DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
54424e5efecf11c00bf296a28310bc8b4c98e4e27ed002d724ca9eeb1c9e4e9c.dll
Resource
win7-20220812-en
Target
54424e5efecf11c00bf296a28310bc8b4c98e4e27ed002d724ca9eeb1c9e4e9c
Size
107KB
MD5
1c8c1031ba8078b9fecd846d3dfcffb0
SHA1
96217f9cd82adfb114f68722e9f52e3b67267861
SHA256
54424e5efecf11c00bf296a28310bc8b4c98e4e27ed002d724ca9eeb1c9e4e9c
SHA512
fb33fe29878efb822b037df602b52b18e84916e5548839f59790bbf7d0dbecc68b810c43a768d8678b6f60bf683cef60bf931db95ce034ad9bbac02678067d4e
SSDEEP
3072:2ur+QqjIC5KdKqoDayYmAr8iaETpCzpzJtEIw1P:TKt+p8DYmW8iaET8z+Iw1
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ