DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d48ce5768b0e4cf7cf2703b840a1e9329fc6b37f87e684d3287dce693552d113.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d48ce5768b0e4cf7cf2703b840a1e9329fc6b37f87e684d3287dce693552d113.dll
Resource
win10v2004-20220812-en
Target
d48ce5768b0e4cf7cf2703b840a1e9329fc6b37f87e684d3287dce693552d113
Size
20KB
MD5
613db02d3a7cb7331da1893b384ec1f8
SHA1
3db996df420afb0fc084bf72ff42c59d07217846
SHA256
d48ce5768b0e4cf7cf2703b840a1e9329fc6b37f87e684d3287dce693552d113
SHA512
2f512b57825f9991fe4f34ac49c0c0d981bf18d5e81766e7f27bb4d3c9f2a2236319e669fc1a3f277e5b0c3a25dd7a51ffcf116e7090475a50a46eeac8d3e36a
SSDEEP
384:roA6RCWkfdbC0QHCxwkpDTuTG8yyNSg+jEgxTVvy22gugSn:GCWo40QHAwkRuTvHIgQEgxTlybZ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ