HideProcess
VerDll
Behavioral task
behavioral1
Sample
89f3e2f4816b596f48efc29559d9b63f43e27869a7201d89e342de56d65b7cc5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89f3e2f4816b596f48efc29559d9b63f43e27869a7201d89e342de56d65b7cc5.dll
Resource
win10v2004-20221111-en
Target
89f3e2f4816b596f48efc29559d9b63f43e27869a7201d89e342de56d65b7cc5
Size
10KB
MD5
668b5393fa98badd4da4d71a5773366a
SHA1
fd38aad3a826c198dcfcfe938efb7ee8713b3be7
SHA256
89f3e2f4816b596f48efc29559d9b63f43e27869a7201d89e342de56d65b7cc5
SHA512
4baa08c2381141d68999cc53f2395ea30d307a149e65198f143ad9bd848f0b00b3ba425bd1296f61c9bea10aff947cfeb9bc86831c3ab4619535d9fdd2652963
SSDEEP
192:nrRsW2AG1EzcMt4nxQ+ZpBE8ec3med0YiUkPSdw5mfE04sagC++E:+tzPIP+ZIzc2pAw5mf9zr+E
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
HideProcess
VerDll
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ