DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
210fd40918096176bf4dd591f48c282c80f1cf1e07cfabf62387ae843540b05c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
210fd40918096176bf4dd591f48c282c80f1cf1e07cfabf62387ae843540b05c.dll
Resource
win10v2004-20220812-en
Target
210fd40918096176bf4dd591f48c282c80f1cf1e07cfabf62387ae843540b05c
Size
24KB
MD5
60094a452277c2e9e07079a6cc3d3961
SHA1
011d411837e6a10e41c1297341e141eda227c10b
SHA256
210fd40918096176bf4dd591f48c282c80f1cf1e07cfabf62387ae843540b05c
SHA512
4f9c56a74b54d8d5138fc6bd4abbb6614b9054bf25e634639cddfd7bbde50de2f05f47aa9a6ee31b8b50d54fd8f9d70210dbb093d9723801c5719ae027deebfd
SSDEEP
384:3EKibCvr+WB+N2w3urjjXvjX2TDciJKhnwSwnJ+bXPQmJCj8lASEbKUmxEJ:3tVtY3u3iUisqvifQmYwlASEbxJ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ