DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ade564bb74f0c186f621ae823ccad6939979ca70c5fab56c24843c664490d2fd.dll
Resource
win7-20220812-en
Target
ade564bb74f0c186f621ae823ccad6939979ca70c5fab56c24843c664490d2fd
Size
72KB
MD5
0ad28c818c3bc89e2fbd8b50e24c3790
SHA1
f1437e6abe3404fd37d16c14db9c2e8d9f260dd4
SHA256
ade564bb74f0c186f621ae823ccad6939979ca70c5fab56c24843c664490d2fd
SHA512
1114a709f403f253361eb13800dceeb6bc1ac5e747a1eae8fb0d394af140b7f175365ff61ae98f7ca25c4fd13c723abff25fd8d43fdf1f5ff445b0f37aeeb6f8
SSDEEP
1536:awB7GujO/4eXrZSduQbAY+OfmxivFrZL5N+jMxw871s9hR:awlGua/9bmuQbAY+40ivlN+Yw8OhR
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ