Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Target
9339acb02f361583261482e09c2c2a1b285239115d581d88f1d5a19b24401d5b
Size
2.6MB
MD5
5051857dbcd8a4f6b0391e8fe6496132
SHA1
f665a5d4dee5ff1a1551161d9ec5cfc072fe7188
SHA256
9339acb02f361583261482e09c2c2a1b285239115d581d88f1d5a19b24401d5b
SHA512
42e74132d4a747e3c8d81d6999f8414321d00452cafcf7cd8545260d0890cf8e55ecfc16b49a6d796cfac3c11f02fa74ebb5005510a880ba8251891fb2704f90
SSDEEP
1536:SyBbLlmjMFiHJWw91gqbA9YhRY7dgAHga0WDqh30oEygBBvL7aVmn4hT/+h8zNHy:ZBlmj/HJT1gmdgdA0W1NEi6h8/a5b+LK
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Kernel Tools SRC\Kernel Tools\x64\Release\KernelToolsDriver.pdb
FltEnumerateFilters
FltUnregisterFilter
RtlGetVersion
KeGetCurrentIrql
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
CmRegisterCallback
CmUnRegisterCallback
MmGetSystemRoutineAddress
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObReferenceObjectByHandle
ObfDereferenceObject
ZwCreateFile
ZwOpenFile
ZwWriteFile
ZwClose
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
KeBugCheck
MmIsAddressValid
PsSetCreateProcessNotifyRoutine
PsSetCreateProcessNotifyRoutineEx
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
PsGetCurrentProcessId
PsGetProcessId
ZwTerminateProcess
ZwOpenProcess
DbgPrintEx
KeUnstackDetachProcess
PsLookupProcessByProcessId
PsLookupThreadByThreadId
PsGetThreadProcess
IoThreadToProcess
ObOpenObjectByPointer
ZwOpenProcessTokenEx
_vsnprintf
ObReferenceObjectByName
KeSignalCallDpcDone
KeSignalCallDpcSynchronize
KeGenericCallDpc
PsSuspendProcess
PsResumeProcess
ZwAdjustPrivilegesToken
ZwSetInformationProcess
ZwQuerySystemInformation
RtlFindExportedRoutineByName
PsGetProcessImageFileName
__C_specific_handler
PsProcessType
SeTokenObjectType
IoDriverObjectType
MmGetPhysicalAddress
ExGetPreviousMode
IoGetCurrentProcess
PsGetProcessSessionId
KeGetCurrentProcessorNumberEx
MmAllocateContiguousMemory
MmFreeContiguousMemory
ExAllocatePool2
KeBugCheckEx
_stricmp
DbgPrint
RtlCopyUnicodeString
RtlInitUnicodeString
wcsstr
KeStackAttachProcess
HalReturnToFirmware
KeStallExecutionProcessor
WdfVersionUnbind
WdfVersionUnbindClass
WdfVersionBind
WdfVersionBindClass
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ