DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d3d400cfc4b48d74af40c400a27739d4d2f908d52a8a0f2e8a70482ac4bca879.dll
Resource
win7-20220812-en
Target
d3d400cfc4b48d74af40c400a27739d4d2f908d52a8a0f2e8a70482ac4bca879
Size
736KB
MD5
42dbe69167990e8e2e56bb41b1249ff2
SHA1
7ae92a0229deb97437b39bfc529f4bbbac9eee8d
SHA256
d3d400cfc4b48d74af40c400a27739d4d2f908d52a8a0f2e8a70482ac4bca879
SHA512
5c5234cf410d373e8ae98d40aa9d7446b21ad47c3a4dbcdb57895a1de0bda9805c03f3553a940a943bf04115a88dafcfa3fe786f581283b5e5f4e289b95e4cae
SSDEEP
12288:g/v1fknGo66DOco2l5SgLeqQ+J8pdJQXK0Zj1ok2waBaqxEm3YNyLru0Zo7L+:g/xkGoDptEGwyqbUzD29JxE23ZqK
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE