DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bcb035400921422b78827a2ecfc9e685a195099c1431e6d4780026f37f15dca6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcb035400921422b78827a2ecfc9e685a195099c1431e6d4780026f37f15dca6.dll
Resource
win10v2004-20220812-en
Target
bcb035400921422b78827a2ecfc9e685a195099c1431e6d4780026f37f15dca6
Size
50KB
MD5
93e60452ca1d186558a2febed8ba6404
SHA1
c5d55d61c5e4075851e80bbf4be421d6d6f46147
SHA256
bcb035400921422b78827a2ecfc9e685a195099c1431e6d4780026f37f15dca6
SHA512
5925fab8126bf72bf4ad0977994ce06142d67cde5b782195d9e9f96d64460135a1b22c4782b9e3eba9a4800fe19d470e446ae53c953abc1af894d309a51af4e3
SSDEEP
1536:6kn/mtAfFFKSt3zQRs5IPjLiDd1PTrknouy8:6ImKFFLxXoLwDToout
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE