DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d2f818a8cd1aab0f00123ef0e51b3d6e51d311fdd3082c33eb93c64b8d3930fa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2f818a8cd1aab0f00123ef0e51b3d6e51d311fdd3082c33eb93c64b8d3930fa.dll
Resource
win10v2004-20220812-en
Target
d2f818a8cd1aab0f00123ef0e51b3d6e51d311fdd3082c33eb93c64b8d3930fa
Size
267KB
MD5
929d12b0a7e378b01bb1b57c1da668c0
SHA1
71bc5423579c374fab4c918269c0c0f39c1bd124
SHA256
d2f818a8cd1aab0f00123ef0e51b3d6e51d311fdd3082c33eb93c64b8d3930fa
SHA512
6693e60538ac65ef772791ae5948f5484546677b865cf391da1924c5eb004bb437307f9f136aa659e833652edce0cba80fb230ca1ed5f38f791754d8dd81f8c3
SSDEEP
6144:YS/GbxZ+22a58vGP4ttQmPyRJZTmUFWT3wGKPrfMxN:J/GbD+22i8u66MWZTmUFi3wVQxN
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE