DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
START
Behavioral task
behavioral1
Sample
ffd6fafa34aae7e3d1cf7d121449085c2bbe7c3ebf88beff66bd340072f62a93.dll
Resource
win7-20220812-en
Target
ffd6fafa34aae7e3d1cf7d121449085c2bbe7c3ebf88beff66bd340072f62a93
Size
64KB
MD5
e5998044ce21fd28ac935c77004d9d5a
SHA1
d6db1d6538f43c8b8ec3533fb205cf455928d7ca
SHA256
ffd6fafa34aae7e3d1cf7d121449085c2bbe7c3ebf88beff66bd340072f62a93
SHA512
e39d2a3420eec2ee2ae01d9ee1c9f7b60fb0e748cc4621fa568fc23e6a4db0850e7cd54f97cfa0d02109faa16e4c305b108e223346f8074f93f62fd9192afbd6
SSDEEP
1536:Hmvr85U7iU7yRz0ubbmApFrXyiD9Zhx53UKnCnbwnGSpnNmNehoF:HmQU+AEJrriyjKKC0n1/w8oF
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
START
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ