DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
aa288e7f5d244061a0acfbb42f0b6bf423e04dbdd2af03c83b41f26617dbc68e.dll
Resource
win7-20220812-en
Target
aa288e7f5d244061a0acfbb42f0b6bf423e04dbdd2af03c83b41f26617dbc68e
Size
194KB
MD5
5c0ebb11bf786772635a77b2fb103a9c
SHA1
e96bbb8f063ac2489caa820a154244b3ad6eb1c6
SHA256
aa288e7f5d244061a0acfbb42f0b6bf423e04dbdd2af03c83b41f26617dbc68e
SHA512
b58e1be3e5f1b5a9ed0e9ac69305d2ea9bd2c46d7f00615b071e6e44cf892f94d9ac9f31edca9865b73049e7f9de26328d7e4cce58654fd97e2270b89b214f90
SSDEEP
6144:GeoT/Emdf5QjprhjIjInOCigLfq2wjecqGpY4Ufmgzb:GemsmpGthjItgLrwjv3+4Uugn
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE