?DelHook@@YGHXZ
?SetHook@@YGHXZ
Behavioral task
behavioral1
Sample
9cd2065aede692524ff84bfa62383706d97948cd119ec6079e69bee562e3b03a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9cd2065aede692524ff84bfa62383706d97948cd119ec6079e69bee562e3b03a.dll
Resource
win10v2004-20221111-en
Target
9cd2065aede692524ff84bfa62383706d97948cd119ec6079e69bee562e3b03a
Size
11KB
MD5
2dd84a108ec03977936bb39c106bd310
SHA1
865687c3da98e53418ac1f481e9cecba17a38501
SHA256
9cd2065aede692524ff84bfa62383706d97948cd119ec6079e69bee562e3b03a
SHA512
dd0629dc0b2ba873a033b830afd087fe42ce5cb2ed07bf387d8b737c2287a3000acd7da29affee56ee17ae9165dc2068660eefa2421c276c6e07b817704f7bc2
SSDEEP
192:lie16AiKi5sy2dZgElUInzrRZIbpHDfTpWJRj:lxNi4HdFlUUZCpTpW
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ