DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
bb0c6d86412b9ac9932f7ca9d155f39f90e932732efeae5213085e37b513f4b2.dll
Resource
win7-20220901-en
Target
bb0c6d86412b9ac9932f7ca9d155f39f90e932732efeae5213085e37b513f4b2
Size
113KB
MD5
847f83468d7649abf72382ca73d7ba82
SHA1
0ca1dbfb2c369281b62ead586a57b79c0dff156e
SHA256
bb0c6d86412b9ac9932f7ca9d155f39f90e932732efeae5213085e37b513f4b2
SHA512
8b0a7a529a7d098de0f9a5e74fbc55ca02703813ec1c645cd75c6b14a43cacdc2a330887d4baa12bd522ac62bf782a2801e7f9caf0baba40405d8807e16490f2
SSDEEP
3072:bQY4QNscdP0bZ7KfK7oQ83fMSaUv0w0o86s9+Ek8FhyOYCU:bh8d2fK7b8P/bv09t6scAryF7
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ