Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Target
7dd3a5ac8a4535c449dfd0c10dbae296
Size
12KB
MD5
7dd3a5ac8a4535c449dfd0c10dbae296
SHA1
6c23e40ff5cd9be4c01755cf0c0ecb59356231f1
SHA256
4a22bb60e67bd9f56af81c22dbead4535a9cfac9fcfc591ca5078de06de15def
SHA512
39050afced8aa65fc5eea1a360d8fcc2a596940791f5213d2ce10bfada1e340425cc726a96168d1731b9235613ddadf209ecc656036623da3f2c2c713d7378ca
SSDEEP
192:pVu/sUxDQHPLa14AHAwq4rCY6+vhHiXjtlAur9ZCspE+TMDQrPe:3u/sUlqPLGHTqVYLHizUHeMDD
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
d:\mydr\new\objchk_win7_amd64\amd64\GetHandle.pdb
MmUnmapLockedPages
PsGetProcessSectionBaseAddress
MmCopyVirtualMemory
IoDeleteSymbolicLink
PsLookupProcessByProcessId
RtlInitUnicodeString
IoDeleteDevice
MmProtectMdlSystemAddress
IoFreeMdl
KeDetachProcess
PsCreateSystemThread
MmMapLockedPagesSpecifyCache
IoGetCurrentProcess
ZwFreeVirtualMemory
IofCompleteRequest
MmProbeAndLockPages
KeAttachProcess
MmUnlockPages
IoCreateSymbolicLink
MmIsAddressValid
ObfDereferenceObject
IoCreateDevice
RtlAssert
IoAllocateMdl
ZwAllocateVirtualMemory
__C_specific_handler
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE