?Ge1tIEPath@@YAHPAD@Z
?Ge5tIEPath@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
a20151bd3d807ec8f5802570ecd437aa5c50cb5994b150241733b228ecd075be.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a20151bd3d807ec8f5802570ecd437aa5c50cb5994b150241733b228ecd075be.dll
Resource
win10v2004-20220812-en
Target
a20151bd3d807ec8f5802570ecd437aa5c50cb5994b150241733b228ecd075be
Size
67KB
MD5
d2f531b405def15104236212bc7017fb
SHA1
dff3470071c28573fd9dfe6f333dc9205d872935
SHA256
a20151bd3d807ec8f5802570ecd437aa5c50cb5994b150241733b228ecd075be
SHA512
eea1672aadd8054761445936ab55570b772bb2d448c0e6863c319bcd20f9e5df89d79bbe9102dbe2deca9309634f70b1add0e9cfe333f3599c3fcee2f74d4f48
SSDEEP
1536:eXiz4Bh5rUBwRE5XyaySf3T/CR5yfnbvUmnG4T:e3sXyFSfj/+S1nG4T
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
?Ge1tIEPath@@YAHPAD@Z
?Ge5tIEPath@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ