Jxibnxw
Ltnkr
Qnwubwy
Static task
static1
Behavioral task
behavioral1
Sample
c541a8bb2de4119b0d15a94c9a3cff18281a22190cf8c032f4a62c187278d95c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c541a8bb2de4119b0d15a94c9a3cff18281a22190cf8c032f4a62c187278d95c.dll
Resource
win10v2004-20220812-en
Target
c541a8bb2de4119b0d15a94c9a3cff18281a22190cf8c032f4a62c187278d95c
Size
204KB
MD5
ffa5272d0db094e76973247b48ae61d1
SHA1
77bbb8a67e73e273adb95be107bd4c2080d5ab53
SHA256
c541a8bb2de4119b0d15a94c9a3cff18281a22190cf8c032f4a62c187278d95c
SHA512
787d2f7a0c3c560888986141051a4d2b340342d46723ad8e4dcac737ae1a5524ebef4c73ca88955cc058c7bfebce7f4579542d0924e2cc35ea9c534699b7b73c
SSDEEP
3072:WTcX3qe6oZKyh++ZyVIJ4MSY1xyESEJNXo:3qe7Mu+6oIL1R7X
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ExitProcess
GetCommandLineA
GetDateFormatA
GetStartupInfoA
GetVersionExA
MapViewOfFile
RtlUnwind
SetLastError
UnmapViewOfFile
VirtualFree
lstrlenA
GetMessageA
LoadCursorFromFileA
OemToCharW
SetFocus
CharUpperBuffA
CharPrevA
RegLoadKeyA
RegEnumKeyA
RegOpenKeyExA
OleUninitialize
GetRunningObjectTable
ReadClassStg
WriteClassStm
OleDuplicateData
OleInitialize
CLSIDFromString
CoCreateInstance
CoGetClassObject
CoInitialize
CoRegisterClassObject
CoRegisterMessageFilter
CoResumeClassObjects
CoRevokeClassObject
CoUninitialize
CreateBindCtx
InternetReadFile
InternetSetOptionExA
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetGetCookieA
InternetCrackUrlA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
ShellExecuteW
ShellExecuteExW
SHBindToParent
Jxibnxw
Ltnkr
Qnwubwy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ