Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
2f74f8a2259f62141aa4135cd24ea4d1_JaffaCakes118
Size
18KB
MD5
2f74f8a2259f62141aa4135cd24ea4d1
SHA1
853d7bd9ec8b5ad95d78120223216990e01fd03e
SHA256
714226f79892e551cd4f58c16093984b301bc46c61c9a502bb730af9e053c915
SHA512
23a95bd52aeac4061c938d40e80738fc9c9961fcd1e98385ae3818a2204014cb1c8669aab15d85558047c20875facdcd24d7b0e9285bc4d8a2eedb45a88be4e2
SSDEEP
192:34vo1e+MC7R7yY6ZoiA8RyowJL/aMjGwP7KMVtWW+ebMjMlo:3n7R7y5ZRYJLWCvbk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
D:\Projects\GG\client_plugins\anti-hack\ProtectDriver\objfre_w2K_x86\i386\ProtectDriver.pdb
KeWaitForSingleObject
ObReferenceObjectByHandle
PsGetProcessId
IoGetCurrentProcess
MmUnmapIoSpace
MmMapIoSpace
MmGetPhysicalAddress
KeServiceDescriptorTable
IofCompleteRequest
memmove
KeClearEvent
KeSetEvent
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
KeDelayExecutionThread
RtlInitUnicodeString
KeInitializeEvent
MmGetSystemRoutineAddress
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
IoDeleteDevice
tolower
KeGetCurrentIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ