TmNbpnm
WkpgodaBwuh
RjgdXljfWoxymb
DdYzechRkpbxCvmzio
Static task
static1
Target
c0b346a42d77779b55074ee34ebb76c3_JaffaCakes118
Size
59KB
MD5
c0b346a42d77779b55074ee34ebb76c3
SHA1
2a69a82daa9b91f2eb7c8ae40b889a81395606cc
SHA256
a27c2afd71fe0291b29fc674be70ccda22ec50cc7289d6ecd26c713654b6a099
SHA512
c012115ffaa1751269e3424dfca53e967793fb53d3a11d0880167e6c871fc1ae3623d1c305eb9b13655d7756fc99039eaac5f73f91a466670218d0cd28867f3d
SSDEEP
1536:8qM7fOUMfv++btMSCkz8xAYXQt/wilcKru:8tzOUMfvtpMUM45ru
Checks for missing Authenticode signature.
resource |
---|
c0b346a42d77779b55074ee34ebb76c3_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
isdigit
InbvCheckDisplayOwnership
wcstombs
PoRegisterSystemState
isupper
memcpy
islower
ZwDuplicateToken
IoSetSystemPartition
ExAcquireSharedStarveExclusive
KeSetIdealProcessorThread
MmGetPhysicalAddress
IoQueryFileDosDeviceName
RtlFindSetBitsAndClear
ExInterlockedExtendZone
NtWriteFile
KeRegisterBugCheckReasonCallback
ExFreePoolWithTag
memchr
towlower
MmRemovePhysicalMemory
_alldvrm
ExDeletePagedLookasideList
ExAcquireSharedWaitForExclusive
strcmp
LpcRequestPort
IoConnectInterrupt
RtlDowncaseUnicodeString
DbgPrint
strrchr
FsRtlIsNameInExpression
MmFreeContiguousMemorySpecifyCache
ZwInitiatePowerAction
ExAllocatePool
strspn
ZwQueryInformationProcess
isspace
RtlImageNtHeader
PsSetProcessPriorityByClass
MmUnsecureVirtualMemory
IoSetPartitionInformation
FsRtlInitializeOplock
TmNbpnm
WkpgodaBwuh
RjgdXljfWoxymb
DdYzechRkpbxCvmzio
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ