DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d6ebdc933ea9f0c936eac302e3c807509388cce597f8df54917881b1e0ae2939.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6ebdc933ea9f0c936eac302e3c807509388cce597f8df54917881b1e0ae2939.dll
Resource
win10v2004-20220901-en
Target
d6ebdc933ea9f0c936eac302e3c807509388cce597f8df54917881b1e0ae2939
Size
55KB
MD5
3f50c1b77ce25d622b2a9199af41fe46
SHA1
4a9c990862018fea639da3f232831d1c86045860
SHA256
d6ebdc933ea9f0c936eac302e3c807509388cce597f8df54917881b1e0ae2939
SHA512
65b7ffa0e7e386be9e55d816446412ee1c5cb494934931e15992696f4c337cfcf99b041305a92c5eac46ef51a5a06576a3c6d4ca162c7e11a3dc0e4475b4f5d3
SSDEEP
1536:qUCKNDyR+U4NpKURAQqaeBK9rtInadr4cKeuU8Pju4:VCKNklApHDq109Ma4cKeurPju4
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ