Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8449ffd22b28385451ef68d4c701799b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8449ffd22b28385451ef68d4c701799b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8449ffd22b28385451ef68d4c701799b_JaffaCakes118
Size
14KB
MD5
8449ffd22b28385451ef68d4c701799b
SHA1
3e6aefddf08699bd69e8151018671f7d061f17e0
SHA256
2eaefbffc5574f4230fa35128b6a3f10ef6092b68565718d6b2de52459b0de4e
SHA512
53e2083da84f768419d0a6d53b44afd85be0d2e7e09f617edae59ff0ec11c71d8d4bc261368b6791d50ac159b62d46df28e78b5ac5f22c540b88c44de03bfe80
SSDEEP
192:iubkbdqZBOa4cxKgi35avlaHqEqmbB+SuiL/CldolMvMjGwPOMjaoX+KzVMMyMnQ:4ojxKgMavoKE7F7uiLCcY0vlJtbs
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\bld_area\savcorp10.0_rc1\Norton_AntiVirus\Corporate_Edition\Win32\src\bin.ira\nlnhook.pdb
GetModuleFileNameA
OutputDebugStringA
CopyFileA
SetCurrentDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
_XcptFilter
_exit
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
_c_exit
_except_handler3
__security_error_handler
malloc
_vsnprintf
free
_mbsrchr
_ismbblead
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ