mrecv
msend
Static task
static1
Behavioral task
behavioral1
Sample
19eb4348e924fa5e6c396369aecc03ca75f04efcddaff436272a25a06c99b572.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19eb4348e924fa5e6c396369aecc03ca75f04efcddaff436272a25a06c99b572.dll
Resource
win10v2004-20220812-en
Target
19eb4348e924fa5e6c396369aecc03ca75f04efcddaff436272a25a06c99b572
Size
57KB
MD5
527a9ff4b3f69901784a914fd98d70e0
SHA1
abd3f1ebc127dc4c0e813e05334d883175c2e4f0
SHA256
19eb4348e924fa5e6c396369aecc03ca75f04efcddaff436272a25a06c99b572
SHA512
318f8b5ecc566d68f7e2839829ae35bde4dd73493e690a5580d27e8c580e34a19321e9b5f73ebe199b0864d7cb6387872c78f60b702ff623df247f3fb94a6c6f
SSDEEP
768:XefcAZOdvZb/FjCTZbnD/AVOlO9P94ldvoUTeKl+1id:mTZGFjCTZv/AVomV4HoY01W
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateThread
Sleep
OpenProcess
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
GlobalFree
GlobalUnlock
GetCurrentProcess
GlobalAlloc
RtlUnwind
CloseHandle
GetModuleFileNameA
GlobalLock
GetCurrentProcessId
GetCommandLineA
GetVersion
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowTextA
FindWindowA
GetWindowThreadProcessId
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
mrecv
msend
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ