InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
53af2f0cf61876f0fc047f1a1b91f81c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53af2f0cf61876f0fc047f1a1b91f81c.dll
Resource
win10v2004-20231215-en
Target
53af2f0cf61876f0fc047f1a1b91f81c
Size
92KB
MD5
53af2f0cf61876f0fc047f1a1b91f81c
SHA1
84629076a9f6931908f3d71a465145736ef58644
SHA256
a2d6989b51c067122484a897fbae2cfffa34750180f76d79bc069f2ff6b71c54
SHA512
5020b624a9224e126d9052ab9b79e3e9c9cb4c3293df20d0b4d282d8ac51198c5f1b0a165f8e75f5a7d361ae3015016e692dc4fe7feed47a46c11d75e728b8b6
SSDEEP
768:AXlmaMvhxrdneStK7vaYXJeMX0D9+2vPZggtWE2HlZdXRO8OxENUhXUUJXlLorAf:N/tV+P3J2vRruvulkjCphXMtFDr2C
Checks for missing Authenticode signature.
resource |
---|
53af2f0cf61876f0fc047f1a1b91f81c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
HeapFree
GetProcessHeap
SetEvent
HeapAlloc
CreateEventA
FindNextFileA
FindFirstFileA
CreateDirectoryA
GetFileAttributesA
DeviceIoControl
lstrcpyA
CreateFileA
GlobalFree
GlobalAlloc
ExitProcess
GetCurrentProcessId
MoveFileA
GetTempFileNameA
GetTempPathA
GetComputerNameA
lstrlenA
WideCharToMultiByte
OpenThread
GetExitCodeThread
GetCurrentThread
VirtualAllocEx
TerminateThread
Thread32First
CreateToolhelp32Snapshot
TerminateProcess
WriteFile
ReadFile
CreatePipe
GlobalMemoryStatus
GetSystemDefaultLangID
lstrcmpiA
RtlUnwind
LCMapStringW
LCMapStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
GetSystemTime
WriteProcessMemory
CreateRemoteThread
ReadProcessMemory
VirtualFreeEx
FreeLibrary
LoadLibraryA
MultiByteToWideChar
CreateMutexA
GetWindowsDirectoryA
lstrcatA
GetSystemDirectoryA
CreateThread
GetModuleFileNameA
ExitThread
CreateProcessA
OpenProcess
WaitForSingleObject
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
WinExec
GetProcAddress
RemoveDirectoryW
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
CreateDirectoryW
DeleteFileW
MoveFileW
GetLogicalDriveStringsA
GetDriveTypeA
GetTickCount
Sleep
SetFileAttributesW
GetVersionExA
GetCurrentThreadId
GetCurrentProcess
GetLastError
GetModuleHandleA
Thread32Next
CloseDesktop
CloseWindowStation
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
ExitWindowsEx
wsprintfA
mouse_event
SetCursorPos
keybd_event
GetDC
GetSystemMetrics
GetUserObjectInformationA
OpenInputDesktop
PostMessageA
GetProcessWindowStation
DeleteService
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegCreateKeyA
RegDeleteValueA
RegCloseKey
GetTokenInformation
LookupAccountSidA
QueryServiceConfigA
EnumServicesStatusA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyA
RegCreateKeyExA
LogonUserA
CreateProcessAsUserA
RegQueryValueExA
ChangeServiceConfigA
ChangeServiceConfig2A
ControlService
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegDeleteKeyA
RegOpenKeyExA
AdjustTokenPrivileges
_wopen
sprintf
_findclose
strftime
localtime
_i64toa
_wfindnexti64
_wfindfirsti64
swprintf
wcscmp
wcslen
_atoi64
_wfindnext
wcscat
wcscpy
_wfindfirst
_write
atoi
strstr
strncpy
strncmp
free
malloc
sscanf
??2@YAPAXI@Z
__CxxFrameHandler
rand
srand
_vsnprintf
atol
_stricmp
realloc
__dllonexit
_onexit
_initterm
_adjust_fdiv
_filelengthi64
_lseeki64
_eof
_read
_close
??3@YAXPAX@Z
_ftol
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteDC
GetDeviceCaps
CreateDCA
GetDIBits
GetObjectA
BitBlt
DeleteObject
recvfrom
htonl
bind
setsockopt
shutdown
__WSAFDIsSet
sendto
inet_addr
gethostbyname
WSAStartup
socket
ioctlsocket
htons
connect
select
send
recv
closesocket
GetModuleFileNameExA
GetProcessMemoryInfo
GetMappedFileNameA
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ