DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
a896840aed104494258a26130861b4befc9338dd28e3b0212fe564912e28c58b.dll
Resource
win7-20220812-en
Target
a896840aed104494258a26130861b4befc9338dd28e3b0212fe564912e28c58b
Size
126KB
MD5
9d2ef67ddf97447e9b748d0f814ac962
SHA1
a5021951904c5c4fc6b94499efe059885d88cac1
SHA256
a896840aed104494258a26130861b4befc9338dd28e3b0212fe564912e28c58b
SHA512
7babf5302b436ca3aa8e145083a0323e76905737310dc2abb248d4ba984bc545b5a8eeb3b42c2e8b771b39fd5bab419b16dde78e87741497cf2a647e997a5a6c
SSDEEP
3072:6dEWwNFAei/4Y5CWU/QHhZ9dIAHnigb5/AzCrM:en88ql/QBzXHnzb5YzCrM
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ