DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
6946c238e03e4d9a23c3dd6fe32db368719b0fbb9cf2613c779e47c77057af0b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6946c238e03e4d9a23c3dd6fe32db368719b0fbb9cf2613c779e47c77057af0b.dll
Resource
win10v2004-20220812-en
Target
6946c238e03e4d9a23c3dd6fe32db368719b0fbb9cf2613c779e47c77057af0b
Size
68KB
MD5
00dad6d4f7a7b92402d10cca39eb9dde
SHA1
7438471cbfb680b9e3d3b838fc181fd50ba5304e
SHA256
6946c238e03e4d9a23c3dd6fe32db368719b0fbb9cf2613c779e47c77057af0b
SHA512
f5ef6c91ccb37e587219cca94df50ff45920f6b0221dce07bdee75265e7c3236b6d7e67ee1cd0130eaca8a387d400b63d3fdd7868929fce2c47d16d87d0e9a20
SSDEEP
1536:YOlt9Q4exDkHQHHGYcEekZBLzT5yQLk2nME8UWcRg:Ys24iDkwnKYBtkkhtRg
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ