DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ebbae77f012e0ac72c430629d63e62aa16f11c09492a747fbe4c9c5d5a882d18.dll
Resource
win7-20220812-en
Target
ebbae77f012e0ac72c430629d63e62aa16f11c09492a747fbe4c9c5d5a882d18
Size
115KB
MD5
62e6f63576c634dd5c688afff807342f
SHA1
becb533a6162e6ee6deacfe13662c137f83dbd9a
SHA256
ebbae77f012e0ac72c430629d63e62aa16f11c09492a747fbe4c9c5d5a882d18
SHA512
8e9eb31f6a6148b96af6b25d05d8f5926b3b2e851e951c81b7af4811899426376774723bbd130e0cb5a865ab9963dc111f8977264a156a24e64bbe7851966764
SSDEEP
3072:vQIe+dli11h6rdi5SotdeXvKe+z4WMQkA4:Te+dw1D6rO1rkWMQU
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ