DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d4677b6b8e30ca307819757e2c361daafce5acbf2584dc010136b922bdb0f819.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4677b6b8e30ca307819757e2c361daafce5acbf2584dc010136b922bdb0f819.dll
Resource
win10v2004-20220901-en
Target
d4677b6b8e30ca307819757e2c361daafce5acbf2584dc010136b922bdb0f819
Size
143KB
MD5
ffe62a6b5b90a354d3d1d2c38558e550
SHA1
78d471a5abb31c3380c2111e61b47ef7d0da95b9
SHA256
d4677b6b8e30ca307819757e2c361daafce5acbf2584dc010136b922bdb0f819
SHA512
3f4f3d38fd254d083e2cab6be4fe2c6e9e618854ab1d0c110c837af8d0512a5b640b5a06aa97fe295db45f19da8dcefa2f61e7e895e0cb07ef57006233e82c33
SSDEEP
3072:qZr97TeKIN2W2DFYMXZ+NFEbZr97TeKIN2tlM:45TxI0lKASmB5TxI08
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ