DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
71e7f5723640d4b9b3a8e5a1de6ca410340ab02162e079efd12be8d9a6b74126.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
71e7f5723640d4b9b3a8e5a1de6ca410340ab02162e079efd12be8d9a6b74126.dll
Resource
win10v2004-20221111-en
Target
71e7f5723640d4b9b3a8e5a1de6ca410340ab02162e079efd12be8d9a6b74126
Size
89KB
MD5
341848f5484dbd4b744bc6ef547ccf20
SHA1
8cf515563edd37711513274592c16b3990dd3302
SHA256
71e7f5723640d4b9b3a8e5a1de6ca410340ab02162e079efd12be8d9a6b74126
SHA512
8c3392e289e94d0e1f6cb93bb0cc8348d0456a992c41c0a363d6113131c1bf91c39d8bf98acab6477ad19df8b90101e1ace9b0c0bde8325f8d49ed3c8c6c5d03
SSDEEP
1536:jsvAeUQGipYOcWGtm3wMANokcX4L4jDbR4EWtv4hVlmwxzFnqAaQUP6pOcY:jjkcXtKkcG4j54EuoVlnVFJaQWcY
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE