Jxibnxw
Ltnkr
Qnwubwy
Static task
static1
Behavioral task
behavioral1
Sample
97965a0e822692aacae9c8fe7267f1273b83c30478b1d6a1c4d715c8c439cafc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97965a0e822692aacae9c8fe7267f1273b83c30478b1d6a1c4d715c8c439cafc.dll
Resource
win10v2004-20221111-en
Target
97965a0e822692aacae9c8fe7267f1273b83c30478b1d6a1c4d715c8c439cafc
Size
204KB
MD5
83c978028e38492fb52f949d146739b0
SHA1
b38cc5a3c1273da1f5fe0979d325d28df83c2e53
SHA256
97965a0e822692aacae9c8fe7267f1273b83c30478b1d6a1c4d715c8c439cafc
SHA512
5b4df225460af2b4fc924014ef256742eae6e4935e703ff41dca4cc2c6db3f5e9e689a0313ede677852d6e56f840e9c853a0056e7e9b1b630e4cfc46c8508df2
SSDEEP
3072:WTcX3qe6oZKyh++ZyVIJ4MSY1xyESEJNXo:3qe7Mu+6oIL1R7X
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ExitProcess
GetCommandLineA
GetDateFormatA
GetStartupInfoA
GetVersionExA
MapViewOfFile
RtlUnwind
SetLastError
UnmapViewOfFile
VirtualFree
lstrlenA
GetMessageA
LoadCursorFromFileA
OemToCharW
SetFocus
CharUpperBuffA
CharPrevA
RegLoadKeyA
RegEnumKeyA
RegOpenKeyExA
OleUninitialize
GetRunningObjectTable
ReadClassStg
WriteClassStm
OleDuplicateData
OleInitialize
CLSIDFromString
CoCreateInstance
CoGetClassObject
CoInitialize
CoRegisterClassObject
CoRegisterMessageFilter
CoResumeClassObjects
CoRevokeClassObject
CoUninitialize
CreateBindCtx
InternetReadFile
InternetSetOptionExA
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetGetCookieA
InternetCrackUrlA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
ShellExecuteW
ShellExecuteExW
SHBindToParent
Jxibnxw
Ltnkr
Qnwubwy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ