DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
efe9f8fe4747f97f03f000222e03bcc65069ad73e968e6315339fde9b796929f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efe9f8fe4747f97f03f000222e03bcc65069ad73e968e6315339fde9b796929f.dll
Resource
win10v2004-20220812-en
Target
efe9f8fe4747f97f03f000222e03bcc65069ad73e968e6315339fde9b796929f
Size
73KB
MD5
3628e76f02c62fdcef66cf9dda6e5abe
SHA1
1bbd8fbfc7250df1188fb73421c2a2e92d4e4539
SHA256
efe9f8fe4747f97f03f000222e03bcc65069ad73e968e6315339fde9b796929f
SHA512
8bec71831da6abf311a439290234006ffee0a186d28a64f2265e15cfea980c895826d58f738a11ae08b43b28c856f3d15dbe367896dbcfe5da0aa80575c2ac65
SSDEEP
1536:1bvMDoh73+3ulZaL3N936e7OW9lFfzQhMmsnouy87N:1bvaQDlZarHOWrF7Q6XoutZ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE