DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
14697e64af65ce7d126aa129a32bfa19b9db022a9b2032a40e797532485e6513.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14697e64af65ce7d126aa129a32bfa19b9db022a9b2032a40e797532485e6513.dll
Resource
win10v2004-20220812-en
Target
14697e64af65ce7d126aa129a32bfa19b9db022a9b2032a40e797532485e6513
Size
650KB
MD5
a06689add56021798e84944027962344
SHA1
65caa25abc633c6dd1f02b3cd0bffbc2d644debf
SHA256
14697e64af65ce7d126aa129a32bfa19b9db022a9b2032a40e797532485e6513
SHA512
41d8abc42906e7e557479d2e63bdc9f907dea24518f1782049261ad48b5317f7b9452af3771debc7de13ae4fb72a6d91b2c15e22a661e84d19fb8152be2e4816
SSDEEP
6144:La8zDRhE3qubQqZiyVmLAVPY/pUgUrhqWrRHyDz7+gedJiYksrosWixu/1mqEm6N:lz9hE3yqZ5VvnoWrQmvBksNSSzA
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ