?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
1ce872c6836f13450f3b61a7de8e2744b1d45470b71cc673c3af51cafb9b121a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ce872c6836f13450f3b61a7de8e2744b1d45470b71cc673c3af51cafb9b121a.dll
Resource
win10v2004-20220901-en
Target
1ce872c6836f13450f3b61a7de8e2744b1d45470b71cc673c3af51cafb9b121a
Size
122KB
MD5
90f6bd1ea9f971688ab2a55ae53f9c10
SHA1
802ead120e765e3842f3fb8ca8c7c9e866c8a1da
SHA256
1ce872c6836f13450f3b61a7de8e2744b1d45470b71cc673c3af51cafb9b121a
SHA512
c422a178a373b3b62d72179e37ad7deeddd27689a0a57a5903e5ec62424e5f89aea0a3e5253d10b65b1f3aca3ee3a9e96e86e1400f51fff496a438d89e6f823a
SSDEEP
1536:dK2CuIrIHJXlxsyo6DGkzKkgXuRE7vfzBUW4Ais7XPnCR1K/z1KzD9m1Wf9ZuV3J:IfHIHJXXss7aCivF6oCrBfNfzuxPQO/
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ