SAxecrv
ServiceRouteEx
Sexecrv
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
a25a1d35f5dafe297e01119013020129b78442f2cc747715848cd95def889d47.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a25a1d35f5dafe297e01119013020129b78442f2cc747715848cd95def889d47.dll
Resource
win10v2004-20221111-en
Target
a25a1d35f5dafe297e01119013020129b78442f2cc747715848cd95def889d47
Size
24KB
MD5
60efa8767166035b021207361f25d5c6
SHA1
1e9a95ce15f36a6c97d08bdaa3f56958bc214a4d
SHA256
a25a1d35f5dafe297e01119013020129b78442f2cc747715848cd95def889d47
SHA512
94ab714d74ac2287199882505fe568d931290fe7cd4ad0e304e4e0a21419b5e7d2e85f98bece7b2c54fa39669f132f9166487ecd43b9ca0a663a953b00d45d6b
SSDEEP
192:+6iYQ46Gml30OZpI+ytaFerpjuBBQ6PRQkJbJB8K6IVjwFIu:NlQ4Al32+yt+erxuBBQARQkx8KTkFI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetEvent
WriteProcessMemory
WaitForSingleObject
MultiByteToWideChar
GetCurrentDirectoryA
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
lstrlenA
Sleep
WideCharToMultiByte
lstrcatA
GetPrivateProfileStringA
VirtualProtect
CloseHandle
CreateThread
GetModuleFileNameA
SetWindowsHookExA
wsprintfA
SetTimer
KillTimer
CallNextHookEx
UnhookWindowsHookEx
gethostname
send
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
_adjust_fdiv
malloc
_initterm
free
strrchr
strcmp
fopen
fputs
fread
fclose
memcmp
strlen
memset
strcpy
strcat
_strlwr
_itoa
SAxecrv
ServiceRouteEx
Sexecrv
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ