DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e55908bb77d806b5a4ceadcb5da700323c7fe904b4a8dc66e4d2ccf7b175b7d2.dll
Resource
win7-20220812-en
Target
e55908bb77d806b5a4ceadcb5da700323c7fe904b4a8dc66e4d2ccf7b175b7d2
Size
126KB
MD5
f4b07bcbba94fb5b6f5f2d755ca4066c
SHA1
0be7a928bca6f9900b91fa947881bd5592fae76e
SHA256
e55908bb77d806b5a4ceadcb5da700323c7fe904b4a8dc66e4d2ccf7b175b7d2
SHA512
dadf1b4211a39dcfba17d2b8a2a910965bf97e0d62268eb838e8f2f927d48fc2d34a2554aca276415362a6f4fab43cddd7050f9d58c53a743c2df4f2a66c33b4
SSDEEP
3072:OnnywcF/0v3GRmyAD93NepFGSgs5pGvNR:4n2/5wFDFNePGSgs5cVR
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ