DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
faa2fa835f4795a66cc4cd0b04c0f6152317954cc0337d600674831dc9c07752.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
faa2fa835f4795a66cc4cd0b04c0f6152317954cc0337d600674831dc9c07752.dll
Resource
win10v2004-20220812-en
Target
faa2fa835f4795a66cc4cd0b04c0f6152317954cc0337d600674831dc9c07752
Size
40KB
MD5
051bb4f70dabfc97e207f39a4b45f455
SHA1
7ef8aad700a23115dc551ede7bb411b822040a9a
SHA256
faa2fa835f4795a66cc4cd0b04c0f6152317954cc0337d600674831dc9c07752
SHA512
c07f1307d055b0d4e11d4d7f357fd790828382db6e72d9e6902eceb15be7d8a9c7056cb8239b9c4ac64cf9643b82c4a4b0933499fff5012eb6882546febe41ab
SSDEEP
768:ke/Yb6iwhl8PXAHd35nbcuyD7UXMj0DLj:XnJHd35nouy8XMADX
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE