DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d80aca0b0d03572ebe06d1d6de9f38ff064ad769101dde68a8b6308424c16d6f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d80aca0b0d03572ebe06d1d6de9f38ff064ad769101dde68a8b6308424c16d6f.dll
Resource
win10v2004-20220812-en
Target
d80aca0b0d03572ebe06d1d6de9f38ff064ad769101dde68a8b6308424c16d6f
Size
166KB
MD5
55152f53525e386b547e334f93592922
SHA1
36200ae05c651d0a64fcaf8bb0c6176315ca2241
SHA256
d80aca0b0d03572ebe06d1d6de9f38ff064ad769101dde68a8b6308424c16d6f
SHA512
badbe9b6f9539fbae3ed878027cc0c51f5f943a72a1403083378cdbce3f8ae484f77dc1b57a1a71564c23553259a2db405626eff9cd08de0b6783d51047ff352
SSDEEP
3072:I/LHpo465G39YLqrwPjKJ/9VxxFg9WtQEDmTI+trWjXvT9:ITHi/LqS9zEyU+O
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE