WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
b8002bd55628aa4cc91ef3ff3e040fe3_JaffaCakes118
Size
19KB
MD5
b8002bd55628aa4cc91ef3ff3e040fe3
SHA1
b7fb89ae9d29a935a22b648f268fae816c886d20
SHA256
735583314429a4ee32a58978f8121788af5cf15dec043a23a41ba6bd908d0347
SHA512
0a0a8e25fc1bcd7cce7b03963530c9576d3367a05ded1ca88db7dda0afb8c57ac879ac7c3279025f938785536d5d7b31dfcc40c8c048e04aaf98e0b29c80fa11
SSDEEP
384:66eV+hNuEuiTTeEE9blGtqz9a0MH6wvcSZV+APF5/QJeVW4:l0ovzPqksz9a0MH3fZtr
Checks for missing Authenticode signature.
resource |
---|
b8002bd55628aa4cc91ef3ff3e040fe3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExInitializeRundownProtection
ZwQueryInformationProcess
RtlFindLongestRunClear
PsRestoreImpersonation
memcpy
CcIsThereDirtyData
FsRtlInitializeMcb
IoCreateSymbolicLink
RtlAppendUnicodeStringToString
IoReportResourceForDetection
CcGetDirtyPages
FsRtlNotifyFilterChangeDirectory
strcmp
KeInsertQueueDpc
MmIsAddressValid
FsRtlIsNtstatusExpected
NtDuplicateObject
RtlInt64ToUnicodeString
NtAllocateUuids
ExFreePoolWithTag
READ_REGISTER_BUFFER_ULONG
ZwCreateFile
RtlReserveChunk
FsRtlLookupLastLargeMcbEntry
ZwDisplayString
CcMapData
KeStackAttachProcess
ExAllocatePool
IoWritePartitionTableEx
KdDebuggerEnabled
strlen
RtlImageNtHeader
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ