Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Target
43e41581a8c3bae7666b1b6bf4b7d094_JaffaCakes118
Size
76KB
MD5
43e41581a8c3bae7666b1b6bf4b7d094
SHA1
c4ffe7fd337d42ba9080e8c8a0d250dd95fd8d31
SHA256
6b762eef07a29a4f611e7f67c65a492ef4d6ab8e847ab558ab03159681ebe15a
SHA512
4770c24a71a4b169a28ca33453ba77def79af3d648aa0c68f01494e2995b053dbfe3bac7b01224a33ee7ce4f310dcb2696ec5c02f6b9e597408b5765711f761d
SSDEEP
1536:mN3ZbCMluxvF029wgE+uS8WhAjZPNiy6bMdczcAIh4Cx0Ra7Cq:mhZb/MRF0ewSuS8WhAxNhkFIDx0cJ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\trunk_jieou\ftsafe\drivers\tsdefensebt\bin\fre\i386\TSDefenseBt.pdb
ExAllocatePoolWithTag
ExGetPreviousMode
RtlInitUnicodeString
memset
ObfDereferenceObject
MmIsAddressValid
IoGetDeviceObjectPointer
RtlCompareUnicodeString
RtlCompareMemory
ZwDeleteKey
ZwCreateKey
KeSetTimer
KeInitializeTimerEx
_allmul
RtlEqualUnicodeString
ZwQuerySystemInformation
PsLookupProcessByProcessId
IoFreeMdl
MmUnlockPages
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
IoAllocateMdl
IoGetStackLimits
ZwOpenKey
ZwQueryValueKey
ZwSetValueKey
ZwDeleteValueKey
memcpy
ZwEnumerateKey
ZwFlushKey
ZwQuerySecurityObject
ZwSetSecurityObject
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
CmRegisterCallback
CmUnRegisterCallback
KeSetEvent
ExQueueWorkItem
KeInitializeEvent
_strnicmp
PsGetProcessImageFileName
ObOpenObjectByPointer
ObReferenceObjectByPointer
IoDriverObjectType
PsGetVersion
IoDeleteSymbolicLink
ZwQueryObject
IoUnregisterShutdownNotification
PsSetCreateProcessNotifyRoutine
IoRegisterShutdownNotification
InitSafeBootMode
IoCreateFile
_wcsnicmp
PsTerminateSystemThread
ObReferenceObjectByHandle
PsThreadType
wcsncpy
ExAllocatePool
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
RtlCopyUnicodeString
ObQueryNameString
IoFileObjectType
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
ObReferenceObjectByName
IofCompleteRequest
IoDeleteDriver
MmGetSystemRoutineAddress
KeDelayExecutionThread
strrchr
_stricmp
IoCreateDriver
IoGetCurrentProcess
ExInitializeResourceLite
ExAcquireResourceSharedLite
ExAcquireResourceExclusiveLite
ExIsResourceAcquiredSharedLite
ExIsResourceAcquiredExclusiveLite
ExReleaseResourceLite
ExDeleteResourceLite
KeEnterCriticalRegion
KeLeaveCriticalRegion
InterlockedPopEntrySList
InterlockedPushEntrySList
ExInitializeNPagedLookasideList
ExDeleteNPagedLookasideList
ZwCreateFile
PsGetCurrentProcessId
MmSystemRangeStart
ObMakeTemporaryObject
IoRegisterDriverReinitialization
ExUuidCreate
KeTickCount
KeBugCheckEx
wcsncat
ZwEnumerateValueKey
ExFreePoolWithTag
ZwClose
KeWaitForSingleObject
PsCreateSystemThread
_vsnwprintf
ExFreePool
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlUnicodeStringToInteger
wcslen
ZwReadFile
ZwQueryInformationFile
RtlVolumeDeviceToDosName
IoGetRelatedDeviceObject
ZwQueryInformationProcess
_wcsicmp
ObfReferenceObject
PsGetProcessSectionBaseAddress
KeUnstackDetachProcess
KeStackAttachProcess
IoVolumeDeviceToDosName
wcsstr
MmHighestUserAddress
RtlUnwind
_allshl
_aullshr
_aulldiv
KeRaiseIrqlToDpcLevel
KfLowerIrql
KeAcquireQueuedSpinLock
KeReleaseQueuedSpinLock
KeQueryPerformanceCounter
KeGetCurrentIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ