{"id":736,"date":"2020-11-26T18:44:06","date_gmt":"2020-11-26T18:44:06","guid":{"rendered":"https:\/\/cybersecthreat.com\/?p=736"},"modified":"2024-04-01T13:48:39","modified_gmt":"2024-04-01T05:48:39","slug":"dump-password-from-exe-part2","status":"publish","type":"post","link":"https:\/\/cybersecthreat.com\/zh\/2020\/11\/26\/dump-password-from-exe-part2\/","title":{"rendered":"Dump password from exe(2)"},"content":{"rendered":"<p>This article is actually part two of &#8220;Extract\/Dump password from exe&#8221; series. In <a href=\"https:\/\/cybersecthreat.com\/zh\/extract-password-from-exe-part1\/\">part one<\/a>, we focused on unpacking executable generated by script converter such as PyInstaller, Py2exe and AutoIt. In short, we will focus on executable compiled by Visual Studio and Delphi in this article. Basically, we will try to understand what information is available in the executable file via <strong>strings.exe<\/strong>. Although more and more developers are moving to Visual Studio today, but we still saw some applications and malware written by Delphi. Therefore, we will also cover Delphi in our discussion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-is-it-important\">Why is it important?<\/h2>\n\n\n\n<p>If you are red team player, this article gives you an expectation what information (e.g. credential) is available in the executable file. In addition, traditional anti-virus relies on recognize the signature (keyword). If we have better understand of the relationship between source code and compiled executable, this certainly enhance the ability to evade the defense technology.<\/p>\n\n\n\n<p>On the other hand, if you are blue team player, you may review with the developer before the credential information leak to wrong hand. Moreover, when performing initial malware analysis, you may also have correct expectation to evaluate the executable file.<\/p>\n\n\n<style>.kadence-column736_9fe166-5f > .kt-inside-inner-col{display:flex;}.kadence-column736_9fe166-5f > .kt-inside-inner-col,.kadence-column736_9fe166-5f > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column736_9fe166-5f > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column736_9fe166-5f > .kt-inside-inner-col{flex-direction:column;align-items:center;}.kadence-column736_9fe166-5f > .kt-inside-inner-col > .kb-image-is-ratio-size{align-self:stretch;}.kadence-column736_9fe166-5f > .kt-inside-inner-col > .wp-block-kadence-advancedgallery{align-self:stretch;}.kadence-column736_9fe166-5f > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column736_9fe166-5f > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column736_9fe166-5f{position:relative;}@media all and (max-width: 1024px){.kadence-column736_9fe166-5f > .kt-inside-inner-col{flex-direction:column;justify-content:center;align-items:center;}}@media all and (max-width: 767px){.kadence-column736_9fe166-5f > .kt-inside-inner-col{flex-direction:column;justify-content:center;align-items:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column736_9fe166-5f\"><div class=\"kt-inside-inner-col\"><style>.kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-table-of-content-wrap{padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:0px;background-color:rgba(255,255,255,0.99);border-top:3px solid #313131;border-right:3px solid #313131;border-bottom:3px solid #313131;border-left:3px solid #313131;box-shadow:0px 0px 14px 0px #abb8c3;}.kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-table-of-contents-title-wrap{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-table-of-contents-title{font-size:var(--global-kb-font-size-lg, 2rem);font-weight:bold;font-style:normal;}.kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-table-of-content-wrap .kb-table-of-content-list{color:#d65a02;font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:regular;font-style:normal;margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-right:0px;margin-bottom:0px;margin-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-toggle-icon-style-basiccircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-toggle-icon-style-basiccircle .kb-table-of-contents-icon-trigger:before, .kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-toggle-icon-style-arrowcircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-toggle-icon-style-arrowcircle .kb-table-of-contents-icon-trigger:before, .kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-toggle-icon-style-xclosecircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-toggle-icon-style-xclosecircle .kb-table-of-contents-icon-trigger:before{background-color:rgba(255,255,255,0.99);}@media all and (max-width: 1024px){.kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-table-of-content-wrap{margin-left:var(--global-kb-spacing-auto, auto);border-top:3px solid #313131;border-right:3px solid #313131;border-bottom:3px solid #313131;border-left:3px solid #313131;}}@media all and (max-width: 767px){.kb-table-of-content-nav.kb-table-of-content-id736_c39b58-69 .kb-table-of-content-wrap{margin-left:var(--global-kb-spacing-auto, auto);border-top:3px solid #313131;border-right:3px solid #313131;border-bottom:3px solid #313131;border-left:3px solid #313131;}}<\/style><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"h-lab-environment\">Lab environment<\/h2>\n\n\n\n<p>In order to facilitate our discussion, some simple client applications directly connecting to database were designed. In general, the database connection between client application and databases requires a &#8220;connection string&#8221;. This connection string includes information such as IP address of database server and even user name and password. If &#8220;Integrated Security&#8221; is used for database connection, then the user name and password information is not available inside the executable file.<\/p>\n\n\n\n<p>In our experiment, all programs written in Delphi (XE 2 and XE 10) were designed specifically connect to <strong>MySQL<\/strong> database. On the other hand, applications written in VB .Net, C#, C++ (Visual Studio 2013, 2017 and 2019)  were designed to use MSSQL database. Below list the connection string information used by both MySQL and MSSQL database in our source code.<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td>Server hostname<\/td><td>localhost<\/td><\/tr><tr><td>Database Name<\/td><td>mytestdb<\/td><\/tr><tr><td>User Name<\/td><td>mytestuser1<\/td><\/tr><tr><td>Password<\/td><td>AAAAABB_2<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Database connection information used specifically in our lab<\/figcaption><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-source-code-used-in-lab\">Source code used in lab<\/h2>\n\n\n\n<p>Firstly, we will give you a high-level overview of ALL source code used in our this experiment:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A <strong>database connection component<\/strong> with connection string defined, and it is implemented either via &#8220;drag-and-drop&#8221; using IDE or runtime source code.<\/li>\n\n\n\n<li>A <strong>data source binding component<\/strong> which connecting the <strong>database connection component<\/strong> and data grid component, which is implemented either via &#8220;drag-and-drop&#8221; using IDE or runtime source code.<\/li>\n\n\n\n<li>A <strong>data grid component<\/strong> responsible to display information in database, and it is implemented either via &#8220;drag-and-drop&#8221; using IDE or runtime source code.<\/li>\n\n\n\n<li>A <strong>remark<\/strong> contains the string <strong>RemarkAAAAA<\/strong> was explicitly defined for our test cases. Later, we will see if remark is available after compiled the program.<\/li>\n\n\n\n<li>Multiple private and public variables and values with suffix <strong>AAAAA <\/strong>also defined. <\/li>\n<\/ul>\n\n\n\n<p>All the source code using in our testing are also available download via our github repository <a href=\"https:\/\/github.com\/cybersecthreat\/Code_Samples\">\u7db2\u5740<\/a>. We are not going to discuss every source code used in this testing because we do not want to make it a programming article. Therefore, instead of discuss the source code of each language, we will only discuss one example. Below is code snippet of VB .Net:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<pre class=\"wp-block-code\"><code>Public Class Form1\n    Dim MyClassVarAAA As String ' This variable name will be available via strings.exe\n\n    Private Sub Form1_Load(sender As Object, e As EventArgs) Handles MyBase.Load        \n        ' RemarkAAAAA                    Me.Tbl_personTableAdapter.Fill(Me.MytestdbDataSet.tbl_person)\n        Dim MyFunctionVarAAAAA As String\n        MyClassVarAAAAA = \"MyClassValueAAAAA\"\n        MyFunctionVarAAAAA = \"MyFunctionValueAAAAA\"\n        MsgBox(\"Static_MsgBox_MessageAAAAA\")\n        MsgBox(MyClassVarAAAAA)\n        MsgBox(MyFunctionVarAAAAA)\n\n    End Sub\nEnd Class<\/code><\/pre>\n<\/div><\/div>\n\n\n\n<p>As shown above example, we have defined multiple variable and values using the keyword &#8220;AAAAA&#8221;. Later on, we will grep the keyword &#8220;AAAAA&#8221; and see what is included inside the executable file.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-detect-it-easy\">Detect it Easy<\/h2>\n\n\n\n<p>Before we move on to grep the keyword, let&#8217;s explore each executable file using amazing tool <a href=\"http:\/\/ntinfo.biz\/index.html\">detect it easy<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win64_die.png\" alt=\"Delphi XE2 Win64 DIE\" class=\"wp-image-1003\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">1) Delphi XE 2 (x64) compiled executable<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win32_die.png\" alt=\"Delphi XE2 Win32 DIE\" class=\"wp-image-1004\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win32_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win32_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win32_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_Win32_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><figcaption class=\"wp-element-caption\">2) Delphi XE 2 (x86) compiled executable<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win64_die.png\" alt=\"Delphi XE10 Win64 DIE\" class=\"wp-image-1001\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">3) Delphi XE 10 Seattle (x64)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win32_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win32_die.png\" alt=\"Delphi XE10 Win32 DIE\" class=\"wp-image-1002\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win32_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win32_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win32_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_Win32_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">4) Delphi XE 10 Seattle (x86)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x64_die.png\" alt=\"VS2013 VB x64 DIE\" class=\"wp-image-1000\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">5) VB .NET 2013 (x64) + .NET Framework 4.5<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x86_die.png\" alt=\"VS2013 VB x86 DIE\" class=\"wp-image-999\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">6) VB .NET 2013 (x86) + .NET Framework 4.5<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x64_die.png\" alt=\"VS2013 VC++ x64 DIE\" class=\"wp-image-998\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">7) Visual C++ 2013 (x64) + .NET Framework 4.5<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x86_die.png\" alt=\"VS2013 VC++ x86 DIE\" class=\"wp-image-997\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">8) Visual C++ 2013 (x86) + .NET Framework 4.5<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x64_die.png\" alt=\"VS2013_VC# x64 DIE\" class=\"wp-image-996\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">9) C# 2013 (x64) + .NET Framework 4.5<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x86_die.png\" alt=\"VS2013_VC# x86 DIE\" class=\"wp-image-995\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">10) C# 2013 (x86) + .NET Framework 4.5<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x64_die.png\" alt=\"VS2017_VB_x64_DIE\" class=\"wp-image-994\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">11) VB .NET 2017 (x64) + .NET Framework 4.6.1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x86_die.png\" alt=\"VS2017 VB x86 DIE\" class=\"wp-image-993\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">12) VB .NET 2017 (x86) + .NET Framework 4.6.1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x64_die.png\" alt=\"VS2017 VC++ x64 DIE\" class=\"wp-image-992\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">13) Visual C++ 2017 (x64) + .NET Framework 4.6.1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x86_die.png\" alt=\"VS2017 VC++ x86 DIE\" class=\"wp-image-991\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VC_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">14) Visual C++ 2017 (x86) + .NET Framework 4.6.1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x64_die.png\" alt=\"VS2017 VC# x64 DIE\" class=\"wp-image-990\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">15) C# 2017 (x64) + .NET Framework 4.6.1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x86_die.png\" alt=\"VS2017 VC# x86 DIE\" class=\"wp-image-989\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">16) C# 2017 (x86) + .NET Framework 4.6.1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x64_die.png\" alt=\"VS2019 VB x64 DIE\" class=\"wp-image-988\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">17) VB .NET 2019 (x64) + .NET Framework 4.7.2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x86_die.png\" alt=\"VS2019 VB x86 DIE\" class=\"wp-image-987\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">18) VB .NET 2019 (x86) + .NET Framework 4.7.2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x64_die.png\" alt=\"VS2019 VC++ x64 DIE\" class=\"wp-image-986\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">19) Visual C++ 2019 (x64) + .NET Framework 4.7.2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x86_die.png\" alt=\"VS2019 VC++ x86 DIE\" class=\"wp-image-985\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">20) Visual C++ 2019 (x86) + .NET Framework 4.7.2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x64_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x64_die.png\" alt=\"VS2019 VC# x64 DIE\" class=\"wp-image-984\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x64_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x64_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x64_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x64_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">21) C# 2019 (x64) + .NET Framework 4.7.2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x86_die.png\"><img loading=\"lazy\" decoding=\"async\" width=\"817\" height=\"471\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x86_die.png\" alt=\"VS2019 VC# x86 DIE\" class=\"wp-image-983\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x86_die.png 817w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x86_die-300x173.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x86_die-768x443.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_x86_die-600x346.png 600w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><figcaption class=\"wp-element-caption\">22) C# 2019 (x86) + .NET Framework 4.7.2<\/figcaption><\/figure>\n\n\n\n<p>As you may also aware, there are not much fruitful information from Detect it Easy at this stage. However, I prefer to use it as the first step to understand and evaluate the executable file.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-dump-password-from-exe-via-strings-exe\">Dump password from exe via strings.exe<\/h2>\n\n\n\n<p>So, we will move on to explore what information are available inside the executable file via the strings.exe. As I have said, we will try to grep the keyword &#8220;AAAAA&#8221; using <strong>findstr<\/strong> command.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-delphi\">Delphi<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"203\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings-1024x203.png\" alt=\"Delphi XE2 CDS MySQL x64 strings\" class=\"wp-image-1055\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings-1024x203.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings-300x59.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings-768x152.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings-1536x304.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings-600x119.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">1) Delphi XE2 x64 +MySQL connection via CDS component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"202\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings-1024x202.png\" alt=\"Delphi XE2 CDS MySQL x86 strings\" class=\"wp-image-1056\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings-1024x202.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings-300x59.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings-768x151.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings-1536x302.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings-600x118.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_cds_mysql_win32_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">2) Delphi XE2 x86 +MySQL connection via CDS component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"182\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings-1024x182.png\" alt=\"Delphi XE2 unidac MySQL x64 strings\" class=\"wp-image-1053\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings-1024x182.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings-300x53.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings-768x136.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings-1536x273.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings-600x106.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">3) Delphi XE2 x64 +MySQL connection via unidac component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"196\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings-1024x196.png\" alt=\"Delphi XE2 unidac MySQL x86 strings\" class=\"wp-image-1054\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings-1024x196.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings-300x57.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings-768x147.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings-1536x294.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings-600x115.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_unidac_mysql_win32_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">4) Delphi XE2 x86 +MySQL connection via unidac component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"189\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings-1024x189.png\" alt=\"Delphi XE2 zeoslib MySQL x64 strings\" class=\"wp-image-1050\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings-1024x189.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings-300x55.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings-768x142.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings-1536x284.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings-600x111.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">5) Delphi XE2 x64 +MySQL connection via zeoslib component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"194\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings-1024x194.png\" alt=\"Delphi XE2 zeoslib MySQL x86 strings\" class=\"wp-image-1052\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings-1024x194.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings-300x57.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings-768x146.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings-1536x291.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings-600x114.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe2_zeoslib_mysql_win32_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">6) Delphi XE2 x86 +MySQL connection via zeoslib component<\/figcaption><\/figure>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"211\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings-1024x211.png\" alt=\"Delphi XE10 CDS MySQL x64 strings\" class=\"wp-image-1065\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings-1024x211.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings-300x62.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings-768x159.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings-1536x317.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings-600x124.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">7) Delphi XE10 x64 +MySQL connection via CDS component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"205\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings-1024x205.png\" alt=\"Delphi XE10 CDS MySQL x86 strings\" class=\"wp-image-1066\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings-1024x205.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings-300x60.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings-768x154.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings-1536x307.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings-600x120.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_cds_mysql_win32_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">8) Delphi XE10 x86 +MySQL connection via CDS component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"188\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings-1024x188.png\" alt=\"Delphi XE10 unidac MySQL x64 strings\" class=\"wp-image-1059\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings-1024x188.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings-300x55.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings-768x141.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings-1536x283.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings-600x110.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">9) Delphi XE10 x64 +MySQL connection via unidac component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"202\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings-1024x202.png\" alt=\"Delphi XE10Delphi XE10 unidac MySQL x86 strings\" class=\"wp-image-1060\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings-1024x202.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings-300x59.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings-768x152.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings-1536x304.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings-600x119.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_unidac_mysql_win32_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">10) Delphi XE10 x86 +MySQL connection via unidac component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"203\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings-1024x203.png\" alt=\"Delphi XE10 zeoslib MySQL x64 strings\" class=\"wp-image-1057\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings-1024x203.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings-300x59.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings-768x152.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings-1536x304.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings-600x119.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">11) Delphi XE10 x64 +MySQL connection via zeoslib component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"190\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings-1024x190.png\" alt=\"Delphi XE10 zeoslib MySQL x86 strings\" class=\"wp-image-1058\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings-1024x190.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings-300x56.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings-768x142.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings-1536x284.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings-600x111.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_zeoslib_mysql_win32_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">12) Delphi XE10 x86 +MySQL connection via zeoslib component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"206\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings-1024x206.png\" alt=\"Delphi XE10 firedac MySQL x64 strings\" class=\"wp-image-1063\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings-1024x206.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings-300x60.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings-768x155.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings-1536x309.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings-600x121.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">13) Delphi XE10 x64 +MySQL connection via firedac component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"197\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings-1024x197.png\" alt=\"Delphi XE10 firedac MySQL x86 strings\" class=\"wp-image-1064\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings-1024x197.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings-300x58.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings-768x148.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings-1536x295.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings-600x115.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firedac_mysql_win32_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">14) Delphi XE10 x86 +MySQL connection via firedac component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"196\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings-1024x196.png\" alt=\"Delphi XE10 firemonkey firedac MySQL x64 strings\" class=\"wp-image-1061\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings-1024x196.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings-300x57.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings-768x147.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings-1536x293.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings-600x115.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">15) Delphi XE10 x64 FireMonkey GUI+MySQL connection via firedac component<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"205\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings-1024x205.png\" alt=\"Delphi XE10 firemonkey firedac MySQL x86 strings\" class=\"wp-image-1062\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings-1024x205.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings-300x60.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings-768x154.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings-1536x307.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings-600x120.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/delphi_xe10_firemonkey_firedac_mysql_win32_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">16) Delphi XE10 x86 FireMonkey GUI+MySQL connection via firedac component<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-visual-studio-2013\">Visual Studio 2013<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"138\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings-1024x138.png\" alt=\"VS2013 VB MSSQL x64 strings\" class=\"wp-image-1051\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings-1024x138.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings-300x40.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings-768x104.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings-1536x207.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings-600x81.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">1) VB .NET 2013 x64 + .NET Framework 4.5 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"143\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings-1024x143.png\" alt=\"VS2013 VB MSSQL x86 strings\" class=\"wp-image-1049\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings-1024x143.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings-300x42.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings-768x107.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings-1536x214.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings-600x84.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_x86_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">2) VB .NET 2013 x86 + .NET Framework 4.5 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"163\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1024x163.png\" alt=\"VS2013 VB MSSQL ConnectionString by appconf x64 strings\" class=\"wp-image-1048\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1024x163.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-300x48.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-768x122.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1536x244.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-600x95.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">3) VB .NET 2013 x64 + .NET Framework 4.5 + MSSQL connection via App.config<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"155\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1024x155.png\" alt=\"VS2013 VB MSSQL ConnectionString by App.config x86 strings\" class=\"wp-image-1047\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1024x155.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-300x45.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-768x116.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1536x233.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-600x91.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_AppConf_x86_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">4) VB .NET 2013 x86 + .NET Framework 4.5 + MSSQL connection via App.config<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"193\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings-1024x193.png\" alt=\"VS2013 VB MSSQL ConnectionString by Code x64 strings\" class=\"wp-image-1045\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings-1024x193.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings-300x57.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings-768x145.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings-1536x290.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings-600x113.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">5) VB .NET 2013 x64 + .NET Framework 4.5 + MSSQL connection via code to define datasource method 1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"205\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x86_strings-1024x205.png\" alt=\"VS2013 VB MSSQL ConnectionString by Code x86 strings\" class=\"wp-image-1067\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x86_strings-1024x205.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x86_strings-300x60.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x86_strings-768x154.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x86_strings-1536x308.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x86_strings-600x120.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code_x86_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">6) VB .NET 2013 x86 + .NET Framework 4.5 + MSSQL connection via code to define datasource method 1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"190\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1024x190.png\" alt=\"VS2013 VB MSSQL ConnectionString by code Method 2 x64 strings\" class=\"wp-image-1046\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1024x190.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings-300x56.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings-768x143.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1536x286.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings-600x112.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">7) VB .NET 2013 x64 + .NET Framework 4.5 + MSSQL connection via code to define datasource method 2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"198\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1024x198.png\" alt=\"VS2013 VB MSSQL ConnectionString by Code Method 2 x86 strings\" class=\"wp-image-1044\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1024x198.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings-300x58.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings-768x148.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1536x296.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings-600x116.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VB_SQLTest_ConnectionString_By_Code2_x86_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">8) VB .NET 2013 x86 + .NET Framework 4.5 + MSSQL connection via code to define datasource method 2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"129\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings-1024x129.png\" alt=\"VS2013 VC++ MSSQL x64 strings\" class=\"wp-image-1042\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings-1024x129.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings-300x38.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings-768x97.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings-1536x193.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings-600x76.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">9) Visual C++ 2013 x64 + .NET Framework 4.5 + MSSQL connection via code to define datasource<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"136\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings-1024x136.png\" alt=\"VS2013 VC++ MSSQL x86 strings\" class=\"wp-image-1018\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings-1024x136.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings-300x40.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings-768x102.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings-1536x204.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings-600x80.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VC_SQLTest_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">10) Visual C++ 2013 x86 + .NET Framework 4.5 + MSSQL connection via code to define datasource<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"134\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings-1024x134.png\" alt=\"VS2013 VC# MSSQL x64 strings\" class=\"wp-image-1043\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings-1024x134.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings-300x39.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings-768x100.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings-1536x200.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings-600x78.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">11) C# 2013 x64 + .NET Framework 4.5 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"134\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings-1024x134.png\" alt=\"VS2013 VC# MSSQL x86 strings\" class=\"wp-image-1040\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings-1024x134.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings-300x39.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings-768x101.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings-1536x201.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings-600x79.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2013_VCSharp_SQLTest_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">12) C# 2013 x86 + .NET Framework 4.5 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-visual-studio-2017\">Visual Studio 2017<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"134\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings-1024x134.png\" alt=\"VS2017 VB MSSQL x64 strings\" class=\"wp-image-1041\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings-1024x134.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings-300x39.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings-768x100.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings-1536x200.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings-600x78.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">13) VB .NET 2017 x64 + .NET Framework 4.6.1 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"147\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings-1024x147.png\" alt=\"VS2017 VB MSSQL x86 strings\" class=\"wp-image-1039\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings-1024x147.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings-300x43.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings-768x110.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings-1536x220.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings-600x86.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_x86_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">14) VB .NET 2017 x86 + .NET Framework 4.6.1 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"152\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1024x152.png\" alt=\"VS2017 VB MSSQL ConnectionString by App.config x64 strings\" class=\"wp-image-1038\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1024x152.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-300x45.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-768x114.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1536x228.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-600x89.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">15) VB .NET 2017 x64 + .NET Framework 4.6.1 + MSSQL connection via App.config<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"163\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1024x163.png\" alt=\"VS2017 VB MSSQL ConnectionString by App.config x86 strings\" class=\"wp-image-1036\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1024x163.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-300x48.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-768x122.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1536x244.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-600x95.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_AppConf_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">16) VB .NET 2017 x86 + .NET Framework 4.6.1 + MSSQL connection via App.config<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"200\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings-1024x200.png\" alt=\"VS2017 VB MSSQL ConnectionString by code x64 strings\" class=\"wp-image-1037\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings-1024x200.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings-300x58.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings-768x150.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings-1536x299.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings-600x117.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">17) VB .NET 2017 x64 + .NET Framework 4.6.1 + MSSQL connection via code to define datasource method 1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"187\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings-1024x187.png\" alt=\"VS2017 VB MSSQL ConnectionString by code x86 strings\" class=\"wp-image-1035\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings-1024x187.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings-300x55.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings-768x140.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings-1536x280.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings-600x110.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code_x86_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">18) VB .NET 2017 x86 + .NET Framework 4.6.1 + MSSQL connection via code to define datasource method 1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"181\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1024x181.png\" alt=\"VS2017 VB MSSQL ConnectionString by code method 2 x64 strings\" class=\"wp-image-1033\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1024x181.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings-300x53.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings-768x136.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1536x272.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings-600x106.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x64_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">19) VB .NET 2017 x64 + .NET Framework 4.6.1 + MSSQL connection via code to define datasource method 2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"186\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1024x186.png\" alt=\"VS2017 VB MSSQL ConnectionString by code Method 2 x86 strings\" class=\"wp-image-1034\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1024x186.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x86_strings-300x55.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x86_strings-768x140.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1536x280.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x86_strings-600x109.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VB_SQLTest_ConnectionString_By_Code2_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">20) VB .NET 2017 x86 + .NET Framework 4.6.1 + MSSQL connection via code to define datasource method 2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"134\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings-1024x134.png\" alt=\"VS2017 VC++ MSSQL x64_strings\" class=\"wp-image-1032\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings-1024x134.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings-300x39.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings-768x101.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings-1536x201.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings-600x79.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x64_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">21) Visual C++ 2017 x64 + .NET Framework 4.6.1 + MSSQL connection via code to define datasource<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"151\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings-1024x151.png\" alt=\"VS2017 VC++ MSSQL x86 strings\" class=\"wp-image-1017\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings-1024x151.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings-300x44.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings-768x113.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings-1536x227.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings-600x88.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSQLTest_x86_strings.png 1546w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">22) Visual C++ 2017 x86 + .NET Framework 4.6.1 + MSSQL connection via code to define datasource<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"138\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings-1024x138.png\" alt=\"VS2017 VC# MSSQL x64 strings\" class=\"wp-image-1030\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings-1024x138.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings-300x40.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings-768x104.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings-1536x207.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings-600x81.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">23) C# 2017 x64 + .NET Framework 4.6.1 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"136\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings-1024x136.png\" alt=\"VS2017 VC# MSSQL x86 strings\" class=\"wp-image-1031\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings-1024x136.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings-300x40.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings-768x102.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings-1536x203.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings-600x79.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2017_VCSharp_SQLTest_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">24) C# 2017 x86 + .NET Framework 4.6.1 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-visual-studio-2019\">Visual Studio 2019<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"136\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings-1024x136.png\" alt=\"VS2019 VB MSSQL x64 strings\" class=\"wp-image-1028\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings-1024x136.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings-300x40.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings-768x102.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings-1536x203.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings-600x79.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x64_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">25) VB .NET 2019 x64 + .NET Framework 4.7.2 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"140\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings-1024x140.png\" alt=\"VS2019 VB MSSQL x86 strings\" class=\"wp-image-1029\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings-1024x140.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings-300x41.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings-768x105.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings-1536x210.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings-600x82.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">26) VB .NET 2019 x86 + .NET Framework 4.7.2 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"153\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1024x153.png\" alt=\"VS2019 VB MSSQL ConnectionString by App.config x64 strings\" class=\"wp-image-1026\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1024x153.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-300x45.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-768x115.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-1536x230.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings-600x90.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">27) VB .NET 2019 x64 + .NET Framework 4.7.2 + MSSQL connection via App.config<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"159\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1024x159.png\" alt=\"VS2019 VB MSSQL ConnectionString by App.config x86 strings\" class=\"wp-image-1027\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1024x159.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-300x46.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-768x119.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-1536x238.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings-600x93.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_AppConf_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">28) VB .NET 2019 x86 + .NET Framework 4.7.2 + MSSQL connection via App.config<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"198\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings-1024x198.png\" alt=\"VS2019 VB MSSQL ConnectionString by code x64 strings\" class=\"wp-image-1025\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings-1024x198.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings-300x58.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings-768x149.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings-1536x297.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings-600x116.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x64_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">29) VB .NET 2019 x64 + .NET Framework 4.7.2 + MSSQL connection via code to define datasource method 1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"197\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings-1024x197.png\" alt=\"VS2019 VB MSSQL ConnectionString by code x86 strings\" class=\"wp-image-1023\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings-1024x197.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings-300x58.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings-768x148.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings-1536x296.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings-600x116.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code_x86_strings.png 1547w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">30) VB .NET 2019 x86 + .NET Framework 4.7.2 + MSSQL connection via code to define datasource method 1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"208\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1024x208.png\" alt=\"VS2019 VB MSSQL ConnectionString by code method 2 x64 strings\" class=\"wp-image-1024\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1024x208.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings-300x61.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings-768x156.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings-1536x312.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings-600x122.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">31) VB .NET 2019 x64 + .NET Framework 4.7.2 + MSSQL connection via code to define datasource method 2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"203\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1024x203.png\" alt=\"VS2019 VB MSSQL ConnectionString by code method 2 x86 strings\" class=\"wp-image-1022\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1024x203.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings-300x59.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings-768x152.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings-1536x305.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings-600x119.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VB_SQLTest_ConnectionString_By_Code2_x86_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">32) VB .NET 2019 x86 + .NET Framework 4.7.2 + MSSQL connection via code to define datasource method 2<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"140\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings-1024x140.png\" alt=\"VS2019 VC++ MSSQL x64 strings\" class=\"wp-image-1020\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings-1024x140.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings-300x41.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings-768x105.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings-1536x209.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings-600x82.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x64_strings.png 1548w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">33) Visual C++ 2019 x64 + .NET Framework 4.7.2 + MSSQL connection via code to define datasource<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"141\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings-1024x141.png\" alt=\"VS2019 VC++ MSSQL x86 strings\" class=\"wp-image-1016\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings-1024x141.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings-300x41.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings-768x106.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings-1536x211.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings-600x83.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VC_SQLTest_x86_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">34) Visual C++ 2019 x86 + .NET Framework 4.7.2 + MSSQL connection via code to define datasource<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"134\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings-1024x134.png\" alt=\"VS2019 VC# MSSQL x64 strings\" class=\"wp-image-1021\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings-1024x134.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings-300x39.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings-768x100.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings-1536x200.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings-600x78.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">35) C# 2019 x64 + .NET Framework 4.7.2 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"137\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings-1024x137.png\" alt=\"VS2019 VCSharp MSSQL x86 strings\" class=\"wp-image-1019\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings-1024x137.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings-300x40.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings-768x103.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings-1536x206.png 1536w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings-600x81.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x86_strings.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">36) C# 2019 x86 + .NET Framework 4.7.2 + MSSQL connection via datagrid datasource creation<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-summary\">Summary<\/h2>\n\n\n\n<p>As shown above, we can see some key observation from our experiment.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firstly, remarks inside the source code is always not available<\/li>\n\n\n\n<li>Secondly, many of the results show &#8220;Password=AAAAABB_2&#8221;. If we try to grep keyword such as Password from the executable file, then credential information may be available.<\/li>\n\n\n\n<li>Thirdly, all the results show the password &#8220;AAAAABB_2&#8221;.  Even though some of them do not contains the keyword &#8220;Password=&#8221; in a single line, it is still possible to build a dictionary for brute force attack.<\/li>\n\n\n\n<li>Fourthly, name of variable and value of variable may also available. It is also important to notice that traditional Anti-Virus relies on keyword inside the malware executable file. These keywords may also include variable name, values or debug messages. In fact, we have evade those traditional Anti-Virus many times by removing those keywords from the source code and re-compiled the executable file again.<\/li>\n<\/ul>\n\n\n\n<p>To conclude, do not assume an executable file can help to keep your secrets, and attacker may be able to dump password from exe file.  For instance, I saw some organization reasonably protect scripts containing credential, but wrongly left executable file with embedded credential unprotected. Moreover, executable packer such as upx can hide those credential information but the information still can be extracted. We will further explore Anti-Debugging techniques to protect an executable in the future. <\/p>","protected":false},"excerpt":{"rendered":"<p>This article is actually part two of &#8220;Extract\/Dump password from exe&#8221; series. In part one, we focused on unpacking executable generated by script converter such as PyInstaller, Py2exe and AutoIt. In short, we will focus on executable compiled by Visual Studio and Delphi in this article. Basically, we will try to understand what information is&#8230;<\/p>","protected":false},"author":2,"featured_media":1021,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[42,40,57],"tags":[21,77,17,60,76],"class_list":["post-736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blue-team","category-red-team","category-reverse-engineering","tag-blue-team","tag-delphi","tag-red-team","tag-reverse-engineering","tag-visual-studio"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Dump password from exe(2) - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"part two of &quot;Extract\/Dump password from exe&quot; series ... what information (e.g. credential) is available in the executable file\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/2020\/11\/26\/dump-password-from-exe-part2\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dump password from exe(2)\" \/>\n<meta property=\"og:description\" content=\"This article is actually part two of &quot;Extract\/Dump password from exe&quot; series. In part one, we focused on unpacking executable generated by script\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/2020\/11\/26\/dump-password-from-exe-part2\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-26T18:44:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-01T05:48:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1549\" \/>\n\t<meta property=\"og:image:height\" content=\"202\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kelvin Yip\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Yip\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"23 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/\"},\"author\":{\"name\":\"Kelvin Yip\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/4787dde06da74fa66cb5e92e481b0f98\"},\"headline\":\"Dump password from exe(2)\",\"datePublished\":\"2020-11-26T18:44:06+00:00\",\"dateModified\":\"2024-04-01T05:48:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/\"},\"wordCount\":1552,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/VS2019_VCSharp_SQLTest_x64_strings.png\",\"keywords\":[\"Blue Team\",\"Delphi\",\"Red Team\",\"Reverse Engineering\",\"Visual Studio\"],\"articleSection\":[\"Blue Team\",\"Red Team\",\"Reverse Engineering\"],\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/\",\"name\":\"Dump password from exe(2) - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/VS2019_VCSharp_SQLTest_x64_strings.png\",\"datePublished\":\"2020-11-26T18:44:06+00:00\",\"dateModified\":\"2024-04-01T05:48:39+00:00\",\"description\":\"part two of \\\"Extract\\\/Dump password from exe\\\" series ... what information (e.g. credential) is available in the executable file\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/VS2019_VCSharp_SQLTest_x64_strings.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/VS2019_VCSharp_SQLTest_x64_strings.png\",\"width\":1549,\"height\":202,\"caption\":\"VS2019 VC# MSSQL x64 strings\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Red Team\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/category\\\/red-team\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dump password from exe(2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/4787dde06da74fa66cb5e92e481b0f98\",\"name\":\"Kelvin Yip\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g\",\"caption\":\"Kelvin Yip\"},\"sameAs\":[\"https:\\\/\\\/cybersecthreat.com\"],\"knowsAbout\":[\"CyberSecurity\"],\"knowsLanguage\":[\"English\",\"Chinese\"],\"jobTitle\":\"Founder, CEO\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/zh\\\/author\\\/kelvinyip-m\\\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/11\\\/26\\\/dump-password-from-exe-part2\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Dump password from exe(2) - CyberSecThreat","description":"part two of \"Extract\/Dump password from exe\" series ... what information (e.g. credential) is available in the executable file","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/2020\/11\/26\/dump-password-from-exe-part2\/","og_locale":"zh_TW","og_type":"article","og_title":"Dump password from exe(2)","og_description":"This article is actually part two of \"Extract\/Dump password from exe\" series. In part one, we focused on unpacking executable generated by script","og_url":"https:\/\/cybersecthreat.com\/zh\/2020\/11\/26\/dump-password-from-exe-part2\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_published_time":"2020-11-26T18:44:06+00:00","article_modified_time":"2024-04-01T05:48:39+00:00","og_image":[{"width":1549,"height":202,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png","type":"image\/png"}],"author":"Kelvin Yip","twitter_card":"summary_large_image","twitter_creator":"@cybersecthreat","twitter_site":"@cybersecthreat","twitter_misc":{"\u4f5c\u8005:":"Kelvin Yip","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"23 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#article","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/"},"author":{"name":"Kelvin Yip","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/4787dde06da74fa66cb5e92e481b0f98"},"headline":"Dump password from exe(2)","datePublished":"2020-11-26T18:44:06+00:00","dateModified":"2024-04-01T05:48:39+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/"},"wordCount":1552,"commentCount":0,"publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"image":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png","keywords":["Blue Team","Delphi","Red Team","Reverse Engineering","Visual Studio"],"articleSection":["Blue Team","Red Team","Reverse Engineering"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/","url":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/","name":"Dump password from exe(2) - CyberSecThreat","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png","datePublished":"2020-11-26T18:44:06+00:00","dateModified":"2024-04-01T05:48:39+00:00","description":"part two of \"Extract\/Dump password from exe\" series ... what information (e.g. credential) is available in the executable file","breadcrumb":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings.png","width":1549,"height":202,"caption":"VS2019 VC# MSSQL x64 strings"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Red Team","item":"https:\/\/cybersecthreat.com\/category\/red-team\/"},{"@type":"ListItem","position":2,"name":"Dump password from exe(2)"}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"Person","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/4787dde06da74fa66cb5e92e481b0f98","name":"Kelvin Yip","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/secure.gravatar.com\/avatar\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g","caption":"Kelvin Yip"},"sameAs":["https:\/\/cybersecthreat.com"],"knowsAbout":["CyberSecurity"],"knowsLanguage":["English","Chinese"],"jobTitle":"Founder, CEO","url":"https:\/\/cybersecthreat.com\/zh\/author\/kelvinyip-m\/"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2020\/11\/26\/dump-password-from-exe-part2\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":{"category":[{"value":42,"label":"Blue Team"},{"value":40,"label":"Red Team"},{"value":57,"label":"Reverse Engineering"}],"post_tag":[{"value":21,"label":"Blue Team"},{"value":77,"label":"Delphi"},{"value":17,"label":"Red Team"},{"value":60,"label":"Reverse Engineering"},{"value":76,"label":"Visual Studio"}]},"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/11\/VS2019_VCSharp_SQLTest_x64_strings-1024x134.png",1024,134,true],"author_info":{"display_name":"Kelvin Yip","author_link":"https:\/\/cybersecthreat.com\/zh\/author\/kelvinyip-m\/"},"comment_info":1,"category_info":[{"term_id":42,"name":"Blue Team","slug":"blue-team","term_group":0,"term_taxonomy_id":42,"taxonomy":"category","description":"","parent":0,"count":14,"filter":"raw","cat_ID":42,"category_count":14,"category_description":"","cat_name":"Blue Team","category_nicename":"blue-team","category_parent":0},{"term_id":40,"name":"Red Team","slug":"red-team","term_group":0,"term_taxonomy_id":40,"taxonomy":"category","description":"","parent":0,"count":6,"filter":"raw","cat_ID":40,"category_count":6,"category_description":"","cat_name":"Red Team","category_nicename":"red-team","category_parent":0},{"term_id":57,"name":"Reverse Engineering","slug":"reverse-engineering","term_group":0,"term_taxonomy_id":57,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","cat_ID":57,"category_count":3,"category_description":"","cat_name":"Reverse Engineering","category_nicename":"reverse-engineering","category_parent":0}],"tag_info":[{"term_id":21,"name":"Blue Team","slug":"blue-team","term_group":0,"term_taxonomy_id":21,"taxonomy":"post_tag","description":"","parent":0,"count":13,"filter":"raw"},{"term_id":77,"name":"Delphi","slug":"delphi","term_group":0,"term_taxonomy_id":77,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":17,"name":"Red Team","slug":"red-team","term_group":0,"term_taxonomy_id":17,"taxonomy":"post_tag","description":"","parent":0,"count":6,"filter":"raw"},{"term_id":60,"name":"Reverse Engineering","slug":"reverse-engineering","term_group":0,"term_taxonomy_id":60,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":76,"name":"Visual Studio","slug":"visual-studio","term_group":0,"term_taxonomy_id":76,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/comments?post=736"}],"version-history":[{"count":0,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/1021"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/categories?post=736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/tags?post=736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}