DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
c66a4a4960c4c59eb1a775bc7ec8716b6d72b96fe4fdf6573e2be56f1050433e.dll
Resource
win7-20221111-en
Target
c66a4a4960c4c59eb1a775bc7ec8716b6d72b96fe4fdf6573e2be56f1050433e
Size
116KB
MD5
6222c4480c5bddb20be433da58ee5475
SHA1
a4cdd6b016940cdc5dc918e735d9838afabc8418
SHA256
c66a4a4960c4c59eb1a775bc7ec8716b6d72b96fe4fdf6573e2be56f1050433e
SHA512
d08e97c4d8e90cac59869b7552ecffd14831abada99d2492fa30f57d411971a0c0abff3602319e4e6c3554f9698de046a0f9b415541ba5d489ad74be9664fd5c
SSDEEP
3072:49c/0bl4CI0UODxMv5YV7mI97W6tJ3jdWwzXPygiP:4a0blhIN5kW673j3zW
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ