DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
e3741242dd3e3a16122a142d794df79bde06bcc2d18e54956a7859c68e506f17.dll
Resource
win7-20220812-en
Target
e3741242dd3e3a16122a142d794df79bde06bcc2d18e54956a7859c68e506f17
Size
60KB
MD5
9a583258085184fd43a7d4a8b2618877
SHA1
3633ffaecebc22abf4b1f2a22487e861e07e64ee
SHA256
e3741242dd3e3a16122a142d794df79bde06bcc2d18e54956a7859c68e506f17
SHA512
2b48da2eb9e39a5d5167dba904be97e8109ce46d278e693fab631d512582682c59f653c21103ada177e1f96c7a53a5b717c6944e00dc3d64c7e23885c8824e16
SSDEEP
1536:h4k5FTtXbZcKaazCZjZ8Ve3fREUhiGql+b:R1bZwaz9V+htu+b
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ