DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
f5ac437ced572eb340105c7fd401668e8a298dad1946b5a904475245fb169dbb.dll
Resource
win7-20220812-en
Target
f5ac437ced572eb340105c7fd401668e8a298dad1946b5a904475245fb169dbb
Size
72KB
MD5
046ccf3289c21fcc36d6676149934980
SHA1
ef8d094b9a3f9826a445f74a2c0c5acaf9ae6197
SHA256
f5ac437ced572eb340105c7fd401668e8a298dad1946b5a904475245fb169dbb
SHA512
bcfe1ddf558d3a01e8b0d0c4eaeafb5c41f818c868b0844df489c006e75f7871f2825dedd1bec0a81486053cfb1f30f138cab12247a98dbb38ade1fd53ad0eff
SSDEEP
768:DFPC6yR/rtjR/l1Ag82QMop/2yje1zuCFxCW4+Ks79OfxZJIPPfnZnsdz8mAaLy1:RCX/r16/p/2dnTCDQeZJAfne2aOXsQld
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ