DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e1f39d39f02b7e5f57ada71f2dc1add8ff1741a2d91635425b7fffea5ea7c00f.dll
Resource
win7-20221111-en
Target
e1f39d39f02b7e5f57ada71f2dc1add8ff1741a2d91635425b7fffea5ea7c00f
Size
78KB
MD5
b3a2c5de7459e07075590afd16a38be0
SHA1
520bc235ba6644b67be47321401a8d2dbbb2da79
SHA256
e1f39d39f02b7e5f57ada71f2dc1add8ff1741a2d91635425b7fffea5ea7c00f
SHA512
af570d71b78811ba66949d9b45b56c44df089180863d8aa3dfeb14a04097310c7caa45847c20e63b8218b3430fb6e8695bd705af3d2742b75b86273bc0e573a8
SSDEEP
1536:CNofBFWDR4EKtC1YTADVhR2vq4ZB6RNomdo3VLg9tSB5pym9d8blV:mwDvTAZP2vrHWNyG9tKqm9dqT
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ