DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
f1d7f5ca83fb597e90fd1ee685b5238adb63a710852a220867dc135da81dd701.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1d7f5ca83fb597e90fd1ee685b5238adb63a710852a220867dc135da81dd701.dll
Resource
win10v2004-20220812-en
Target
f1d7f5ca83fb597e90fd1ee685b5238adb63a710852a220867dc135da81dd701
Size
55KB
MD5
0d37d8a4cf97fa8bbd4ef108e727b3f0
SHA1
39ae4805e33e565597c075ec320f4d1aefeb2958
SHA256
f1d7f5ca83fb597e90fd1ee685b5238adb63a710852a220867dc135da81dd701
SHA512
ca57ce9aaa55083faaac48dd54871be435655ee8afa2d75ffead4608bff3576502fd9df1bc526d147a50c1ae980a6e5be4f40b6440e2c66051dd8c88e5d8d8f4
SSDEEP
1536:dQFY0nU4Pk97jAofOQbNjMncBZrDRe+fG:d30n/kZ2QbNgcBJr
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ