DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
9e5a083b42d888847bab39013e2bfb778943bd5b1f91a62c15d9d908ecadc89c.dll
Resource
win7-20221111-en
Target
9e5a083b42d888847bab39013e2bfb778943bd5b1f91a62c15d9d908ecadc89c
Size
108KB
MD5
4fbfa050786fc46191d0eca998141116
SHA1
c10bc7c19175960d91d6cd73703b138d5cb75f03
SHA256
9e5a083b42d888847bab39013e2bfb778943bd5b1f91a62c15d9d908ecadc89c
SHA512
ebc2b9da2acab9a25316ba28af19ea087cb21316c0407fd1711acd29f5355abe0b181c302894c9183b7a7cf7e167b4216f1cc8721e73ce17a17752b712510f5e
SSDEEP
3072:xxp+s37cRHXfWK30cGbcMm0t0hyTUTAmljo2mfm/a:zpkxXOhcMPt9TLbxfY
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE