InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
cf358c1bb3db299a8ca4a6193b2ce122593e4b9dbe23ecff5a11be22e2d8a6c5.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf358c1bb3db299a8ca4a6193b2ce122593e4b9dbe23ecff5a11be22e2d8a6c5.dll
Resource
win10v2004-20220901-en
Target
cf358c1bb3db299a8ca4a6193b2ce122593e4b9dbe23ecff5a11be22e2d8a6c5
Size
75KB
MD5
0c602fdf1a7700e1ee0b90aacdc1b680
SHA1
1400206d45fcb98c0449ff5419b0abf7403cb555
SHA256
cf358c1bb3db299a8ca4a6193b2ce122593e4b9dbe23ecff5a11be22e2d8a6c5
SHA512
e599d967ed11c6e99a9c0c876574b36ac57b1a2431ff737197db105e7b0fd90d7b07fc5ec807480345e3686cac81ab8a1cb7716ea9ded7239e36b39a87039041
SSDEEP
1536:xhHcP2DsozDfWLjjbvnJVWYK+3XrxISjK8qdkZR:bHMglzTWjbvwIlTjKndCR
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ