Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Static task
static1
Behavioral task
behavioral1
Sample
6426afce03a606ca0ba5cf38e4bad92cfd9f5959e31c88fd9060464f67eda30e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6426afce03a606ca0ba5cf38e4bad92cfd9f5959e31c88fd9060464f67eda30e.dll
Resource
win10v2004-20220901-en
Target
6426afce03a606ca0ba5cf38e4bad92cfd9f5959e31c88fd9060464f67eda30e
Size
28KB
MD5
695406a9bee01b5f43d135c94efd54fa
SHA1
4f5cb08a6a2af1752a84df4c100fd76f9fd22018
SHA256
6426afce03a606ca0ba5cf38e4bad92cfd9f5959e31c88fd9060464f67eda30e
SHA512
064b27ab8a5e6cb59b3960b717dfb78406dc906eab3d82b7d2a42350f4282e8a4f5cd46f4ba5e0e92c1390b4f978ac3cfc31dc45c7ca93cc83b7dfa1485ee070
SSDEEP
768:LGZTnJsrFycjt5QZ2ZGVamH1hU+qPsYq:enOFyc55Qg1mHjUBs
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE