?GdiOutput@@YGXUverifyEw@CA7
?LockingPick@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
aba787634773753e307547ab498981932297381c72a7647c661e02a6420076d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aba787634773753e307547ab498981932297381c72a7647c661e02a6420076d1.exe
Resource
win10v2004-20221111-en
Target
aba787634773753e307547ab498981932297381c72a7647c661e02a6420076d1
Size
201KB
MD5
39bc3814e535801a92db635bc43fdc80
SHA1
4e0cf2aec3cca97ba5c9e3244c5cf1bd5170c789
SHA256
aba787634773753e307547ab498981932297381c72a7647c661e02a6420076d1
SHA512
796ff39dfc2994cfaa6b2fe4d82b56542627dbcb687963bbf86ad7d3bf9e9310bada8c52c3108664d0ce9bd162e6ae20b94c9c84971df446ccf8079f882e961c
SSDEEP
3072:8XSoiCJLu37cmavQH0UAkZJcYcvYgoccdARpHbdSeIhqbt8hR55R:QE0URiggoc4IURhqJ8hRT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UrlIsW
UrlGetPartA
PathUndecorateW
StrStrA
StrRChrW
StrStrW
GetForegroundWindow
GetCaretPos
GetMessagePos
GetClassLongW
IsDlgButtonChecked
IsCharUpperW
GetCurrentDirectoryW
?GdiOutput@@YGXUverifyEw@CA7
?LockingPick@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ