DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
da73912540f24f34c41f232ad5570c1d2b361b8f537b1748aaed21510d5ce888.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
da73912540f24f34c41f232ad5570c1d2b361b8f537b1748aaed21510d5ce888.dll
Resource
win10v2004-20220812-en
Target
da73912540f24f34c41f232ad5570c1d2b361b8f537b1748aaed21510d5ce888
Size
22KB
MD5
0b2f41357ee0cbf527191ad810cdd345
SHA1
6439faa8c6a54e280544b578e74a3d3d1489ae27
SHA256
da73912540f24f34c41f232ad5570c1d2b361b8f537b1748aaed21510d5ce888
SHA512
43942f2e298ddcfef4e15f0d146d178e0990a38186e10d9283dc0442d27b9b604a37d9adf2cf51130ad2d7260dd260e1c968cecc680ddb1384eeee60db6533e8
SSDEEP
384:lBW3uhGq6USadm9d08769PkdE9uKmSU9USj+APXpZ/kWf:lmrqHSa0dh7G74zT
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ