?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
ceb3155b4e4126d82a64ca36c8b7110076fda2529367a02d9bf29dbbb56d960c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ceb3155b4e4126d82a64ca36c8b7110076fda2529367a02d9bf29dbbb56d960c.dll
Resource
win10v2004-20221111-en
Target
ceb3155b4e4126d82a64ca36c8b7110076fda2529367a02d9bf29dbbb56d960c
Size
40KB
MD5
9aae00ef2fe3047c42528ece183a40b7
SHA1
7183a4014af93b95c2a70c570a7a301ab7faf675
SHA256
ceb3155b4e4126d82a64ca36c8b7110076fda2529367a02d9bf29dbbb56d960c
SHA512
e8923bc62f4278ee81d022895b124567a1c5211503c0dd0137e9ac9dc33d8f3132b3cb7d1656d134e80dab2686d4aa6705149107c8ef9b903e1608b5e24df160
SSDEEP
768:0XYjok5JGhCBQh6lfPvpXn0yexncwciJaoW6ghxyYCCd1R:0oRHB5hvVnAnbp1cxyYCIR
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ