WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
4298da3256d7d657f35f8ad8ee3c62f5_JaffaCakes118
Size
19KB
MD5
4298da3256d7d657f35f8ad8ee3c62f5
SHA1
6c143130e383a074da368738d29fb9b3ef257f25
SHA256
8bb849f22327b34691dfe358f8dbf55d374fbc8dca78aa8d8ab8c00772ef19fb
SHA512
a18e539a42c00464136a0aa505872f00a892f8c6b0ab3935e3420056b43bfeecb1d48c958453913861d35fa73fb109680f2c20aa17ae557ee4db8ebead579044
SSDEEP
384:f98MamgPUzS+cFJ7d70P3vHlTMExNBpRwNQJqzYtb/s:f98bmg8WFP7kSEnBpWN
Checks for missing Authenticode signature.
resource |
---|
4298da3256d7d657f35f8ad8ee3c62f5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
ZwQueryInformationProcess
ExAllocatePool
memcpy
ZwDisplayString
CcMdlRead
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
DbgPrint
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
strcmp
IoCreateSymbolicLink
strlen
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
CcMdlReadComplete
PsRestoreImpersonation
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ