AtgppuwOviiAwm
CsyPsnyCgjdycTl
BehwcHj
Static task
static1
Target
bf75827de75e367fbbfb28b34e9bb486_JaffaCakes118
Size
20KB
MD5
bf75827de75e367fbbfb28b34e9bb486
SHA1
1361d0d74efda04570a025c23af58228c1538790
SHA256
97b3163e389d335c0e4bf1701f8764eabaa5e70f152b604420df2d10251c7892
SHA512
b0ec1cae284c25eef3e562cb832cb0657cc684536e96ee1b6f4fd4278c16bff839e808fa2575e279578cc64d0984bfc2077589f0c6d813305a5249b54e3017fa
SSDEEP
384:Ph+tx9s1JcpVa6efhTn1sR9eSjgCSf5Y5/R5:Pq9s1+na6efhTnKeSjkxY
Checks for missing Authenticode signature.
resource |
---|
bf75827de75e367fbbfb28b34e9bb486_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MmAllocateNonCachedMemory
strrchr
IoForwardIrpSynchronously
PoStartNextPowerIrp
ExAcquireResourceSharedLite
ZwWriteFile
ExFreePoolWithTag
RtlImageNtHeader
RtlSplay
SeTokenIsAdmin
ExAllocatePool
RtlLockBootStatusData
strcmp
PsGetProcessInheritedFromUniqueProcessId
PsJobType
FsRtlAreNamesEqual
RtlDeleteAce
ZwOpenTimer
PsGetProcessWin32WindowStation
_wcsupr
KeRegisterBugCheckCallback
ZwYieldExecution
SeCreateClientSecurityFromSubjectContext
FsRtlCurrentBatchOplock
ExInterlockedAddLargeInteger
RtlCreateAcl
RtlTimeToSecondsSince1970
RtlGetCallersAddress
IoForwardAndCatchIrp
ZwQueryObject
IoSetDeviceInterfaceState
RtlOemToUnicodeN
AtgppuwOviiAwm
CsyPsnyCgjdycTl
BehwcHj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ