AutorunThread
DeleteServiceByName
GetCurDoc
InitHook
RandomDw
SaveToFileH
XorByStr
Static task
static1
Behavioral task
behavioral1
Sample
5f1d5ab62e8a5ed2d6fdf36c7a12126b7f438f5186ff7509dd13f9c20dd516d7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5f1d5ab62e8a5ed2d6fdf36c7a12126b7f438f5186ff7509dd13f9c20dd516d7.dll
Resource
win10v2004-20220812-en
Target
5f1d5ab62e8a5ed2d6fdf36c7a12126b7f438f5186ff7509dd13f9c20dd516d7
Size
28KB
MD5
a2a3af5ba3c5570cfc7d47839e580130
SHA1
d77042246de28f636250e9d80a4e408d26a86918
SHA256
5f1d5ab62e8a5ed2d6fdf36c7a12126b7f438f5186ff7509dd13f9c20dd516d7
SHA512
671f9a98139f68a93ca225d15c5eeb749d1b2b8db7ee100ca70517409a6b6808331bf491b01ff47ed087e09c2890ade082d2c5c678d8bc61acfa7f6125d6a8ca
SSDEEP
384:rqFVDz6bErWuw8ZJxFWsvkLrQkQT5YM/BVQdVDxfNPHPPsNFOhYe8pHWM4+lD9Zy:rqFR6uBkrrwKM/BVQJBsNFAWFzvqI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AutorunThread
DeleteServiceByName
GetCurDoc
InitHook
RandomDw
SaveToFileH
XorByStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ