UixIxexSlawkqmFd
Cjaogc
Wqnkgb
Static task
static1
Target
0a03987570b517bebd78ad3448c438f2_JaffaCakes118
Size
20KB
MD5
0a03987570b517bebd78ad3448c438f2
SHA1
e874ec3853306c1101056a04d4c7ef79678bfe64
SHA256
52d516fd3ae3315e2353b6605f4dd289ff5dca1b76abfd1c02a2a726df0f1552
SHA512
4f08f8aebf6c1a09f3b1ce40cee9956f9c64190b90dfcccacd02803d73e2ea820e289d0e128215134356a74f640ddf7a1b018c9f3344e24c7acbeab63017167e
SSDEEP
384:EtOWQc7iKGjUwFAQdr7mFbo41FBG/BR/Nq13fsAkW781gWr:EG/fUgvdKnuChUAC1
Checks for missing Authenticode signature.
resource |
---|
0a03987570b517bebd78ad3448c438f2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
strcmp
CcIsThereDirtyData
DbgPrint
ZwDisplayString
memcpy
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
ExAllocatePool
strlen
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
RtlImageNtHeader
IoCreateSymbolicLink
CcMapData
ZwQueryInformationProcess
CcGetDirtyPages
MmIsAddressValid
ExFreePoolWithTag
PsRestoreImpersonation
UixIxexSlawkqmFd
Cjaogc
Wqnkgb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ