DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d.dll
Resource
win10v2004-20220812-en
Target
49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d
Size
774KB
MD5
c3f4ec92c1407a04dfe954a8e7ffae90
SHA1
055710ad8e78f8a8965a4baf9ee78028f3372c9f
SHA256
49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d
SHA512
6756d0d6d26e6d8ad34603ad42ad0a47a0271dd2123cb1603795a44af39f7c35f6a81c73af0d2ae19070cd29de8460525afbbfcb3bc07d8212af1a5543bde409
SSDEEP
24576:jMPmLmsLOesX5loATAQxmnVo3aoiCz0U:jcmLmEOesplh5xmnVoqoiC4
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarTstGt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE