GetVcodeFromBuffer
GetVcodeFromFile
GetVcodeFromHWND
GetVcodeFromURL
LoadCdsFromBuffer
LoadCdsFromFile
Behavioral task
behavioral1
Sample
0682477ac42785106261c6fb48642937f82d1bc794a9b6e97737573b8b1a680a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0682477ac42785106261c6fb48642937f82d1bc794a9b6e97737573b8b1a680a.dll
Resource
win10v2004-20220812-en
Target
0682477ac42785106261c6fb48642937f82d1bc794a9b6e97737573b8b1a680a
Size
42KB
MD5
f53b6e20914bfaffc33091da059e6574
SHA1
a402f35a26127e2dae47bcc85f20d5287b1ca6f1
SHA256
0682477ac42785106261c6fb48642937f82d1bc794a9b6e97737573b8b1a680a
SHA512
f98a7fc81ff4190849f57a9502d0e069479eae55bb7b9e147eddbf73c4cca57c0d2c4fd50942d7d6b20829a587f48f54d48284bf5bc1310f0071bc7efd987f34
SSDEEP
768:sjt4+nwmIItFeWaXrEq64/uRCO57qkmxcny++RuK16y3Zn+CoJLQ1zDW:s2ow6ttaXo6WIGCcnF+r3Z+CoJL4y
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVcodeFromBuffer
GetVcodeFromFile
GetVcodeFromHWND
GetVcodeFromURL
LoadCdsFromBuffer
LoadCdsFromFile
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ