DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
b30ff953e81bcf331a4391c090208ddb65d9deaee7651197b92a05e66b89ce9a.dll
Resource
win7-20221111-en
Target
b30ff953e81bcf331a4391c090208ddb65d9deaee7651197b92a05e66b89ce9a
Size
116KB
MD5
b798191679810a8ffeaffa5f1fb751f4
SHA1
36416835d2af47fd1ab76d7fe4b3ee1a99a4b602
SHA256
b30ff953e81bcf331a4391c090208ddb65d9deaee7651197b92a05e66b89ce9a
SHA512
64a6239e7bce3188b30604508bd62d0cdb48af3d891fbdc86fa25eda491533e473658c5d436985e8d4513c92cc3a9e2ad5940266efae617294cb78217c620343
SSDEEP
3072:J55DIrumIXyGZjVHVWUX7VY4v0XYelDVUT:j5s6VyGZjVHVeHplDVm
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ