WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
0d23f4e98c1e4fdd207d831b8fc2e3bf_JaffaCakes118
Size
19KB
MD5
0d23f4e98c1e4fdd207d831b8fc2e3bf
SHA1
c2322cca9bf5fa06a67213666e43a0f938ff456b
SHA256
a0197632b9a15edc52757668f7f4b830a9dcea862edab08b226742b1b348e437
SHA512
4a0801c0c78b207c64b8a1eddf7133e266ad2d3efab12313867c22f2bfdc1a8cd32502aac474d38d571763a3f573c2e590e0cb778388e8128750867dc60bfc87
SSDEEP
384:if+lN9WQA7iKGjUwFAQdr7qFbo41FBG/BR/Nq13bXW:if+/xjfUgvdenuChjW
Checks for missing Authenticode signature.
resource |
---|
0d23f4e98c1e4fdd207d831b8fc2e3bf_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcMapData
ZwQueryInformationProcess
memcpy
ZwDisplayString
strcmp
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
DbgPrint
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
strlen
IoCreateSymbolicLink
ExAllocatePool
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
CcIsThereDirtyData
PsRestoreImpersonation
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ