DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
bf873447d6e60c60cab602f6cad02bf00e822343c473d007f48ac180a050794f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf873447d6e60c60cab602f6cad02bf00e822343c473d007f48ac180a050794f.dll
Resource
win10v2004-20221111-en
Target
bf873447d6e60c60cab602f6cad02bf00e822343c473d007f48ac180a050794f
Size
89KB
MD5
320bc29fe7f40e806550ac14f62d7bf0
SHA1
2a5b7e9c5122214a774974511f2f3a7017448ae5
SHA256
bf873447d6e60c60cab602f6cad02bf00e822343c473d007f48ac180a050794f
SHA512
3fe9407ee32ec5a6e37c501aaaaf0bdb2cec2723ed60ada5882c96c5cda68188be1e33f30d55645d691eb4576b6d8d667873855fc918e0edadc137f1b8baab54
SSDEEP
1536:jsvAeUQGipYOcWGtm3wMANokcX4L4jDbR4EWtv4hVlmwxzFnqAaQUP6pOc2:jjkcXtKkcG4j54EuoVlnVFJaQWc2
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE