DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0a313c4fd06379713c76fec8a9a52184a0f02e6427f7aab9980c33e91a0e4d85.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0a313c4fd06379713c76fec8a9a52184a0f02e6427f7aab9980c33e91a0e4d85.dll
Resource
win10v2004-20220812-en
Target
0a313c4fd06379713c76fec8a9a52184a0f02e6427f7aab9980c33e91a0e4d85
Size
382KB
MD5
214263264c8e8be45af9d1f43e822fb3
SHA1
3d8766ce803bebf6f0b52fa2a9982d24db13185b
SHA256
0a313c4fd06379713c76fec8a9a52184a0f02e6427f7aab9980c33e91a0e4d85
SHA512
a665642276825d919cf141514e48e54c3998e26c886ce2672a3717da8e3b81db3dbc4022fc5eb1422268e25320970dd2af19acb67288efe0593cab219b6da7d5
SSDEEP
6144:VZ3znARrH++IFV1ok85jXvIjlW5rwS6GIjxs6h5eqaVTlX+Xghuh:rzARDIL85o3/C6hAqaLhuh
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarSub
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE