Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
642828913b14f027828764150ea5d18f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
642828913b14f027828764150ea5d18f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
642828913b14f027828764150ea5d18f_JaffaCakes118
Size
238KB
MD5
642828913b14f027828764150ea5d18f
SHA1
656ec6e56db3bd0176d46b44af23b20ab616eee4
SHA256
1d14c73c9b45a28d1d259b1b05dace849e2f79b0a73aa3015697159259a12721
SHA512
c763047021f5acf9e25d70c506483b186e4d5a5f47178a2f9a985e9a4d0551977d03b3888e2fe756204c2b5441bc1f0890d74c4532e7a1cee009192e597bd59c
SSDEEP
6144:mgP/Cp0w0NQmvG3W9D8fDAIWXkUIh6g+j:Kpwemv0W9DaW0Ue6x
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__vbaVarSub
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaAryMove
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
ord513
__vbaNextEachVar
__vbaFreeObjList
__vbaLineInputVar
ord516
_adj_fprem1
ord518
ord626
__vbaCopyBytes
__vbaStrCat
ord553
__vbaSetSystemError
__vbaHresultCheckObj
__vbaNameFile
__vbaLenVar
_adj_fdiv_m32
__vbaAryDestruct
__vbaVarIndexLoadRefLock
__vbaExitProc
__vbaVarForInit
ord593
ord594
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaVarIndexLoad
ord520
__vbaVargVar
__vbaRefVarAry
__vbaBoolVarNull
_CIsin
ord631
ord632
__vbaVargVarMove
__vbaChkstk
__vbaFileClose
ord526
EVENT_SINK_AddRef
__vbaGenerateBoundsError
ord528
__vbaStrCmp
ord529
__vbaVarTstEq
__vbaPutOwner3
__vbaDateR8
__vbaI2I4
__vbaObjVar
DllFunctionCall
__vbaVarLateMemSt
_adj_fpatan
__vbaRedim
EVENT_SINK_Release
ord600
_CIsqrt
__vbaObjIs
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
__vbaStrToUnicode
__vbaPrintFile
ord712
_adj_fprem
_adj_fdivr_m64
ord607
ord608
ord716
__vbaFPException
ord717
__vbaInStrVar
__vbaStrVarVal
__vbaUbound
__vbaVarCat
__vbaDateVar
__vbaI2Var
ord538
ord645
_CIlog
ord539
__vbaErrorOverflow
__vbaFileOpen
__vbaNew2
__vbaInStr
__vbaVarLateMemCallLdRf
__vbaVar2Vec
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
ord576
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaVarSetVar
__vbaI4Var
__vbaLateMemCall
__vbaVarAdd
__vbaStrToAnsi
__vbaVarDup
__vbaFpI2
__vbaVarCopy
ord616
__vbaVarLateMemCallLd
__vbaUnkVar
__vbaFpI4
__vbaVarSetObjAddref
__vbaLateMemCallLd
__vbaR8IntI2
_CIatan
__vbaStrMove
ord618
__vbaStrVarCopy
__vbaForEachVar
ord619
ord542
ord543
_allmul
ord544
__vbaLenVarB
ord545
_CItan
ord547
__vbaFPInt
__vbaAryUnlock
__vbaVarForNext
_CIexp
__vbaFreeObj
__vbaFreeStr
ord580
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.