Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
7ab462041d0d48cd5004883a313bd8f0239d55ed3959adb34614d6f2c18990a7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ab462041d0d48cd5004883a313bd8f0239d55ed3959adb34614d6f2c18990a7.dll
Resource
win10v2004-20221111-en
Target
7ab462041d0d48cd5004883a313bd8f0239d55ed3959adb34614d6f2c18990a7
Size
116KB
MD5
1219539c48d68bbcc9ddc8764bebdc40
SHA1
c5fd8b441da5abbd7057056cd43cb1b1918ba7e6
SHA256
7ab462041d0d48cd5004883a313bd8f0239d55ed3959adb34614d6f2c18990a7
SHA512
7c1b44b3c23adbc6aa8e0cf3a27d0d0677ede12469622b1ed15c18f613d6f07952f186c0f9ee968f3a72be3c9e4923e03dcc7dd8022070785bb57be00fe42c69
SSDEEP
3072:mjrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:d5ULTh1hUtRc+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ