DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f1589170aa3c3fbe53322f2ff2d3f30a3c30c7890279c5f13cdf73a104956760.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1589170aa3c3fbe53322f2ff2d3f30a3c30c7890279c5f13cdf73a104956760.dll
Resource
win10v2004-20220812-en
Target
f1589170aa3c3fbe53322f2ff2d3f30a3c30c7890279c5f13cdf73a104956760
Size
52KB
MD5
3c2662731d8b21c013247bed140d08c5
SHA1
c1d47f629ccc517a1824daa280b739e27ee8674f
SHA256
f1589170aa3c3fbe53322f2ff2d3f30a3c30c7890279c5f13cdf73a104956760
SHA512
830dd090cdc0d32f6d337d1582dfb844aef99ad8a2008184cfbb81276d697850b3ef05ac17c7a38fb9535e9ab0f1d05683a3317258a6b7b026b88fda30981710
SSDEEP
384:wWfUnjd8a4VOdtM5FtBMvZ7wU1XYX5ci6A+cD3GsNnPk9vmKhmJzGKlC4tRxZ:wWojGa4VO4Mh7wUC6A+cD2sFGKMWRx
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord518
ord662
ord595
ord598
EVENT_SINK_AddRef
ord529
DllFunctionCall
ord569
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord716
ord717
ProcCallEngine
ord535
ord644
ord570
ord648
ord571
ord573
ord578
ord685
ord101
ord102
ord103
ord104
ord610
ord105
ord612
ord619
ord546
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ