DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
1195cde5020a9674a1a3f3c0a5a394270411306a98dbf80670723709326504be.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1195cde5020a9674a1a3f3c0a5a394270411306a98dbf80670723709326504be.dll
Resource
win10v2004-20220812-en
Target
1195cde5020a9674a1a3f3c0a5a394270411306a98dbf80670723709326504be
Size
99KB
MD5
4c4749b719c42ac232f18bfd69ed59d7
SHA1
7c6894f366ac5219b45075e2395f9b53fd55fbd5
SHA256
1195cde5020a9674a1a3f3c0a5a394270411306a98dbf80670723709326504be
SHA512
a83ccbbbbe3fa1f6381826f44cdbde0030ad4313cd83f2f4b394c2f617d6760664e47a404eb9d5498f76750796af8133b970be12938370671993cc13cff76932
SSDEEP
3072:cB8HXAx0WKRwcfQLFNSqzVj2OkYYzADadkWGqzjTNr:cB8QxowWQZNSSj2OoCk1Gqz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
memcmp
ReadFile
InterlockedDecrement
LocalFree
LocalAlloc
WideCharToMultiByte
CloseHandle
SetFilePointer
CreateFileA
GetModuleFileNameA
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ