DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
fb370c69ae71aa42d4ec1fd0e4383886b7f4c8c2c061ff4b2a2dc6058c275a10.dll
Resource
win7-20220812-en
Target
fb370c69ae71aa42d4ec1fd0e4383886b7f4c8c2c061ff4b2a2dc6058c275a10
Size
126KB
MD5
9c83cd9bb132e1397ed9c2020143c8d1
SHA1
40be497dc7e7e0fb16b7c820fea1e625990a418f
SHA256
fb370c69ae71aa42d4ec1fd0e4383886b7f4c8c2c061ff4b2a2dc6058c275a10
SHA512
850a593d91287cf3a86e10d28cc5dca8563b604597b64f1e3c779de7631cdde50d5d454f2738d3bbd18c3b45004e4eb3f65c166d047dcde9ddf4212ed06b82ba
SSDEEP
3072:OnnywcF/0v3GRmyAD93NepFGSgs5pGvNT:4n2/5wFDFNePGSgs5cVT
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ