DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d46c0f1b122ccf27b7d0deebd10743e56b0e2bfed4654f324b38cff999ed9056.dll
Resource
win7-20220901-en
Target
d46c0f1b122ccf27b7d0deebd10743e56b0e2bfed4654f324b38cff999ed9056
Size
14KB
MD5
b032f76f4b77e1be711ceaf295e6d506
SHA1
c904ce2637a3b8321f95f460c91f04c2214ff139
SHA256
d46c0f1b122ccf27b7d0deebd10743e56b0e2bfed4654f324b38cff999ed9056
SHA512
717d305a814d79d1b0c4a719fbd63730a39a335642a9659907764e76c273b745d62ed9903600262a5f80fcd59638fd41b57d29823727b9ba6d3249d660b7a470
SSDEEP
192:/WYbRz20BJuasMJPxIb6zuGa4DwyU+G0Yv4Eqs1gLhpIr9H12c2/qBvDA:/bRfuMPmsu14DwNv4EqBhpIX2/a
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ