DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
b2b7cf4608875de492e9bab464d301e322fff058ed2500c46fa0fd14837279eb.dll
Resource
win7-20221111-en
Target
b2b7cf4608875de492e9bab464d301e322fff058ed2500c46fa0fd14837279eb
Size
431KB
MD5
c19fb86cca5a39ae6ac4216ec4544b8e
SHA1
77deb6fdbd61fda25f71d8c9aee1d221677d19ac
SHA256
b2b7cf4608875de492e9bab464d301e322fff058ed2500c46fa0fd14837279eb
SHA512
964122509bfb3b6110526c0fb35450aa0a47204d0afe2f4bbde8858605a9104a64c3cc49c183641a9a64852c488b11846ebfeb9d6c967cd9ffe4fddffcb54b55
SSDEEP
12288:6B4Ir3tE8tvkgix6aiBFvHgiqUFkvkfAPu35R275:84IrtE8tfFzCupRW
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE