DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b4e6059c771a4b49b566f528d2acd5f74c6f429f6963dbac7477dc54713f9a18.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4e6059c771a4b49b566f528d2acd5f74c6f429f6963dbac7477dc54713f9a18.dll
Resource
win10v2004-20220812-en
Target
b4e6059c771a4b49b566f528d2acd5f74c6f429f6963dbac7477dc54713f9a18
Size
231KB
MD5
0ad57e049ab66fbd62d9b01cfe2cd360
SHA1
366d6747103443aa32ea4b70b8a1ea540b3c5a6d
SHA256
b4e6059c771a4b49b566f528d2acd5f74c6f429f6963dbac7477dc54713f9a18
SHA512
ae1a58686caa7f60ebc9bea400404373fb8996c5f991d195c919592dba89614d1427b6a7ad60b095f5cb998c94f51102028adba037dedb87aa553542a8b82f3c
SSDEEP
6144:2xAA9dnPQpmeWbjksaHalEL9/ThtpGRUj1aOP:2BdPhfLla/1tpGi1P
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE