_run@4
on_avast_dll_unload
Static task
static1
Behavioral task
behavioral1
Sample
19089aa74b6dd88254d0a05484efb874.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
19089aa74b6dd88254d0a05484efb874.dll
Resource
win10v2004-20240226-en
Target
19089aa74b6dd88254d0a05484efb874
Size
81KB
MD5
19089aa74b6dd88254d0a05484efb874
SHA1
f20e053d6bf1cb1486d5bc9d28045957db066b65
SHA256
d19b7a65c6758eab266b5411c1bae649d3fb9c7996b3d5fa01df780612c7f802
SHA512
ae03958d01632a1d4d8e8943ddf0e050e4dfe4c548f665882e3a512dfe33c7f2e548ae4b1f0fcfe7b109208dce093d8a012c34eb63fe63a8f53ff8983a6606b7
SSDEEP
1536:Uc+UPvS0RKCmqAvj45Hx8u05iecuYSoosWaocdBkez0U+Gr:r+5oxmqAiR8+/RBkez0U+M
Checks for missing Authenticode signature.
resource |
---|
19089aa74b6dd88254d0a05484efb874 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
GetModuleFileNameA
WriteProcessMemory
HeapFree
CreateMutexA
OpenProcess
Sleep
GetLastError
CreateFileA
LoadLibraryA
CloseHandle
HeapAlloc
VirtualAllocEx
GetFileSize
ExitProcess
GetCurrentProcessId
GetProcessHeap
FreeLibrary
CreateRemoteThread
GetComputerNameA
GetProcAddress
WriteConsoleW
CreateFileW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
RaiseException
GetModuleHandleExW
GetModuleFileNameW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
DecodePointer
_run@4
on_avast_dll_unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ