DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
9ce11c0f4f00584d07dc70013c7a0d2c7a2c08f3652a19fa1a9f17fb50805142.dll
Resource
win7-20220812-en
Target
9ce11c0f4f00584d07dc70013c7a0d2c7a2c08f3652a19fa1a9f17fb50805142
Size
194KB
MD5
fbcba368afc6281f7f558ba8fdd93d48
SHA1
d5abef4de78caf4ff9944172eb440b18fba9c7b6
SHA256
9ce11c0f4f00584d07dc70013c7a0d2c7a2c08f3652a19fa1a9f17fb50805142
SHA512
7c3f01dab948f3e49664d2afcd9fada6120e21b281587301d44f070829439b874a780bb9658eb10740ad00a1d8a80f07afe28077ab133a8ba6d58a3565c07619
SSDEEP
6144:AeoT/Emdf5QjprhjIjInOCigLfq2wjVqGpY4UsmM:AemsmpGthjItgLrwjV3+4Usv
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE