DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644.dll
Resource
win10v2004-20220901-en
Target
e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644
Size
298KB
MD5
21e52a3c510f824f4bd597ffd1a569a2
SHA1
417d7e1fc6cf3c572e12879a8b312e9f49ee5ec4
SHA256
e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644
SHA512
719ca05d37d59b804e980d2b676e82959964c300c1a53ff58721c0428f114b737f2d3209585e2372ede69f7bcaae6ba6ccf98504c21fee6238915e3f3f1bc5f3
SSDEEP
6144:xNn2sEOLf8yJwkPvWrYaRWvJsqbILMs49QLaaXnEUqftjh:fnf8y7WrSlbkfGORqf/
Detects file using ACProtect software.
Processes:
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE