DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MyCallCBTProc
Static task
static1
Behavioral task
behavioral1
Sample
2b8870315c51c8158042b76d240b8c226e7852ed2772d6e3f29ccd053fc9d0d8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2b8870315c51c8158042b76d240b8c226e7852ed2772d6e3f29ccd053fc9d0d8.dll
Resource
win10v2004-20220812-en
Target
2b8870315c51c8158042b76d240b8c226e7852ed2772d6e3f29ccd053fc9d0d8
Size
11KB
MD5
673d48c087887d96b79eacb2588ecbe0
SHA1
0438a4eac92c2b6609db5670b3c69dc9d0b581a1
SHA256
2b8870315c51c8158042b76d240b8c226e7852ed2772d6e3f29ccd053fc9d0d8
SHA512
ec9a978636b610b7d8a3b5aceecea48faf18e64a3ce4eda66b852b084570fccad299da1e86c33785368b0b53e776e8095b7f9673c53824bfd938325eeb523a26
SSDEEP
192:eZUSsI2P4Ha1l3K4ZymcX0er/rHCPAFaZietb3NGfIG59qsbi+6AE:uSP11l3KtmcXsYFSie1UgG54d
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MyCallCBTProc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE