DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c767de1f0d276d56e0ec294b90259d9fe3681ae5e708fa95e9fb933035adaf49.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c767de1f0d276d56e0ec294b90259d9fe3681ae5e708fa95e9fb933035adaf49.dll
Resource
win10v2004-20220812-en
Target
c767de1f0d276d56e0ec294b90259d9fe3681ae5e708fa95e9fb933035adaf49
Size
20KB
MD5
78d71eb9da6c16918797d9ac3e0e3750
SHA1
ffc92cc988e22f9e90ae03e4085b99c38d6f89a6
SHA256
c767de1f0d276d56e0ec294b90259d9fe3681ae5e708fa95e9fb933035adaf49
SHA512
e33307668f6ec6a45c25d9e49ed289593473c12a05e10a8e535cab39a123cdbae01bf5db8913e7b6da56f1a428b95f002821f2d7383fe8179dcbc2a7faaf2412
SSDEEP
96:XQfuTIXdcFbBd9LA1ljaa7wpDjfjEIg+ho1sZAT8dT6EMYS26/yImBZAwLFBIibO:uAdKarxjEah3S8d604iAy4
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord717
ord644
ord570
ord101
ord102
ord103
ord104
ord105
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ