DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
c60485a007a943e0c502f87c589a47704721a028d109dc66f4de71c7421df420.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c60485a007a943e0c502f87c589a47704721a028d109dc66f4de71c7421df420.dll
Resource
win10v2004-20220812-en
Target
c60485a007a943e0c502f87c589a47704721a028d109dc66f4de71c7421df420
Size
19KB
MD5
52aeac04ef4d6d47ac1e984e370a6a9b
SHA1
1e5060e11b6e6b7936d8d5921c3dae7e04586580
SHA256
c60485a007a943e0c502f87c589a47704721a028d109dc66f4de71c7421df420
SHA512
5317d3fdcf24ff64345b4ca4d66afb09fda20154e08065cc738dad8c09d354a167b25ff5357e69100bff4115e7002602f930fc86dea458332521e4af383f46e2
SSDEEP
384:5o3pSo1JwFScdHzQz+YRbRssLjSjFUvyk6TS3p8b1l+ySTN/:5eYDHtMbbLjSjRxop
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ