DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e486dea31a87ffbec3c9ea57b99cf5d20bad198b5da7dfc2c4e161cce3180c3f.dll
Resource
win7-20221111-en
Target
e486dea31a87ffbec3c9ea57b99cf5d20bad198b5da7dfc2c4e161cce3180c3f
Size
116KB
MD5
0b2db94cdcebdf8c4970a2827fabab9e
SHA1
0036f123a92163a633a37302974025dd17702459
SHA256
e486dea31a87ffbec3c9ea57b99cf5d20bad198b5da7dfc2c4e161cce3180c3f
SHA512
47d7c89b2a572b00c749e13c8cbbac62cd692c28d7490ed161873ee7c552fabda5f2f9746ce3080d2adbcef697c69354fc9f26f6aab4dee198eab19182bc9444
SSDEEP
3072:iihsMhNZW7L0E2oDASL4h9q9t+UQP+86Z/rZ:Z3BWf0ej9/N
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ