Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
7db3e74aa7676b983397e63b90811536
Size
206KB
MD5
7db3e74aa7676b983397e63b90811536
SHA1
0c34fadadaf855b21a5dc714a0ebce0c197f033d
SHA256
e5062c1949b24e8643f8ef26ce1c37ea457ef5ac143f50d7ab895b74fd96caf9
SHA512
2c899ce0ed86bf4a058a97acafe8f473c9bb80c6cf389eb06e2ecda318cf6a5f1a897a61ae3e3bfaaf3f273bb0f32bfca5de1df45f0b6113bf3db3a96c40fe15
SSDEEP
6144:GeOeD1yLT4DWPJGX4w7qaG8/wIHysLNJhOxESQ3ZNuoUxURQh8znEVN0RZUd:GeOehyLTpALnSsLNUo3xUd
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\ied_sec_client_proj\branches\tessafe\1.11.x\Bin\i386\TesSafe.pdb
PsLookupProcessByProcessId
KdDebuggerEnabled
KdDisableDebugger
ExFreePoolWithTag
KeAttachProcess
_strnicmp
ObfDereferenceObject
ZwQueryInformationProcess
IoGetCurrentProcess
KefReleaseSpinLockFromDpcLevel
KefAcquireSpinLockAtDpcLevel
IoThreadToProcess
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
ExAllocatePoolWithTag
_except_handler3
MmUnlockPages
KeUnstackDetachProcess
KeStackAttachProcess
Ke386IoSetAccessProcess
Ke386SetIoAccessMap
Ke386QueryIoAccessMap
ZwUnloadDriver
PsTerminateSystemThread
KeWaitForSingleObject
KeSetBasePriorityThread
KeSetPriorityThread
KeGetCurrentThread
KeSetEvent
ZwQuerySystemInformation
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
MmFreeNonCachedMemory
PsSetCreateProcessNotifyRoutine
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwReadFile
ObReferenceObjectByHandle
MmSectionObjectType
KeClearEvent
RtlInitUnicodeString
KeInitializeEvent
KeInitializeSpinLock
PsThreadType
PsCreateSystemThread
PsGetCurrentProcessId
PsProcessType
MmAllocateNonCachedMemory
IoCreateSymbolicLink
IoCreateDevice
PsGetVersion
KeTickCount
strrchr
PsLookupThreadByThreadId
KeDelayExecutionThread
KeInsertQueueApc
KeInitializeApc
ObReferenceObjectByName
IoDriverObjectType
wcsncat
wcsncpy
_stricmp
KeSetAffinityThread
KeQueryActiveProcessors
RtlCreateRegistryKey
RtlWriteRegistryValue
RtlDeleteRegistryValue
MmHighestUserAddress
RtlAppendUnicodeStringToString
RtlCopyUnicodeString
RtlVolumeDeviceToDosName
RtlUnicodeToMultiByteN
strncpy
ObQueryNameString
ZwDuplicateObject
ZwOpenProcess
ZwQueryObject
ObOpenObjectByPointer
MmMapLockedPagesSpecifyCache
MmBuildMdlForNonPagedPool
MmSystemRangeStart
IoFileObjectType
KeBugCheckEx
MmGetSystemRoutineAddress
KeAddSystemServiceTable
MmIsAddressValid
ExEventObjectType
KeServiceDescriptorTable
HalQueryRealTimeClock
KfAcquireSpinLock
KfReleaseSpinLock
KeQueryPerformanceCounter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE