AddAtomA
AddRefActCtx
AllocConsole
GetFnPath
s
Behavioral task
behavioral1
Sample
d60c71b58716edd3f1898298b400de1bf8bf4bb48b63b1855c6a87158a7269ab.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d60c71b58716edd3f1898298b400de1bf8bf4bb48b63b1855c6a87158a7269ab.dll
Resource
win10v2004-20221111-en
Target
d60c71b58716edd3f1898298b400de1bf8bf4bb48b63b1855c6a87158a7269ab
Size
45KB
MD5
df32c0b9cf3f19b5e4746a9fc0de3b0c
SHA1
44e0ea8f4097b2f675408ebc22b99346adcfd7ed
SHA256
d60c71b58716edd3f1898298b400de1bf8bf4bb48b63b1855c6a87158a7269ab
SHA512
7235a192f98d88b6c9cf48ce7e19ee34d18f3d5fbee54d302bcf40408ea14d9b6571a52659bab1d22df6fd5c729cce6863e2eb8145e6038d40bed2cd52e6aa2c
SSDEEP
768:ksGdXhwY9zBWSyY99VOwpjUb2V91/QtcAWe7xuJOI/DywJmB:CdaGBW5kLOwpjr/ucAWQuJjmB
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AddAtomA
AddRefActCtx
AllocConsole
GetFnPath
s
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ