DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
calloc
free
malloc
realloc
Behavioral task
behavioral1
Sample
c68a6619b29a386cc4f2251b8cb3c82e1aec6eadfac05ed2ca5e7ec57a5ce15b.dll
Resource
win7-20220812-en
Target
c68a6619b29a386cc4f2251b8cb3c82e1aec6eadfac05ed2ca5e7ec57a5ce15b
Size
24KB
MD5
576b1c35c393a9bab415c5714913d185
SHA1
6610752c317936f454baf4fe19cbc989171b4e6f
SHA256
c68a6619b29a386cc4f2251b8cb3c82e1aec6eadfac05ed2ca5e7ec57a5ce15b
SHA512
9783cb6313f7dc492a93cca1c168fe9ffd32f3e3af018532f4010582bbcbf66a76f4dd3f7fad1206f40053a1bb4b2cf5a11251e21bf795705ffd6b11b801c3b1
SSDEEP
384:CqT5rEkgeipuheC6JRauYIQUJQ0UmpmNMFIoUuxBh5bhkX5soK7KtsNs9hxp:CgJEkgoh/8auY/9PDzDABqXuoRsMhxp
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
calloc
free
malloc
realloc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ