jxgzof
jxgzon
Static task
static1
Behavioral task
behavioral1
Sample
b00c65df704a5a4e4844a4bc322b5fdca1ca2724be896c9c6db2f028a9fe2103.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b00c65df704a5a4e4844a4bc322b5fdca1ca2724be896c9c6db2f028a9fe2103.dll
Resource
win10v2004-20220812-en
Target
b00c65df704a5a4e4844a4bc322b5fdca1ca2724be896c9c6db2f028a9fe2103
Size
19KB
MD5
af1984f38c970f8dbbd4b4a604cb2ccf
SHA1
49ffc1db54d6293585c5eb95ea609c1dc90e777b
SHA256
b00c65df704a5a4e4844a4bc322b5fdca1ca2724be896c9c6db2f028a9fe2103
SHA512
74e27b76172d2f2131f0e28d8790e95976a1fbd4fbfb3465195c434d640b32e59684707e0bdca63984a108c43c189c7d7b11b75ec1d4facfa5f88fd9a8936062
SSDEEP
384:WYQy4lCxirMG8MLDD8XApa/pzk4DsqcoFBYWM:2rr8iD8X4ep44IvoFe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrlenA
Sleep
ExitProcess
lstrcpyA
lstrcmpA
lstrcpynA
lstrcmpiA
GetTickCount
GetSystemTime
GetPrivateProfileStringA
CloseHandle
ReadFile
CreateFileA
SetFilePointer
GetModuleFileNameA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
RtlUnwind
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
FindWindowA
HttpOpenRequestA
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
InternetReadFile
jxgzof
jxgzon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ