DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5519d8211901a1b2d5ffeb37915739c1eed2b98ed6eea7784aa4ee07fb42cfb8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5519d8211901a1b2d5ffeb37915739c1eed2b98ed6eea7784aa4ee07fb42cfb8.dll
Resource
win10v2004-20220812-en
Target
5519d8211901a1b2d5ffeb37915739c1eed2b98ed6eea7784aa4ee07fb42cfb8
Size
512KB
MD5
2a6e50f1ada3b0a0d8e02749c585ad99
SHA1
674299eeb914af2f2e3d43c82e46e9cee1f15a86
SHA256
5519d8211901a1b2d5ffeb37915739c1eed2b98ed6eea7784aa4ee07fb42cfb8
SHA512
0a93bed08458f22a4e8ad08bbc69198054850da92a49f6e4b060cc6aeab69edf5875dcb1d035f818cb869a09166ce4fcf79641da2e5612f75e2f668a78c69068
SSDEEP
12288:VWJ9xwuBmh7ATqfuHrRpApQ16YISOm89DxJvjGk:VW3uuBMcufKPWQAYISOmCdJCk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarTstGt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE