GetJpyzmFromBuffer
GetJpyzmFromFile
GetVcodeFromHWND
GetVcodeFromURL
LoadCdsFromBuffer
LoadNetFromFile
Behavioral task
behavioral1
Sample
c0ae4752c71393a2c420180be0b2c6c8ae58a934fde875b2a8e8e54a942859be.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0ae4752c71393a2c420180be0b2c6c8ae58a934fde875b2a8e8e54a942859be.dll
Resource
win10v2004-20221111-en
Target
c0ae4752c71393a2c420180be0b2c6c8ae58a934fde875b2a8e8e54a942859be
Size
41KB
MD5
f40c5f775e366b8847295921d517bd09
SHA1
d9b8bb38c8d42597f3e09f1343c822ed7e0a4aca
SHA256
c0ae4752c71393a2c420180be0b2c6c8ae58a934fde875b2a8e8e54a942859be
SHA512
9fa80763d89159cd070cd8de12d416ddd18accaa36070a525250200bc56a29e8f2bd53c28d1442c26d1efd83a89a8b36a11d485d56fd405814738dc8767fbfae
SSDEEP
768:JjkaNcXrjdDhHRVrryRKaHpmDrbyq4r5WA64C/23poh+tw5Ll4w/L2Nn:JQ+0rVhHRK0firgA64v3pba56gLk
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetJpyzmFromBuffer
GetJpyzmFromFile
GetVcodeFromHWND
GetVcodeFromURL
LoadCdsFromBuffer
LoadNetFromFile
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ