?FormFactor@@YGXUverifyEw@CA7
?FormWeight@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
d81069a06d0da6dbc0478f330c782c9c2ecd9dbbedc09f05431f7c93c56d30e7.exe
Resource
win7-20220812-en
Target
d81069a06d0da6dbc0478f330c782c9c2ecd9dbbedc09f05431f7c93c56d30e7
Size
95KB
MD5
81f0ce6cb76965f6d7d8a31eae655920
SHA1
927aee8c955f138b96f696fb98b2ab44f83cdcc6
SHA256
d81069a06d0da6dbc0478f330c782c9c2ecd9dbbedc09f05431f7c93c56d30e7
SHA512
b98c876d5811b32c0aef1286ab143876622d9a3fa870f20f7a82a5bf7b3d0c7d77eda46c45962c35c89ec5e68119254c722c2283c1fe1fdf347d7dc64cdd8b9d
SSDEEP
1536:QPsQ6vyUSR9WTiV9aN6qbKXK1A7qMIZzLel34hFDP7bkRVCMwJoZKwj5HHHLIKK:QPsQm/SR9WTiVc6qbK61Y7kzW3EDylw4
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetClassLongA
IsCharLowerA
GetProcessWindowStation
LoadBitmapA
IsMenu
GetActiveWindow
lstrcatA
UrlIsOpaqueW
UrlGetPartA
StrCSpnA
UrlIsOpaqueA
PathIsRootA
StrChrIW
StrCmpIW
PathIsFileSpecW
PathIsURLW
PathGetDriveNumberA
StrToIntW
StrStrA
?FormFactor@@YGXUverifyEw@CA7
?FormWeight@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ