DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
caf9ff71f1ea6d8682085752e6fb77037089ba9e7ba5e0f351dd041027714d8d.dll
Resource
win7-20221111-en
Target
caf9ff71f1ea6d8682085752e6fb77037089ba9e7ba5e0f351dd041027714d8d
Size
126KB
MD5
4f8ecd26d1f28de4ffeec6fe168611b0
SHA1
bce185bfea4ed1bc519b6edb767d722781ab66a5
SHA256
caf9ff71f1ea6d8682085752e6fb77037089ba9e7ba5e0f351dd041027714d8d
SHA512
a623e8562913d2c1bffe47d81952734687f058e3700075883050812d778fb2a42fe21252459a4236444540427aea0eb3587f728f839e0f07982737bfae2d2d91
SSDEEP
3072:OnnywcF/0v3GRmyAD93NepFGSgs5pGvNw:4n2/5wFDFNePGSgs5cVw
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ