DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4c3107751c123c2a8a61fe46afd8ec028cc5b43f301c4b831939e79ef4023dd3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c3107751c123c2a8a61fe46afd8ec028cc5b43f301c4b831939e79ef4023dd3.dll
Resource
win10v2004-20220812-en
Target
4c3107751c123c2a8a61fe46afd8ec028cc5b43f301c4b831939e79ef4023dd3
Size
44KB
MD5
6673bef794d10a57ae3d79730d1902d4
SHA1
8c4963ad1d200b459f3acf65ff66eae299f3ed63
SHA256
4c3107751c123c2a8a61fe46afd8ec028cc5b43f301c4b831939e79ef4023dd3
SHA512
41e783e930c926149d0f92d75cec67842943cc56d3cd55b1dfb4abc2a257a0b664b8561c9ce61dad922f616da26b78be9ad6e12e70081ddd8f961eeada3899ca
SSDEEP
768:8pPkgjVGyVoi3PDpgshMLvNuhwigjO/IX:AkgokrplMpu+OAX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord518
ord660
ord666
EVENT_SINK2_Release
ord593
ord594
ord303
ord520
ord309
ord631
ord632
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord607
ord608
ord609
ord531
ord717
ProcCallEngine
ord536
ord537
ord644
ord571
EVENT_SINK2_AddRef
ord576
ord578
ord685
ord101
ord102
ord103
ord104
ord105
ord611
ord616
ord617
ord618
ord619
ord580
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ