DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
7377f26a3e15ccd413d3a06d0e89e608d4bf652f29d157efaeafd7c3375661a3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7377f26a3e15ccd413d3a06d0e89e608d4bf652f29d157efaeafd7c3375661a3.dll
Resource
win10v2004-20220812-en
Target
7377f26a3e15ccd413d3a06d0e89e608d4bf652f29d157efaeafd7c3375661a3
Size
104KB
MD5
a91b48ac7a504e68570a35d387983e20
SHA1
5c9e5f1f0dcbf80a5501cf7a83ae4f76de3aebf4
SHA256
7377f26a3e15ccd413d3a06d0e89e608d4bf652f29d157efaeafd7c3375661a3
SHA512
58fb6f9c3cced30b4ac91b903bbdde41df526835c066e8dfef05f747b8a875e01580b2438d111298f9089ce197be50988d4fe1b09d1c4013d4cc6278cc1c6258
SSDEEP
3072:nHRy9K9Jm9gXM1KmfGzHL/8akbMjcoNA3PK6DxKPm:nIgIitmfCL7jcoN0nxIm
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ