DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
b604ea725fda7c13f818a917285c84a05db6f553056831b760f2aa4d9e896495.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b604ea725fda7c13f818a917285c84a05db6f553056831b760f2aa4d9e896495.dll
Resource
win10v2004-20221111-en
Target
b604ea725fda7c13f818a917285c84a05db6f553056831b760f2aa4d9e896495
Size
458KB
MD5
ec826553cb3e748f59e58baaef17a128
SHA1
23345be27c9d3b9e31668f10b5ee10517ea59cf8
SHA256
b604ea725fda7c13f818a917285c84a05db6f553056831b760f2aa4d9e896495
SHA512
79299c63b48dc24c1742c9984a4c1d978943586fb2042e7ffeb6ae4596b7ed8a1465f696b0bb3e6df21fa597ea51692b737e8728cd097154bad66fbca51b7aff
SSDEEP
12288:znyq2D6yRJvPAt/I2slhaEbAA2WW0j+treM:zyq22YhPAVI/slf50j+pe
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE