DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
73ebdcca67a6c0bbe82ea4b2234eef2430e7727376e8338744b201d13e41d725.dll
Resource
win7-20220812-en
Target
73ebdcca67a6c0bbe82ea4b2234eef2430e7727376e8338744b201d13e41d725
Size
65KB
MD5
fb0c4852e0461a7d431b4e5aa9790860
SHA1
a1c1f1fe846a9ab3448215f2e74b9ac76b5aee9b
SHA256
73ebdcca67a6c0bbe82ea4b2234eef2430e7727376e8338744b201d13e41d725
SHA512
43ce447c70bd950dfb1bb1c961b8968dabd6f4e3f54405e92d3ddf8f701f3621c4722594d120dfe2d829d4f26af974122b65fc71938bd5ba8cfab62aa4d04210
SSDEEP
768:vqMivlsRFT8o5I3R1eO72trgCNY1XTjbvMZ7T5f9+nM/rq+DUtHW9smZtJXTul23:Viv+RFTGUtra1bOXT+GrqyDHXKk
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ