CancelDll
LoadDll
Behavioral task
behavioral1
Sample
674977a38cc444eaffc874b64761faa5a01de69cf926341cf0178022b31c7f0c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
674977a38cc444eaffc874b64761faa5a01de69cf926341cf0178022b31c7f0c.dll
Resource
win10v2004-20220812-en
Target
674977a38cc444eaffc874b64761faa5a01de69cf926341cf0178022b31c7f0c
Size
59KB
MD5
61f09838b8b54ab35b959f2966b6582a
SHA1
48f8c1a56a1855f0c307531fdc284965208e8425
SHA256
674977a38cc444eaffc874b64761faa5a01de69cf926341cf0178022b31c7f0c
SHA512
bafc1e293058987ff52971a35ee88ca4f31b53e5c754fcf0aa669d1330421e2999300f583bf2520a309c07b4470d9eb8a997c70701d41ea78ed28d4fbc46016b
SSDEEP
1536:hXGa7ReQCJhV50g2NCyS6yTgHU93dtcOg:r7RCx50g2N3fyj93dA
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CancelDll
LoadDll
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ