InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
de2b59d0fc532145b89d7272dc63cff156adc1f4f28760f2f7a2af6d1373d601.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de2b59d0fc532145b89d7272dc63cff156adc1f4f28760f2f7a2af6d1373d601.dll
Resource
win10v2004-20220812-en
Target
de2b59d0fc532145b89d7272dc63cff156adc1f4f28760f2f7a2af6d1373d601
Size
38KB
MD5
7ca32c01c4fb9b4d0efff8e496af3d40
SHA1
acbfb8a5a2d80dfa8b9e26a03d0a17839fde1507
SHA256
de2b59d0fc532145b89d7272dc63cff156adc1f4f28760f2f7a2af6d1373d601
SHA512
a21f34eb61e5c683ded9cba303dd607a96e617c85ea2fb5ce5733a8c0985609cc66e69a5e9acf3056824e8d4e2fc90aca0e79e0dc108f79705bcdebc4e6158f7
SSDEEP
768:slcOnoaEWuTG+8vGqHMeMgO4zGjby0U1BN9puIs9kGMeRV2:6cGoLNGHtMmGPcsk4X
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ