DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3ae05051669aa6ac93a3cead05fdc71ee13790b8c53f6ba18ccc979dd6eb6ff4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ae05051669aa6ac93a3cead05fdc71ee13790b8c53f6ba18ccc979dd6eb6ff4.dll
Resource
win10v2004-20220812-en
Target
3ae05051669aa6ac93a3cead05fdc71ee13790b8c53f6ba18ccc979dd6eb6ff4
Size
44KB
MD5
52ffb69c7354d44d43cf64e340a46427
SHA1
e7b9f75fb1cc73b9e9288e3efa0f976e7874d4cb
SHA256
3ae05051669aa6ac93a3cead05fdc71ee13790b8c53f6ba18ccc979dd6eb6ff4
SHA512
5c17baa0e2336b66bf7b007fd670120abeeba71c6f6963b6473be625ea94b849c1308d0369444d17d5b57924b5e708a9c09cada764f7bf5988e4313a21d68f00
SSDEEP
768:40yAgujCPZPwT6Iav2D4gLrMZvjVHcfk:4pAHCHY40MjY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord518
ord660
EVENT_SINK2_Release
ord593
ord594
ord303
ord520
ord309
ord631
ord632
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord607
ord608
ord609
ord531
ord717
ProcCallEngine
ord536
ord537
ord644
ord645
ord571
EVENT_SINK2_AddRef
ord578
ord685
ord101
ord102
ord103
ord104
ord105
ord611
ord616
ord617
ord618
ord619
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ