DLD
MSplg7
Static task
static1
Behavioral task
behavioral1
Sample
fcaa1f0f02e74ad10ef48c6304d7f9edc93918314e2d7e1990384c708d15b7ac.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fcaa1f0f02e74ad10ef48c6304d7f9edc93918314e2d7e1990384c708d15b7ac.dll
Resource
win10v2004-20220901-en
Target
fcaa1f0f02e74ad10ef48c6304d7f9edc93918314e2d7e1990384c708d15b7ac
Size
6KB
MD5
29dae574e92b06d559b860cf1b787d40
SHA1
a4759618cbb03f6e1f27e80aa1e1efa8ae7b50c5
SHA256
fcaa1f0f02e74ad10ef48c6304d7f9edc93918314e2d7e1990384c708d15b7ac
SHA512
a64781bff596e9d68dab28ca04ce03304782156272e5a9286167e7277d3b79abc80f4704182e9f216f6f691605952612b66e192cb6879298deca8dbe1b8a0bcd
SSDEEP
96:rqoaixhR1n7zEGzbE7dLq2r0CtS4kOSBagVdYf/:uhiPj7CdLq2r0C2vY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
wsprintfA
CreateProcessA
CreateThread
DeviceIoControl
ExitThread
GetLocalTime
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GlobalAddAtomA
GlobalFindAtomA
LoadLibraryA
CreateFileA
RtlZeroMemory
Sleep
VirtualAlloc
CloseHandle
_llseek
_lread
_lwrite
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
OpenProcess
VirtualProtectEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
InternetConnectA
HttpOpenRequestA
WSAStartup
connect
gethostbyname
recv
send
socket
DLD
MSplg7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ