_Student_ZwOpenProcess@16
_Student_ZwOpenThread@16
_Student_ZwQueryDirectoryFile@44
_Student_ZwQuerySystemInformation@16
Static task
static1
Target
0e60d98b79c3f11104b8d41d46c21388
Size
9KB
MD5
0e60d98b79c3f11104b8d41d46c21388
SHA1
51bfae378615cb7cf72de2d9524ee494341d009f
SHA256
1ae11e1fda60d35a3a34b0a2878dcac0b76b247e4983f638072446525640e040
SHA512
68e8b55b4291346a5e747ca1c609b06cac9204eb75df5984345193c33ffac2b77fdc175df1feda821edf040598268763b51f24995f2a07abf87925d6801707e3
SSDEEP
96:5S1eIRsOCnyidj9idjfixfiq6B/MzB/R3Iv5YNcBCKfIhF1KhhZ+n59Y9ca3w:bssFyi7iRu36uX3IBY+Q3Fc3ZM
Checks for missing Authenticode signature.
resource |
---|
0e60d98b79c3f11104b8d41d46c21388 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
strncmp
IoGetCurrentProcess
ZwClose
ExFreePool
ZwQueryValueKey
ExAllocatePoolWithTag
ZwOpenKey
RtlInitUnicodeString
wcscmp
KeSetEvent
sprintf
PsGetCurrentProcessId
PsLookupProcessByProcessId
PsGetCurrentThreadId
IoDeleteDevice
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
ObfDereferenceObject
IofCompleteRequest
ObReferenceObjectByHandle
DbgPrint
KeServiceDescriptorTable
PsSetCreateThreadNotifyRoutine
IoCreateSymbolicLink
IoCreateDevice
PsGetVersion
ZwQueryDirectoryFile
ZwQuerySystemInformation
ZwOpenThread
ZwOpenProcess
_Student_ZwOpenProcess@16
_Student_ZwOpenThread@16
_Student_ZwQueryDirectoryFile@44
_Student_ZwQuerySystemInformation@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ