DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
92c26a57de4b467c4e9593e0938ba795a8c4b51815dcdde124000fa8442f4873.dll
Resource
win7-20220812-en
Target
92c26a57de4b467c4e9593e0938ba795a8c4b51815dcdde124000fa8442f4873
Size
194KB
MD5
f542e3ea890a3b907b81b57be09d73a2
SHA1
bf3b053291be37455bbdbe7fbd6502b74ed2f452
SHA256
92c26a57de4b467c4e9593e0938ba795a8c4b51815dcdde124000fa8442f4873
SHA512
693ad118d47d8a5b11d9b4bbd07bbe40c8d4a45ca9b9cc7123a34865a07fabdbbfa6c3323dc492970e1876eaa83e62f6fa1647bbbf662a287284b24a8c750b83
SSDEEP
3072:uILYp/6oDftXv4PHBWehnCUb4kJLkRz+cY0jiQhbVfOgn9Fj71KfCA1hGynaJm7:L897xX8YUnCMRJ4O0jprn9FNKf5ci
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE