Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
102c02c860e08c43bcee40a2f045ab34_JaffaCakes118.exe
Resource
win7-20240215-en
Target
102c02c860e08c43bcee40a2f045ab34_JaffaCakes118
Size
721KB
MD5
102c02c860e08c43bcee40a2f045ab34
SHA1
0438c797a1a6e734ba8f820dd757c01ec4f7f6c8
SHA256
d641c10f01473d13f54d2e60a4e776008be0ccefb58650438a5e0527636f324c
SHA512
c2c95b1e151496b073f756ffbba2b5961c1afbbcca965b333c71fbfc2591883c2b0871515aec4a6b6deca20e55bc9da9a86c9af95e0aa8c497bf16d9a61e663e
SSDEEP
12288:bsAAQVg0YHl73Wj56UZ6KFj0oqw9h97TF0WmWEXZY5uZ/p2IB1l+J:bsAA+g0Yh32Fj5qMh97T5BK/p28/g
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\teamcity-agent\work\2cdd6a239545233d\build.msvc\Win32\Installer-Release\BootstrapperQTStudio\RobloxStudioLauncherBeta.pdb
DeleteCriticalSection
RaiseException
DecodePointer
CreateEventA
GetModuleHandleW
OpenEventW
CreateEventW
OpenMutexW
CreateMutexW
lstrcmpW
CloseHandle
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetLastError
GetProcessHeap
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
IsValidLocale
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetStdHandle
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
SetFilePointerEx
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetCommandLineW
GetCommandLineA
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapDestroy
GetProcAddress
LocalFree
FormatMessageA
LockResource
FreeLibrary
LoadResource
SizeofResource
LoadLibraryW
FindResourceW
FindResourceExW
CreateDirectoryW
CreateFileW
GetFileAttributesW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
FindClose
FormatMessageW
DeleteFileW
FindFirstFileW
FindNextFileW
VerSetConditionMask
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
OpenProcess
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetCurrentThread
Sleep
GetSystemTime
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
lstrlenW
CreateFileMappingW
GetModuleFileNameW
CreateProcessW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetFileAttributesW
VerifyVersionInfoW
GetGeoInfoW
GetUserGeoID
GetUserDefaultLCID
GetSystemTimeAsFileTime
CreateSemaphoreA
WaitForSingleObjectEx
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
SetLastError
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsFree
CreateSemaphoreW
GetShortPathNameW
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
OpenEventA
WaitForMultipleObjectsEx
GetCurrentProcessId
ResumeThread
TlsGetValue
TlsSetValue
CreateWaitableTimerW
SetWaitableTimer
GetFileSizeEx
SetFileTime
GetFileAttributesExW
GetTempPathW
FileTimeToSystemTime
QueryPerformanceCounter
QueryPerformanceFrequency
GetFileSize
WriteFile
ReadFile
SetFilePointer
GetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcmpiW
lstrcpyW
lstrcatW
IsDebuggerPresent
OutputDebugStringW
EncodePointer
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
GetParent
GetWindowLongW
GetWindowRect
InvalidateRect
ShowWindow
CreateWindowExW
CallWindowProcW
DefWindowProcW
SendMessageW
MessageBoxA
SetWindowLongW
GetWindowTextW
SetForegroundWindow
IsWindowVisible
PostMessageW
LoadBitmapW
LoadIconW
FillRect
GetMessageW
TranslateMessage
DispatchMessageW
PostThreadMessageW
SetWindowPos
CharUpperW
CharNextW
SetFocus
LoadAcceleratorsW
TranslateAcceleratorW
SetWindowTextW
MessageBoxW
EnumWindows
GetWindowThreadProcessId
PostQuitMessage
RegisterClassW
DestroyWindow
GetDlgItem
GetDlgCtrlID
SetTimer
KillTimer
EnableWindow
GetSystemMetrics
DrawTextW
GetDC
ReleaseDC
BeginPaint
EndPaint
MessageBoxExW
SetDCBrushColor
SelectObject
CreateSolidBrush
DeleteObject
SetDCPenColor
Rectangle
GetStockObject
GetDeviceCaps
CreatePen
CreateFontW
SetBkMode
SetTextColor
RoundRect
RegCreateKeyExW
CopySid
GetUserNameW
CheckTokenMembership
RegDeleteKeyW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
RegQueryValueExW
DuplicateToken
OpenProcessToken
OpenThreadToken
IsValidSid
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
GetLengthSid
SHGetFolderPathAndSubDirW
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
CoInitialize
CoUninitialize
StringFromGUID2
CreateStreamOnHGlobal
CoCreateInstance
CoCreateGuid
RegisterTypeLi
StrCpyW
PathFileExistsW
StrCmpNW
SHDeleteKeyW
StrCmpW
StrStrW
PathAddBackslashW
StrRChrW
StrDupW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
IsNetworkAlive
UnloadUserProfile
freeaddrinfo
connect
htons
getaddrinfo
WSAStartup
WSACleanup
WSAGetLastError
socket
send
sendto
closesocket
InternetSetOptionW
HttpQueryInfoW
InternetWriteFile
InternetQueryDataAvailable
HttpSendRequestExW
InternetReadFile
HttpSendRequestW
InternetQueryOptionA
InternetQueryOptionW
HttpEndRequestW
HttpAddRequestHeadersW
InternetOpenW
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
InitCommonControlsEx
_TrackMouseEvent
GdiplusShutdown
GdipCloneImage
GdiplusStartup
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdipFree
GdipAlloc
GdipDisposeImage
GetProcessImageFileNameW
EnumProcesses
timeSetEvent
timeGetDevCaps
timeBeginPeriod
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ