d3d9
Behavioral task
behavioral1
Sample
a6e44714eb29dc69d4b4217eb305f283afaff9781303288e35642589e4d20f01.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a6e44714eb29dc69d4b4217eb305f283afaff9781303288e35642589e4d20f01.dll
Resource
win10v2004-20220901-en
General
-
Target
a6e44714eb29dc69d4b4217eb305f283afaff9781303288e35642589e4d20f01
-
Size
303KB
-
MD5
f720aea6181d468be47ab27acb8bd6e9
-
SHA1
6be2b194e53551120ba2b69fa28726aadc050c13
-
SHA256
a6e44714eb29dc69d4b4217eb305f283afaff9781303288e35642589e4d20f01
-
SHA512
8981ff038bb7c548510e5d2ea9181b6a52fc8ee252342c7ddae08af157e3769e09f2da93d78456d12212f8e5b7ee0377535558b60096d6ea83b83c8ae8ad947c
-
SSDEEP
6144:zvc4sGoBpUzuCQomz9+hwsrW271yZ5FKsf2bOhjxuC96Y/roS:brslLUwzZfsnxWnKsfpZ96yroS
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a6e44714eb29dc69d4b4217eb305f283afaff9781303288e35642589e4d20f01.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 712KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 295KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE