DllMain
Install
ServiceMain
ShellMain
ShellMainThread
UnInstall
zxFunction001
Behavioral task
behavioral1
Sample
ebe400dbfd560ed2162888c89f30859d325e220dd1c232ce57f7d575670053aa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebe400dbfd560ed2162888c89f30859d325e220dd1c232ce57f7d575670053aa.dll
Resource
win10v2004-20220812-en
Target
ebe400dbfd560ed2162888c89f30859d325e220dd1c232ce57f7d575670053aa
Size
77KB
MD5
7fff14deeeb5dcc4ae90fe7c9929d92f
SHA1
445f0ce741c0027abf678827de23c80d262cb0a3
SHA256
ebe400dbfd560ed2162888c89f30859d325e220dd1c232ce57f7d575670053aa
SHA512
03ce436294a9c2929b177bfb590263a4a9671f73139efb2481e0c3cebbfbdfdddc47968460f3d5c9ddae4a950bd974dff8a7e5374b96dbe89ba9f8b2282c3f80
SSDEEP
1536:/tizqrFvAS5xFzAOLTivgvPw705RssYJbNLzvNfNMljEfYoZ3a:1iOrBlxFMqMgnw7cIbNH1fNMWYO3a
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllMain
Install
ServiceMain
ShellMain
ShellMainThread
UnInstall
zxFunction001
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ