InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
ad427c311d08094950d5304749570ecdc72d6c54e33fcb8727842e972a7174ba.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad427c311d08094950d5304749570ecdc72d6c54e33fcb8727842e972a7174ba.dll
Resource
win10v2004-20220901-en
Target
ad427c311d08094950d5304749570ecdc72d6c54e33fcb8727842e972a7174ba
Size
39KB
MD5
a1fab0b2d1ebe2f17bb28716c574baf0
SHA1
5825073d3d89ea0d0dfc1642a4674559d65c6b8e
SHA256
ad427c311d08094950d5304749570ecdc72d6c54e33fcb8727842e972a7174ba
SHA512
f537293dc0904cfe96c1e1300c195a1d8f22d34bc141679e56511933d4365d95d38dde7a524ac0dbb07ac6930b297e4752263d7f007d88b6db361076ec1a29c9
SSDEEP
768:Xsn/eiVy4+oAJbrF2ANsis6DpEFc0hOoyxyknb4uSwaaF8:8n/eJ4VUbrpsi1+y0sLVMuSHA8
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ