DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
aff87bba00f3b38a47651416bb3e372758ac0175aa29b4dbc1721c020b4794d7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aff87bba00f3b38a47651416bb3e372758ac0175aa29b4dbc1721c020b4794d7.dll
Resource
win10v2004-20220812-en
Target
aff87bba00f3b38a47651416bb3e372758ac0175aa29b4dbc1721c020b4794d7
Size
295KB
MD5
8d8f686eac0b97fb1cb1be20c72f63c3
SHA1
4e68f3fb4eac92b093a3897b15a6a0d296ec42e6
SHA256
aff87bba00f3b38a47651416bb3e372758ac0175aa29b4dbc1721c020b4794d7
SHA512
fa3e8b5504eed8d1ac9b654b96c88ce47e7cf8f5626f281b2346126eefba8e67b8000a92bfaa14b7666e705abacdc9da56d89806552852e9e03b5c209bbbf4de
SSDEEP
6144:IVHiSEV9bO4SIqalLp/Djwpn8ZGQ5Q+O3OwVUbZW+1h60p7:yyK4blVPw+g9+bT60V
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarTstGt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE