UixIxexSlawkqmFd
Cjaogc
Wqnkgb
Static task
static1
Target
43398e65f9b2c5d6bc427ced994ae1bf_JaffaCakes118
Size
20KB
MD5
43398e65f9b2c5d6bc427ced994ae1bf
SHA1
90db7db3f498892fbb460bf9237a3f5fd14e8e7d
SHA256
c6b8230859b6704a4985a05bfab2a9e79c57bd5e7ba9333a456be739d68aeb93
SHA512
d44d2bf7ad9a2f697f1e0ea7bc49fb60ae2a4d861df97b6a815649dd0da7b513f5b07e9b19f8fda96076302c5226b34cabb4359ae34b2ae3f3e0c6c551ee48b6
SSDEEP
384:5AIH5OQ7SRADb47LTbTGtJliB9P/JzqkjkW781gWr:5xzDbguniBTjC1
Checks for missing Authenticode signature.
resource |
---|
43398e65f9b2c5d6bc427ced994ae1bf_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
strcmp
CcIsThereDirtyData
DbgPrint
ZwDisplayString
memcpy
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
ExAllocatePool
strlen
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
RtlImageNtHeader
IoCreateSymbolicLink
CcMapData
ZwQueryInformationProcess
CcGetDirtyPages
MmIsAddressValid
ExFreePoolWithTag
PsRestoreImpersonation
UixIxexSlawkqmFd
Cjaogc
Wqnkgb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ