InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
cc28332fc0d642612876909298d1ec54f28bf5ebb0032017713a1022a928e001.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc28332fc0d642612876909298d1ec54f28bf5ebb0032017713a1022a928e001.dll
Resource
win10v2004-20221111-en
Target
cc28332fc0d642612876909298d1ec54f28bf5ebb0032017713a1022a928e001
Size
92KB
MD5
5fdbab81076c924e64a3853449d6e962
SHA1
42bbfff980e8fc666a4f8ef009b915388d4faa2c
SHA256
cc28332fc0d642612876909298d1ec54f28bf5ebb0032017713a1022a928e001
SHA512
f5f4f504e6194d26b95a4a25618dc9006c725e3aac6607a1938e7d4bf3784f8f0392ca20a4234e11266366e1c88a6c26bd05643042b6b9b704d4c0c13b2461d2
SSDEEP
768:vAcSmHIAnSk9x31HpM5j/21eeT+0GGI6FFYgJ3N7N6nP5bJ6OiDgZLVL5dR4fmuq:ZnSYlaAO8FzsFLkh+/fAm0n8E2bTx
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateMutexA
VirtualFreeEx
ReadProcessMemory
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetLocalTime
HeapFree
GetProcessHeap
SetEvent
HeapAlloc
CreateEventA
FindNextFileA
FindFirstFileA
CreateDirectoryA
GetFileAttributesA
DeviceIoControl
lstrcpyA
CreateFileA
GlobalFree
GlobalAlloc
ExitProcess
GetCurrentProcessId
MoveFileA
GetTempFileNameA
OpenThread
GetWindowsDirectoryA
GetCurrentThread
Thread32Next
TerminateThread
Thread32First
CreateToolhelp32Snapshot
TerminateProcess
WriteFile
ReadFile
CreatePipe
GlobalMemoryStatus
GetSystemDefaultLangID
lstrcmpiA
RtlUnwind
LCMapStringW
LCMapStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
GetFileSize
GetSystemTime
lstrcatA
CreateThread
GetPrivateProfileStringA
GetModuleFileNameA
ExitThread
CreateProcessA
WaitForSingleObject
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RemoveDirectoryW
SetFileAttributesA
RemoveDirectoryA
CreateDirectoryW
DeleteFileW
MoveFileW
GetLogicalDriveStringsA
GetDriveTypeA
GetTickCount
Sleep
SetFileAttributesW
GetCurrentThreadId
GetCurrentProcess
GetLastError
GetModuleHandleA
CopyFileA
WritePrivateProfileStringA
GetSystemDirectoryA
GetVersionExA
FreeLibrary
GetTempPathA
DeleteFileA
WinExec
MultiByteToWideChar
WideCharToMultiByte
OpenProcess
CloseHandle
lstrlenA
GetComputerNameA
LoadLibraryA
GetProcAddress
GetExitCodeThread
GetDC
keybd_event
ExitWindowsEx
CloseDesktop
CloseWindowStation
SetThreadDesktop
GetSystemMetrics
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
wsprintfA
mouse_event
SetCursorPos
GetUserObjectInformationA
OpenDesktopA
PostMessageA
OpenInputDesktop
RegOpenKeyA
DuplicateTokenEx
OpenProcessToken
AdjustTokenPrivileges
GetTokenInformation
LookupAccountSidA
QueryServiceConfigA
EnumServicesStatusA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
LogonUserA
DeleteService
RegQueryValueExA
ChangeServiceConfigA
ChangeServiceConfig2A
ControlService
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
LookupPrivilegeValueA
CreateProcessAsUserA
_ftol
??3@YAXPAX@Z
_findclose
_wfindnexti64
strftime
localtime
_i64toa
wcscmp
_wfindfirsti64
_close
_read
_eof
_lseeki64
_filelengthi64
_wopen
swprintf
_atoi64
_wfindnext
wcscat
wcscpy
_wfindfirst
_write
??2@YAPAXI@Z
atol
free
malloc
sscanf
__CxxFrameHandler
strncmp
rand
srand
_vsnprintf
realloc
__dllonexit
_onexit
_initterm
_adjust_fdiv
strncpy
wcslen
sprintf
_stricmp
atoi
DeleteDC
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
GetDIBits
GetObjectA
BitBlt
DeleteObject
htonl
htons
closesocket
socket
WSAStartup
gethostbyname
recv
recvfrom
bind
ioctlsocket
connect
setsockopt
shutdown
select
__WSAFDIsSet
send
sendto
inet_addr
URLDownloadToFileA
GetMappedFileNameA
GetProcessMemoryInfo
GetModuleFileNameExA
LoadUserProfileA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
HttpSendRequestA
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ