DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
8cbc002c49ebbd72e4b589d513dba59a5c6bed8bec1507809490975f27845491.dll
Resource
win7-20220812-en
Target
8cbc002c49ebbd72e4b589d513dba59a5c6bed8bec1507809490975f27845491
Size
126KB
MD5
4f32688dd40b14894d218ce41fb532e9
SHA1
f4753c9687543e9d52815bd299aaf11f02228008
SHA256
8cbc002c49ebbd72e4b589d513dba59a5c6bed8bec1507809490975f27845491
SHA512
1240888588e11e5a3355adedd4e7603b3c2c04e22322baccadafa54b7fedb743a3f9bafacf6447ae58e42767f727e67b2d4a4edc3dcc0f97be67bd05ead621f8
SSDEEP
3072:RS5WU1bUMSEd61GND6AZOHQ9Xx3zirk7iwGPy6g+mSR4:RALb1682ACQ9Rzir31y6fml
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ