DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Overview
overview
9Static
static
9RegDll.dll
windows7-x64
1RegDll.dll
windows10-2004-x64
1dm.dll
windows7-x64
1dm.dll
windows10-2004-x64
8河源下�...cn.url
windows7-x64
1河源下�...cn.url
windows10-2004-x64
1淘宝热卖.url
windows7-x64
1淘宝热卖.url
windows10-2004-x64
1烈焰辅助.exe
windows7-x64
9烈焰辅助.exe
windows10-2004-x64
9烈焰辅�...��.exe
windows7-x64
8烈焰辅�...��.exe
windows10-2004-x64
8Behavioral task
behavioral1
Sample
RegDll.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RegDll.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
dm.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
dm.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
河源下载站-cngr.cn.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
河源下载站-cngr.cn.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
淘宝热卖.url
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
淘宝热卖.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
烈焰辅助.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
烈焰辅助.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
烈焰辅助破解补丁.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
烈焰辅助破解补丁.exe
Resource
win10v2004-20220812-en
Target
61c4fec8cc9175e420e9ae5241bc50e08de58843d16f5dafd9dd4bc56c8c18a5
Size
3.4MB
MD5
94aa1bf95decfb184f143c97905c1274
SHA1
00a4b27748e35d150744a6ce976216dab453ec2e
SHA256
61c4fec8cc9175e420e9ae5241bc50e08de58843d16f5dafd9dd4bc56c8c18a5
SHA512
d51003f64c61d00e15d63faf7fb562af4bacf88c1069157a27ae78b0540d5528efafcaad077030d70bcf397395692bc029d4d8e6ee78b16630e5cb8de0d2e0d8
SSDEEP
98304:r5a3YO0YhuTzJZxwzq8inAB6VTzW/GGZ9Ey:rooOrebqzq8in06VTM9Ey
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/dm.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/dm.dll | upx |
static1/unpack001/烈焰辅助破解补丁.exe | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord3831
ord3825
ord3079
ord4080
ord4424
ord614
ord1206
ord2623
ord290
ord825
ord1223
ord4622
ord4226
ord2486
ord4003
ord446
ord743
ord1569
ord1196
ord1168
ord6467
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord3830
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3262
ord3081
ord3738
ord561
ord815
ord5500
ord1132
ord1131
ord6354
ord1176
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord2976
ord2985
ord3136
ord4465
ord3147
ord3259
ord2982
ord1799
ord1089
ord823
ord1578
ord600
ord826
ord269
ord1116
__CxxFrameHandler
wcstombs
__dllonexit
_onexit
free
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
LocalFree
LoadLibraryA
FreeLibrary
GetProcAddress
LocalAlloc
RegSetValueExA
RegCloseKey
RegCreateKeyExA
OleInitialize
CoTaskMemFree
StringFromCLSID
OleUninitialize
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
??0CxFile@@QAE@ABV0@@Z
??0CxFile@@QAE@XZ
??0CxIOFile@@QAE@ABV0@@Z
??0CxIOFile@@QAE@PAU_iobuf@@@Z
??0CxMemFile@@QAE@ABV0@@Z
??1CxFile@@UAE@XZ
??1CxIOFile@@UAE@XZ
??1CxImage@@UAE@XZ
??4CxFile@@QAEAAV0@ABV0@@Z
??4CxIOFile@@QAEAAV0@ABV0@@Z
??4CxMemFile@@QAEAAV0@ABV0@@Z
??_7CxFile@@6B@
??_7CxIOFile@@6B@
??_7CxImage@@6B@
??_7CxMemFile@@6B@
??_FCxIOFile@@QAEXXZ
??_FCxImage@@QAEXXZ
??_FCxMemFile@@QAEXXZ
??_OCxImage@@QAEXABV0@@Z
?Close@CxIOFile@@UAE_NXZ
?Eof@CxIOFile@@UAE_NXZ
?Error@CxIOFile@@UAEJXZ
?Flush@CxIOFile@@UAE_NXZ
?GetC@CxIOFile@@UAEJXZ
?GetS@CxIOFile@@UAEPADPADH@Z
?Open@CxIOFile@@QAE_NPBD0@Z
?PutC@CxFile@@UAE_NE@Z
?PutC@CxIOFile@@UAE_NE@Z
?Read@CxIOFile@@UAEIPAXII@Z
?Scanf@CxIOFile@@UAEJPBDPAX@Z
?Seek@CxIOFile@@UAE_NJH@Z
?Size@CxIOFile@@UAEJXZ
?Tell@CxIOFile@@UAEJXZ
?Write@CxIOFile@@UAEIPBXII@Z
CBFunA
CBFunB
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetAdaptersInfo
waveOutUnprepareHeader
ioctlsocket
VerLanguageNameA
RasHangUpA
GetFileTime
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetWindowTextA
RoundRect
OpenPrinterA
RegSetValueExA
DragAcceptFiles
OleFlushClipboard
LHashValOfNameSys
ImageList_DragLeave
ord8
HttpQueryInfoA
ChooseColorA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE