DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
a38e52e24025ccd0eb166b0c113487df.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a38e52e24025ccd0eb166b0c113487df.dll
Resource
win10v2004-20240221-en
Target
a38e52e24025ccd0eb166b0c113487df
Size
88KB
MD5
a38e52e24025ccd0eb166b0c113487df
SHA1
858003c60e670c9ad26aedf4c0ac903f9b1b2a36
SHA256
1e01557c543f9a20cec272597faba9cba0e9025b1ea45e57a52f70cd2b9f01d3
SHA512
5014588abc516efecb5884f140a1d8681f72f782bfde20569160898a1bba70bdb3ba40b03b2249e3b81e4554657ca5b0812302743e692266a4ecc1cf9a540b75
SSDEEP
1536:lLaU5Zlbotc+iZQayFNQOKBX8qzKDTJKbrzEZdcoGafMkKZQaTf/0VCc3O:l2ql7DyzQOsiDTm6Hnx8p2l3
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
a38e52e24025ccd0eb166b0c113487df |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ