DeleteSelf
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
PPPP
QQQQ
Behavioral task
behavioral1
Sample
c14d7057ae555bc98e791821f7ea279b4e953dd05267fa2808a08c9186103d13.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c14d7057ae555bc98e791821f7ea279b4e953dd05267fa2808a08c9186103d13.dll
Resource
win10v2004-20220901-en
Target
c14d7057ae555bc98e791821f7ea279b4e953dd05267fa2808a08c9186103d13
Size
18KB
MD5
7d39fedfa3f604490875ff17fecfab36
SHA1
79190929c350d6a7261dc1e5dc542e36264876d8
SHA256
c14d7057ae555bc98e791821f7ea279b4e953dd05267fa2808a08c9186103d13
SHA512
14de42af7213b1f1a236e0005f56ef7e1ae71316f1bd78eeac43d41d31e0a315719f3909121ad948c69587199af9e892d2ba656bb222a2a5e4655cc4c46b0f9d
SSDEEP
384:VvoZivxbgxXfZqZ3HVbtq0tcjvvcgwenyv:F8ivxbOfZK3Hptqmegen
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteSelf
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
PPPP
QQQQ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ