DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
29b997f1ae6704e0ee83a3fa8198794d17b70645d8067046556507f10e313e48.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
29b997f1ae6704e0ee83a3fa8198794d17b70645d8067046556507f10e313e48.dll
Resource
win10v2004-20220812-en
Target
29b997f1ae6704e0ee83a3fa8198794d17b70645d8067046556507f10e313e48
Size
27KB
MD5
533f7a48d4d595dd2bfe932ef43fa0ca
SHA1
457471ca7fe6d594c4705102b08ff48816d4eff2
SHA256
29b997f1ae6704e0ee83a3fa8198794d17b70645d8067046556507f10e313e48
SHA512
fd3d50866ceacce723dcfe2b01041150dd37d731aa111516b141c61746f360007c206f072a66363a1e8e68d72adc51bb7739a109ec49f69d4f4654e65542b809
SSDEEP
384:oCWsHmh/ro4FSw8AFCk29//g6+sGwZKAK7AYd8IxOSJyo0DOIZls:o1hjsw8AFC33g61urhd8kOSMYIZ2
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE