DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
edf82605b3934507005717f05e124f9fa2f00a281fea6902edbcd7950e5b50ed.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
edf82605b3934507005717f05e124f9fa2f00a281fea6902edbcd7950e5b50ed.dll
Resource
win10v2004-20221111-en
Target
edf82605b3934507005717f05e124f9fa2f00a281fea6902edbcd7950e5b50ed
Size
106KB
MD5
d80964c0e4f43bb82f627ef48bd426ae
SHA1
7be183998d687c0d7b6574877fcff50a06e48acf
SHA256
edf82605b3934507005717f05e124f9fa2f00a281fea6902edbcd7950e5b50ed
SHA512
7a61d9ecb2c5ec0ac56f3e6cc9c6a70fd04a65b343add2e9eb4768992c9ccfa385dc5e21e5fc076fb033cff07df401ed9506bc3a0e142578372c95a1ef2f9c6b
SSDEEP
3072:VK7N5XRhgErUV8GziM+mnK9ye433RQ8FT2iafhd:ON5XgErUnrUyR33rFT2pJd
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ