DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2ed1197de6cd589a336a6d41a0c6839fcc16ea3304fec9087de3cbbb571e9a37.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ed1197de6cd589a336a6d41a0c6839fcc16ea3304fec9087de3cbbb571e9a37.dll
Resource
win10v2004-20220812-en
Target
2ed1197de6cd589a336a6d41a0c6839fcc16ea3304fec9087de3cbbb571e9a37
Size
294KB
MD5
df84a7d9081497ddd8f9c88d13dc8317
SHA1
d5c05d59f760010354479d93343c206d64432d9a
SHA256
2ed1197de6cd589a336a6d41a0c6839fcc16ea3304fec9087de3cbbb571e9a37
SHA512
246684a76b9fb0ca694cbbbde5cfbe71b824ce0b34fc4db80fa5288e2480bd4a31fbba57ccc6ccf3c080a85183b5614dd50b9ee95274c3ceeceb7efd77061cc7
SSDEEP
6144:WeyV/F+jQMrhL31lgvpx3Le4YvqI8QetS/t4j9hRSWXaD1juD1bnmr:q/YjQqdFl2JyBJ9etU4jjRsA1U
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarTstGt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE