DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
c75197d845097c3449a4ba4ec8480ae2ba5009949c4727363ef7627f50983f29.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c75197d845097c3449a4ba4ec8480ae2ba5009949c4727363ef7627f50983f29.dll
Resource
win10v2004-20220901-en
Target
c75197d845097c3449a4ba4ec8480ae2ba5009949c4727363ef7627f50983f29
Size
52KB
MD5
692241dd119ee988defb4c49fc64fe40
SHA1
4194c7de9c1a3614a23f13f1c02858ae1c38d443
SHA256
c75197d845097c3449a4ba4ec8480ae2ba5009949c4727363ef7627f50983f29
SHA512
0698dbbaf439575776dbd4675bd0b54e187bf87e89a0190db4e7b4ed65687d01f4814d55609831dffc967ed4c7392d0786fe749afc2b0fbcf9f613df77cd6ff1
SSDEEP
1536:JYV33vPzLaLePtYLVNG3vAGDO1Tn5wEKijQfQ06LOg6c/:+Vv3GLCVD+ZKijozoOzc/
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ