DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1b19a5eba53cbe2bbcfb2204354824ee0cd5383b9330b501b5a4c6be7d2c5baf.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b19a5eba53cbe2bbcfb2204354824ee0cd5383b9330b501b5a4c6be7d2c5baf.dll
Resource
win10v2004-20221111-en
Target
1b19a5eba53cbe2bbcfb2204354824ee0cd5383b9330b501b5a4c6be7d2c5baf
Size
630KB
MD5
a975f4350ec92a1d4ff648cdda9a83fd
SHA1
f3e12309b3e4848694d440319ede5c4d4fef0ecc
SHA256
1b19a5eba53cbe2bbcfb2204354824ee0cd5383b9330b501b5a4c6be7d2c5baf
SHA512
9e68b584d5d180697e6e2197251fe7a525a58ac298470ca846a84c5f9dcd2d9c386b6b02b08fe90fbb8f086127c360ae7376af5d6544882c6252778825da91ef
SSDEEP
12288:ddJiaMQvQBqN2HLPuJfAAFUwFzlnmMBJJ6H/iibq0Db9KxhJim:I9ZBqNUm5AV+lrylbq0f9gh
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarSub
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE