DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
0e4145e0d45ef86c3b303613a1700d91.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e4145e0d45ef86c3b303613a1700d91.dll
Resource
win10v2004-20231215-en
Target
0e4145e0d45ef86c3b303613a1700d91
Size
179KB
MD5
0e4145e0d45ef86c3b303613a1700d91
SHA1
242f3b383065ee74dd7e62bbe300feec51ff4831
SHA256
cb4355fb0a9256753e367a0d70c9e614ff90b7382f4ae306f6a913ebc081921c
SHA512
dd3a4aacc5ed7abacf8d4275ba0e86051821ed7a0bdc89b7e79239439f554fdd2d05e7e0862c5109d952acc0d46024c3e52ac6572bd9e6f095fd6bf75c1cd44e
SSDEEP
3072:GrkbSBoe8pa7esrkyINKybbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7WFvn:j+oEtUlwvP6bQ7yMP+DE827evbAs
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
0e4145e0d45ef86c3b303613a1700d91 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE