DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f46dc35f38fb841f8696e80da53476d821474f5472164fa21c4637e69a6f5787.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f46dc35f38fb841f8696e80da53476d821474f5472164fa21c4637e69a6f5787.dll
Resource
win10v2004-20220812-en
Target
f46dc35f38fb841f8696e80da53476d821474f5472164fa21c4637e69a6f5787
Size
52KB
MD5
7270f144bc0e1626441147cf28f22dc2
SHA1
ed8e9dcf4baab496732287abc742d35f3057303a
SHA256
f46dc35f38fb841f8696e80da53476d821474f5472164fa21c4637e69a6f5787
SHA512
b8ff51390fad9a3042d3fe42b6b2f1042457cb2b9600666e8a52d36e61a1dfaef2cdd0c8363d18248b4bcd075e1e47421b32152eea167d920d3c378d58b33afa
SSDEEP
768:LJXofW5CIAfkPkYfdnT7EBq/qqvfy7sfqUyFBUnBmIGCiuIJ5/AIN4rsyFH9LYzu:FXrwyUsfqUyFBRxFdWsyVsPwNl+q
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE