UixIxexSlawkqmFd
Cjaogc
Wqnkgb
Static task
static1
Target
01783deeae133e8c03fb00baa43f6e75_JaffaCakes118
Size
20KB
MD5
01783deeae133e8c03fb00baa43f6e75
SHA1
27a5d2e2bc8689ee2d489eb15b3b0e84d7f15d19
SHA256
41028e4a07a077aa8f1fbe91b1a09ae5eb2057eafe5405d9b28012d3361dd95e
SHA512
0bac9624661f2014c0f34b78441364ad3bb121ba4cfc55f1464e5a7f31eedda3ace8552de4d49cec90045d700681eff362b3a2a11d9d50e9a9c8814c04763c37
SSDEEP
384:Q3XKDWQw7iKGjUwFAQdr7qFbo41FBG/BR/Nq13DmAkW781gW:Q3X+TfUgvdenuChyAC1
Checks for missing Authenticode signature.
resource |
---|
01783deeae133e8c03fb00baa43f6e75_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcMapData
ZwQueryInformationProcess
memcpy
ZwDisplayString
strcmp
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
DbgPrint
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
strlen
IoCreateSymbolicLink
ExAllocatePool
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
CcIsThereDirtyData
PsRestoreImpersonation
UixIxexSlawkqmFd
Cjaogc
Wqnkgb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ