jxgzof
jxgzon
Static task
static1
Behavioral task
behavioral1
Sample
5aeffff8800ee70ebe6882a62db6872f5e2ffc5a453ca12cc0806e6e065d324f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5aeffff8800ee70ebe6882a62db6872f5e2ffc5a453ca12cc0806e6e065d324f.dll
Resource
win10v2004-20221111-en
Target
5aeffff8800ee70ebe6882a62db6872f5e2ffc5a453ca12cc0806e6e065d324f
Size
21KB
MD5
76e8fa208dae710547b88042d3593ad0
SHA1
1a0cad0005715b5b1157d33b06edbd52cfde2fa7
SHA256
5aeffff8800ee70ebe6882a62db6872f5e2ffc5a453ca12cc0806e6e065d324f
SHA512
6cde16241c1a55a2d6d794d4304bb69069a181875c3ceedc19139bac39a39fa5e44700971ac9c1f0b2a232ef60a6a3b0113356c10545702cd7aaf77378bb3e79
SSDEEP
384:vKcxLWbw9krIWpQcmqzfuXpmXdkSMgekXhzOrwOqc26cSSQ04La4t:v1QQiTuXpVZ7kXhzgvv26kj4Lvt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrlenA
ExitProcess
Sleep
lstrcpyA
lstrcmpA
lstrcpynA
lstrcmpiA
GetTickCount
GetSystemTime
GetPrivateProfileStringA
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
RtlUnwind
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
FindWindowA
HttpOpenRequestA
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
InternetReadFile
jxgzof
jxgzon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ