UixIxexSlawkqmFd
Cjaogc
Wqnkgb
Static task
static1
Target
46c9b3c10673807ac7b463f6c0c37933_JaffaCakes118
Size
20KB
MD5
46c9b3c10673807ac7b463f6c0c37933
SHA1
3bfd9043bbb22e0b1c9054caf309d4a4df4c7957
SHA256
3ac99adce8d6ed1df4ded52a235e4777f7a254bea3a4c0c2bdeea6eb86089db3
SHA512
c9c8e2bd005f25b00eee6f584668c53da773c49bffc99e39f9ed21c2e82610a9652061c738b184784155cfbaf08175e3f506b34fc7f84e36141d6fd025ce6d2c
SSDEEP
384:UAFi95OQXSRADb47LT/TGtJliB9P/JJ9LkjkW781gW:UAF6vDbgCniBQjC1
Checks for missing Authenticode signature.
resource |
---|
46c9b3c10673807ac7b463f6c0c37933_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcGetLsnForFileObject
strcmp
strlen
ZwDisplayString
DbgPrint
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
ExAllocatePool
memcpy
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
RtlImageNtHeader
IoCreateSymbolicLink
CcInitializeCacheMap
ZwQueryInformationProcess
CcGetDirtyPages
MmIsAddressValid
ExFreePoolWithTag
PsRestoreImpersonation
UixIxexSlawkqmFd
Cjaogc
Wqnkgb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ