DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
4af7ce8b3c533d33efc39614901c1ad0dba7ab01e0eb1e17249247596b5ef6f5.dll
Resource
win7-20220812-en
Target
4af7ce8b3c533d33efc39614901c1ad0dba7ab01e0eb1e17249247596b5ef6f5
Size
7KB
MD5
91405ad63d4b9edb39a9579349b96500
SHA1
97816a01a7133cbd9152aaf0a0bac11c4b9e6840
SHA256
4af7ce8b3c533d33efc39614901c1ad0dba7ab01e0eb1e17249247596b5ef6f5
SHA512
4d719abb32f28db3f442eeb439b8569ac68a030387cad0478708269e541988fa40f91e82cc39534158fe1a22a71b83b2e24b651fd6a1fb0836eb4d1b90b4affe
SSDEEP
192:RMeCErFRHBQhEnUHalm4qYU7vh4NQ6UNC:Rm8HuaIBf
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ