HookOff
HookOn
Behavioral task
behavioral1
Sample
cfc383a4ab26d286bf765429a9ed8c4a456d36e56d90754f7d6e52619fa1e779.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfc383a4ab26d286bf765429a9ed8c4a456d36e56d90754f7d6e52619fa1e779.dll
Resource
win10v2004-20221111-en
Target
cfc383a4ab26d286bf765429a9ed8c4a456d36e56d90754f7d6e52619fa1e779
Size
24KB
MD5
dbc6f81a3510ad39cbb661754275fceb
SHA1
d996475d2d1c97300b741d821bf5acf5cd4cc921
SHA256
cfc383a4ab26d286bf765429a9ed8c4a456d36e56d90754f7d6e52619fa1e779
SHA512
b22910f211ed3b5d57694bb5ef91fccc7c5f0c9eff179fcbcc78ee8b27ae1bb41fd55533b952e0c19e5f4c196980bce75a709ad351c7a5359fc0ff3358e4ea3b
SSDEEP
384:spbaLrGmigNY9iwbsBU4qH8LvMh6+u2o26AG4mVtf3XJHsZ77V83K5LNxfnoRt2t:W0GgNY9ifSHFdRoJg4BXJ6oubfnoRhv
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ