DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e4987cb453dbde042c7da263ec395f22355e9f9c5492341fcd72671d9dd7924f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4987cb453dbde042c7da263ec395f22355e9f9c5492341fcd72671d9dd7924f.dll
Resource
win10v2004-20220812-en
Target
e4987cb453dbde042c7da263ec395f22355e9f9c5492341fcd72671d9dd7924f
Size
74KB
MD5
9220921ce49b9c552f792cccf78ddc4b
SHA1
45bf5011bcf3b62eb17866d4a497768998131e5e
SHA256
e4987cb453dbde042c7da263ec395f22355e9f9c5492341fcd72671d9dd7924f
SHA512
a14eb1e19466332da847f02c6f8d76bcaf9dc0bfc78485c70935b91cccf23ecd868691b5c49eb381028903ac4e49194fe9ce32406e749145a9d4d99f9cc14d10
SSDEEP
1536:043NtAvUOlc5fg6pZFYTvIoB3zqih1yaV+MkNcYCaBsE/e7JL:1fIcSUZFYTgoxhQak3C3E/e7JL
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ