DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b1d2553a0357be86530ab0e54b9f4fce566ebfafed0c8a2b6a9ca63da5c2cef4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1d2553a0357be86530ab0e54b9f4fce566ebfafed0c8a2b6a9ca63da5c2cef4.dll
Resource
win10v2004-20220901-en
Target
b1d2553a0357be86530ab0e54b9f4fce566ebfafed0c8a2b6a9ca63da5c2cef4
Size
52KB
MD5
54681bc9d8ded10c982d6b09202969f1
SHA1
f2934ca094798f34848869639a3b460b0f823ec8
SHA256
b1d2553a0357be86530ab0e54b9f4fce566ebfafed0c8a2b6a9ca63da5c2cef4
SHA512
d71264435e9257841f6cd1e034dd61384ddf5187e9efd085db6d63852514212c2b1ec69bdd51b4214d5b04256e10cd46236806cdabf9224790665d1458af0d21
SSDEEP
1536:LXGVDiZk+63KcAgrnniMYjikv7zK2VXE2bnouy8:LGVakZ3Kc5rnniMYjiylHout
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE