DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ca02b0ac8766f08a649b8b48ce9d4dfa0349d17ce24295047db43067aa47de4e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca02b0ac8766f08a649b8b48ce9d4dfa0349d17ce24295047db43067aa47de4e.dll
Resource
win10v2004-20220901-en
Target
ca02b0ac8766f08a649b8b48ce9d4dfa0349d17ce24295047db43067aa47de4e
Size
159KB
MD5
5dad44d2c60aa6825be43f7f8c59ff49
SHA1
4c4c595dfc3f66edaf707b5eb572ccfda1525501
SHA256
ca02b0ac8766f08a649b8b48ce9d4dfa0349d17ce24295047db43067aa47de4e
SHA512
b52d797ec5f6547581976fcbc6f087e82773a487e0911817daaf5eb464e5c9ba551e9a75dfc9219a74774e2a8a0dcbc3239970d98a4282e7d909d3e395d462c2
SSDEEP
3072:4Bx0XjOJrJSFpUhY930bP8k8xP8kFPnEctcEnPFk8QNOah:4B/6Sa30bP8k8xP8kFPnEctcEnPFk8QF
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EVENT_SINK_GetIDsOfNames
MethCallEngine
EVENT_SINK_Invoke
ord516
ord517
ord518
ord519
ord660
ord558
Zombie_GetTypeInfo
EVENT_SINK2_Release
ord592
ord300
ord301
ord596
ord597
ord598
ord599
ord306
ord520
ord307
ord522
ord709
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord529
ord561
DllFunctionCall
ord563
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord608
ord531
ord716
ord532
ord717
ord319
ProcCallEngine
ord535
ord537
ord644
ord645
ord570
ord648
ord573
EVENT_SINK2_AddRef
ord681
ord576
ord577
ord578
ord685
ord101
ord102
ord103
ord689
ord104
ord610
ord105
ord320
ord612
ord321
ord613
ord616
ord617
ord618
ord619
ord650
ord546
ord580
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ