SetHook
unhook
��y?e_CRC
Behavioral task
behavioral1
Sample
1909194999a5013730597cc0e4b575d3b3accf03a982a91305c3f1ff18940e61.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1909194999a5013730597cc0e4b575d3b3accf03a982a91305c3f1ff18940e61.dll
Resource
win10v2004-20220812-en
Target
1909194999a5013730597cc0e4b575d3b3accf03a982a91305c3f1ff18940e61
Size
152KB
MD5
4e4b0267a4a43d1cd323578531108000
SHA1
d251a19997655ec3275b101d537eadc6a1b32994
SHA256
1909194999a5013730597cc0e4b575d3b3accf03a982a91305c3f1ff18940e61
SHA512
dd7ef346c120ba8a0b5733298849c14a24fdd89b81d008126f1fe7f2f6b33095ed448e3301d881e56081901f1c904e60c61f56609a49e5ef9454571f891e0d41
SSDEEP
3072:B2Bo+O4Cv5rH7Ab19GNrtEVbVVVVs/u2R+rmQro4QamEXdo+pG:B2BoF4CRrHk7qr6ZFit+rRdQEJG
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowThreadProcessId
Beep
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
timeGetTime
LookupPrivilegeValueA
_ftol
SetHook
unhook
��y?e_CRC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ