AheadLib_LpkPresent
AheadLib_ScriptApplyDigitSubstitution
AheadLib_ScriptApplyLogicalWidth
AheadLib_ScriptBreak
AheadLib_ScriptCPtoX
AheadLib_ScriptCacheGetHeight
AheadLib_ScriptFreeCache
AheadLib_ScriptGetCMap
AheadLib_Sc
Behavioral task
behavioral1
Sample
b2bf7c0a257642d0de32d1cc237573f44be44e23ba1bae8a38317cc3c990d00b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2bf7c0a257642d0de32d1cc237573f44be44e23ba1bae8a38317cc3c990d00b.dll
Resource
win10v2004-20220901-en
Target
b2bf7c0a257642d0de32d1cc237573f44be44e23ba1bae8a38317cc3c990d00b
Size
68KB
MD5
2e6e31d745074d37a62ce64b8ab34183
SHA1
1d053aebf1f99fc58da9085ad5c3b10cf729fce6
SHA256
b2bf7c0a257642d0de32d1cc237573f44be44e23ba1bae8a38317cc3c990d00b
SHA512
74bb8817f0ff21b97176d48ee8e947c54c07def8e40890b32e2ebc8323184dc04c8d58b1488dc0f66d0a8e3d216f4142c02ab5a9104b849f634a356dd85f7e55
SSDEEP
1536:e+47UMjXaUEpQP4jMKZshnrcA0i19C0fUz8KoFFixTzRymx9l6feh:547XvUa4xyJryk9C0fUzqFMV0Zi
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AheadLib_LpkPresent
AheadLib_ScriptApplyDigitSubstitution
AheadLib_ScriptApplyLogicalWidth
AheadLib_ScriptBreak
AheadLib_ScriptCPtoX
AheadLib_ScriptCacheGetHeight
AheadLib_ScriptFreeCache
AheadLib_ScriptGetCMap
AheadLib_Sc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ