DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ab617c5dfe0929dc134678dc5a7b5e83b0ce2677e95eced4ef07d33e64aa815c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ab617c5dfe0929dc134678dc5a7b5e83b0ce2677e95eced4ef07d33e64aa815c.dll
Resource
win10v2004-20220901-en
Target
ab617c5dfe0929dc134678dc5a7b5e83b0ce2677e95eced4ef07d33e64aa815c
Size
42KB
MD5
f0e4ba7e68d00e93457321ddedcab83b
SHA1
15546f9ebf5fb19f5653cd67386d6ef90998c533
SHA256
ab617c5dfe0929dc134678dc5a7b5e83b0ce2677e95eced4ef07d33e64aa815c
SHA512
3f04323e40fd7aa132b3100a01f96f167c2c6fe6aa40ca4f1cb1b712e42e29cf0de125e71b0e1dbca252f6559457bbca1a8b538d8fe9966bf5b8677652e0935d
SSDEEP
768:KYMNkGacMPkHjw7OHa8OqeHH6plt5RN1FfEtd+ChwMWkoh1:KlNkhsDw7w/dLatdJSMWkW
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ