DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5445078f794bead9e20e4ca1a88d6299d1deb3c10c7a1e1e2bee8d8bb93743b8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5445078f794bead9e20e4ca1a88d6299d1deb3c10c7a1e1e2bee8d8bb93743b8.dll
Resource
win10v2004-20220812-en
Target
5445078f794bead9e20e4ca1a88d6299d1deb3c10c7a1e1e2bee8d8bb93743b8
Size
250KB
MD5
7fa1d5b60842b6a7b8416b2702a4e5f5
SHA1
23c2e7dade52b496a92cd59fe8e7a5d15bf2de0b
SHA256
5445078f794bead9e20e4ca1a88d6299d1deb3c10c7a1e1e2bee8d8bb93743b8
SHA512
8f2ef3bbe1471f0162eda1b14fece6ed705aa16c416de6eed38f78f4fbf8973b030378e9674579ef9b5e7ff8bdcc0aca0c1fc170c0911fb913a7fb36a20d06a0
SSDEEP
6144:XTjsblXBbvfowHUERqGNTIgXOa54cPQT7X+zY/OVX+oe:jQxNvggR/oxOsWVXh
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarSub
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE