GL_ZIPCompress
GL_ZIPUncompress
Static task
static1
Behavioral task
behavioral1
Sample
d263a582b19201ba5c2846ab17f3eda31f28aca315fa22fb78d7774fb9e7ad93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d263a582b19201ba5c2846ab17f3eda31f28aca315fa22fb78d7774fb9e7ad93.exe
Resource
win10v2004-20220901-en
Target
d263a582b19201ba5c2846ab17f3eda31f28aca315fa22fb78d7774fb9e7ad93
Size
692KB
MD5
0aaf14915881c2ca6d40dc6371996ac8
SHA1
e5ce43f07a383fc39df2d8c84e2a66c08abd82f5
SHA256
d263a582b19201ba5c2846ab17f3eda31f28aca315fa22fb78d7774fb9e7ad93
SHA512
b8825ca2544c2f28139bfb9ab544eb821d90a358f0776445e1ff0a03190b5c13044acc8c60835540c068820010a5c0f29b7030b0dcd9d3f81aaf2d7b27f4f64b
SSDEEP
12288:n0DSh8ZviCGQybvwO5gXdddONNN9NNN8Bz01QgGvyhhWx2foVjD2oXfRPbfDYa2L:hrQMvd5Hwng
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord656
ord6438
ord2575
ord4396
ord3402
ord3574
ord3610
ord2135
ord818
ord2370
ord2688
ord665
ord6241
ord1979
ord6385
ord2915
ord5186
ord354
ord6334
ord6880
ord2642
ord6215
ord3797
ord5981
ord4224
ord6007
ord1988
ord5356
ord5808
ord5204
ord3229
ord690
ord1228
ord389
ord6059
ord1074
ord1075
ord3584
ord543
ord803
ord3742
ord4275
ord1949
ord4034
ord1175
ord5572
ord5651
ord3127
ord3616
ord3126
ord3613
ord2614
ord5442
ord3318
ord5683
ord4376
ord4853
ord2714
ord5873
ord6157
ord289
ord613
ord4476
ord6282
ord6605
ord6453
ord3092
ord6172
ord5789
ord3873
ord1576
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord609
ord2379
ord5220
ord296
ord617
ord2725
ord5289
ord6143
ord5583
ord941
ord2864
ord5608
ord922
ord4202
ord4129
ord6662
ord4204
ord2764
ord924
ord858
ord3337
ord3811
ord2818
ord860
ord535
ord1134
ord2621
ord5214
ord823
ord5710
ord6877
ord926
ord939
ord561
ord541
ord533
ord815
ord801
ord798
ord3738
ord4622
ord5714
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord4274
ord4673
ord3998
ord2976
ord3361
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord640
ord641
ord323
ord324
ord1168
ord3619
ord3626
ord3663
ord825
ord2414
ord3571
ord1146
ord6379
ord567
ord3640
ord4424
ord3370
ord5290
ord4402
ord1776
ord6055
ord2582
ord470
ord537
ord755
ord6883
ord6675
ord3301
ord1200
ord2645
ord6663
ord4278
ord6907
ord6888
ord4299
ord6199
ord5875
ord6197
ord6378
ord2452
ord4710
ord1641
ord3706
ord1640
ord5785
ord2860
ord2859
ord2446
ord2405
ord693
ord540
ord800
ord4160
ord5265
ord2754
ord4022
ord1792
ord1795
ord3874
ord2302
ord4234
atoi
_mbschr
_mbscmp
_except_handler3
__set_app_type
_purecall
_strcmpi
_snprintf
printf
strstr
_stricmp
_strnicmp
memset
sprintf
realloc
memmove
vsprintf
memcpy
strlen
free
_strdup
malloc
_ftol
__CxxFrameHandler
_mbsnbcpy
_ftime
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcslen
_CxxThrowException
_strlwr
isdigit
isxdigit
strchr
_setmbcp
??1type_info@@UAE@XZ
_onexit
__dllonexit
strcat
strrchr
strncpy
strcpy
strncmp
memcmp
strcmp
fclose
fopen
wcscmp
_wtoi
_mbsicmp
atol
rename
_itoa
calloc
_controlfp
_lclose
GetFileSize
ReadFile
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LocalFree
_lread
_llseek
_lopen
lstrcpynA
IsDBCSLeadByte
GetStartupInfoA
MoveFileExA
WritePrivateProfileStringA
MoveFileA
DeleteFileA
CopyFileA
RemoveDirectoryA
OpenProcess
GetShortPathNameA
InterlockedIncrement
LoadLibraryExA
GetFileTime
CompareFileTime
GetVersion
GetWindowsDirectoryA
GetSystemDirectoryA
ResumeThread
SuspendThread
CreateThread
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualQuery
lstrlenA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
GetDriveTypeA
GetCurrentProcess
GetTempPathA
GetTempFileNameA
CreateProcessA
WaitForSingleObject
FindFirstFileA
FindClose
FindNextFileA
InterlockedDecrement
CreateDirectoryA
GetFileAttributesA
GetPrivateProfileIntA
GetPrivateProfileStringA
SetCurrentDirectoryA
Sleep
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
CreateFileA
DeviceIoControl
CloseHandle
GetSystemMetrics
SetRectEmpty
IntersectRect
IsRectEmpty
SendMessageA
LoadBitmapA
LoadIconA
ChildWindowFromPointEx
GetParent
SetWindowRgn
GetWindowDC
DrawIconEx
ScreenToClient
PostQuitMessage
GetDesktopWindow
InvalidateRect
PostMessageA
SetForegroundWindow
GetWindowRect
ExitWindowsEx
FindWindowExA
SetTimer
KillTimer
SendMessageTimeoutA
FindWindowA
wsprintfA
OffsetRect
SetRect
CopyRect
InflateRect
GetClientRect
GetDC
ReleaseDC
GetFocus
SetCapture
ReleaseCapture
SetFocus
EnableWindow
GetCursorPos
CreateCursor
SetCursor
GetCapture
IsZoomed
SystemParametersInfoA
SetActiveWindow
SetWindowLongA
GetActiveWindow
GetKeyState
PtInRect
SetStretchBltMode
GetStockObject
CreateDIBSection
StretchBlt
SelectPalette
RealizePalette
ExtCreateRegion
DeleteDC
GetDeviceCaps
CreatePalette
CreateRectRgn
OffsetRgn
CombineRgn
DeleteObject
CreateFontIndirectA
GetObjectA
CreateCompatibleBitmap
CreateRoundRectRgn
CreateCompatibleDC
BitBlt
GetTextExtentPoint32A
SelectObject
CreateBitmap
SetDIBitsToDevice
CreateFontA
TextOutA
CreateSolidBrush
CreateDIBitmap
RegQueryInfoKeyA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyExA
RegSetValueA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegFlushKey
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetSpecialFolderPathA
SHChangeNotify
ShellExecuteA
SHGetFolderPathA
SHGetSpecialFolderLocation
OleRun
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoCreateInstance
SysAllocStringByteLen
SysStringByteLen
VariantClear
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SysAllocString
VariantInit
VariantChangeType
VariantCopy
SysStringLen
GetErrorInfo
SysFreeString
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?data@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Doraise@runtime_error@std@@MBEXXZ
?what@runtime_error@std@@UBEPBDXZ
??0runtime_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??1runtime_error@std@@UAE@XZ
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
PlaySoundA
WSACleanup
WSAStartup
gethostname
gethostbyname
inet_addr
SHDeleteEmptyKeyA
SHDeleteKeyA
PathCombineA
PathAddExtensionA
PathAppendA
PathIsDirectoryA
PathFileExistsA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ord251
GL_ZIPCompress
GL_ZIPUncompress
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ