DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
53ccea7b5d7cd858b87a4b46f5110e9b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53ccea7b5d7cd858b87a4b46f5110e9b.dll
Resource
win10v2004-20231215-en
Target
53ccea7b5d7cd858b87a4b46f5110e9b
Size
59KB
MD5
53ccea7b5d7cd858b87a4b46f5110e9b
SHA1
1066108fd1ca9beb1c99fdaaf6406b82f685ccbb
SHA256
ee8c5e4302a6c0f2ee18480ad4503644411bd3621af7fb9f1c53be1d7f353240
SHA512
f6c99feb8e84b6187d12f74c4e40fa12d2259e2ed5b88b56a4444c0762c0c70215fdb2752565390571df1f464d0509c66b440c5963a964b78c09c13b0cae303a
SSDEEP
768:uOJqHObAGeNBKqo4gAAqWGWpICG3CYgVl33dNgMWCvaN4olgaOJiTic+Nac8cczn:8HtGb79qW8W3NNoHvTic+NaFQy1ci
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
53ccea7b5d7cd858b87a4b46f5110e9b |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ