WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
0721f867701d9c12f423b46908afc443
Size
19KB
MD5
0721f867701d9c12f423b46908afc443
SHA1
cea4693b89009070f82629b1a176594e90dd4e97
SHA256
e35c786b45b3e65c7ba0728988558d5c013c3fb6a61503a8c19ebdf44e499abf
SHA512
57304a7d70b2be8ad5665def739902a6b2bce0fedc5098773adaa8a9b77e26b74c5c344946c89990284ebf49bb7c932ae80cb5909a2226358531984a9a2a6a39
SSDEEP
384:fZFuYArpiaR3GFRpaVfbM48vg1xRGKEDfvbqhPhgAad:nTUpKohL0g1xRenu+d
Checks for missing Authenticode signature.
resource |
---|
0721f867701d9c12f423b46908afc443 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExInitializeRundownProtection
RtlImageNtHeader
RtlFindLongestRunClear
PsRestoreImpersonation
strcmp
CcRemapBcb
FsRtlInitializeMcb
IoCreateSymbolicLink
RtlAppendUnicodeStringToString
IoReportResourceForDetection
CcGetDirtyPages
FsRtlNotifyFilterChangeDirectory
CcPurgeCacheSection
KeInsertQueueDpc
MmIsAddressValid
FsRtlIsNtstatusExpected
NtDuplicateObject
RtlInt64ToUnicodeString
NtAllocateUuids
ExFreePoolWithTag
READ_REGISTER_BUFFER_ULONG
ZwCreateFile
RtlReserveChunk
FsRtlLookupLastLargeMcbEntry
ZwDisplayString
ZwQueryInformationProcess
KeStackAttachProcess
DbgPrint
IoWritePartitionTableEx
KdDebuggerEnabled
ExAllocatePool
strchr
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ