WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
83deb87471a8eb07d6ce9f0db921d7c8_JaffaCakes118
Size
19KB
MD5
83deb87471a8eb07d6ce9f0db921d7c8
SHA1
803bfa4f3bccb9d4a5826da9359d047822c183ae
SHA256
e09328bcc3d3cc26eae14a9342be0cefe59e90788af83ec57484f9a23bac3562
SHA512
c940c8f03010d14d89947eead923c4d8975cf437e27175fab3eeeeb7f076acfa0c42085e5f0b9c4f23498418de187daae80e15f671487b34bb7f31d611c6cc13
SSDEEP
384:398MamgPUzS+cFJ7d70P3vHlTMExNBpRwNQJqzYtb/s:398bmg8WFP7kSEnBpWN
Checks for missing Authenticode signature.
resource |
---|
83deb87471a8eb07d6ce9f0db921d7c8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
ZwQueryInformationProcess
ExAllocatePool
memcpy
ZwDisplayString
CcMdlRead
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
DbgPrint
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
strcmp
IoCreateSymbolicLink
strlen
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
CcMdlReadComplete
PsRestoreImpersonation
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ