?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
47caa807da8915c72957baf52364d63519b278a9aa88497bd0394f4e844086e0.exe
Resource
win7-20220812-en
Target
47caa807da8915c72957baf52364d63519b278a9aa88497bd0394f4e844086e0
Size
98KB
MD5
1af032045befbdc72b6347bbcf0c3780
SHA1
59ec075b25990ddd6f2dad3655fcff17db026698
SHA256
47caa807da8915c72957baf52364d63519b278a9aa88497bd0394f4e844086e0
SHA512
70eb2413ddab71bef132fe77906707b0ea02da24dace5227551715f3998d4944bd6e9ebed270aa0ab7290435b5bb9eaf522af2f79b0bd876dc1aedd4b3120dde
SSDEEP
3072:L8imlKe1CwzDyXuL8tTNdpshfFAXZX8isybfN:L8dlKMp8RNdChfyX83ybF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrPBrkA
UrlCompareA
StrCmpNW
PathIsRootW
PathIsSameRootA
ChrCmpIA
StrStrW
PathGetDriveNumberA
ord29
UrlGetPartA
lstrcatA
IsMenu
GetProcessWindowStation
GetActiveWindow
IsCharLowerA
GetClassLongA
LoadBitmapA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ