?DelHook@@YGHXZ
?SetHook@@YGHXZ
Behavioral task
behavioral1
Sample
d588d000dc2e75a35245b34ff610420b.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d588d000dc2e75a35245b34ff610420b.dll
Resource
win10v2004-20240226-en
Target
d588d000dc2e75a35245b34ff610420b
Size
12KB
MD5
d588d000dc2e75a35245b34ff610420b
SHA1
db09418290145c703013e3e94eebf47f4313bcff
SHA256
e601c8f7d7807dda184c4f8798770f246621a82e418cbbf7908ff340e155bf6f
SHA512
758aedcc7e8cd7e40159110ea7f191cdd801a65ee470d4157940c5ddc6c537c78bf76ef52ed8cc65c10b2c445197077df68f634e92b803150393622f11884cec
SSDEEP
192:DDXcZ35QSB2aFjZoxtxrOrjEzNl7UMFxpSK5kCo+imBxqssHqJ23l8LgbVTpWJn:DD05QSlGxr7kMJ22dvsKJ23hbVTpW
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
d588d000dc2e75a35245b34ff610420b |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ