DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
22406f28b75844356ba6c1fb3d4f40b59aa74c5fcbc8fed5a03b55b9ffd24085.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22406f28b75844356ba6c1fb3d4f40b59aa74c5fcbc8fed5a03b55b9ffd24085.dll
Resource
win10v2004-20220901-en
Target
22406f28b75844356ba6c1fb3d4f40b59aa74c5fcbc8fed5a03b55b9ffd24085
Size
39KB
MD5
b516082689c4bb0bec696fe83c141e40
SHA1
74d9a13d667e6f7189b4d1290f0a52bcf935939f
SHA256
22406f28b75844356ba6c1fb3d4f40b59aa74c5fcbc8fed5a03b55b9ffd24085
SHA512
bef9976b2e98aab3bb3b4b17295f9791e967fce5cd67297f905ed19d2db4642760da91d65f444defcfad2c0885bf3091c17f75c8ce3eae0306584047e48c0f34
SSDEEP
384:KTH44WQtU1/mQuaT/dopoz72/u4Ng1GQyPIX:KTYtQtU51J7muWvQywX
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE