gytfredwse
ServiceMain
rftgyhujk
Static task
static1
Behavioral task
behavioral1
Sample
f0aea66f8ba2a59f2e86f2be847afaee101afec13dbb01f8e8c8f7b133e70ae4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0aea66f8ba2a59f2e86f2be847afaee101afec13dbb01f8e8c8f7b133e70ae4.dll
Resource
win10v2004-20220812-en
Target
f0aea66f8ba2a59f2e86f2be847afaee101afec13dbb01f8e8c8f7b133e70ae4
Size
43KB
MD5
7267c178a3b5bd33d24dfa858f47bc0b
SHA1
e8177dc815864f1ffcbe9f90322355e706597a34
SHA256
f0aea66f8ba2a59f2e86f2be847afaee101afec13dbb01f8e8c8f7b133e70ae4
SHA512
82846fd12d731cb17768f75ea6592a1afe837b8a32da6ccc1aeba9a0905c043ef7cd604ad42e5f43a6e9dd06935b6ff4b8277e6d12d15738cde10ce59b7495a4
SSDEEP
768:XkuQ3/Uc/d9NjUxJnF7MA1pzV72PHylLnYRoj54EYaQWxj:XkuwHF9NjWoAvz4viLnvd4EYLWxj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
capCreateCaptureWindowA
ExitWindowsEx
StrCmpW
malloc
RegCloseKey
ShellExecuteA
listen
GetModuleFileNameExA
ImmReleaseContext
DeleteObject
CreateStreamOnHGlobal
waveInUnprepareHeader
gytfredwse
ServiceMain
rftgyhujk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE