InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
4633c6b4543963fbf7eb21635d299b7c66c83cbf93dc1199433e3d1bfd49e9b5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4633c6b4543963fbf7eb21635d299b7c66c83cbf93dc1199433e3d1bfd49e9b5.dll
Resource
win10v2004-20220812-en
Target
4633c6b4543963fbf7eb21635d299b7c66c83cbf93dc1199433e3d1bfd49e9b5
Size
29KB
MD5
659003bcf999a26b488908389d6aa2c0
SHA1
c44ed5d7d3b34224c424b97d5957e4cc4137cff4
SHA256
4633c6b4543963fbf7eb21635d299b7c66c83cbf93dc1199433e3d1bfd49e9b5
SHA512
55c17bb69c6a5aef2c26323c0714b564fd3d0a76422ab457da323f9c7a327697838588f57d693a2fd141ad75001cd76c1fa4ec3fa3c4530556cf3d4ed1ec81e0
SSDEEP
768:Lscz5hdv9VEJoqfeybB11pPEOXX/FJ6XFT:LNz5hfVefeylpPEO/H6VT
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ