IpizcfAcmvvdWqu
OsvFuvvGhbfDn
GfeKmpxvAbljKm
Static task
static1
Target
4347c94f99d8146431cd0df7f8341110_JaffaCakes118
Size
19KB
MD5
4347c94f99d8146431cd0df7f8341110
SHA1
0823f7fa48c842506b8cc19bfa941f19f670ffe8
SHA256
31196c8bc3d3a9ee76d3880fedbb444de6add3a37cb82b84ee7c138720bf3e74
SHA512
126566787f9ca09364164c89170c269aad1a14a611d4e0369bb10a203908d2219f243c33ea25e41b05c2175a39dcb96dcc12a675f815f79a21adc9a74931a919
SSDEEP
384:1JJcxWabdPj0jYLjuDP7JwKmjgQ+DTc0wM7z8tXJQ/1qJnhzkW781gW:1rcsabdPjNLj7/lAQ0wMOJUQ1C1
Checks for missing Authenticode signature.
resource |
---|
4347c94f99d8146431cd0df7f8341110_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcGetFlushedValidData
ExAllocatePool
DbgPrint
ZwDisplayString
ExFreePoolWithTag
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
ZwSetInformationFile
memcpy
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
RtlImageNtHeader
IoCreateSymbolicLink
strcmp
strlen
CcGetDirtyPages
MmIsAddressValid
CcGetFileObjectFromSectionPtrs
PsRestoreImpersonation
IpizcfAcmvvdWqu
OsvFuvvGhbfDn
GfeKmpxvAbljKm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ