DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
bc0bb1cc0cc5962eb75189a28ce55866faecdafdefd09ac0788dd94c61a9e114.dll
Resource
win7-20220812-en
Target
bc0bb1cc0cc5962eb75189a28ce55866faecdafdefd09ac0788dd94c61a9e114
Size
126KB
MD5
1dd3a06a0b333f74d997a9012d1959bf
SHA1
19bbdc5ad5fd1634a41bcb9d95ba06f90a41051e
SHA256
bc0bb1cc0cc5962eb75189a28ce55866faecdafdefd09ac0788dd94c61a9e114
SHA512
0c34b251f33fd7931b9c5f3e878e4955c8b1717eef8716452b8bbf5e53cc5af6c8f6a1cfa1b0cb7c0a56010b5aa129e50fe1d51773b970c2cafcbc33fac1e2d0
SSDEEP
3072:RS5WU1bUMSEd61GND6AZOHQ9Xx3zirk7iwGPy6g+mSRa:RALb1682ACQ9Rzir31y6fmz
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ