_???������3��D��
cd
Behavioral task
behavioral1
Sample
e06b84c358cbe46e9320f42a90353233eebc348330ac12e50943477bf488377a.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e06b84c358cbe46e9320f42a90353233eebc348330ac12e50943477bf488377a.dll
Resource
win10v2004-20240226-en
Target
e06b84c358cbe46e9320f42a90353233eebc348330ac12e50943477bf488377a.dll
Size
912KB
MD5
0dfaee816ec541f9a66be0f18a9fff99
SHA1
e6828c37e8ab2ab0713698a198b5fd2e4b2a4723
SHA256
e06b84c358cbe46e9320f42a90353233eebc348330ac12e50943477bf488377a
SHA512
520d829bc8fa70e27c7546011387a9ca047a51a8ab2d2fe8b53fb353908470fd33127424012feceac292abef78e79305ba8889744d50113598cf130aa9bb9151
SSDEEP
24576:CcHyNDAOBv/ki0bw9APdJPIc02s6YtIEIGW:CcHG80vt9A19/G6YCqW
resource | yara_rule |
---|---|
sample | INDICATOR_EXE_Packed_VMProtect |
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
e06b84c358cbe46e9320f42a90353233eebc348330ac12e50943477bf488377a.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTimeZoneInformation
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetSubMenu
CreatePolygonRgn
midiStreamClose
DocumentPropertiesA
RegOpenKeyExA
ShellExecuteA
CLSIDFromString
UnRegisterTypeLi
ord17
getpeername
ChooseColorA
_???������3��D��
cd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ