CancelDll
LoadDll
Behavioral task
behavioral1
Sample
b4679c10115e7783453bee523babaecf5c59d49fecfaec8dcc732138963a2b9b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4679c10115e7783453bee523babaecf5c59d49fecfaec8dcc732138963a2b9b.dll
Resource
win10v2004-20220812-en
Target
b4679c10115e7783453bee523babaecf5c59d49fecfaec8dcc732138963a2b9b
Size
61KB
MD5
09843c08037617eb5628c987c9727f90
SHA1
87fa0d0af4801867206a59900eb71aa3db32056d
SHA256
b4679c10115e7783453bee523babaecf5c59d49fecfaec8dcc732138963a2b9b
SHA512
c2ab8d7d80ed88e841b255d878c7dce312ea44c88bbb943b46ba76e3c925bc4051dcbe84baada12fc5a7ecdd837c9e6a1f1d0e3d84c1603e695420d3d50141c7
SSDEEP
1536:IykzkagGuMP0i2uYlhtt3vgibwLljUf3FLLMX7u:IFzkaTk/lDtBwR8L+C
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CancelDll
LoadDll
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ