DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8c822f72aed53b9499b1154ec976d534e26ad903beecbc81bc3bc3c944fc15f6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c822f72aed53b9499b1154ec976d534e26ad903beecbc81bc3bc3c944fc15f6.dll
Resource
win10v2004-20220812-en
Target
8c822f72aed53b9499b1154ec976d534e26ad903beecbc81bc3bc3c944fc15f6
Size
52KB
MD5
81e5335e9ef4185c188d132e3dff2ab9
SHA1
159789f46241a8048598a6813c5c49a3e4730a11
SHA256
8c822f72aed53b9499b1154ec976d534e26ad903beecbc81bc3bc3c944fc15f6
SHA512
b6eac470fe32fa22807aca7fda2c416901dcf7da2adf95bcc0c7e30cff3739b8f6d90183e4e29cf4cabfbe64e67bab515be465c64b8851026909f1763d988e48
SSDEEP
1536:7qkXTxWHlU9bj8V611SDjX6kuu4hXnROJXunouy8:77DqU971ajX6k1ARGuout
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE