@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
Behavioral task
behavioral1
Sample
privat cheats mulitihak/privat cheats mulitihak.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
privat cheats mulitihak/privat cheats mulitihak.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
privat cheats mulitihak/privat cheats mulitihak.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
privat cheats mulitihak/privat cheats mulitihak.exe
Resource
win10v2004-20231215-en
Target
fe909c87096e086bd062b74e9e9a41c7
Size
512KB
MD5
fe909c87096e086bd062b74e9e9a41c7
SHA1
b3ae507b1b3bdcfaf0101b7cb7984bbff268b345
SHA256
08515284117787a967cf5a534ecce0d69124c1928064664a6a00c4add8c6478c
SHA512
e6cded1a4f49a1a9adb2540245ece5f6d3e39caa744848a6eaea49b2ed50a8a9ab2cf1443db1ab5128d6ad53946090ebbcc0076802fcb67aefc068feb6491d3c
SSDEEP
12288:3AUPQm7TPjfu9aBZ32reNEs4M9MOhXLQFDz9RzlrS705U6Z+26QP:lIm7nuu32reNEgVXLq5lrS70Y264
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/privat cheats mulitihak/privat cheats mulitihak.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/privat cheats mulitihak/privat cheats mulitihak.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/privat cheats mulitihak/privat cheats mulitihak.dll |
unpack002/out.upx |
unpack001/privat cheats mulitihak/privat cheats mulitihak.exe.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
ord17
SHAutoComplete
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
MoveFileW
DeleteFileW
DeleteFileA
CreateDirectoryA
CreateDirectoryW
FindClose
FindNextFileA
FindFirstFileA
FindNextFileW
FindFirstFileW
GetTickCount
WideCharToMultiByte
GlobalAlloc
GetVersionExW
GetFullPathNameA
GetFullPathNameW
GetModuleFileNameW
FindResourceW
GetModuleHandleW
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
CompareStringA
ExitProcess
GetFileAttributesA
GetNumberFormatW
DosDateTimeToFileTime
GetDateFormatW
GetTimeFormatW
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
WaitForSingleObject
Sleep
GetTempPathW
MoveFileExW
UnmapViewOfFile
GetCommandLineW
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
SetEnvironmentVariableW
GetProcAddress
LocalFileTimeToFileTime
SystemTimeToFileTime
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
SetCurrentDirectoryW
LoadLibraryW
FreeLibrary
WriteFile
SetFileTime
GetStdHandle
ReadFile
GetCurrentDirectoryW
CreateFileW
CreateFileA
GetFileType
SetFilePointer
CloseHandle
SetEndOfFile
SetLastError
GetLastError
GetLocaleInfoW
CharUpperA
OemToCharBuffA
wvsprintfA
wvsprintfW
ReleaseDC
GetDC
SendMessageW
SetDlgItemTextW
SetFocus
EndDialog
DestroyIcon
SendDlgItemMessageW
GetDlgItemTextW
GetClassNameW
DialogBoxParamW
IsWindowVisible
WaitForInputIdle
SetForegroundWindow
GetSysColor
PostMessageW
LoadBitmapW
CharToOemBuffA
CharToOemA
OemToCharA
FindWindowExW
UpdateWindow
SetWindowTextW
LoadCursorW
RegisterClassExW
SetWindowLongW
GetWindowLongW
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
GetClientRect
IsWindow
MessageBoxW
ShowWindow
GetDlgItem
EnableWindow
LoadStringW
SetWindowPos
GetWindowTextW
GetSystemMetrics
GetWindow
CharUpperW
GetWindowRect
GetParent
MapWindowPoints
LoadIconW
CreateWindowExW
CopyRect
CreateCompatibleDC
GetDeviceCaps
GetObjectW
CreateCompatibleBitmap
SelectObject
StretchBlt
DeleteObject
DeleteDC
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
SHChangeNotify
ShellExecuteExW
SHFileOperationW
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
CreateStreamOnHGlobal
OleInitialize
CoCreateInstance
OleUninitialize
CLSIDFromString
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ