Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
c64eae0afd014b50ba04e651228cb31235ff1b968efd0d24da039aa343b86b89.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c64eae0afd014b50ba04e651228cb31235ff1b968efd0d24da039aa343b86b89.exe
Resource
win10v2004-20220812-en
Target
c64eae0afd014b50ba04e651228cb31235ff1b968efd0d24da039aa343b86b89
Size
119KB
MD5
694ab122c4030b3d385cc0b932d3446a
SHA1
8ede303a6205f010367d1096f487d46474d774ee
SHA256
c64eae0afd014b50ba04e651228cb31235ff1b968efd0d24da039aa343b86b89
SHA512
2657d79b06567683202c5b23d6358a9cf7299f6adc8818a3753608a20a3ad6f952a03d5fa0caa39556603a3da2b8fcf5fc9e4d747d784b790832fe93a01e6454
SSDEEP
3072:oxERpAyFgMn5OlYEg1Qq6y3WyORCiprSYvKS7ONjY8AAtJjI:0iOyFF5ONkCyfipBiNnxtJj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ