TMethodImplementationIntercept
__dbk_fcall_wrapper
beNotified
dbkFCallWrapperAddr
getFuncsArray
getName
isUnicode
messageProc
setInfo
Behavioral task
behavioral1
Sample
36f0000.HTMLTag_unicode.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
36f0000.HTMLTag_unicode.dll
Resource
win10v2004-20230220-en
Target
36f0000.HTMLTag_unicode.dll
Size
1.4MB
MD5
428dd3281f939f8142ebbb0e2dedb2a8
SHA1
83cd0e38d07a454de4e34ce6d0d38fcdde2c13f3
SHA256
8be2031ccefc9e322fb0357e8f703ac026f9a8224dfe7611fcf740cfc5bc7401
SHA512
4efbc1b54d8af889f1d07101b9ba5713962ac8073d89941847152a1fb71fddf978adef18ec4e969ff1a9dfd79c37d02119f61e4e498a0082b6b96774fb24c3d2
SSDEEP
12288:HZirRzGTcRDN33/5GQZDHnvuPJ7v9nHi5ahpEMYMCWdO0mibL:5irDx7GUTnv0v9nHiEh9YMDO0mibL
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
TMethodImplementationIntercept
__dbk_fcall_wrapper
beNotified
dbkFCallWrapperAddr
getFuncsArray
getName
isUnicode
messageProc
setInfo
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE