dbgls
����_IDȡ���ھ���2
�ȼ�����
ϵͳ_ȡ����ƽ��
ϵͳ_������ƽ��
Behavioral task
behavioral1
Sample
4d9ecbed136b705fc1d8470d7aa7614741891d6ea4fd7267e85954ffc44ac7ea.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4d9ecbed136b705fc1d8470d7aa7614741891d6ea4fd7267e85954ffc44ac7ea.dll
Resource
win10v2004-20231023-en
Target
4d9ecbed136b705fc1d8470d7aa7614741891d6ea4fd7267e85954ffc44ac7ea
Size
3.7MB
MD5
c3c4c2769241dda67304e6f6b52ef336
SHA1
ae4e45b43e3e2eb65daf0b018232624dd5ca9512
SHA256
4d9ecbed136b705fc1d8470d7aa7614741891d6ea4fd7267e85954ffc44ac7ea
SHA512
c57833761bf519b5ed26a992e6313da39f6eb49fc996a34fb89aaeaf0375587ce4e311b091ac6f10093bcdff22945558b50345f12a3a0349c8f29bcf9f790322
SSDEEP
98304:268JmjBusx3r1ZqtlaWR8Dhc5cCKgYa/CB6PewPdd:ZlUsxJZGWDhcGCKHwld
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
4d9ecbed136b705fc1d8470d7aa7614741891d6ea4fd7267e85954ffc44ac7ea |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
midiStreamStop
ntohs
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
SendDlgItemMessageA
CharUpperBuffW
Chord
GradientFill
OpenPrinterA
GetFileTitleA
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
Shell_NotifyIconA
CLSIDFromProgID
SafeArrayPutElement
ImageList_Destroy
WTSSendMessageW
dbgls
����_IDȡ���ھ���2
�ȼ�����
ϵͳ_ȡ����ƽ��
ϵͳ_������ƽ��
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ