DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
b96aff85870cf11348240e9e113801d8c0fc21ce6f63a28cc869a54ecb6d971d.dll
Resource
win7-20220901-en
Target
b96aff85870cf11348240e9e113801d8c0fc21ce6f63a28cc869a54ecb6d971d
Size
107KB
MD5
08deadd55de987c84b91813267d52e90
SHA1
223df86767213dbbf4220a0364a57861e7d6320e
SHA256
b96aff85870cf11348240e9e113801d8c0fc21ce6f63a28cc869a54ecb6d971d
SHA512
fd17c6f3cb0a1d0f9cef73ab1f69d69a29eaf4b852ec9f209c399ebad6b604649d18b3f16b2407597f19bbc79cbe2fb46b8eec8d3e0006d700888134328c6b76
SSDEEP
3072:hur+QqjIC5KdKqoDayYmAr8iaETpCzpzJtEIw1P:wKt+p8DYmW8iaET8z+Iw1
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ