DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6c5b5bb694550a3a9e2e4bc40ae0c09bf8dad93134ff38757d30d03935204425.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c5b5bb694550a3a9e2e4bc40ae0c09bf8dad93134ff38757d30d03935204425.dll
Resource
win10v2004-20221111-en
Target
6c5b5bb694550a3a9e2e4bc40ae0c09bf8dad93134ff38757d30d03935204425
Size
512KB
MD5
6c041873df8a7724eca46b8dedc09508
SHA1
adb71b168058b34186b79a8f87ea341fa8a28db0
SHA256
6c5b5bb694550a3a9e2e4bc40ae0c09bf8dad93134ff38757d30d03935204425
SHA512
1a2fd6459a6f819267c98e51ea9676d383568bd5798302064cb021a198ae7d849b703b58d02ad711578375e723379a6a0d3bdabf62db2fe3b652fa873b825e99
SSDEEP
12288:j6ERfDQRaSSSfP97j5ZFHWkuVMk4bCVKfkDu:mEt0Raut7VnHW34bCVFDu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarTstGt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE