Jxibnxw
Ltnkr
Qnwubwy
Static task
static1
Behavioral task
behavioral1
Sample
ef09307290314aa8b9d45dff4ce45bc30d85147cb087c90f5e711b8772f0ac94.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef09307290314aa8b9d45dff4ce45bc30d85147cb087c90f5e711b8772f0ac94.dll
Resource
win10v2004-20221111-en
Target
ef09307290314aa8b9d45dff4ce45bc30d85147cb087c90f5e711b8772f0ac94
Size
204KB
MD5
c058e086cb02638c899e50eac7d24ef3
SHA1
52f8b7c6cf59632c41bcd0ea0a9fafe16747e8ae
SHA256
ef09307290314aa8b9d45dff4ce45bc30d85147cb087c90f5e711b8772f0ac94
SHA512
7b52b6e9cb6e10c25a04572ad7f3409ba33f9c29b95907342197bd994161867c43fd3fe923fd8a7188d918f91f0095f14dfc35a838be4e43625446c09246b09b
SSDEEP
3072:WTcX3qe6oZKyh++ZyVIJ4MSY1xyESEJNXo:3qe7Mu+6oIL1R7X
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ExitProcess
GetCommandLineA
GetDateFormatA
GetStartupInfoA
GetVersionExA
MapViewOfFile
RtlUnwind
SetLastError
UnmapViewOfFile
VirtualFree
lstrlenA
GetMessageA
LoadCursorFromFileA
OemToCharW
SetFocus
CharUpperBuffA
CharPrevA
RegLoadKeyA
RegEnumKeyA
RegOpenKeyExA
OleUninitialize
GetRunningObjectTable
ReadClassStg
WriteClassStm
OleDuplicateData
OleInitialize
CLSIDFromString
CoCreateInstance
CoGetClassObject
CoInitialize
CoRegisterClassObject
CoRegisterMessageFilter
CoResumeClassObjects
CoRevokeClassObject
CoUninitialize
CreateBindCtx
InternetReadFile
InternetSetOptionExA
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetGetCookieA
InternetCrackUrlA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
ShellExecuteW
ShellExecuteExW
SHBindToParent
Jxibnxw
Ltnkr
Qnwubwy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ