UixIxexSlawkqmFd
Cjaogc
Wqnkgb
Static task
static1
Target
13089b906b6b224b58713d5f2ac47568_JaffaCakes118
Size
19KB
MD5
13089b906b6b224b58713d5f2ac47568
SHA1
35c760a2dc937627d936197054281fb5f4a4eaed
SHA256
8dcd4d384930c461f006b928898f609a433d7c0953f9cbae7f8cb057c1555e0d
SHA512
2555c48939f9b5489753064b87d495f57c4dd7a373d64fcca5c4097cd3eb3900688c5408815e16c92ed80815d48f416e4bf6becbebbadbd433bb1a6c207836ed
SSDEEP
384:/S3XK4WQA7iKGjUwFAQdr7qFbo41FBG/BR/Nq13DXW:q3XXjfUgvdenuChrW
Checks for missing Authenticode signature.
resource |
---|
13089b906b6b224b58713d5f2ac47568_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcMapData
ZwQueryInformationProcess
memcpy
ZwDisplayString
strcmp
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
DbgPrint
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
strlen
IoCreateSymbolicLink
ExAllocatePool
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
CcIsThereDirtyData
PsRestoreImpersonation
UixIxexSlawkqmFd
Cjaogc
Wqnkgb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ