DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
51e0ea81d6df11ac9d6fb430c5896116edcfbf10b7f0bfa949a725b14f3d2693.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51e0ea81d6df11ac9d6fb430c5896116edcfbf10b7f0bfa949a725b14f3d2693.dll
Resource
win10v2004-20220812-en
Target
51e0ea81d6df11ac9d6fb430c5896116edcfbf10b7f0bfa949a725b14f3d2693
Size
127KB
MD5
e9301793068b76fce983cd6b4c3a0a4a
SHA1
15f82bec6a2b686d14bc4cef6463391a4cee81c9
SHA256
51e0ea81d6df11ac9d6fb430c5896116edcfbf10b7f0bfa949a725b14f3d2693
SHA512
79bfcbde617cafb2ff9e66ab354d92bc44a8e1b5306e782fb52bba3c03556cd679d4ff967497661f6b3cf0017dae2dbb1cf42fdec6600c53522a71efc60134e4
SSDEEP
3072:MGs8ozc40RRQJ4J7GWI5VP+61giC6TJ/RtWqxxQ9:MGs8oz10NiW871G6TJ/RtWqxw
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE