DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
dfc41953405ee67474eab0d5fb39906745605994e0c311dab01719d882d59956.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dfc41953405ee67474eab0d5fb39906745605994e0c311dab01719d882d59956.dll
Resource
win10v2004-20220901-en
Target
dfc41953405ee67474eab0d5fb39906745605994e0c311dab01719d882d59956
Size
83KB
MD5
5ec8a54a2399192424fa5c96af227768
SHA1
dee411e17bd5cdc65e1f1fc8eacb4e40e7cac0c8
SHA256
dfc41953405ee67474eab0d5fb39906745605994e0c311dab01719d882d59956
SHA512
0ad873f9b248a449893f41ac547aaff3bb17b5f859b147522cb59aa2b9b7f0860ba61e5efaef4622757a89109f23e7065d3d580cd62ca244842d4de4557942a9
SSDEEP
1536:Te1x/JdvUcAWHNT+UuTZznO91JE+sNfRefBerftBb/RxCX/3+z:619JdvUPWZmTZV+exBNQOz
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ