Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
cfb46747f09ef0ff1aa1e2cd7e8c2202855e5981929fabe9d4d438fbccaef0b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfb46747f09ef0ff1aa1e2cd7e8c2202855e5981929fabe9d4d438fbccaef0b9.exe
Resource
win10v2004-20220901-en
Target
cfb46747f09ef0ff1aa1e2cd7e8c2202855e5981929fabe9d4d438fbccaef0b9
Size
110KB
MD5
7560771834a0d9ade6024078d9611140
SHA1
13b2333b41afc9f592c7e91bf7cba32a8dda63c2
SHA256
cfb46747f09ef0ff1aa1e2cd7e8c2202855e5981929fabe9d4d438fbccaef0b9
SHA512
744da7e96009c9c9e06037c82e4c35434d0f14d8d06cb89fdca9bb5f10116ba5a54a696fbc8a5f544f308a665a16247790a87edd0635c7b8c3a52aa9bd9983bf
SSDEEP
3072:qIUXnU97ufgjTgr1778rH+4dkjqpaL2NKsaH/SP:qIoUAIgr1/8rH+4dyeNKf/S
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ