Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
08d439e00d85a786c95d612110a45f41.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08d439e00d85a786c95d612110a45f41.dll
Resource
win10v2004-20231215-en
Target
08d439e00d85a786c95d612110a45f41
Size
110KB
MD5
08d439e00d85a786c95d612110a45f41
SHA1
38737c0177bd55aefbc294b4a1a05ed5dd083f7b
SHA256
79e3535b9c77e7aa1cbd88bc94120d7d3b689e9321162a5d3bf9041db742f8f0
SHA512
45e55553d38702478262c673bc8b1000b9cd503448e717a3cb5d0ffc70f140f05eeca857dfef4c8ccb956c5babbbb294b1414a19e2f63f48dc01e38ed41e70f5
SSDEEP
3072:zIUXnU97ufgjTgr1778rH+4dkjqpaL2NKsaH/SP:zIoUAIgr1/8rH+4dyeNKf/S
Checks for missing Authenticode signature.
resource |
---|
08d439e00d85a786c95d612110a45f41 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ