DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
10401a24918b9a653163ac3cd6cc2c1bca0e47a1d3021af326d84ca1899aa7ba.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
10401a24918b9a653163ac3cd6cc2c1bca0e47a1d3021af326d84ca1899aa7ba.dll
Resource
win10v2004-20220812-en
Target
10401a24918b9a653163ac3cd6cc2c1bca0e47a1d3021af326d84ca1899aa7ba
Size
251KB
MD5
3d6ccb42a8346fb04e5f71dcf9d8304a
SHA1
ef17e57149305ffc93689dc8e73560d4d90690ad
SHA256
10401a24918b9a653163ac3cd6cc2c1bca0e47a1d3021af326d84ca1899aa7ba
SHA512
6ec90bdccf2e72efd18751535e0576f81c3293f629e9bb86b3a375a663305b162ba7cf4ad8fb063739580a4ec4423ac9cb35f2aad1abefeb78fc94964b3ad79c
SSDEEP
3072:1Zr97TeKgC+2DFYMXZ+NFU0oqZr97TeKgCxlu:X5TxLNKASOU5TxLC
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ