DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
KillExe
RunModule
StopModule
Behavioral task
behavioral1
Sample
b2e851e253744a6536cead7a4b04661ee8438a4cf0d93c987f60dc976afaa1b7.dll
Resource
win7-20220812-en
Target
b2e851e253744a6536cead7a4b04661ee8438a4cf0d93c987f60dc976afaa1b7
Size
24KB
MD5
452693665b3b7df5b5327d63eb7c1b4f
SHA1
2db64e8ce7e6b0123ae83cc2045bb8725a9b12ba
SHA256
b2e851e253744a6536cead7a4b04661ee8438a4cf0d93c987f60dc976afaa1b7
SHA512
718674faba0c3c72377a1a941d8685b14f6e4a9bb0a6f7525bcf6700190a8402d450bcc0c8f46a4873fd595e420b86175a754326adfa5a03d5e821db411b8478
SSDEEP
384:enjQudSkLgAL1ozYFOeLH2Glb2ENdFZB1liHZEdr7A:encudBMAL1ouOeH2GlqENBjkEl
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
KillExe
RunModule
StopModule
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE