DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
4ccb30f8ac3a3780babf4f069676d7d0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ccb30f8ac3a3780babf4f069676d7d0.dll
Resource
win10v2004-20231215-en
Target
4ccb30f8ac3a3780babf4f069676d7d0
Size
29KB
MD5
4ccb30f8ac3a3780babf4f069676d7d0
SHA1
11655c61307cb9acb31b6c16a52b422f82f5cf12
SHA256
f453ede35992b35963e54f24891fd6963d1eb54f160dd0dc7ae90f53279bb71f
SHA512
03470541127eaad66528428221f8e95b62b34cc9857567373780b00f1030927776a47967346b3787bb62ba8bb8370ce547c6b1e1825b01c99e6d69728b392900
SSDEEP
384:rLRFkwIrCo/elkjC2xmIvQD3UFkADrpikY5DnkbQ/d9/KZ1IjRB6ZuTywQJTh5LM:rAh/IkO0BOUFvrpfYcKa1IjGgg
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
4ccb30f8ac3a3780babf4f069676d7d0 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ