DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e66d91f0209eb57fd315c9927d416e000c7b9e756de7605a4db99ff443f3221e.dll
Resource
win7-20220812-en
Target
e66d91f0209eb57fd315c9927d416e000c7b9e756de7605a4db99ff443f3221e
Size
63KB
MD5
6041a7bbb314186c5a423d2072ab6174
SHA1
2b62cb3d28fc0c004b493596d6d8ea5412f0f92b
SHA256
e66d91f0209eb57fd315c9927d416e000c7b9e756de7605a4db99ff443f3221e
SHA512
1fb9489820c835ba4614b67cc5d1170f58c9b634a2a4aff6610ef18506e85912e19dfd294797fc37e5c0f86756049c7bcb6afc4fad416c466d2041a28c8e1ebf
SSDEEP
1536:ynpFTNi95GOjsu1AdTfXo04aGqWWcjBAG5g0w6:YpFiiTfX74aG7VjJLw6
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ