DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
cc0c01e44251228b77b68959c24e6ce30fc37ba5eb2cc9b221f5304482db9610.dll
Resource
win7-20220812-en
Target
cc0c01e44251228b77b68959c24e6ce30fc37ba5eb2cc9b221f5304482db9610
Size
194KB
MD5
7bd66689d65fc4146252a9ef357366ec
SHA1
e09a2ffa0a74ee3bbd0acea22b46cd5e0485af39
SHA256
cc0c01e44251228b77b68959c24e6ce30fc37ba5eb2cc9b221f5304482db9610
SHA512
6ae158689fe2a834d6cf7f507da8e3050e824b1bb50e1ec379c49332cec620a31bbd6ff4e9a35fc0f1015e10d095a195e42b0f46cf8109d6d9713b036c1ba3e8
SSDEEP
6144:AeoT/Emdf5QjprhjIjInOCigLfq2wjVqGpY4UsmC:AemsmpGthjItgLrwjV3+4UsV
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE