DllCanUnloadNow
DllGetClassObject
Simenze
Whaier
Static task
static1
Behavioral task
behavioral1
Sample
b2f1781b4cb49804828eb968131a0d122290a912382db99909c3404a1392a172.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2f1781b4cb49804828eb968131a0d122290a912382db99909c3404a1392a172.dll
Resource
win10v2004-20220812-en
Target
b2f1781b4cb49804828eb968131a0d122290a912382db99909c3404a1392a172
Size
27KB
MD5
68d8541828e480f2b1ccdb0ec37f2248
SHA1
47f40506a1a7bdc75e47a9a861473ae876b6a5ea
SHA256
b2f1781b4cb49804828eb968131a0d122290a912382db99909c3404a1392a172
SHA512
fe3ee70425d89fbdeafe3b3b762cd22ae75b67a0dacbba1e48489778ed5b48c635b542c39c97c156f6240559821602a4677f118563ed17fd05cb2a8f4aa2402f
SSDEEP
768:XEtVbb/m6ajjmR5Et5Q8X3nTC6YXnbcuyD7UnM:XEt5boamzHHG6YXnouy8nM
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
Simenze
Whaier
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE