??4CContentStripperFactory@@QAEAAV0@ABV0@@Z
?CreateInstance@CContentStripperFactory@@SAPAVCContentStripper@@XZ
Static task
static1
Behavioral task
behavioral1
Sample
36eedd4e19f76e2aebaf650603a1ec0face8f0f61b5661109c66a4b4117e80aa.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
36eedd4e19f76e2aebaf650603a1ec0face8f0f61b5661109c66a4b4117e80aa.dll
Resource
win10v2004-20220812-en
Target
36eedd4e19f76e2aebaf650603a1ec0face8f0f61b5661109c66a4b4117e80aa
Size
156KB
MD5
08c00f922a3c838a09f10b0562d658e9
SHA1
7af2bbd03caa8361e5194f19d753f955b31e77c9
SHA256
36eedd4e19f76e2aebaf650603a1ec0face8f0f61b5661109c66a4b4117e80aa
SHA512
7348b466da0e9934c69ca9f2c7e1727fb43578f468381dff747a5b5bf87ac05cc89aa747e499e51725977a6ce4b54b5c1ad580a21e06239f2e6151eeb3d0a639
SSDEEP
3072:tnIPNSS68pRUlmjDIADbOafco3xpCC3L5D:tIAzFgXPcmpp3L
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapCreate
CreateFileA
WriteFile
ReadFile
GetFileSize
SetFilePointer
GlobalAlloc
GlobalFree
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
CloseHandle
VirtualFree
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
LoadLibraryA
FlushFileBuffers
SetStdHandle
??4CContentStripperFactory@@QAEAAV0@ABV0@@Z
?CreateInstance@CContentStripperFactory@@SAPAVCContentStripper@@XZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ