SAxecrv
ServiceRouteEx
Sexecrv
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
29cfa237e0676bb37a6e9aa7c8cdfcab650c77e0a8fefed4a2e1a4fead1b96b1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
29cfa237e0676bb37a6e9aa7c8cdfcab650c77e0a8fefed4a2e1a4fead1b96b1.dll
Resource
win10v2004-20221111-en
Target
29cfa237e0676bb37a6e9aa7c8cdfcab650c77e0a8fefed4a2e1a4fead1b96b1
Size
24KB
MD5
232370520b1f7b2b2eccd7b96941a9a0
SHA1
5d15d98824b4308b28565960d02fff0c403f03f0
SHA256
29cfa237e0676bb37a6e9aa7c8cdfcab650c77e0a8fefed4a2e1a4fead1b96b1
SHA512
6a2d2fadae4efe1931a270e60711b91d8c3c515205361efa2d1c7b58bdcd9b20b829ea71fc2f6f417fdfc461691b0dfac02368669d0cb684b658aef3d448e690
SSDEEP
192:+mRuK9TQkEmYjT/iZuQS0puBBQ6PRQkJbZBdi2IVjavI:HuAQkpYXiYpiuBBQARQkBdiHGvI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetEvent
WriteProcessMemory
WaitForSingleObject
MultiByteToWideChar
GetCurrentDirectoryA
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
lstrlenA
Sleep
WideCharToMultiByte
lstrcatA
GetPrivateProfileStringA
VirtualProtect
CloseHandle
CreateThread
GetModuleFileNameA
SetWindowsHookExA
wsprintfA
SetTimer
KillTimer
CallNextHookEx
UnhookWindowsHookEx
gethostname
send
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
_adjust_fdiv
malloc
_initterm
free
strrchr
strcmp
fopen
fputs
fread
fclose
memcmp
strlen
memset
strcpy
strcat
_strlwr
_itoa
SAxecrv
ServiceRouteEx
Sexecrv
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ