DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
94f53669bcad6d66c040270c760302275cf89964a94cadc0c176f8e61e6a5896.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94f53669bcad6d66c040270c760302275cf89964a94cadc0c176f8e61e6a5896.dll
Resource
win10v2004-20220901-en
Target
94f53669bcad6d66c040270c760302275cf89964a94cadc0c176f8e61e6a5896
Size
53KB
MD5
a3914111ee45bb06172ae329bde82270
SHA1
e902860a8b896b61a8344eed54d20d94d02d972b
SHA256
94f53669bcad6d66c040270c760302275cf89964a94cadc0c176f8e61e6a5896
SHA512
8c3a0aee5b2633547cf9eee50d3df6773b8913e2f03a90c9151f2e0d409fd3f341551f2f74d6b0be31269be05c17824024cf45da37935b649ca3562d678382a1
SSDEEP
1536:QtdzXJurc90zeJM+CrmutBKtehLl+flch:sdNhJ98BYeylch
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ