DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitDll
InitO
Behavioral task
behavioral1
Sample
e01393a28bed472e06acec4c87de75697028562204114256d77123b67e416f6a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e01393a28bed472e06acec4c87de75697028562204114256d77123b67e416f6a.dll
Resource
win10v2004-20220901-en
Target
e01393a28bed472e06acec4c87de75697028562204114256d77123b67e416f6a
Size
33KB
MD5
664d13fb32b3621239a70f3e4ea81c2e
SHA1
2ad44c69ed8d56dd920f2a78a044072944875ec8
SHA256
e01393a28bed472e06acec4c87de75697028562204114256d77123b67e416f6a
SHA512
cc9febdff93d4d767acab602d01835e2e31d52b1b9c1d1d81e536c7b4dedc28fbf1c572da1c19bebdf3d05deaa3bd906815c47d22ebaf3933d4cc5a2d10609f2
SSDEEP
768:Fdzhtndl7QNnUzbMsCqyBC3dzLINHe2hoqcA6jD:7TQNUzb4qyBC3xINpKqcpD
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitDll
InitO
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ