Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
0019c5944e7de92b1a465b62c89e373e_JaffaCakes118
Size
32KB
MD5
0019c5944e7de92b1a465b62c89e373e
SHA1
960dc8d6159ebea5131fc4ef4ad0a07a0f694c81
SHA256
ea966d4ad53411cabff2740867c75c5a18f87f11e84c8dccad73d504b14f81ce
SHA512
13918931d5e225dd94f51c26f5b16fd86d845c456b5ba43feb61f476e83cd29b878c42c535c75a05cc15e9f607b674b13189cd7768b827f641195e5ef4202fa9
SSDEEP
384:DeHh2zlzM2GcAeWuTn3o6YJLWCvb2d+uh5n:DeHIvozLpbQ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\projects\gg\client_plugins\anti-hack\protectdriver\objfre_w2K_x86\i386\ProtectDriver.pdb
IoDeleteSymbolicLink
RtlInitUnicodeString
KeDelayExecutionThread
PsSetCreateProcessNotifyRoutine
IoCreateSymbolicLink
IoCreateDevice
strncmp
MmIsAddressValid
IoGetCurrentProcess
MmGetSystemRoutineAddress
PsInitialSystemProcess
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
ZwClose
IoDeleteDevice
ZwOpenProcess
KeInitializeMutex
KeWaitForSingleObject
KeReleaseMutex
MmUnmapIoSpace
MmMapIoSpace
MmGetPhysicalAddress
KeServiceDescriptorTable
memcpy
memmove
ObfDereferenceObject
ObReferenceObjectByHandle
tolower
KeTickCount
ZwTerminateProcess
IofCompleteRequest
PsGetProcessId
RtlUnwind
KeBugCheckEx
KeGetCurrentIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ