InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
b38e5ba996ab533528c82b6d2dbaeaad7220349be0bd1916252f77deba26627d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b38e5ba996ab533528c82b6d2dbaeaad7220349be0bd1916252f77deba26627d.dll
Resource
win10v2004-20221111-en
Target
b38e5ba996ab533528c82b6d2dbaeaad7220349be0bd1916252f77deba26627d
Size
72KB
MD5
c34b3921fa972a4aa8565a5733d99c27
SHA1
6d6f933d1cb45f182f1067bc6e9c5f6b9d1a652a
SHA256
b38e5ba996ab533528c82b6d2dbaeaad7220349be0bd1916252f77deba26627d
SHA512
c392e7ce9ee4888d1a43916301d7f0e48a2180bf6c23779e5f4765ccbd8b74dc9462827c33ea2648ddd2e9918df8d993c5fe1fe9107a2e453bbb5daeec925121
SSDEEP
768:SPwwSUJykdmv+HjCUFesFVtyjvrYc9QgJd3qopKpaSxiB9OIeVeD5SydCXFEBpYg:FtU5YogYcua3BpGFbIeVelU1mz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetDriveTypeA
GetLogicalDriveStringsA
MoveFileW
DeleteFileW
CreateDirectoryW
RemoveDirectoryA
SetFileAttributesA
RemoveDirectoryW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateProcessA
ExitThread
GetModuleFileNameA
GetPrivateProfileStringA
CreateThread
lstrcatA
GetWindowsDirectoryA
CreateMutexA
VirtualFreeEx
ReadProcessMemory
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetLocalTime
HeapFree
GetProcessHeap
SetEvent
HeapAlloc
CreateEventA
FindNextFileA
FindFirstFileA
GetTickCount
GetFileAttributesA
DeviceIoControl
lstrcpyA
CreateFileA
GlobalFree
GlobalAlloc
ExitProcess
GetCurrentProcessId
MoveFileA
GetTempFileNameA
OpenThread
GetExitCodeThread
GetCurrentThread
Thread32Next
TerminateThread
Thread32First
CreateToolhelp32Snapshot
TerminateProcess
WriteFile
ReadFile
CreatePipe
RtlUnwind
LCMapStringW
LCMapStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
GetFileSize
GetSystemTime
Sleep
SetFileAttributesW
GetCurrentThreadId
GetCurrentProcess
GetLastError
GetModuleHandleA
CopyFileA
WritePrivateProfileStringA
GetSystemDirectoryA
GetVersionExA
GetTempPathA
DeleteFileA
WinExec
FreeLibrary
LoadLibraryA
GetProcAddress
OpenProcess
GetComputerNameA
CloseHandle
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryA
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
CloseWindowStation
GetProcessWindowStation
wsprintfA
ExitWindowsEx
CloseDesktop
GetThreadDesktop
ChangeServiceConfigA
LogonUserA
DeleteService
ChangeServiceConfig2A
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserA
sprintf
strncpy
atoi
_ftol
??3@YAXPAX@Z
_findclose
_wfindnexti64
strftime
localtime
_i64toa
wcscmp
_wfindfirsti64
_close
_read
_eof
_lseeki64
_filelengthi64
_wopen
swprintf
_atoi64
_wfindnext
wcscat
wcscpy
_wfindfirst
_write
??2@YAPAXI@Z
atol
free
malloc
sscanf
__CxxFrameHandler
strncmp
rand
srand
_vsnprintf
__dllonexit
_onexit
_initterm
_adjust_fdiv
wcslen
_stricmp
closesocket
socket
sendto
inet_addr
recvfrom
recv
htons
WSAStartup
htonl
bind
ioctlsocket
connect
setsockopt
shutdown
select
__WSAFDIsSet
send
gethostbyname
URLDownloadToFileA
GetModuleFileNameExA
GetMappedFileNameA
LoadUserProfileA
InternetConnectA
InternetCrackUrlA
InternetOpenA
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ