Summary | ZeroBOX

DefenderControl.ini

ScreenShot AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 July 19, 2021, 5:26 p.m. July 19, 2021, 5:28 p.m.
Size 42.4KB
Type Little-endian UTF-16 Unicode text, with CRLF line terminators
MD5 62516ed108e319cf929b64a8cf4cfa93
SHA256 289b8303e9d006c973595d4678b69923d09ff1baae20efdd076d56cceeb38c8e
CRC32 3B980C06
ssdeep 384:a9VBz7j3ehWYn/qmt4yJJU3nBaY+BvroUVB5j1vIdo7apm:a57OhJ/nDOaYczoUM6apm
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a62000
process_handle: 0xffffffff
1 0 0
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep