jxgzof
jxgzon
Static task
static1
Behavioral task
behavioral1
Sample
d7631b0dffc306f918027344f73761faf4471db89c645d96ee8184fd5dad1f48.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7631b0dffc306f918027344f73761faf4471db89c645d96ee8184fd5dad1f48.dll
Resource
win10v2004-20220812-en
Target
d7631b0dffc306f918027344f73761faf4471db89c645d96ee8184fd5dad1f48
Size
16KB
MD5
d882e10c9841a32f8b9e1e3a33286eb0
SHA1
56302c7ae4459e41756f45cf82c6ae7339e9d6f0
SHA256
d7631b0dffc306f918027344f73761faf4471db89c645d96ee8184fd5dad1f48
SHA512
5b9a6ec25ed3760eac19cebae0b3618cdf570ae8fc1a421f5ce6559a478a9f36a93335f950bf697a6fcc45c69361a803dbed10bf136ee54a18b7b1fff87e9cce
SSDEEP
384:yZbRekQSYFkWkFrepTgkLhViotDv4oYSqeTetsQydeqYAv:fkF6psChViCj4ometHdeUv
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrlenA
Sleep
ExitProcess
lstrcpyA
lstrcmpA
lstrcpynA
lstrcmpiA
GetTickCount
GetSystemTime
GetPrivateProfileStringA
CloseHandle
ReadFile
CreateFileA
SetFilePointer
GetModuleFileNameA
CreateThread
UnmapViewOfFile
OutputDebugStringA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
RtlUnwind
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
FindWindowA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
InternetReadFile
jxgzof
jxgzon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ