_run@4
on_avast_dll_unload
Static task
static1
Behavioral task
behavioral1
Sample
bb6ccc2f4e67550ea673d6952a38b9f3.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bb6ccc2f4e67550ea673d6952a38b9f3.dll
Resource
win10v2004-20240226-en
Target
bb6ccc2f4e67550ea673d6952a38b9f3
Size
81KB
MD5
bb6ccc2f4e67550ea673d6952a38b9f3
SHA1
a321c6840ce01639a05c20952309758d15296148
SHA256
81151646dcb0147cbfb090f838712ad08f6c1ba236e3f636cc242f116927f5d1
SHA512
2a08270a22acd0074648271d39a580a41b1d92ad7d5ac7273087a2ec2d3bfb15f3698dc87c6a1e957eabf5ee99ad5705d3f883991bd5964da6767e52f052ddbd
SSDEEP
1536:rc+UPvS0RKCmqAvj45Hx8u05iecuYSoosWaocdBkez0U+Gn:4+5oxmqAiR8+/RBkez0U+g
Checks for missing Authenticode signature.
resource |
---|
bb6ccc2f4e67550ea673d6952a38b9f3 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
GetModuleFileNameA
WriteProcessMemory
HeapFree
CreateMutexA
OpenProcess
Sleep
GetLastError
CreateFileA
LoadLibraryA
CloseHandle
HeapAlloc
VirtualAllocEx
GetFileSize
ExitProcess
GetCurrentProcessId
GetProcessHeap
FreeLibrary
CreateRemoteThread
GetComputerNameA
GetProcAddress
WriteConsoleW
CreateFileW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
RaiseException
GetModuleHandleExW
GetModuleFileNameW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
DecodePointer
_run@4
on_avast_dll_unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ