DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
4cdfacd075ab586bcff15d1648cd1d093d7c4a867e3a8dd55d37d4ee07665b30.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cdfacd075ab586bcff15d1648cd1d093d7c4a867e3a8dd55d37d4ee07665b30.dll
Resource
win10v2004-20220901-en
Target
4cdfacd075ab586bcff15d1648cd1d093d7c4a867e3a8dd55d37d4ee07665b30
Size
78KB
MD5
65cf4a32442992713d5d03754eb89710
SHA1
724d6400763ab59bc972ef197ce18b9edb748f49
SHA256
4cdfacd075ab586bcff15d1648cd1d093d7c4a867e3a8dd55d37d4ee07665b30
SHA512
fb2ad809a85acea1e5f0aa94c8ead722115ec7b1760ccf19380ade265cf868326ed5d697cf3ca2339ee859bbac7c1f3ac2da706f1d3b0684aaa99632e1ac9647
SSDEEP
1536:jrWY3g6nnI4JJC5ZzpOKfrWO2QTDzAvHnVrnouy82wY:jiv6nn5Jk5R0KfpDEfnVzout6
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE