DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d70ff3e5414a00e5a1b6c70f05be431dd6aee7315a07b1147f83563f3986c6b3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d70ff3e5414a00e5a1b6c70f05be431dd6aee7315a07b1147f83563f3986c6b3.dll
Resource
win10v2004-20221111-en
Target
d70ff3e5414a00e5a1b6c70f05be431dd6aee7315a07b1147f83563f3986c6b3
Size
76KB
MD5
eeea03c529453dc63b9ffcb940206dd8
SHA1
3992b137553f789b3745412f086078dddbac1296
SHA256
d70ff3e5414a00e5a1b6c70f05be431dd6aee7315a07b1147f83563f3986c6b3
SHA512
f24516bf05c2b31fb8b3ddb7f447c81a1f6dadff603b30eb9fc9bd5365738e87db60cf1a3d9013805ed58892a264c6bff00b631d4b25abbcc206a82fd09611a7
SSDEEP
1536:GxbKKmRaAytMMMMMMMMMMMMMPG1wu9VYhKJ29v6I:GxbKavwu9V5
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord588
MethCallEngine
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord101
ord102
ord103
ord104
ord105
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ