?ExpandEnvironmentSampleStringsA@567GPAUHINSTANCE__@@U_COMMPROP@@?F
?ExpandEnvironmentSampleStringsW@567GPAUHINSTANCE__@@U_COMMPROP@@?F
?ZeroAccesA@567GPAUHINSTANCE__@@U_COMMPROP@@?F
?ZeroAccesW@567GPAUHINSTANCE__@@U_COMMPROP@@?F
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.PornoAsset.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Ransom.Win32.PornoAsset.exe
Resource
win10v2004-20220901-en
Target
HEUR-Trojan-Ransom.Win32.PornoAsset.pef-edaee1e705185ec9222641dd47eea02e5ba52c98872ac74fda9ef617d9a93396
Size
191KB
MD5
858e9b76249d9c96bf5f50ed9d1090a0
SHA1
57ede2c6cc49921a471726e21be15c0b34e1c615
SHA256
edaee1e705185ec9222641dd47eea02e5ba52c98872ac74fda9ef617d9a93396
SHA512
66f3c1a9742013d24a872a9c7febe8a70b49d3a1cad825baed28c3adceb579be5d3392d4ae6f3544d995be90318851471413a117626d3d86312f984f4c4fbceb
SSDEEP
3072:n3tIab6HxH7fws687yDiu7FlGmUiTEAmtKr+EsQVzB3GqP3m+PuA1fS:ncHbC87yWUQOTEAgKDsCpGKuAl
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathStripPathW
StrToIntA
GetModuleHandleA
lstrlenA
LoadLibraryExW
CreatePropertySheetPageA
?ExpandEnvironmentSampleStringsA@567GPAUHINSTANCE__@@U_COMMPROP@@?F
?ExpandEnvironmentSampleStringsW@567GPAUHINSTANCE__@@U_COMMPROP@@?F
?ZeroAccesA@567GPAUHINSTANCE__@@U_COMMPROP@@?F
?ZeroAccesW@567GPAUHINSTANCE__@@U_COMMPROP@@?F
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ