DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
c1bb685a274c1036d988cb4977ffe813a103d4bcc6eface7961b59423b40c435.dll
Resource
win7-20220812-en
Target
c1bb685a274c1036d988cb4977ffe813a103d4bcc6eface7961b59423b40c435
Size
19KB
MD5
8de2e3b8562e9b7bc84e68b1ab89b099
SHA1
d0238677c30731e8d0682dde4bdfeeff5a1480da
SHA256
c1bb685a274c1036d988cb4977ffe813a103d4bcc6eface7961b59423b40c435
SHA512
191677e8eeb12d03db15327d61bc6feb4d36e7a8cdb9267e17d8c7e0ba4579ee165c0666671135fada8d05043b7a2ad164ea70b4eb83ada924e269e9367e95cb
SSDEEP
384:WTCi5L7x7I15bdm6aoxt32fJhrrYFfCN22kuJ3ezgn:WTCk7xqy67x52fPSKNd/JO
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ