ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
377cc369c02964eda564b758f6d96465f69610960cf1e4273d24b42f3c4b64ee.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
377cc369c02964eda564b758f6d96465f69610960cf1e4273d24b42f3c4b64ee.dll
Resource
win10v2004-20220812-en
Target
377cc369c02964eda564b758f6d96465f69610960cf1e4273d24b42f3c4b64ee
Size
16KB
MD5
4baae65d3cae68fa49cd58dab8cfe340
SHA1
d083bad6c2c1cc5e38d52e95c829cb7b0548e49e
SHA256
377cc369c02964eda564b758f6d96465f69610960cf1e4273d24b42f3c4b64ee
SHA512
c7f4a24d19b9d209da3adeb55ab6654311d0d90f1eb1d74f316010794c74d7b735c7d9319eaa7ebda36a21c611f8fdd80aff2f5980b1502e3a62f7bd3b480853
SSDEEP
384:KZ/XwTJMrtEOdN3zyk7GuBBQARQkLvaMqJJO:KZvQTOdMk9BBQARQkW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_strupr
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
LoadLibraryA
GetSystemDirectoryA
GetPrivateProfileStringA
CreateThread
lstrlenA
WritePrivateProfileStringA
IsBadReadPtr
ExitProcess
lstrcpyA
lstrcmpiA
lstrcmpA
WaitForSingleObject
TerminateThread
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
lstrcatA
ReadFile
VirtualProtectEx
Sleep
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ