DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
a8f96c6c9c064a181948ffc2b131b09f2b31fdf830a7355ef7d509eddc5d1f01.dll
Resource
win7-20220901-en
Target
a8f96c6c9c064a181948ffc2b131b09f2b31fdf830a7355ef7d509eddc5d1f01
Size
43KB
MD5
cdbfbd3dc2f0146b035cc758d2b97d2c
SHA1
d94f97532840936a22c1a13687671d792cb64c10
SHA256
a8f96c6c9c064a181948ffc2b131b09f2b31fdf830a7355ef7d509eddc5d1f01
SHA512
c8398cfb8439c65d56bd9a2350c24c1876e855be715751ea3659e88e7fe11b15aaddab3910d3d07fcb30a544bb5ff6283b746f2d17de4142eff8bb955adcbc40
SSDEEP
768:1RRscZuKcIX1GEMmAT8PtvxYtDJWsTKhvunCuL99:ecZuLoAmAT81pYtDJWsuwL9
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ