EpjpwOrp
CrgkGcdwIv
LbUcwfEsbkqVasbOp
Gwet
UbFzftUasxSid
Static task
static1
Behavioral task
behavioral1
Sample
bc13d57582f4328dcfa24b80959ac9f5000a7207c24f881d85ea02af1d2e168e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc13d57582f4328dcfa24b80959ac9f5000a7207c24f881d85ea02af1d2e168e.exe
Resource
win10v2004-20220812-en
Target
bc13d57582f4328dcfa24b80959ac9f5000a7207c24f881d85ea02af1d2e168e
Size
63KB
MD5
12c5f0f6e275b515c7cfcc26748a5b82
SHA1
08d89712eac855ab59e6c591c020e041ce752376
SHA256
bc13d57582f4328dcfa24b80959ac9f5000a7207c24f881d85ea02af1d2e168e
SHA512
4580953973a8c3b2f4998646848dbf1db5fc22dcae478b57c449b87358c0ff3044d5e0f6b2a81717aa2798b1aae7d48f8171d123cf6292785cbeb8d4c0a64aa8
SSDEEP
1536:3z4aVxdDgtWzYcyKC2sKVOFfhhp9EQMwVJzP5AtTm:3vTdDgXcyZ2LVOzaRwJ9Atq
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetLastError
CopyFileA
DisableThreadLibraryCalls
GetStdHandle
GetFileSizeEx
GetModuleHandleA
LocalReAlloc
GetShortPathNameA
OutputDebugStringA
CopyFileExA
CreateDirectoryW
VerLanguageNameA
ExitProcess
LoadLibraryA
CreateDirectoryA
Beep
VirtualProtect
VirtualAlloc
LocalHandle
FlushViewOfFile
GetCurrentDirectoryW
_putws
_mbscmp
strrchr
_wfullpath
fputws
sprintf
_inp
__set_app_type
_wmktemp
?what@exception@@UBEPBDXZ
memcpy
_adj_fdiv_m16i
_getdiskfree
_wtol
isalnum
ungetwc
getc
__p___mb_cur_max
_fdopen
_mbsncoll
DispatchMessageW
EnumDesktopWindows
RemoveMenu
SetForegroundWindow
MapWindowPoints
TranslateMessage
AppendMenuW
ModifyMenuA
GetDlgItem
GetPropW
LoadCursorW
SetDlgItemInt
GetWindowTextLengthW
MonitorFromWindow
LoadCursorFromFileA
TranslateAcceleratorW
GetWindowRect
LoadStringA
CheckMenuRadioItem
OpenClipboard
SendMessageW
GetParent
GetTextMetricsW
CreateDIBSection
SetBkColor
GetStockObject
SetDIBits
SetMapMode
SetStretchBltMode
ExtCreatePen
GetTextFaceW
GetObjectW
SetBkMode
CreateRectRgn
CreatePatternBrush
CreateRectRgnIndirect
SetPaletteEntries
GetNearestColor
CreateCompatibleDC
GetBrushOrgEx
GetTextExtentPoint32W
EpjpwOrp
CrgkGcdwIv
LbUcwfEsbkqVasbOp
Gwet
UbFzftUasxSid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ