DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
f85544dc54d06caa843a8f4c7ab3047828f0023be63b6ec4b9ef402f04682be8.dll
Resource
win7-20220812-en
Target
f85544dc54d06caa843a8f4c7ab3047828f0023be63b6ec4b9ef402f04682be8
Size
107KB
MD5
4e511b54283ab37484c2d7ca46bcff50
SHA1
a087e6b98a90b2b94f4234a668e0dbf74d01f1bd
SHA256
f85544dc54d06caa843a8f4c7ab3047828f0023be63b6ec4b9ef402f04682be8
SHA512
dc293a6960f52b68d39ea50ef6a35c30d64a45758febada20dff92095136c9931e22ccfbbf2442b649acbb5170624f0e1c1735e21f3d6d9232617c0ac8452616
SSDEEP
3072:Yur+QqjIC5KdKqoDayYmAr8iaETpCzpzJtEIw1P:FKt+p8DYmW8iaET8z+Iw1
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ