Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
31d7354a3b2ebe74eef4b2fb8e39b5dd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31d7354a3b2ebe74eef4b2fb8e39b5dd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
31d7354a3b2ebe74eef4b2fb8e39b5dd_JaffaCakes118
Size
1.3MB
MD5
31d7354a3b2ebe74eef4b2fb8e39b5dd
SHA1
759c618922131df1b0518e4b99357ae5725a89e9
SHA256
a063ce83ac44373ac813b34ba6904d2c353bd57a57c79bfa4a0c4fb0476408a8
SHA512
fb4f1ea955aa4dd9d4ac31128416b85b45d9b2b7caa975bb539afd02af80a593a8f6de4507ae71a8e54c5ceec2170ed34f4cacabcd19187b2ccf7d15ae6a874d
SSDEEP
24576:mnDvrbgH7k8JKA9MP4OvBEqYYj/mP3vLq0tPwD3nXn3J2vOu0O7Rs:UDjbWRJnqAHfL1PwD3XMvOKs
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\Boy\Desktop\Desktop\obstool_111\obfstool_19_07_2011\Template_LoadEXE_msi\Release\LoadEXE.pdb
FindResourceA
SetThreadContext
GetCurrentProcess
Sleep
SizeofResource
GetFileAttributesA
GetProcAddress
GetModuleHandleA
GetTempPathA
ResumeThread
DeleteFileA
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetConsoleCP
GetConsoleMode
CloseHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CreateFileA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapSize
SetEndOfFile
GetProcessHeap
ReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ