gytfredwse
ServiceMain
rftgyhujk
Static task
static1
Behavioral task
behavioral1
Sample
d4f709a81714cf910836fe2ada83d325ff12a9339c06da95f7e5603b05700daf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d4f709a81714cf910836fe2ada83d325ff12a9339c06da95f7e5603b05700daf.dll
Resource
win10v2004-20221111-en
Target
d4f709a81714cf910836fe2ada83d325ff12a9339c06da95f7e5603b05700daf
Size
49KB
MD5
85d7899ae7582b653462b4c95f35d169
SHA1
67cb44369947519c665c93323e83043c9d9c94d5
SHA256
d4f709a81714cf910836fe2ada83d325ff12a9339c06da95f7e5603b05700daf
SHA512
b4e26d15fc8e9756801544f26a68688b86965984576a8ebc11a3a431ba3e8e6cb1fd01672bc1f2b673d6646ed159305e8caece218c8b83295d80e77b9784b3b2
SSDEEP
1536:IoXxpnrmZIWdcAye+kL5RLNWGkWmrz2ErYjn:NDytcAyeR5RLNsrz2ErYjn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ShellExecuteA
ExitWindowsEx
CreateStreamOnHGlobal
GetModuleFileNameExA
malloc
RegCloseKey
listen
ImmReleaseContext
waveInUnprepareHeader
DeleteObject
StrCmpW
capCreateCaptureWindowA
gytfredwse
ServiceMain
rftgyhujk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE