AtgppuwOviiAwm
CsyPsnyCgjdycTl
BehwcHj
Static task
static1
Target
fcb40140ead72097f4bc95ad55c41184_JaffaCakes118
Size
20KB
MD5
fcb40140ead72097f4bc95ad55c41184
SHA1
ddd8956f5d8b54efc1f94993459fa0f2b4436b84
SHA256
d3011f7736ffa573dd0e3af2ca75a2a3200cefe722d581061e8c9d53b7ebaba6
SHA512
a46b00c97a954657a87ba619348d1caac1bde2b53e15cfdab4cdd1dc8307614a170c588341c2a4660ea371f31859ac6d75f7769abebc2e0179ee60d3b30d6914
SSDEEP
384:Ah+tx9s1JcpVa6efhTn1sR9eSjgCSf5Y5/R5:Aq9s1+na6efhTnKeSjkxY
Checks for missing Authenticode signature.
resource |
---|
fcb40140ead72097f4bc95ad55c41184_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MmAllocateNonCachedMemory
strrchr
IoForwardIrpSynchronously
PoStartNextPowerIrp
ExAcquireResourceSharedLite
ZwWriteFile
ExFreePoolWithTag
RtlImageNtHeader
RtlSplay
SeTokenIsAdmin
ExAllocatePool
RtlLockBootStatusData
strcmp
PsGetProcessInheritedFromUniqueProcessId
PsJobType
FsRtlAreNamesEqual
RtlDeleteAce
ZwOpenTimer
PsGetProcessWin32WindowStation
_wcsupr
KeRegisterBugCheckCallback
ZwYieldExecution
SeCreateClientSecurityFromSubjectContext
FsRtlCurrentBatchOplock
ExInterlockedAddLargeInteger
RtlCreateAcl
RtlTimeToSecondsSince1970
RtlGetCallersAddress
IoForwardAndCatchIrp
ZwQueryObject
IoSetDeviceInterfaceState
RtlOemToUnicodeN
AtgppuwOviiAwm
CsyPsnyCgjdycTl
BehwcHj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ