DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
137fbf9a756a5aed79ce3ce12cb6a1dc0c2a816aea603001caa785ec2d7f27e5.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
137fbf9a756a5aed79ce3ce12cb6a1dc0c2a816aea603001caa785ec2d7f27e5.dll
Resource
win10v2004-20230220-en
Target
137fbf9a756a5aed79ce3ce12cb6a1dc0c2a816aea603001caa785ec2d7f27e5
Size
335KB
MD5
073c88fc83fb839390024b503aeb3b1a
SHA1
ad787762bf7269f2834a4a105535670e250faaca
SHA256
137fbf9a756a5aed79ce3ce12cb6a1dc0c2a816aea603001caa785ec2d7f27e5
SHA512
e340d1ddf5a0b425939a421e4df9fbb11392fe753cd73db3d86ee942cfb1d983d76585081d37a5ff381119d3af6d1874d0b4be3c5dd9012758b08f6fbcbf4ae6
SSDEEP
6144:0ZIoqM51MhP/OU6oduEhNHWXv5n2zjM2tjjorzz3I5vkKCrzltibzNWXv8N54P:AIoihPmYduEhNH+5ewCjoc5vkKqazkXB
Processes:
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE