jxgzof
jxgzon
Static task
static1
Behavioral task
behavioral1
Sample
92a56826e16d643c976834bea529f676c75390cd14a6e53ad599cd824e3756c5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92a56826e16d643c976834bea529f676c75390cd14a6e53ad599cd824e3756c5.dll
Resource
win10v2004-20220901-en
Target
92a56826e16d643c976834bea529f676c75390cd14a6e53ad599cd824e3756c5
Size
16KB
MD5
10dfdff8898b9dc5be6e6b83525bcacb
SHA1
8f8690ddee1eb16d633b987c080ea6c85745865c
SHA256
92a56826e16d643c976834bea529f676c75390cd14a6e53ad599cd824e3756c5
SHA512
a319ff1ae1322944f3a716d6095902d6c17a369b6dfd1a8257cd543f8312b6a77f94b5405534263b3e30d0b000ed56e436fc8d77ed34ed5e84c263ec88a8b0da
SSDEEP
384:ebPwynYlJiD+UHP+pTDbRV/V228hh4AYqr47tsQy6mMYZrGf:CnCUmpTfRV/V2H34AfLH6mbs
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrlenA
Sleep
ExitProcess
lstrcpyA
lstrcmpA
lstrcpynA
lstrcmpiA
GetTickCount
GetSystemTime
GetPrivateProfileStringA
CloseHandle
ReadFile
CreateFileA
SetFilePointer
GetModuleFileNameA
CreateThread
UnmapViewOfFile
OutputDebugStringA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
RtlUnwind
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
FindWindowA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
InternetReadFile
jxgzof
jxgzon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ