DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e0db644bc2cd44e40d957d5c7f74501339fcef90b3acc66b0ef26d281f7a11c8.dll
Resource
win7-20220901-en
Target
e0db644bc2cd44e40d957d5c7f74501339fcef90b3acc66b0ef26d281f7a11c8
Size
56KB
MD5
4bf96740817e66486ebef407bca0cc4c
SHA1
719fd693a9350ab58863016eb04922fb11e41a91
SHA256
e0db644bc2cd44e40d957d5c7f74501339fcef90b3acc66b0ef26d281f7a11c8
SHA512
edfa9b467e07899380b46b004a53d1dc60bb5d5b8a7bf8796dddc24643c04ddb2908f0a21f9845dc3f738c7aec3b42979e1e8ba022ed83501b630bab31cfae73
SSDEEP
1536:FKgQdE0oRaJ9gaJzOKDizlrDKOvivxOku8qeof5y8OnZ:Fk4zaJ9izlrDDivju8hN
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ