DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3ddf710006f4bc1b31fca4492a2d828d87c30125900f408e8550f3342c619470.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ddf710006f4bc1b31fca4492a2d828d87c30125900f408e8550f3342c619470.dll
Resource
win10v2004-20220812-en
Target
3ddf710006f4bc1b31fca4492a2d828d87c30125900f408e8550f3342c619470
Size
796KB
MD5
72586c7fad5e9650e0f3526f89dfeebf
SHA1
ea5ba660e19fad537b400d6b49c11a915084e2a9
SHA256
3ddf710006f4bc1b31fca4492a2d828d87c30125900f408e8550f3342c619470
SHA512
6898fd6f7b1e7fd3ad87e8300f2fe71d35bb43dbd16d18aaac9ef506d74b3a770522aba8a183cedc45c5f6f77a02d4adedc900a42b1ec984dca4898376d58d94
SSDEEP
24576:ncNjVEDtP3rpG6RGbHd/UEzAc/RGjTKv:nbl3rpGYoxzk4G3K
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarTstGt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE