DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitEntry0
Static task
static1
Behavioral task
behavioral1
Sample
e74a21b1c60b337ce5d77c9812b372e89d0812a8a1fff6b0ed47a7e67f0e8e2d.dll
Resource
win7-20220414-en
Target
e74a21b1c60b337ce5d77c9812b372e89d0812a8a1fff6b0ed47a7e67f0e8e2d
Size
93KB
MD5
5138ac98e8307be170c2c4ffbc465a4d
SHA1
2393ab502d9c647b1a4415f61069c7e2bbc43ee4
SHA256
e74a21b1c60b337ce5d77c9812b372e89d0812a8a1fff6b0ed47a7e67f0e8e2d
SHA512
86cc9b10153e053fa8d8f5be3162faeebfc3e4857bc7fc65c4dbca94f80f5deac916b692ffc67aa1744f7f5332227abbde9d57fb1cb653ff9296c1906aa46e89
SSDEEP
1536:nL5YhFx//u06+aDIDC0V1KuPgHLjqgUkHErbcFvyxtR1RDBMad/6xcAvwoCWBhnJ:FYJmHnD6dPgr4bLxtRnD6cFAvpBBhnbN
Detects file using ACProtect software.
Processes:
resource | yara_rule |
---|---|
sample | acprotect |
Processes:
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitEntry0
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ