DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4272d8256af3f93dab07c66cfebc809210a851c7981237a94dbad6117ed4efba.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4272d8256af3f93dab07c66cfebc809210a851c7981237a94dbad6117ed4efba.dll
Resource
win10v2004-20221111-en
Target
4272d8256af3f93dab07c66cfebc809210a851c7981237a94dbad6117ed4efba
Size
92KB
MD5
c2ce8da8e394ddfe113df3db357f02a7
SHA1
f066482ea6dea3a56b84fcc9d72443c89a09ace0
SHA256
4272d8256af3f93dab07c66cfebc809210a851c7981237a94dbad6117ed4efba
SHA512
0e87f47a23e7683618c9fa783143924efcbf74f0ce5391e37ceffe7eb0f1d20d0860cccd46b882516db3fe195109f47a300e8aaa1981bd4254c178788592f9a2
SSDEEP
1536:RDIRGgf2MFF5yCUSGMlbV62JE3bJuGevOliOMFvk7l:5LWhGSGVlOOlX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord519
ord558
ord592
ord595
ord631
EVENT_SINK_AddRef
ord527
ord529
ord561
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord607
ProcCallEngine
ord644
ord537
ord570
ord648
ord681
ord685
ord101
ord102
ord103
ord104
ord105
ord616
ord618
ord581
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ