injector_call
setting_call
Static task
static1
Target
Module.dll
Size
9.4MB
MD5
1b4c3202e8f4c91523a856ba7b9ecea0
SHA1
77d7507bf32c37c0e7694c5194070f525294fb1e
SHA256
c49a2b7273b274225c9e09e3029339c9a2f8a9077abcd5e0fd35bd05e1c900a6
SHA512
9a29516f77e86680e9b06b856b32dc5c666867d3bb7321f39f66ba8aa2c9a2b83fad0e7eddd3a2c1de5907d05f61a769440bab0f22364f1b0a2db10bbb01dc90
SSDEEP
196608:RYPuSWGn7udbSsCnpGMSdYseQ9biKC3Z5e93bvy2LCKHQMu518wN:K+GgbBCBDGVB93bvy2LC9j
Checks for missing Authenticode signature.
resource |
---|
Module.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CryptAcquireContextA
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
ClientToScreen
CharUpperBuffW
WSACleanup
CertAddCertificateContextToStore
SHGetFolderPathA
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
ImmGetContext
D3DCompile
ord301
IdnToAscii
_CxxThrowException
__acrt_iob_func
__sys_errlist
_access
_callnewh
_dsign
_gmtime64
___lc_codepage_func
atoi
_strdup
qsort
getenv
injector_call
setting_call
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ