EndHook
GetDllVersion
SetTarget
StartHook
Behavioral task
behavioral1
Sample
f69a35a8a286b7d0b18027a4b5b42b4176472d193e69d7e129fcc119ba1e81a4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f69a35a8a286b7d0b18027a4b5b42b4176472d193e69d7e129fcc119ba1e81a4.dll
Resource
win10v2004-20221111-en
Target
f69a35a8a286b7d0b18027a4b5b42b4176472d193e69d7e129fcc119ba1e81a4
Size
32KB
MD5
a4458cfb86dc64a6718327967f66e64a
SHA1
936b653253281ec15f920cc3b33771331d12ea99
SHA256
f69a35a8a286b7d0b18027a4b5b42b4176472d193e69d7e129fcc119ba1e81a4
SHA512
e83e950a3ae6317f56bea9a0bb3bb3ae9e38dcc544e90bb4cef429562ba7fa2d9cbfbdab4e75869e234ba7064fd6868bb392158051b3df08d5a040b23fd87eea
SSDEEP
768:fQ309TXQpbARWoswvMoQHTmj3ushFEo6V7T/8nsS:jQaRWx4MB63ueQ7r8sS
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EndHook
GetDllVersion
SetTarget
StartHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ