DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
cb537602cb5f317e3db718e99f623094d6c2bd915c7c293ac3d315b9defedf74.dll
Resource
win7-20221111-en
Target
cb537602cb5f317e3db718e99f623094d6c2bd915c7c293ac3d315b9defedf74
Size
31KB
MD5
e035eb22c0611b8a10246855bfff1000
SHA1
e9ff691da5b3d40a6cfc09e09e4c6306b24ea868
SHA256
cb537602cb5f317e3db718e99f623094d6c2bd915c7c293ac3d315b9defedf74
SHA512
9ac962306e005113ef365b523d81bc146a46e1f412e9a19c5667df0c1388b0bdab8e07373aafaf407919f890430f260493505dafd82a2f7debd7d85ec3bd68b7
SSDEEP
768:HELpotKlLGDqpyTqnJnX086GA6g9dTvI:cpDG2v08mfnTQ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ