DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
949e33eaba8d3a8b3ffb48a28e2045bbaaf9b4a155351568675aab8fa2320508.dll
Resource
win7-20221111-en
Target
949e33eaba8d3a8b3ffb48a28e2045bbaaf9b4a155351568675aab8fa2320508
Size
64KB
MD5
b7fd9962d10b5139eedcf8c7d483d875
SHA1
874948e801df9831283be4946be8c02d97925931
SHA256
949e33eaba8d3a8b3ffb48a28e2045bbaaf9b4a155351568675aab8fa2320508
SHA512
b8a9fa3c6d30e1e0c137659d45cd302fbc3247a0bdcbc7a4e08457604d87e3fd49ecd7b7731dbc3501b4cf7e0ccffccb27e13682a9cde60a9338843c5b87d978
SSDEEP
768:nRuO+DzbAElfs5y9geW1WKLHu37Ku2gVYxnha5:noDRl05yJW1WKu37Kv+2
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE