DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
2a294b2bd0b1d13c3d75cac475e4f0e7c55788a272ad351b31b538948510d5e3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a294b2bd0b1d13c3d75cac475e4f0e7c55788a272ad351b31b538948510d5e3.dll
Resource
win10v2004-20221111-en
Target
2a294b2bd0b1d13c3d75cac475e4f0e7c55788a272ad351b31b538948510d5e3
Size
84KB
MD5
fefe6bd24940b605ce33c12532c6de31
SHA1
17c3fc1803c5246fc0fca448516c37cc5cf151a4
SHA256
2a294b2bd0b1d13c3d75cac475e4f0e7c55788a272ad351b31b538948510d5e3
SHA512
4a90a0ac3e741be6b30815d1500f80ec28bbf579b414a4dcaff18ae1694829f1e0af996de3d52b296f82955e367e39825db2b938a9861e15be4138bf4a6529ae
SSDEEP
1536:ofURoJ+rHS4oyNlB/9qbPhYl2i4ogmU7:uFZyLBlQYl2/ogmU7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
InterlockedDecrement
GetProcAddress
HeapDestroy
LocalFree
FreeLibrary
LoadLibraryA
VariantCopy
SetErrorInfo
VariantChangeType
VariantClear
VariantInit
GetErrorInfo
wcscmp
__CxxFrameHandler
_purecall
?raw_name@type_info@@QBEPBDXZ
memcpy
wcslen
_CxxThrowException
memcmp
memset
sprintf
_lrotl
_lrotr
fmod
sin
cos
_ftol
??1type_info@@UAE@XZ
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ