DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
da674e19e3ba2c82630c218d43619a0991f3254050bb518ac854abe2abeb2e3a.dll
Resource
win7-20221111-en
Target
da674e19e3ba2c82630c218d43619a0991f3254050bb518ac854abe2abeb2e3a
Size
126KB
MD5
117e5b8d1c5abe0355b02418b0ced1d8
SHA1
cc53ef98c14f3b86188d91e99f3539fa81118fbe
SHA256
da674e19e3ba2c82630c218d43619a0991f3254050bb518ac854abe2abeb2e3a
SHA512
428748d7dc3a1454e6367ca8a016a5a3ea620842badc865259810f6a45cb00224561d731072ee65870b7dcb0456d145b9ad0542e17dd4c1a45e4944dad710590
SSDEEP
3072:OnnywcF/0v3GRmyAD93NepFGSgs5pGvNX:4n2/5wFDFNePGSgs5cVX
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ