DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.dll
Resource
win7-20220901-en
Target
ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1
Size
269KB
MD5
dfd6f5df0b944b7b595cf95898150f05
SHA1
c85bc9ee029fb84775ba0e8595786fdc990e7699
SHA256
ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1
SHA512
b44383729d5f509227ea0663502642790df885809707e4aea1f9329d8bee73e3cece2aadb49a92a7d4e27f769ff22a43d855dfbd34c0bfe663936e0b58763b21
SSDEEP
6144:QtTLYhM5ZISvGCzUm5XxRSFTcwENDIg76k2RwuJ/09kLgd:QtTb5iFm5XfSDoDERwuJxg
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE