DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Behavioral task
behavioral1
Sample
518eae4fd956a8b1943f8dddc90fcd87366e3645a946b7fc50a2905a2cd2f793.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
518eae4fd956a8b1943f8dddc90fcd87366e3645a946b7fc50a2905a2cd2f793.dll
Resource
win10v2004-20220901-en
Target
518eae4fd956a8b1943f8dddc90fcd87366e3645a946b7fc50a2905a2cd2f793
Size
23KB
MD5
4404bd98cf29bcfc21119252e540fb90
SHA1
5cf49e1a9a5c0de42b71685090a9d986d80af5fe
SHA256
518eae4fd956a8b1943f8dddc90fcd87366e3645a946b7fc50a2905a2cd2f793
SHA512
8381a2a2cf636e0f881af318a56033af2698dc65f13b278ee99cfcec8738f7f946c32db9b53be7d019878e7a93a262c86bf172a6cd0450b235d367165685c79b
SSDEEP
384:gqcxz27X2UK7GsPNx16v1+B70IQ+kXEm3arkhQbWDa8/dCLxl5qoijTlKbPkZ:4pO2UK7blH7PwDa8exlAlqcZ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE