InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
a1e5be44426fa43c9654f0ccd9646cb8a74c6bf96a1b2629fab72b2126981e69.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1e5be44426fa43c9654f0ccd9646cb8a74c6bf96a1b2629fab72b2126981e69.dll
Resource
win10v2004-20220901-en
Target
a1e5be44426fa43c9654f0ccd9646cb8a74c6bf96a1b2629fab72b2126981e69
Size
85KB
MD5
8194dd23d379b97f998ed81493450ac2
SHA1
6e6dfe3f654d82444de719792b18b92afc0560f2
SHA256
a1e5be44426fa43c9654f0ccd9646cb8a74c6bf96a1b2629fab72b2126981e69
SHA512
35d3cbd3ec8d058aefd4a7bcf7362ff866d8e8e45e9e665acd155db1673304bcb08685bf58b433b426c81d32c1ccf615bd4677910865bcfca188755d456f5b60
SSDEEP
1536:fANTQHNQbbZvXP9IqwQj95OXyjhtxI1zGC3i:fggUf02Bj/xszGqi
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateProcess
WriteFile
ReadFile
GetCurrentThread
CreatePipe
GetModuleHandleA
DeleteFileA
FreeLibrary
CreateDirectoryA
GetFileAttributesA
RemoveDirectoryA
FindNextFileA
FindFirstFileA
GetCurrentThreadId
GetVersionExA
WinExec
SetFileAttributesW
GetLogicalDriveStringsA
MoveFileW
DeleteFileW
CreateDirectoryW
GetTickCount
RemoveDirectoryW
GetTempPathA
GetLocalTime
HeapFree
GetProcessHeap
SetEvent
HeapAlloc
CreateEventA
InitializeCriticalSection
GlobalFree
GlobalAlloc
GetComputerNameA
lstrlenA
WideCharToMultiByte
OpenThread
GetExitCodeThread
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
GetCurrentProcessId
Thread32Next
TerminateThread
Thread32First
CreateToolhelp32Snapshot
ExitProcess
MoveFileA
GetTempFileNameA
ReadProcessMemory
RtlUnwind
LCMapStringW
LCMapStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
GetFileSize
GetSystemTime
EnterCriticalSection
LeaveCriticalSection
CreateProcessA
OpenProcess
WaitForSingleObject
GetPrivateProfileStringA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
GetModuleFileNameA
CreateMutexA
GetLastError
GetCurrentProcess
GetSystemDirectoryA
ExitThread
GetWindowsDirectoryA
lstrcatA
WritePrivateProfileStringA
SetFileAttributesA
CopyFileA
CloseHandle
Sleep
CreateThread
GetDriveTypeA
CreateFileA
DeviceIoControl
lstrcpyA
CloseDesktop
CloseWindowStation
SetThreadDesktop
OpenDesktopA
ExitWindowsEx
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
wsprintfA
SetProcessWindowStation
ClearEventLogA
DeleteService
DuplicateTokenEx
OpenEventLogA
CloseEventLog
LogonUserA
CreateProcessAsUserA
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
ChangeServiceConfigA
ChangeServiceConfig2A
StartServiceA
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
sprintf
sscanf
??3@YAXPAX@Z
strncpy
malloc
free
__CxxFrameHandler
_ftol
??2@YAPAXI@Z
_vsnprintf
atoi
_findclose
strftime
localtime
_i64toa
_wfindnexti64
_wfindfirsti64
swprintf
wcscmp
wcslen
_atoi64
_close
_read
_eof
_lseeki64
_filelengthi64
_wopen
_wfindnext
wcscat
wcscpy
_wfindfirst
_write
atol
strncmp
rand
srand
_stricmp
__dllonexit
_onexit
_initterm
_adjust_fdiv
htonl
htons
select
__WSAFDIsSet
closesocket
recv
recvfrom
inet_ntoa
gethostname
socket
bind
ioctlsocket
connect
setsockopt
shutdown
send
sendto
inet_addr
gethostbyname
WSAStartup
URLDownloadToFileA
GetModuleFileNameExA
GetMappedFileNameA
LoadUserProfileA
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ