DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
a87741166011a71f8e2eb0474661324f23b3ddf64f8c7c35e5844bf5f89fe9af.dll
Resource
win7-20221111-en
Target
a87741166011a71f8e2eb0474661324f23b3ddf64f8c7c35e5844bf5f89fe9af
Size
61KB
MD5
33d7b119f78cd6e550f7bdb74362b140
SHA1
33561de4aab7919e1dd8cc8d18792e785472e721
SHA256
a87741166011a71f8e2eb0474661324f23b3ddf64f8c7c35e5844bf5f89fe9af
SHA512
8b574cb9531c49476368fba09583759bcd09374dc0a8b3c365b84d98cfd926d48e970ec6a131de245fe1fb55c7718019d89753f03bf4507b7a471a6e4883cd96
SSDEEP
1536:A3UqaAORxZU+79I9SAwdLQJin7Djh0jxTkKhNh:A3YAOhRIcP8K7x0jxTkKx
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ