InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
8cce697e11277ca9cfd4bb7bf4c5b3eeb2804652bfdf285ff2d558a2c1d3858b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8cce697e11277ca9cfd4bb7bf4c5b3eeb2804652bfdf285ff2d558a2c1d3858b.dll
Resource
win10v2004-20220901-en
Target
8cce697e11277ca9cfd4bb7bf4c5b3eeb2804652bfdf285ff2d558a2c1d3858b
Size
45KB
MD5
7b9e516393a34c2331a360cb1646331c
SHA1
05cdaca0093714d21bc65c2112a53698dffa00f1
SHA256
8cce697e11277ca9cfd4bb7bf4c5b3eeb2804652bfdf285ff2d558a2c1d3858b
SHA512
2859951b7cb850f83dc255a8dd91f0951b75d96847ca16db71985507805d95a7c1c52c978675649c8cd0476039f28ea074d4d0e7fc3918641b222af26e7fa1e8
SSDEEP
768:+v4wkhqbM5r1cjcgseTIs7MegjLPfj52CZpTYh0qCuIgsAvlsuwwt2MN3Uv3qde:+Tkv1cjcBeTLfgjLdZRYh0qCun5lkw5q
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ