DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c6c2a1b62ae4d619c32bcf291edd6f30c4ecb0e646e59e7070ad329a859c7022.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6c2a1b62ae4d619c32bcf291edd6f30c4ecb0e646e59e7070ad329a859c7022.dll
Resource
win10v2004-20220901-en
Target
c6c2a1b62ae4d619c32bcf291edd6f30c4ecb0e646e59e7070ad329a859c7022
Size
20KB
MD5
0ce7e5d1dc8cd84b9cf3fd711ff09dae
SHA1
2ff8d54d81afb9c08f85c59b2b208abab24c4039
SHA256
c6c2a1b62ae4d619c32bcf291edd6f30c4ecb0e646e59e7070ad329a859c7022
SHA512
c9ac3324f5a8e0d527c4f5b550cf97f63e614cf522ed9e928b7aad16554641b2c89534fc591a55be11f6766f37a772fbedf34d1189518769ce7922e21097b244
SSDEEP
96:x9iYOilZDNgoqDeo6Wee7Zv9enbUWFvYqKmtvrbIAlq4JrENsmsI/RvKL:CYO43q/zZvHKEmBIAQ4VEDtv
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord666
EVENT_SINK_AddRef
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ProcCallEngine
ord648
ord101
ord102
ord103
ord104
ord105
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ