DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Target
JaffaCakes118_b985a2341c469ae636a7326b5779945d
Size
344KB
MD5
b985a2341c469ae636a7326b5779945d
SHA1
6846433e8203655d21a25708046bfa364ffbd066
SHA256
57216ab53e7219e475423cf5ff7c025b7f610856ba46f62a4475031a323f28b6
SHA512
ffc70877e8bfb78dd85ef3af07596d429c9974d9bf8d47ca4d7df4259a02149c0b4139473b86a71d792d3cb6ccf470486db642cf547ecab2a9ac078b3158c7b1
SSDEEP
6144:iA04rHqwR00NaOTQxNtHWUJBEdrz8Bt72ggW6N9+dGyKSkNsAjBoFeL1Y0ISDX32:iA04rHqwR00NaOTQxNtHWUJBEdrz8Bt9
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_b985a2341c469ae636a7326b5779945d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?DXDitherArray@@YGXPBUDXDITHERDESC@@@Z
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord324
ord641
ord4234
ord2864
ord3021
ord4710
ord6453
ord540
ord800
ord6055
ord1776
ord5290
ord4424
ord3610
ord567
ord656
ord4275
ord3089
ord2379
ord1168
ord4274
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord3147
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord3953
ord2725
ord858
ord2818
ord2614
ord1131
ord6467
ord823
ord793
ord616
ord3719
ord2411
ord2023
ord4218
ord2578
ord4398
ord3402
ord3582
ord2302
ord6215
ord2086
ord4299
ord1116
ord5951
ord1200
ord2817
ord3095
ord3097
ord923
ord537
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord825
ord1577
ord1575
ord1176
ord4079
ord5981
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
strncpy
strlen
wcscmp
__CxxFrameHandler
_makepath
_splitpath
memcpy
strcmp
memcmp
_purecall
floor
_ftol
memset
tan
rand
ceil
fabs
asin
sqrt
cos
sin
atan
VirtualAlloc
lstrlenW
lstrlenA
MultiByteToWideChar
lstrcatA
WideCharToMultiByte
FreeLibrary
GetProcAddress
GetModuleHandleA
InterlockedIncrement
IsBadWritePtr
CloseHandle
CreateEventA
IsBadReadPtr
IsBadCodePtr
LocalFree
LocalAlloc
GetModuleFileNameA
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LoadLibraryA
LeaveCriticalSection
InterlockedDecrement
lstrcpyA
EnterCriticalSection
EnableWindow
LoadStringA
SendMessageA
GetParent
ScreenToClient
ChildWindowFromPoint
GetDlgCtrlID
GetWindowRect
SetRect
CharNextA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CoCreateFreeThreadedMarshaler
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
SysFreeString
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
LoadRegTypeLi
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ