?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
b87742f2b4ed26a63c5e3d9ab6c3be265c1351797457ddefa436ca0f5bd9671a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b87742f2b4ed26a63c5e3d9ab6c3be265c1351797457ddefa436ca0f5bd9671a.exe
Resource
win10v2004-20220901-en
Target
b87742f2b4ed26a63c5e3d9ab6c3be265c1351797457ddefa436ca0f5bd9671a
Size
200KB
MD5
075b1af36d1362ce202d1a81034637c6
SHA1
d5ca97ba69db3c1509aa7121256d572f019a0c93
SHA256
b87742f2b4ed26a63c5e3d9ab6c3be265c1351797457ddefa436ca0f5bd9671a
SHA512
efb8ff7baf251ac84020b61987be3a187049427ad6ebb5ba1e9ee517718ce5cb92e24a7c948f8e2e7a0e7574a2899e12beaabba14587e21114ac648ac05bdefb
SSDEEP
3072:iPV74CwzDyHykTT0W9bjwa+Z6q+pX8cl50uAO/xKtI4lNQlnAXlBmxMjc568:i5WQbHv9bkW5Xj309Oxc7vQlnalLjE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrCmpLogicalW
StrToIntA
StrStrIW
PathIsSameRootA
ChrCmpIW
PathIsRootW
StrPBrkA
PathGetCharTypeW
ord29
UrlGetPartA
UrlCompareA
PathGetDriveNumberW
GetActiveWindow
LoadBitmapA
IsCharLowerA
GetClassLongA
IsMenu
GetProcessWindowStation
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ