DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d3866c92c9a866c63bd6ba33f71b1035408c0e57ec7e7bcbe7e2a527ad3631cb.dll
Resource
win7-20221111-en
Target
d3866c92c9a866c63bd6ba33f71b1035408c0e57ec7e7bcbe7e2a527ad3631cb
Size
116KB
MD5
be0e4af83cb93e2dd8c1f26b11c5a0e0
SHA1
31159260d8426db92cf58da5f77cc80057cea59a
SHA256
d3866c92c9a866c63bd6ba33f71b1035408c0e57ec7e7bcbe7e2a527ad3631cb
SHA512
d051cf089b30370e58c8e06028444f48f7600a61867ed578d3852c01934c70b5b2e87d912adc701979f531284e9877125eb3109889707da06285a97e9fbd38ab
SSDEEP
3072:49c/0bl4CI0UODxMv5YV7mI97W6tJ3jdWwzXPygiQ:4a0blhIN5kW673j3z1
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ