Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
6d3404a6eec1a50d2801062c588da31c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6d3404a6eec1a50d2801062c588da31c.dll
Resource
win10v2004-20231215-en
Target
6d3404a6eec1a50d2801062c588da31c
Size
116KB
MD5
6d3404a6eec1a50d2801062c588da31c
SHA1
b3784248ec19ce96b576f9f887763d03cc7a3903
SHA256
75f4582914587e04cb77546d5662f4ced0cd428d6a2348a705610f571aeb84da
SHA512
19f82c3518b5d84112d13cad988cf10e21a6bf4e5268166e5c16ad7309e044b57a992e4bde1eb21172da29bb660b4baba26c49c0f2f7daa5e8f6636055556d0c
SSDEEP
3072:2LMNQHRbQ1hg3+tbwEM6i3UweAy0dXCKWozkhB7X:2LMWH+43+JBi3UH09CK3zM
Checks for missing Authenticode signature.
resource |
---|
6d3404a6eec1a50d2801062c588da31c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ