DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ffedbcb2c8dbdc66ffc2d34fcbab09e411e4f66e08436b375d04ed199d1b18e0.dll
Resource
win7-20221111-en
Target
ffedbcb2c8dbdc66ffc2d34fcbab09e411e4f66e08436b375d04ed199d1b18e0
Size
239KB
MD5
325fc6a592c1bbc7fd1244ce43cbdf56
SHA1
526d56db40e4bf7b919f3a26f3d0523371a8f6e0
SHA256
ffedbcb2c8dbdc66ffc2d34fcbab09e411e4f66e08436b375d04ed199d1b18e0
SHA512
1ed17716adceede976425f94a35d5e220620619237b507611358d1b8d85b78596e68a33c0cd157d2da4b70adec39a598d1e7a4225f3cdeecbf17dfefbabcbfca
SSDEEP
6144:tOdcM8GtEQRmH2tPedG0zPbIiLB2gMy2HsSZh6ivha0:8d58puPedPzUiLBWpZIR0
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE