DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
e2b7f53758abce7075757303f745410ee173fc39b55c4721a2d829d55361bedd.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e2b7f53758abce7075757303f745410ee173fc39b55c4721a2d829d55361bedd.dll
Resource
win10v2004-20220812-en
Target
e2b7f53758abce7075757303f745410ee173fc39b55c4721a2d829d55361bedd
Size
557KB
MD5
8afd15a4b624bf022fe9ba96286b2781
SHA1
b82dca722ed8e35e0c50208f578b87b6ef0a99dc
SHA256
e2b7f53758abce7075757303f745410ee173fc39b55c4721a2d829d55361bedd
SHA512
39fa4d0552eee2726a9ce970fb9047bf85dc2f116d9b3930bfad8a9a0046f8697c43d37359ca6f66cd5fedd4e2f972cf07c8b1133cdf8012569b08e15127b839
SSDEEP
12288:AMfiN78AxAcBST/ztJlTHqWOa24Nq6vPSbpviWpKAy7IasUyRwu:oAcBeztJlmparXSfxysaFI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarSub
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE