SpqJtjjstYuhsfioOq
FstlqZiaotgb
JamVpzwdzYfrgqtiZtscfxpFd
Static task
static1
Target
28db58c8831b53433fb735b829b25404_JaffaCakes118
Size
19KB
MD5
28db58c8831b53433fb735b829b25404
SHA1
45ee1ab296afeb0c09a44c0860ae3c0d6c5f0ec5
SHA256
1ad2eb34d52448b3468828e399e1eccc26008386e6a43d8a47342fad197b68a9
SHA512
fa86b860da59bb809af1c0494085336d9364ee619169a6057270be68ae839ad58acd8de4e14d589c5e15b921130d1861f7869757a122606c80be28e6348609b6
SSDEEP
384:5i9fJRsmmWDEew+8nb1xLL+LVv5E1kbme7:5+i8DvwfhcjE1s5
Checks for missing Authenticode signature.
resource |
---|
28db58c8831b53433fb735b829b25404_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DbgPrint
ZwDisplayString
isdigit
FsRtlNotifyFilterChangeDirectory
IoWritePartitionTableEx
NtDuplicateObject
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
NtAllocateUuids
islower
FsRtlIsNtstatusExpected
strcmp
ExFreePoolWithTag
MmIsAddressValid
ExAllocatePool
FsRtlInitializeMcb
RtlFindLongestRunClear
KeStackAttachProcess
PsRestoreImpersonation
RtlReserveChunk
CcGetDirtyPages
RtlImageNtHeader
ZwQueryInformationProcess
CcSetDirtyPinnedData
KdDebuggerEnabled
KeInsertQueueDpc
IoCreateSymbolicLink
RtlInt64ToUnicodeString
FsRtlLookupLastLargeMcbEntry
IoReportResourceForDetection
READ_REGISTER_BUFFER_ULONG
isprint
CcSetFileSizes
SpqJtjjstYuhsfioOq
FstlqZiaotgb
JamVpzwdzYfrgqtiZtscfxpFd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ