DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
_f
_i
_key
Static task
static1
Behavioral task
behavioral1
Sample
ca95a5d42b980dafe489e2f81bef881e8a75ea33a95eb62a7f4d4441804253a2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca95a5d42b980dafe489e2f81bef881e8a75ea33a95eb62a7f4d4441804253a2.dll
Resource
win10v2004-20220812-en
Target
ca95a5d42b980dafe489e2f81bef881e8a75ea33a95eb62a7f4d4441804253a2
Size
96KB
MD5
e26ca0e7d18810fb55064447b3ab1cb3
SHA1
edfe960f4774eefbc376e12938228c2f5e066bd5
SHA256
ca95a5d42b980dafe489e2f81bef881e8a75ea33a95eb62a7f4d4441804253a2
SHA512
65976a0ac334dc563078513266f4cff36ade57951e7070895c5713c7a9cffcaedd975ee885d4b0dd5ce7e086c1630fb999d995089568b048b2ce3285a4731ea5
SSDEEP
3072:xCF07za6Imif96zEKVcVN7GsL37NpV0afow:poKSa0BfP
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
_f
_i
_key
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE