DriverProc
UserProc
Behavioral task
behavioral1
Sample
971171af0c66a81436e2ff4320a0b6feca50c39f0d6c2151f1d514621539856f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
971171af0c66a81436e2ff4320a0b6feca50c39f0d6c2151f1d514621539856f.dll
Resource
win10v2004-20221111-en
Target
971171af0c66a81436e2ff4320a0b6feca50c39f0d6c2151f1d514621539856f
Size
145KB
MD5
25a01ed3a31d6598a013eec905429ae7
SHA1
445c9251cbfd6f395295736e6dfeef31b22d5843
SHA256
971171af0c66a81436e2ff4320a0b6feca50c39f0d6c2151f1d514621539856f
SHA512
b5fc5aac0658d3e1a33203e16afbe6049e68b52cd03295c4047527fa46b1aed2db068432c98c02abf4298444f14fbe40290ed1094f2b01a6b1f22a667d5808c2
SSDEEP
3072:SZ1aHWX61yKumgAluIgOE3wKAJzTS8B0GjKUKrDwWmCWzrHmp:S7ao616JAex3wlhTS80GVKrsCWzrH
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DriverProc
UserProc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ