?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
cfeeaec70819588483854d2d59c76ccb6853bc2547232cfd019ed957eb1a672b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cfeeaec70819588483854d2d59c76ccb6853bc2547232cfd019ed957eb1a672b.dll
Resource
win10v2004-20221111-en
Target
cfeeaec70819588483854d2d59c76ccb6853bc2547232cfd019ed957eb1a672b
Size
40KB
MD5
fae61c8eab8e5ff77596bd03e7d51dda
SHA1
2115e069e0e574d82d86a0be2e18a9a2ccef734d
SHA256
cfeeaec70819588483854d2d59c76ccb6853bc2547232cfd019ed957eb1a672b
SHA512
bb8002704ec41df91270d5428f62fcb425f9558c2e09a7231fffe7a4840c7341ed95df8182134d85fecfdc44c052c17687af4a977e4812954f21f5ee8baa239a
SSDEEP
768:fAmmaibVMnTSqptoxcf+nHzD6rD0HyGsVGwtHP/3+c2zyBg:fATMxb+O+nyrD0HbwtH3+H
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ