DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
682e9bbb8454b924bf92efbb41edfde58354fe1f90203c8db6410cd10c6a0d29.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
682e9bbb8454b924bf92efbb41edfde58354fe1f90203c8db6410cd10c6a0d29.dll
Resource
win10v2004-20220812-en
Target
682e9bbb8454b924bf92efbb41edfde58354fe1f90203c8db6410cd10c6a0d29
Size
207KB
MD5
93190d4d37e9b83dd78ded671405e6b0
SHA1
ce6d90cce32ca68ecd8d5f765983cb731a07a1e1
SHA256
682e9bbb8454b924bf92efbb41edfde58354fe1f90203c8db6410cd10c6a0d29
SHA512
3049481377a21746c1f7402bc2babd377f9c93c3b7f12b39d729acea28dd0db268ba98fe1735906881df0375d09246f67726ce7f9aa0dc612db31a8397abb785
SSDEEP
6144:NKPnKONK0FWCChdSL10bVTAxq7jbFfgJxv:0PrFWC6KkRDFMv
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE