Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
c6051f9c81e60df998114777fcd7cab831597feecf62d23e734eb4889433ce88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6051f9c81e60df998114777fcd7cab831597feecf62d23e734eb4889433ce88.exe
Resource
win10v2004-20220812-en
Target
c6051f9c81e60df998114777fcd7cab831597feecf62d23e734eb4889433ce88
Size
110KB
MD5
83d940d3be40ab395afd4ced0a55da90
SHA1
465f620d94d0025171357cc5674c21548df4ecb9
SHA256
c6051f9c81e60df998114777fcd7cab831597feecf62d23e734eb4889433ce88
SHA512
8b8dba29db7bf10acae43a511b319ecb92bcee21f204db5bf66f14aedf86c6bf668b854642e638843d65f84e88a15605184956c1052e4eeae342702dc9857185
SSDEEP
1536:W6+f9cJ0GBrXF8VoIynSDRN2sR8wjtF8YTwF4+tSn1Aecx4AGC6hnqosdfmGVFPC:qTodSDRUsR8qTwM1AecWc6Jqosdfm4a
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ