DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
593440f7780df70cbf272ec179071100d60e6b1070edb06aef6c2a5d1186124f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
593440f7780df70cbf272ec179071100d60e6b1070edb06aef6c2a5d1186124f.dll
Resource
win10v2004-20220812-en
Target
593440f7780df70cbf272ec179071100d60e6b1070edb06aef6c2a5d1186124f
Size
159KB
MD5
a6d6f067b684cdb15227ab3fa1954920
SHA1
9d2af4133b0b935a772164e6276579efd0350f43
SHA256
593440f7780df70cbf272ec179071100d60e6b1070edb06aef6c2a5d1186124f
SHA512
4d779732a3d08036b4a99723d1bd541f4fd4c4cf309ebdcb16d255a5ec4fc705813b61af6c294a55eac5c7c861eed7eee9013e6f24e3a2a156865af47227f569
SSDEEP
3072:bBx0XjOJrJSFpUhY930bP8k8xP8kFPnEctcEnPFk8Q4Oah:bB/6Sa30bP8k8xP8kFPnEctcEnPFk8Q4
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EVENT_SINK_GetIDsOfNames
MethCallEngine
EVENT_SINK_Invoke
ord516
ord517
ord518
ord519
ord660
ord558
Zombie_GetTypeInfo
EVENT_SINK2_Release
ord592
ord300
ord301
ord596
ord597
ord598
ord599
ord306
ord520
ord307
ord522
ord709
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord529
ord561
DllFunctionCall
ord563
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord608
ord531
ord716
ord532
ord717
ord319
ProcCallEngine
ord535
ord537
ord644
ord645
ord570
ord648
ord573
EVENT_SINK2_AddRef
ord681
ord576
ord577
ord578
ord685
ord101
ord102
ord103
ord689
ord104
ord610
ord105
ord320
ord612
ord321
ord613
ord616
ord617
ord618
ord619
ord650
ord546
ord580
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ