?RestrictReason##YGPAXU_FILETIME###Z
?SeasonProgress@@YGPAXU_FILETIME@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.PornoAsset.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Ransom.Win32.PornoAsset.exe
Resource
win10v2004-20220901-en
Target
HEUR-Trojan-Ransom.Win32.PornoAsset.vho-58dac6b6eb22f02ca5bc4a3a9fd523d56e114933b4369ee5b90fec42555871db
Size
180KB
MD5
afc11332d3137ba33ed46fc424b0e375
SHA1
72e759accc0c6ee1e967bf0d8a5dd35206588b5c
SHA256
58dac6b6eb22f02ca5bc4a3a9fd523d56e114933b4369ee5b90fec42555871db
SHA512
855b7f44a7f58e1df5e0e6da9cb48e9223657061edce2d1d722acf38a8478ce8f7e27e2d8a2c18426da79ff9d81a998eafe91ab5bac1974e498d772e07d07bb4
SSDEEP
3072:aRtKB/CTJCz9FoEV6YqbL6uc0jil+/bO/PvYCcW64x1pMUcwa6i/ZHfxbJZ5:WtK1CTEFoga6ucR2bOPMW6B7UsNxbJP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VkKeyScanA
LoadLibraryA
?RestrictReason##YGPAXU_FILETIME###Z
?SeasonProgress@@YGPAXU_FILETIME@@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ