DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
987c048f5cd37784e4889b136e56b591776d48472ca3ea12b0fff70a9018238f.dll
Resource
win7-20220812-en
Target
987c048f5cd37784e4889b136e56b591776d48472ca3ea12b0fff70a9018238f
Size
65KB
MD5
0721c0ce2bd1c45b4ceb1a95dba91070
SHA1
7150652e8a1e67eb01b91b99ffc7c5dceccde387
SHA256
987c048f5cd37784e4889b136e56b591776d48472ca3ea12b0fff70a9018238f
SHA512
6737bbe7569d7e3afe8ee9cd890654dbc48ea07fc4fbf62f8c8d7e58ea2cb3f6ea64b574e6421f73dd2c515712cd77e5910ede88ffc99e920652ce6542c5284d
SSDEEP
768:gtMivlsRFT8o5I3R1eO72trgCNY1XTjbvMZ7T5f9+nM/rq+DUtHW9smZtJXTuLDL:ziv+RFTGUtra1bOXT+GrqyDHXKOm
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ