DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
44c054d97ae6f1949ae29a7c14c594c97849c2834a4efb37cd948298232f038e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44c054d97ae6f1949ae29a7c14c594c97849c2834a4efb37cd948298232f038e.dll
Resource
win10v2004-20220812-en
Target
44c054d97ae6f1949ae29a7c14c594c97849c2834a4efb37cd948298232f038e
Size
44KB
MD5
3d55cddf83115163a28540414c23bf45
SHA1
01df935237faf717e60b42fdf7cdf60b6e3b4871
SHA256
44c054d97ae6f1949ae29a7c14c594c97849c2834a4efb37cd948298232f038e
SHA512
cd0b7471269c0ea0613b62072b6f626a011daac7e8b84254453207776609993f8014c0062eef2aa5e44df864e226d7385be37715485a2098bec8f2147ef7ccdb
SSDEEP
768:8pPkgjVGyVoi3PDpgshMLvNuhwigjO/IM:AkgokrplMpu+OAM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord518
ord660
ord666
EVENT_SINK2_Release
ord593
ord594
ord303
ord520
ord309
ord631
ord632
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord607
ord608
ord609
ord531
ord717
ProcCallEngine
ord536
ord537
ord644
ord571
EVENT_SINK2_AddRef
ord576
ord578
ord685
ord101
ord102
ord103
ord104
ord105
ord611
ord616
ord617
ord618
ord619
ord580
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ