DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ed58cdc202c750a79586ed8ffba68738f51520e4206999db7ac640ede7ef6dc6.dll
Resource
win7-20221111-en
Target
ed58cdc202c750a79586ed8ffba68738f51520e4206999db7ac640ede7ef6dc6
Size
85KB
MD5
c8f5166a13720bd94693585e4a773c49
SHA1
1b0be57a908e7c2881564039db4faf13c882f7c2
SHA256
ed58cdc202c750a79586ed8ffba68738f51520e4206999db7ac640ede7ef6dc6
SHA512
7021ee23cdfc8ce72580bb07abc65bfa45f43a50946a71ced8b658ba6adda8f88fb329ff60390dc74d5a5d22330a08d406af615efa20d555562ab72680419110
SSDEEP
1536:e819oaDvYgdsEA+N8p2Tv16WnqrYdKbfewwm95/clFfqoC9IcQ/7zW:e89oaTYgWr+N8YZqrAKbewwK/ifqo7nO
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ