Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
de9df8f8863f3509d21d8c352e5f089a08616fccdf71a6b4437edac7c091848f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de9df8f8863f3509d21d8c352e5f089a08616fccdf71a6b4437edac7c091848f.exe
Resource
win10v2004-20220812-en
Target
de9df8f8863f3509d21d8c352e5f089a08616fccdf71a6b4437edac7c091848f
Size
116KB
MD5
65d128d705107e63fe5b722f552895a0
SHA1
bc1dc41e2dcc2d17ef69894c0f0a61735abf9333
SHA256
de9df8f8863f3509d21d8c352e5f089a08616fccdf71a6b4437edac7c091848f
SHA512
89c5510f0d1d1fda95b513a39f9bd3c751a1e49511783bb3da8e881d72e15072f851d86fec027d92dd94ae2d967d33094c3eec85c46d0eacceba7cfcad9597d8
SSDEEP
3072:fjrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:e5ULTh1hUtRc+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ