WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
0f3d52b8ac5f0cb69ef89e7aa018f997_JaffaCakes118
Size
19KB
MD5
0f3d52b8ac5f0cb69ef89e7aa018f997
SHA1
efdd288c76de1d50c07a81d1cb3e30e458a0c16f
SHA256
811571df838e69db307c64e4be9ab8e6c036d3aba8bc4362626e2cd8dc0a7b26
SHA512
8a4fcaa43d9f7fa0cb9489fdc0651a7877b84bfa26a5d84fff92e856a4a27cfeb06b89c16b4c4aa5892b635459f41fbd874a841305a01c6b2506776ea307e1b9
SSDEEP
384:t98MamgPUzS+cFJ7d70P3vHlTMExNBpRwNQJqzYtb/s:t98bmg8WFP7kSEnBpWN
Checks for missing Authenticode signature.
resource |
---|
0f3d52b8ac5f0cb69ef89e7aa018f997_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
ZwQueryInformationProcess
ExAllocatePool
memcpy
ZwDisplayString
CcMdlRead
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
DbgPrint
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
strcmp
IoCreateSymbolicLink
strlen
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
CcMdlReadComplete
PsRestoreImpersonation
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ