Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Target
7ec52743b944489a20673e783968c75c62cf03c38b88734f8e05bdc2171e829c
Size
39KB
MD5
a369399fea0b57fe39863c73e6cbadd9
SHA1
32947df9066c67ee0734f3944b8c1926476ccbbf
SHA256
7ec52743b944489a20673e783968c75c62cf03c38b88734f8e05bdc2171e829c
SHA512
52d466eea0980cc2cd61a9b4f185b850ff3e4802a1ad10d9eb94f068ea18a9a3756fb3ddcd219e99349349cabddaeb9496dc127160fafc985ca1b663b8b8d14f
SSDEEP
768:4jFtFqvwSb4yS8DDwz6CCAcgg6suH6ik/YHI2kKzTnZjJItSvs:eqZnD26CCAcgvaR/VVKzLZjStSvs
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
DbgPrint
ExAllocatePoolWithTag
ExFreePoolWithTag
PsWrapApcWow64Thread
ObfDereferenceObject
PsGetCurrentThreadId
PsGetProcessId
ZwQuerySystemInformation
KeInitializeApc
PsIsThreadTerminating
KeInsertQueueApc
KeTestAlertThread
PsGetThreadTeb
PsGetCurrentProcessWow64Process
PsLookupThreadByThreadId
RtlInitUnicodeString
RtlCompareUnicodeString
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
MmIsAddressValid
ObReferenceObjectByName
IoDriverObjectType
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
KeEnterCriticalRegion
KeLeaveCriticalRegion
ExAllocatePool
MmBuildMdlForNonPagedPool
MmMapLockedPages
MmUnmapLockedPages
IoAllocateMdl
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoFreeMdl
ObReferenceObjectByHandleWithTag
ObCloseHandle
PsGetProcessExitStatus
IoCreateFileEx
PsLookupProcessByProcessId
KeStackAttachProcess
KeUnstackDetachProcess
PsGetProcessWow64Process
ZwFreeVirtualMemory
ZwQueryVirtualMemory
MmFlushImageSection
ZwDeleteFile
IoFileObjectType
MmHighestUserAddress
strncmp
RtlEqualUnicodeString
PsGetProcessPeb
ZwAllocateVirtualMemory
__C_specific_handler
IoAllocateIrp
IofCallDriver
IoCreateFile
IoFreeIrp
ObReferenceObjectByHandle
ZwClose
IoGetFileObjectGenericMapping
SeCreateAccessState
ObCreateObject
RtlGetVersion
RtlCompareMemory
MmGetSystemRoutineAddress
MmProtectMdlSystemAddress
MmMapLockedPagesSpecifyCache
MmAllocatePagesForMdlEx
ZwOpenSection
ZwMapViewOfSection
ZwUnmapViewOfSection
ExAcquireFastMutex
ExReleaseFastMutex
MmMapIoSpace
IoGetCurrentProcess
ObRegisterCallbacks
ObUnRegisterCallbacks
ObGetFilterVersion
MmGetPhysicalAddress
PsProcessType
_stricmp
strstr
_strupr
MmCopyVirtualMemory
_strnicmp
ZwOpenFile
ZwCreateSection
KeBugCheckEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ