DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b6a71045c22769f317525ae86c1f5cffd7c637b7b080c5a346260d8b7d6c964e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6a71045c22769f317525ae86c1f5cffd7c637b7b080c5a346260d8b7d6c964e.dll
Resource
win10v2004-20220812-en
Target
b6a71045c22769f317525ae86c1f5cffd7c637b7b080c5a346260d8b7d6c964e
Size
248KB
MD5
fd895a26055fd01f2f17f5e373ca618c
SHA1
1e9849a1e31b720b6a707e3fa1a7142383219676
SHA256
b6a71045c22769f317525ae86c1f5cffd7c637b7b080c5a346260d8b7d6c964e
SHA512
04396dbfbc0da4406bd778afbc8a5810aedf1dbafd52079f7a660768c3643d40824ce84174ee3b5d3a2962b8ad1860f2d6eb2a2bba180d14079ea56f55bf0771
SSDEEP
6144:1lT9MB8K2eRRXMxZkgG7Lwk96LxLDoucX/kM:17E8KHRXV596LxLDmXs
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarSub
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE