DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e0f1cbe60f787d67118e8b424d9bd70ea8b20e5bee86197337872a5a28c44fcc.dll
Resource
win7-20220812-en
Target
e0f1cbe60f787d67118e8b424d9bd70ea8b20e5bee86197337872a5a28c44fcc
Size
63KB
MD5
1427bd760623dfdf76637a291c2b2f71
SHA1
663894ac88e704baa0af776e9a7fc8111f0b4432
SHA256
e0f1cbe60f787d67118e8b424d9bd70ea8b20e5bee86197337872a5a28c44fcc
SHA512
f58535c0ed33478e38c1eb56fe7221f70248569b69919c383e7ea89877bf74a186236a050887a43f546b9c390a8d1d3919349a6ba7c6419c846492262a60d6d5
SSDEEP
1536:kW5LEiRiKF3jmpqzUmF8GKvDW0kmNQeDMs7YD:kcHRP9yyN8+hQJYD
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ