DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
c0fe7040d01fbc706cc66622c6aefe24fdbd90fcf37b7953f3858873e8433b7c.dll
Resource
win7-20220812-en
Target
c0fe7040d01fbc706cc66622c6aefe24fdbd90fcf37b7953f3858873e8433b7c
Size
126KB
MD5
f4f087224701276692dc2ea939f56a64
SHA1
b248043c2e54cef1ee8875b7bcd996b53ea44ea4
SHA256
c0fe7040d01fbc706cc66622c6aefe24fdbd90fcf37b7953f3858873e8433b7c
SHA512
d0307c69706c2874656461ba6bc3c643092c48662bbf677c2ddfd5bdc444d0e7767878a87c4229e9fc81a8fd6636f21651e8c25e09c8169a47ed95de930dc7d0
SSDEEP
3072:OnnywcF/0v3GRmyAD93NepFGSgs5pGvNL:4n2/5wFDFNePGSgs5cVL
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ