DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
cfc6b391c6c864f071a89476968391967a0df97e2cbbaf20fd9b410917530c85.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfc6b391c6c864f071a89476968391967a0df97e2cbbaf20fd9b410917530c85.dll
Resource
win10v2004-20220812-en
Target
cfc6b391c6c864f071a89476968391967a0df97e2cbbaf20fd9b410917530c85
Size
238KB
MD5
5a9d72cb87e70facf9b8fd657c3dd2e0
SHA1
913380e9958f868fbba8637e5b9e907dfa2a12e2
SHA256
cfc6b391c6c864f071a89476968391967a0df97e2cbbaf20fd9b410917530c85
SHA512
bb182dfec88154da0770bd60a0ca72f4f921200234c9294fb92105b6fbbaa34b6aeb6d5c47bddcb09eeccc34a71472dbeffaa6fb7304af6bdf1aa876ac593138
SSDEEP
6144:b9iKMmS/eOvbuM7TIxvyZTUJ/ee50gxpNOkGMhP:ZM3/eSuMPIxvHJ/eoltP
Detects file using ACProtect software.
Processes:
resource | yara_rule |
---|---|
sample | acprotect |
Processes:
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ