?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
5d954934e927e2f0a18370d1bb004754415ad1f8b065e7d2a279254492b7dd13.exe
Resource
win7-20220812-en
Target
5d954934e927e2f0a18370d1bb004754415ad1f8b065e7d2a279254492b7dd13
Size
98KB
MD5
84a915cefc830517af95e5abf61764f0
SHA1
337cd56576703020bf572336fbe9b9c2ccaebf5d
SHA256
5d954934e927e2f0a18370d1bb004754415ad1f8b065e7d2a279254492b7dd13
SHA512
e8d975a38697f798898dbf492890ef6e3400dafdd3d0baa3bb481493f626715498f0ecb3fb495ff0282c0a16b7bc5c224bb6f30c9de5ca9d83c5b1f1f05aa3df
SSDEEP
3072:98imlKe1CwzDyXuL8tTNdpshfFAXZX8isybfN:98dlKMp8RNdChfyX83ybF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrPBrkA
UrlCompareA
StrCmpNW
PathIsRootW
PathIsSameRootA
ChrCmpIA
StrStrW
PathGetDriveNumberA
ord29
UrlGetPartA
lstrcatA
IsMenu
GetProcessWindowStation
GetActiveWindow
IsCharLowerA
GetClassLongA
LoadBitmapA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ