DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
a316cf8b6011e6784870117a5cf5ce9abc288abb5eed999122a99714da211b31.dll
Resource
win7-20220812-en
Target
a316cf8b6011e6784870117a5cf5ce9abc288abb5eed999122a99714da211b31
Size
116KB
MD5
0d885d8da6ca35af4ba02884fe404f54
SHA1
e5744cca5a854c41fc7193a98fe4a3379be3ee23
SHA256
a316cf8b6011e6784870117a5cf5ce9abc288abb5eed999122a99714da211b31
SHA512
fc82c89725359cab817cc0f651a7916422d40c864d3ff2d48bd45ddbb965c0f1c4d81d33c9996acfa77ca0db8e65bf15f0e3b014298c3d2541141f6a5d6f50f2
SSDEEP
3072:RfKEVUtM9aHXQhUFVJe8ZiveDWPHwKPrCl2la39KbliTy0:RiYUtM9aHg+JNNqPwKPrCl2K4iW0
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ