Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
ndGameProtect.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ndGameProtect.dll
Resource
win10v2004-20240508-en
Target
ndGameProtect.dll
Size
746KB
MD5
12b9f50aab857eaffedced529a811b11
SHA1
fe7c3fe89d0279e06e066aa2d7e0d3e67be56ca9
SHA256
2361bd64a1dd8f13ac2cfa35a42daacd9e05b40298aed4de113f6b7b82b842d4
SHA512
c070cfb8c9381456a582d8ffc8c80b9070a08a68f06a0220285d899fbb0e7508d45189ac95ef2231a2c7e97356a58a0dbb62010de4bb1df28e0c3f62b28fa39e
SSDEEP
12288:gMcSjAg/xegdQF3UGOp/lNyjtaL0YeOvR2vCWlWN3YBAYYIQG66gtlId5WqzN29e:gMPjDxnqBrOpbN3+lYIQAgtGnWS2qnxJ
resource | yara_rule |
---|---|
sample | vmprotect |
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\DevOutNew\ndGameProtectV6.0.2.1x64\Release\ndGameProtect.pdb
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
CreateServiceA
OpenServiceA
QueryServiceConfigA
ChangeServiceConfigA
StartServiceA
CloseServiceHandle
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
GetUserNameA
RegOpenKeyExA
OpenServiceW
GetForegroundWindow
GetParent
GetWindowThreadProcessId
GetFocus
KillTimer
SetTimer
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetKeyState
CoUninitialize
CoCreateInstance
CoInitialize
inet_addr
gethostbyname
closesocket
htons
connect
setsockopt
ioctlsocket
select
send
WSAStartup
WSACleanup
recv
socket
InternetReadFile
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
SHGetSpecialFolderPathA
StrStrIA
GetProcessHeap
SetEndOfFile
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
HeapSize
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
lstrlenA
WriteFile
MultiByteToWideChar
lstrcatA
DeleteFileA
GetModuleFileNameA
CreateProcessA
CloseHandle
WaitNamedPipeA
Sleep
CreateFileA
CreateDirectoryA
GetPrivateProfileIntA
WritePrivateProfileStringA
CreateThread
GetCurrentProcess
GetSystemInfo
GetCurrentThreadId
SetEvent
OutputDebugStringA
GetModuleHandleA
FindResourceA
SizeofResource
LoadResource
SetFileAttributesA
GetTickCount
LockResource
LocalAlloc
LocalFree
GetCurrentProcessId
DeviceIoControl
GetLocalTime
GetPrivateProfileStringA
WaitForSingleObject
TerminateThread
GetFileAttributesA
CreateMutexA
GetLastError
ReleaseMutex
GetFileSize
ReadFile
FindFirstFileA
FindClose
GetWindowsDirectoryA
GetVersionExA
IsBadReadPtr
LoadLibraryA
GetProcAddress
FreeLibrary
CreatePipe
TerminateProcess
MoveFileExW
MoveFileExA
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
GetLogicalDriveStringsA
QueryDosDeviceA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
VirtualProtect
HeapFree
GetSystemTimeAsFileTime
ExitThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
InterlockedDecrement
GetCommandLineA
HeapCreate
HeapDestroy
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
ExitProcess
ChangeDate
CheckCodeDate
EnCodeDate
InstallHookEx
MakeSignCode
NdGetDeviceStateEx
UninstallHookEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ