DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
ca5654ef22ee2684aaa2c1f152295395ba69ee1663192b0a18c11cce35ad8fa2.dll
Resource
win7-20221111-en
Target
ca5654ef22ee2684aaa2c1f152295395ba69ee1663192b0a18c11cce35ad8fa2
Size
30KB
MD5
33ba03c34e5c23976378bc0c6d2852d7
SHA1
255e741a4eaf9d4cc5f0e2fdb083db1b3fec2be6
SHA256
ca5654ef22ee2684aaa2c1f152295395ba69ee1663192b0a18c11cce35ad8fa2
SHA512
613f74d4034173618595c14813952946ae31a799f9b8a84fbafcb675d37da952b7b2a86baad9479eedd9cad2bab0d637b47e1b127bb3ff39acff85fed8b25b29
SSDEEP
384:Y1yO3dAIQ3UmbH9Xz4Nx02TeU/v0kaXdTo3BgLSdjIE0eaGKpYZ:GDdAbdbH9X4JlCNToxgLIoh
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ