DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll
Resource
win10v2004-20221111-en
Target
b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409
Size
190KB
MD5
5400467f5b20378cc016ed3710084bf4
SHA1
3d35e52d8463a7429f96e151625fd8314ce44372
SHA256
b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409
SHA512
c21791223de12f7754ed491fb9465e8d7599ac25063aafe81a20bf349373c264f0ba53dddd1a7e9c9f5d11168e320056920184d77ac181541eaa661f9841c6d4
SSDEEP
3072:zKmdbbely43K8U/m11wLFxfsdRQFvxGz0Xt5rS7BvjM38exb6HdlcELLlpENgwJW:zH43K8umrJLSvxG4nrg5MMexCIn6df
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ