Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3a422f1ec28852c3fd699fee9f0e5d77_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a422f1ec28852c3fd699fee9f0e5d77_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3a422f1ec28852c3fd699fee9f0e5d77_JaffaCakes118
Size
2.2MB
MD5
3a422f1ec28852c3fd699fee9f0e5d77
SHA1
e2a9cf6eeaf0598032c24990b741238a7e507801
SHA256
d3592fb4b67b3c3112a89a49df856887f4036b7dc1b42c80426b2fdfd548c54a
SHA512
a003da4c583a504a2f7e7e72c1e4d33168c80ca0b53bc90c0987d500662ea64e4c58eb36f835f8a047a6688a184910d66c6b53a7ea30216667a25b832a7275c6
SSDEEP
12288:Oy5CFXNt5mr1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1lC1b:Oy5CFXNt5mk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
k:\Svil\mozilla\flashgot\native\FlashGot\Release\FlashGot.pdb
InternetSetCookieA
GetProcessHeap
MultiByteToWideChar
lstrlenA
InterlockedDecrement
Sleep
CloseHandle
HeapFree
GetTempPathA
HeapAlloc
FormatMessageA
CreateFileA
FlushFileBuffers
SetStdHandle
InterlockedIncrement
ReadFile
CreateProcessA
TlsAlloc
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapSize
GetLastError
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RtlUnwind
RaiseException
GetProcAddress
GetModuleHandleA
ExitProcess
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
EnterCriticalSection
LeaveCriticalSection
MoveFileA
DeleteFileA
GetCommandLineA
GetStartupInfoA
TlsGetValue
HeapReAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetFullPathNameA
GetCurrentDirectoryA
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualAlloc
WriteConsoleA
MessageBoxA
FindWindowA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
OleRun
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromProgID
SysStringByteLen
SafeArrayAccessData
SafeArrayUnlock
VariantInit
SysAllocString
SafeArrayPutElement
SafeArrayCreate
SafeArrayDestroy
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantClear
GetErrorInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ