DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3.dll
Resource
win7-20220414-en
Target
05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3
Size
21KB
MD5
0071fa9468e35dde86a7aab91750d1d0
SHA1
dfd41581fa282ec93cf6e3e66e8001bb8d9c8592
SHA256
05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3
SHA512
6fd387ef39fe9b0a3ea376ec9c3df4f5f6f2a974b5e40f1a393adf03ecaa31fe9d27ef0d00182af1684aeda2ba1c566380963d0f7a443d8c39c28560fdfa3bf3
SSDEEP
384:kEbzOJAhWbkReqr+yZT29LreT/LAwSysSm4MKC/Ud6H9y38i9PcYB:vbO5qr+yWWWya/PK8i9Pj
Detects file using ACProtect software.
Processes:
resource | yara_rule |
---|---|
sample | acprotect |
Processes:
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ