DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
029921e48465c3c54acc10adf4a4c1daeaa3ef233c38c5760cdc0e4ba22b4d66.dll
Resource
win7-20220414-en
Target
029921e48465c3c54acc10adf4a4c1daeaa3ef233c38c5760cdc0e4ba22b4d66
Size
60KB
MD5
1cab38f3724992740dc83ab2f6303188
SHA1
2dab92c965b11af568b18471021d5cb0f00b0b89
SHA256
029921e48465c3c54acc10adf4a4c1daeaa3ef233c38c5760cdc0e4ba22b4d66
SHA512
e2ec8fbab7466f35e3c84447ffab473345139e9bc532fd4abb21ecfc5ab2f1b3a22c83516f8ded47cebf5de12e71be67de667526375b9aa3a978152dfe821bc6
SSDEEP
1536:fTOijudXI57oOVqzzOeDfXV0A3b5vwor0Au:7OijulobqDruAV1rpu
Detects file using ACProtect software.
Processes:
resource | yara_rule |
---|---|
sample | acprotect |
Processes:
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE