Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
039402b7abe83363a8f474e437213356_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
039402b7abe83363a8f474e437213356_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
039402b7abe83363a8f474e437213356_JaffaCakes118
Size
268KB
MD5
039402b7abe83363a8f474e437213356
SHA1
80d982039c9ffae08e90280cf5cf158253e3448c
SHA256
d7f7ac20f859c4bc21d716b873e0a9fcc0b5ae79a5a44fd72aa20f41fd540913
SHA512
d3b7930c263b2be4d607894b4cb690e789e754ee4e08ca2f65ac1955c8060f810297266be3e0c150add470961db5f892227db20cfa3de55d69aa3ad0e2b8cb6b
SSDEEP
1536:xnA2g/HTjfVN6Vf4c9xFCrk0sNLU1xdn8+kAN7y4cSWDuoIQsnf4q:AyykNcZcgQG
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\400\Release\aswAvast.pdb
_basInitLibrary@4
_basFreeLibrary@0
_basFreeLanguage@4
_basLogEvent@24
_basCheck@0
_basGetErrorString@12
_basGetProfileStringA@20
_basGetProfileInt@12
_basFreeStorage@4
_basGetLanguagePath@0
_basIsOS@4
_basInitThreadLocale@0
_basExecuteAndWait@8
_basCreatePath@16
_basProductInfoFilesOnly@0
_basLoadLanguage@4
_basIsCurrCodePageSkinnable@0
_basIsManagedAvast@0
_basIsWhsEdition@0
_licShowDialog@8
_basPlaySound@4
_basGetProcAddress@8
_basLoadStorage@0
_basProductInfo@0
_usiErrorMessage@28
_usiInitLibrary@4
_usiFreeLibrary@0
_usiMakeReboot@4
??0CNewsViewerCtrl@@QAE@XZ
_usiGetALWILRegistryValue@12
_usiFormatDateTime@16
?ShowRecentNews@CNewsViewerCtrl@@QAEKVCOleDateTime@ATL@@AAH_N@Z
?Initialize@CNewsViewerCtrl@@QAEKAAV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@0K@Z
??1CNewsViewerCtrl@@UAE@XZ
_usiMessage@20
?SetXButtonStyle@CXTButton@@QAEKKH@Z
??0CXTButton@@QAE@XZ
??1CXTButton@@UAE@XZ
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord757
ord578
ord1123
ord876
ord3850
ord2322
ord310
ord2248
ord764
ord2020
ord1126
ord5975
ord1054
ord3830
ord3641
ord1084
ord3210
ord1934
ord3163
ord1280
ord5182
ord4890
ord1671
ord1670
ord1551
ord5912
ord1620
ord1617
ord3946
ord1401
ord4244
ord1010
ord1908
ord5073
ord6275
ord4185
ord5203
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4262
ord3182
ord605
ord4125
ord4320
ord6067
ord2657
ord3934
ord911
ord5529
ord2902
ord784
ord297
ord1489
ord299
ord2933
ord6118
ord1903
ord1063
ord1308
ord2176
ord2321
ord5563
ord781
ord304
ord4035
ord354
ord1794
ord4749
ord709
ord501
ord1482
ord907
ord2131
ord4212
ord2164
ord4115
ord6090
ord4580
ord3684
ord3161
ord1279
ord5637
ord3596
ord5915
ord1402
ord5214
ord760
ord572
ord602
ord347
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord4541
ord266
ord265
ord762
ord5152
ord1207
_mbsnbcmp
strlen
_setmbcp
fopen
fclose
getc
atoi
_ismbcdigit
_snprintf
_except_handler3
__CxxFrameHandler
free
_mbsnbcpy
_mbscmp
_mbsicmp
_localtime64
swprintf
sprintf
ceil
floor
_time64
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
__security_error_handler
memset
GetProcAddress
FreeLibrary
LoadLibraryExA
lstrcatA
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
ExitProcess
GetModuleHandleA
GetVersionExA
lstrlenA
InitializeCriticalSection
DeleteCriticalSection
GetLastError
CloseHandle
TerminateThread
GetExitCodeThread
WaitForSingleObject
CreateThread
GetModuleFileNameA
LoadBitmapA
GetSystemMetrics
LoadIconA
EnableWindow
SetForegroundWindow
KillTimer
SetTimer
InvalidateRect
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
MessageBoxA
StretchBlt
GetObjectA
RealizePalette
CreateCompatibleDC
CreateSolidBrush
ord17
SystemTimeToVariantTime
dep_osIsWow64
fsGetAvastDataPath
fsGetAvastProgramPath
fsGetAvastLicenseFile
BtsSchedule
avscanGetVirusDetails
_tskFreeData@4
_tskFreeLibrary@0
_tskCopyResult@4
_tskFreeResult@4
_tskLogResult@12
_tskProcessData@16
_tskVirusAction@4
_tskInitLibrary@0
_tskExecData@8
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
DSA_FileVerify
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ