PoDmjd
XjImjyyxKdwavHqv
XgsEhxxYl
Static task
static1
Target
7488bf509be7420c53fa149f6b724d08_JaffaCakes118
Size
19KB
MD5
7488bf509be7420c53fa149f6b724d08
SHA1
e6d16d8d6c57270d8ce52e0b7a182f9f79a63f2e
SHA256
6021e8a99afb0b8158280bc81bbf5477f05051ec0c80d14d983216779cae65fd
SHA512
b56eed870eeccf55773aa12e32deb2964bca5efb0df80b78f70c6a711d3112a07fa399d51146c5055f8ddd433a7d9356f6efe2752f887e385b20a72b9e8e6f46
SSDEEP
384:J6Vv+QFrRauepDy+2+i5nUgw7cKxNhbOeJgG0bqmcK:0Vv+GcY1+i5b2xNVR9
Checks for missing Authenticode signature.
resource |
---|
7488bf509be7420c53fa149f6b724d08_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ObReferenceObjectByHandle
CcDeferWrite
RtlFreeUnicodeString
ExInitializeRundownProtection
XIPDispatch
PsGetJobSessionId
MmUserProbeAddress
KeReadStateMutex
IoVerifyVolume
memset
RtlCompareUnicodeString
ZwOpenEvent
RtlAnsiStringToUnicodeString
RtlCaptureStackBackTrace
RtlInitializeGenericTableAvl
ZwSetInformationFile
CcCopyWrite
_CIsin
strcmp
KeInitializeTimerEx
_strrev
NtQueryInformationFile
Ke386SetIoAccessMap
RtlFillMemory
mbtowc
PsGetCurrentProcessSessionId
KeInsertByKeyDeviceQueue
memcpy
RtlImageNtHeader
RtlEnumerateGenericTable
RtlInitString
IoCreateStreamFileObject
InitSafeBootMode
CcFlushCache
KeReleaseMutex
ExFreePoolWithTag
DbgPrint
FsRtlNotifyReportChange
ZwSetVolumeInformationFile
PsGetProcessExitTime
ExAllocatePool
RtlInitializeUnicodePrefix
PoDmjd
XjImjyyxKdwavHqv
XgsEhxxYl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ