?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
13d6154288922b9109160dc4075e3d51fa09587c40ed53090eb8c2d3b556252d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13d6154288922b9109160dc4075e3d51fa09587c40ed53090eb8c2d3b556252d.exe
Resource
win10v2004-20220812-en
Target
13d6154288922b9109160dc4075e3d51fa09587c40ed53090eb8c2d3b556252d
Size
201KB
MD5
8035833eab9c1e94c4aa89088f2786c0
SHA1
8daaf9ac088037f862e82044bce02bf3dc3904eb
SHA256
13d6154288922b9109160dc4075e3d51fa09587c40ed53090eb8c2d3b556252d
SHA512
b5f373269466cd1a9a1225b83db244730243e9182b8b50a333e3492f79576c1cc7b6ccda787bf4430adeb8921d55af2a047947337f5cdf070cfdf5e5fdcec9f0
SSDEEP
3072:99Mp05QTH1an5f6wXvss6exSEisxEwrK7xUyiYaYRvXulqup1l/4ORCmGumKpw6n:z8TW5iwXvssGnz7GyiamqE4u2qw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IsMenu
LoadBitmapA
IsCharLowerA
GetProcessWindowStation
GetActiveWindow
GetClassLongA
PathIsSameRootA
PathGetDriveNumberA
StrToIntW
StrPBrkW
UrlCompareA
UrlGetPartA
StrCSpnA
PathMakePrettyA
PathIsRootW
ChrCmpIA
PathIsPrefixA
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ