DllCanUnloadNow
DllGetClassObject
dllregisterserver
Behavioral task
behavioral1
Sample
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54.dll
Resource
win10v2004-20220812-en
Target
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54
Size
43KB
MD5
52d90a37ff5cbf88d513956b0473f076
SHA1
754da0424baae9f488a0bfda213848c9be743cf3
SHA256
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54
SHA512
38309e6ba680e06268f87546e7e927d782104ff10ceed5845ba15f7300039603d6ffab82205cfc347815930d7ca86e3f3541af0ad7ddb414c459aafbb31460ce
SSDEEP
768:0tX7Gc6qdKTEIMNsxbia0aWgObcB9MrmJy/8r5M5UtlzRG+/6:0x4qHIWsxbialWnbK9MqJ48Nbl8F
Processes:
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
dllregisterserver
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE