DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0b7108825c2013fbf83828db88e52427495b9e7a2cfeee22c4cdb35c480daf82.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b7108825c2013fbf83828db88e52427495b9e7a2cfeee22c4cdb35c480daf82.dll
Resource
win10v2004-20220812-en
Target
0b7108825c2013fbf83828db88e52427495b9e7a2cfeee22c4cdb35c480daf82
Size
150KB
MD5
fa8667146e910da1c7f4aa50f0829294
SHA1
a9d3cefe05d43646c067cac1e67f2fad8697eb03
SHA256
0b7108825c2013fbf83828db88e52427495b9e7a2cfeee22c4cdb35c480daf82
SHA512
c9e417d17881394441466a1becb5832086559112ba03f465420245c808f8b69bb2c6f2c1aaf06424cb8bd219002ee38c3be2bed7d989421e105bc7635fb4672c
SSDEEP
3072:WmA6yMj75U43l7el7EaVjbI9LSGAsySVGF8QR09Lzgn95pIIWPjxA3:WHo75U+Ua9LSgyYGF8Q2Lpljs
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarSub
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE