WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
Static task
static1
Target
44e8ac63860f00378317f433aa95c596_JaffaCakes118
Size
19KB
MD5
44e8ac63860f00378317f433aa95c596
SHA1
90e4962cf8453e99ba0feba6ddb7dcb55e549d0a
SHA256
b6f6518f2b64bfd36e7790e23263cf9c63d123381f45e378eeda0cf8895386eb
SHA512
c0213e1d7eabc0fbaae8e1eebc33e49f0677e2056e58194f6b99932bc1f8dca6e836b046b03966749bf107590b3d1dd275e56a0a46f3959b9258229bf94b104a
SSDEEP
384:1+lN9WQA7iKGjUwFAQdr7qFbo41FBG/BR/Nq13bXW:1+/xjfUgvdenuChjW
Checks for missing Authenticode signature.
resource |
---|
44e8ac63860f00378317f433aa95c596_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcMapData
ZwQueryInformationProcess
memcpy
ZwDisplayString
strcmp
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
DbgPrint
ExFreePoolWithTag
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
strlen
IoCreateSymbolicLink
ExAllocatePool
RtlImageNtHeader
CcGetDirtyPages
MmIsAddressValid
CcIsThereDirtyData
PsRestoreImpersonation
WoyCnwaIhmpk
OgsweglTguefMoyqm
FyeilcVfiuevsZkidrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ