VMP�������ǽ�β
VMP�������ǿ�ʼ
asasas
�����ƶ�
����call
������������
�����̶�CALL
����д�����ڴ�
������������
ȡZ����
�Զ��幥��
�Զ�������
Behavioral task
behavioral1
Sample
950111e5eeabb9e61f5e14fc68ec8cbd505669d3dc61777be07d3c662a6394b6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
950111e5eeabb9e61f5e14fc68ec8cbd505669d3dc61777be07d3c662a6394b6.dll
Resource
win10v2004-20221111-en
Target
950111e5eeabb9e61f5e14fc68ec8cbd505669d3dc61777be07d3c662a6394b6
Size
355KB
MD5
c68fc8e61a694fa0186a15045fb8391c
SHA1
eeee2405c3f61b239b3a776665e7ec9f364e70af
SHA256
950111e5eeabb9e61f5e14fc68ec8cbd505669d3dc61777be07d3c662a6394b6
SHA512
45b356e5d98fc40c893402f40041a082cd5ec56e59f6324436082019bf049f82f59354c3f177772bfffa0b6e2f56f5115aef8dd45e8acf046ea6b3ce702824ea
SSDEEP
6144:W0o7uTaDDB1gPU+I7rv0IDefdYnEteATTauBlNq7gOP9Ai/pVt+2s9NRfoS:nGukDjgM+I3cIClfteA3auTNq7gOVAWU
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VMP�������ǽ�β
VMP�������ǿ�ʼ
asasas
�����ƶ�
����call
������������
�����̶�CALL
����д�����ڴ�
������������
ȡZ����
�Զ��幥��
�Զ�������
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE