DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
e2efb4766349143495f840dc2f79b70eb3719ee1ab2f96e5e2bc9279bdb529ee.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2efb4766349143495f840dc2f79b70eb3719ee1ab2f96e5e2bc9279bdb529ee.dll
Resource
win10v2004-20220901-en
Target
e2efb4766349143495f840dc2f79b70eb3719ee1ab2f96e5e2bc9279bdb529ee
Size
41KB
MD5
d368a20001a6b2d652eda0bbed036808
SHA1
cb19bf24a781ae4078c39d2e8bdd9e1f17c49464
SHA256
e2efb4766349143495f840dc2f79b70eb3719ee1ab2f96e5e2bc9279bdb529ee
SHA512
2205a215880cedbbb500ade03fa206267e80af765d287d9ebb1c42472ba0ec788679b8cab8aacc393af270a6de73db130be276785ff9cef9d6d95bf00772134e
SSDEEP
768:hQW6iPlgaH7VIDYTK7P/dhckmADn8YgR85jJNKlBLI/mUpjLyD8VP1YFrKyY/9M9:hQW6iPy47VIkgdGkmiFO857KvLI+UxL+
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE