DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
55c0c52f8f43c7c9bc29df0e2aa497113bc94e46f7a013e45d7ee76a87201a4a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
55c0c52f8f43c7c9bc29df0e2aa497113bc94e46f7a013e45d7ee76a87201a4a.dll
Resource
win10v2004-20220812-en
Target
55c0c52f8f43c7c9bc29df0e2aa497113bc94e46f7a013e45d7ee76a87201a4a
Size
53KB
MD5
6fcacafc83e41869791df79fbff35b1f
SHA1
39027226bc8bf41ad12fc357210cbf62d0bde594
SHA256
55c0c52f8f43c7c9bc29df0e2aa497113bc94e46f7a013e45d7ee76a87201a4a
SHA512
63fd0d14e10d0b5a28ca289f7b02aa0b9f43127b1b79517844d0e877bb9fe5476f3bb1a5da4e6fb95c5be19e7f9d884ddbc9b0f8b5f633d18202259dce254619
SSDEEP
1536:+5eKt+1PL5oEu18pymOOq5MPVY839mRcBj:q9t+xL5o/1UymOOBhtmRcBj
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ