DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
ID
InitO
Behavioral task
behavioral1
Sample
e5fcd0271915c7a60f2302a965b101a9a5d3be464f8e476e8e01417b38167384.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5fcd0271915c7a60f2302a965b101a9a5d3be464f8e476e8e01417b38167384.dll
Resource
win10v2004-20221111-en
Target
e5fcd0271915c7a60f2302a965b101a9a5d3be464f8e476e8e01417b38167384
Size
42KB
MD5
0ad3cc3c7e1c6549b4c67edd7cab66e0
SHA1
762c0708e050b54bb58b16e91cfee490795bacb8
SHA256
e5fcd0271915c7a60f2302a965b101a9a5d3be464f8e476e8e01417b38167384
SHA512
c4baec74073584a7cb72a3c517bf6d4ef0136cbe579252cc7a58c63e39d80d558e6d0e36f58d58c17e512e54e907498a4438fc590c02e57430a78aaeefe4dbe2
SSDEEP
768:1udVN8BkYSh/4NeTcoVJumtmRKA534O/qcnISIGsEENHQxMAORdPsc:8+Sl4kc2tMKAekIebeJsc
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
ID
InitO
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ