Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
0635f0b8c03a11324857910a7a0f6b74_JaffaCakes118
Size
352KB
MD5
0635f0b8c03a11324857910a7a0f6b74
SHA1
7526655c66607416993e27d58ddabadeb2b6ac80
SHA256
fcd405e1178fe8135596c23c4bbdfe955230f2e72180da1f6ca09309ca13b7ae
SHA512
15d69d5fc1932c2633fddc38a62933868fa65f27a836bb4ac31720fba0b6106fb365f4f5270889768b3da21145a584decf5a6ece0fd3376f427c48b1b40f94c3
SSDEEP
6144:d2FeieuIvx22VI+g3gnNL6cQPxbpBYsEvbkQfIViX9OPbsRSpyoQSJ/Y3WwyIRR0:d2FeiebKHPVE4Qi0SoJzSVOgUYSdvgsW
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\ied_sec_client_proj\trunk\tessafe\Bin\i386\TesSafe.pdb
_except_handler3
ExFreePoolWithTag
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
ExAllocatePoolWithTag
ZwQueryInformationProcess
ObfDereferenceObject
ObOpenObjectByPointer
PsProcessType
PsLookupProcessByProcessId
MmHighestUserAddress
KeSetAffinityThread
KeGetCurrentThread
PsThreadType
IoFreeMdl
MmMapLockedPagesSpecifyCache
MmBuildMdlForNonPagedPool
IoAllocateMdl
MmSystemRangeStart
KeUnstackDetachProcess
KeStackAttachProcess
ZwClose
ZwQueryObject
ObReferenceObjectByHandle
wcsncat
ObQueryNameString
ZwDuplicateObject
ZwOpenProcess
_strnicmp
KeTickCount
KeQueryActiveProcessors
MmUnlockPages
_stricmp
ZwQuerySystemInformation
KdDisableDebugger
KdDebuggerEnabled
KeServiceDescriptorTable
KeAddSystemServiceTable
Ke386IoSetAccessProcess
Ke386SetIoAccessMap
Ke386QueryIoAccessMap
KeWaitForSingleObject
KeSetEvent
IofCompleteRequest
PsGetVersion
KefReleaseSpinLockFromDpcLevel
KefAcquireSpinLockAtDpcLevel
IoThreadToProcess
MmFreePagesFromMdl
RtlCopyUnicodeString
MmUnmapLockedPages
ObReferenceObjectByName
IoDriverObjectType
wcsncpy
KeDelayExecutionThread
KeInsertQueueApc
KeInitializeApc
PsLookupThreadByThreadId
PsTerminateSystemThread
KeSetBasePriorityThread
KeSetPriorityThread
KeCancelTimer
KeClearEvent
MmProbeAndLockPages
KeAttachProcess
strrchr
KeInitializeSpinLock
KeSetTimerEx
KeInitializeEvent
KeInitializeTimer
KeInitializeDpc
ZwReadFile
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwUnloadDriver
MmSectionObjectType
IoDeleteDevice
IoDeleteSymbolicLink
MmFreeNonCachedMemory
PsSetCreateProcessNotifyRoutine
RtlRandom
ExEventObjectType
PsCreateSystemThread
PsGetCurrentProcessId
MmAllocateNonCachedMemory
IoCreateSymbolicLink
IoCreateDevice
KeBugCheckEx
IoGetCurrentProcess
MmIsAddressValid
RtlInitUnicodeString
MmAllocatePagesForMdl
MmGetSystemRoutineAddress
ExAcquireFastMutex
ExReleaseFastMutex
KfAcquireSpinLock
KfReleaseSpinLock
KeQueryPerformanceCounter
HalQueryRealTimeClock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE