DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0f4f8991e89a1797b24f6f6a1b082cc70bac0e8db49f960a7fb1945304e33b7b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f4f8991e89a1797b24f6f6a1b082cc70bac0e8db49f960a7fb1945304e33b7b.dll
Resource
win10v2004-20220812-en
Target
0f4f8991e89a1797b24f6f6a1b082cc70bac0e8db49f960a7fb1945304e33b7b
Size
556KB
MD5
2c35125407f3d11a91b0be0dde825b57
SHA1
841b6bb54384e409b41841f46b7f8463c411b0a3
SHA256
0f4f8991e89a1797b24f6f6a1b082cc70bac0e8db49f960a7fb1945304e33b7b
SHA512
dd7f1acbcb046074d74f3302bfe82a5e47d89fc6990997e25314a7d41b8cbfe9002811ad91037082b8f01ac18b183af98f4383f4339cf6c1ad94bf63d4167fdc
SSDEEP
12288:GbQZ7C65DfLhGvAfiOrgO99YvNKLYBmbPD8f0RTwmw8M+J:G8hoY6OrgO99YvNWYUbRT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarSub
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE