Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
16c202a683ef85a7b3595898c04eef4e_JaffaCakes118
Size
33KB
MD5
16c202a683ef85a7b3595898c04eef4e
SHA1
4e3eaecc444cad6cbb3cb79f74c092d239c35b8d
SHA256
68d49671e0d34960ac99a92f74cebffe51007458f1098c0e6dd6ae774d1b8d5f
SHA512
0534dcd9966c77a0aa17bcff81452756cb6f6d39fdf97b664385f092239e3b52d657507442ce7f2a113afe8ade832f62f9e4a012736623ee2765acdb0e1df867
SSDEEP
768:V/MSsk0Dp9Ur2kSjjqbTdmA3gCTXem8BieHLMbC:VXuvs2kSjjqbTdxQCN8BDHkC
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
f:\spyware\spkdll\sysdriver\t\objfre_w2K_x86\i386\RKHit.pdb
_except_handler3
MmUnlockPages
ObfDereferenceObject
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
MmIsAddressValid
KeInitializeSpinLock
ObReferenceObjectByName
IoDriverObjectType
RtlInitUnicodeString
ExFreePool
_stricmp
strrchr
ExAllocatePoolWithTag
ZwQuerySystemInformation
IoFileObjectType
ZwClose
ObReferenceObjectByHandle
ZwOpenKey
PsProcessType
IoDeviceObjectType
MmSectionObjectType
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlImageDirectoryEntryToData
NtBuildNumber
wcscpy
ProbeForRead
IoGetCurrentProcess
RtlAppendUnicodeStringToString
RtlVolumeDeviceToDosName
IoCreateFile
KeGetCurrentThread
KeServiceDescriptorTable
ObQueryNameString
ObReferenceObjectByPointer
ZwQueryInformationProcess
ObOpenObjectByPointer
PsGetVersion
IoAllocateMdl
ObfReferenceObject
PsLookupThreadByThreadId
IoThreadToProcess
NtGlobalFlag
PsThreadType
IofCallDriver
ZwOpenDirectoryObject
MmGetVirtualForPhysical
MmGetPhysicalAddress
MmSystemRangeStart
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
MmBuildMdlForNonPagedPool
IoAllocateIrp
IoGetBaseFileSystemDeviceObject
KeInitializeEvent
IoGetDeviceObjectPointer
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
swprintf
IoGetConfigurationInformation
ZwTerminateProcess
PsGetCurrentProcessId
KeInsertQueueApc
KeInitializeApc
KeClearEvent
ExfInterlockedInsertTailList
ExfInterlockedRemoveHeadList
wcsstr
_wcsupr
IoCreateSynchronizationEvent
MmGetSystemRoutineAddress
ZwOpenEvent
IoDeleteDevice
RtlInitAnsiString
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUserProbeAddress
IoFreeMdl
KfAcquireSpinLock
KfReleaseSpinLock
KeStallExecutionProcessor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ