WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
b4cb338ccdcb3d00fc002033af314b88_JaffaCakes118
Size
19KB
MD5
b4cb338ccdcb3d00fc002033af314b88
SHA1
2b9ca0158e629a01dd04c2e38c8e55a8f74ff480
SHA256
b6b26ada53eed4af014f5a9405f17f54947e9a7716f1886d05fe4b5f00fefe5b
SHA512
4e9f4d0fe34cd60c76867af29a753cbcb64e1f6b9bc86e87055556f0c354340f831b48b1403553f959b6428e824b5d6843c3d209f4bf9140c41aa6d2d8cf53d0
SSDEEP
384:x4vFBCefHZmOOV7YUK4PBSZOjF1D7Rbd02tPpeO:x4vfm1LpPBSZOLD7VpJ
Checks for missing Authenticode signature.
resource |
---|
b4cb338ccdcb3d00fc002033af314b88_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcMdlReadComplete
ZwQueryInformationProcess
memcpy
ZwDisplayString
CcMdlRead
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
strcmp
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
ExAllocatePool
IoCreateSymbolicLink
strlen
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
strchr
PsRestoreImpersonation
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ