Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
a82f36d7f6b368bbdc26d7b13add8795_JaffaCakes118
Size
127KB
MD5
a82f36d7f6b368bbdc26d7b13add8795
SHA1
3c05531abaf68d5dedcb710f0e34461223c1b7de
SHA256
48c30f45e5b7185cfa3f68b4932089b30c1e25770e8d2cf59baa0ef6f8e1237a
SHA512
5cac4b497efb1a0223a35e3567d8b9629af07e737be936cebd06528a38a4834f0b0361ef2f0e6ce251d788e033c44a166c4d7144741464377329837718e0037e
SSDEEP
1536:EvwVYg0KL7ivNv/qAF8lC7E1SU39X5rL98nXCAhoU8uMxpq2R8T2dK0:b0KL7Kv/qKcXGnhoU8txpF8wK0
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\work\mbamsw~1\FLT\binchk_wlh_x86\i386\mbamswissarmy32.pdb
KeLeaveCriticalRegion
KeEnterCriticalRegion
CcWaitForCurrentLazyWriterActivity
KeInitializeTimer
ExFreePoolWithTag
RtlUpcaseUnicodeChar
ExAllocatePoolWithTag
memcpy
ZwQueryVolumeInformationFile
ZwClose
ZwOpenFile
MmUnmapLockedPages
MmMapLockedPagesSpecifyCache
FsRtlIsNameInExpression
RtlUpcaseUnicodeString
IoCreateFile
IoRegisterLastChanceShutdownNotification
ZwDisplayString
RtlCompareMemory
_allmul
IoGetDeviceAttachmentBaseRef
ObfReferenceObject
IoGetDeviceObjectPointer
swprintf
KeWaitForSingleObject
IofCallDriver
ExReleaseResourceLite
ExAcquireResourceExclusiveLite
IoBuildSynchronousFsdRequest
KeInitializeEvent
IofCompleteRequest
ExAllocatePool
ZwQueryValueKey
ZwOpenKey
_alldiv
_allrem
_allshl
_aulldiv
_aullrem
RtlDecompressBuffer
_allshr
RtlEqualUnicodeString
_wcsicmp
RtlOemToUnicodeN
IoStartPacket
IoSetHardErrorOrVerifyDevice
IoAllocateIrp
IoFreeIrp
IoFreeMdl
MmUnlockPages
IoStartNextPacket
IoWriteErrorLogEntry
IoAllocateErrorLogEntry
KeInitializeDpc
IoInitializeIrp
KefReleaseSpinLockFromDpcLevel
KefAcquireSpinLockAtDpcLevel
IoGetDriverObjectExtension
MmIsAddressValid
RtlAppendUnicodeToString
ObQueryNameString
RtlAppendUnicodeStringToString
RtlCopyUnicodeString
ObReferenceObjectByHandle
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
FsRtlDissectName
RtlVolumeDeviceToDosName
wcschr
IoFileObjectType
RtlAnsiStringToUnicodeString
strchr
RtlInitAnsiString
strstr
ZwQuerySystemInformation
toupper
towupper
RtlEqualString
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
wcsncpy
ObCreateObject
IoDriverObjectType
RtlUnicodeStringToAnsiString
ObReferenceObjectByName
RtlFreeUnicodeString
ZwWriteFile
ZwCreateFile
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
_vsnwprintf
IoGetLowerDeviceObject
KeTickCount
KeBugCheckEx
RtlUnwind
KeSetTimer
KeBugCheck
RtlAssert
IoDeleteSymbolicLink
ObfDereferenceObject
memset
IoCreateDevice
RtlInitUnicodeString
DbgPrint
IoCreateSymbolicLink
_vsnprintf
IoDeleteDevice
KfAcquireSpinLock
KfReleaseSpinLock
KfRaiseIrql
KfLowerIrql
HalReturnToFirmware
KeGetCurrentIrql
KeRaiseIrqlToDpcLevel
ClassReleaseRemoveLock
ClassCompleteRequest
ClassAcquireRemoveLockEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ