DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
db6add41939b933448c9d3e1edd8543a20b9a0d971b006844af4ff4ec2346fe6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db6add41939b933448c9d3e1edd8543a20b9a0d971b006844af4ff4ec2346fe6.dll
Resource
win10v2004-20220812-en
Target
db6add41939b933448c9d3e1edd8543a20b9a0d971b006844af4ff4ec2346fe6
Size
72KB
MD5
fd74ff1ce748f36820dd5be0fc967c1b
SHA1
77a07c95abe85942b28aa62070e4a41537350d24
SHA256
db6add41939b933448c9d3e1edd8543a20b9a0d971b006844af4ff4ec2346fe6
SHA512
39ec7853f077d50132935051b28fabc4b041717bc7538a161ea85ef2d781b746bb8e56c391ff8a9429f91f54cd9c0081094a2d0b002bf17802dd0b594a4f5378
SSDEEP
1536:OJQzGRxmrdj5xXIeHYEIQMZqqacTCK4orC1:yKGRxmhj5xIe4ZXZqqYK4AC1
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE