?ChildProcessMain@Awesomium@@YAHPAUHINSTANCE__@@@Z
N1
n2
n3
n5
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Evo-gen.22565.18144.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Evo-gen.22565.18144.dll
Resource
win10v2004-20240508-en
Target
SecuriteInfo.com.Win32.Evo-gen.22565.18144.dll
Size
182KB
MD5
10d9795ca6dd6415a12c1185053aa577
SHA1
2de21fa453da200aadce12ac1dc2c7e4cfc4bfd1
SHA256
8af79865dad92a096be0f7330ed686d643affb161c683dcf7be9abde482dc6eb
SHA512
d6608b095c4dfd52d767e340d188ed6c9c6e07dba801c7358b3c63e29abe652387104d55694f6527bbe1877a4e56c911b19c4ee1f5afa926affbcb425fdd2cae
SSDEEP
3072:mgUM0fK6plx21Y+xkejD0JuaxSdquVZdvIAIOAg0FujD/rug3Pebb5:sPXyY+xkuDgucoTfAOHrH+b5
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Win32.Evo-gen.22565.18144.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
HeapSize
GetModuleFileNameA
VirtualFree
WriteConsoleW
SetEndOfFile
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
HeapAlloc
ReadFile
ReadConsoleW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CloseHandle
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
CreateFileW
MessageBoxA
RegSetValueExA
RegOpenKeyA
RegCloseKey
?ChildProcessMain@Awesomium@@YAHPAUHINSTANCE__@@@Z
N1
n2
n3
n5
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE