DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ddab67d6dd36ca64069ad088f772c210dac9ea88b0db755213ff3a26a0a895da.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddab67d6dd36ca64069ad088f772c210dac9ea88b0db755213ff3a26a0a895da.dll
Resource
win10v2004-20220812-en
Target
ddab67d6dd36ca64069ad088f772c210dac9ea88b0db755213ff3a26a0a895da
Size
57KB
MD5
13bae74806f9c4fc8c891d48e926e6f7
SHA1
085dd9a95cb7dcbeed91d3d1ee15de15323bd115
SHA256
ddab67d6dd36ca64069ad088f772c210dac9ea88b0db755213ff3a26a0a895da
SHA512
6dce5a519125de3fc88738cebd86ec45c30901ab158d6413d24d0bc95346e8dee0fbe2d6b59df86cef139b24561f478d2aee95e1dd1849f042e3920cca8ccb50
SSDEEP
1536:qSuFqLT30NZeD98E3wXAdVIXWbuViWVsE+MGInouy8K:/uFGT0NZep8e7+LV/+KoutK
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE