DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1d14176119d8f02ab7cd6bc550288bddc0573b25825b6d6451c31ef011c8f48c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1d14176119d8f02ab7cd6bc550288bddc0573b25825b6d6451c31ef011c8f48c.dll
Resource
win10v2004-20220812-en
Target
1d14176119d8f02ab7cd6bc550288bddc0573b25825b6d6451c31ef011c8f48c
Size
60KB
MD5
01860844347238cff3f7460c4f3ab38d
SHA1
6e3a7b77f50e02660e1aa8e90b536218bf22f98a
SHA256
1d14176119d8f02ab7cd6bc550288bddc0573b25825b6d6451c31ef011c8f48c
SHA512
6a700cf2aeec403899ce2721a865a4886f3ebe73b37c5b06a923afbc3682a35f3c4aabaed48e8844d79cbd6a048cd3b494445353c4fe439ceda16624af66f5fd
SSDEEP
1536:mq/F3a1CmS1k71nfVEsHR7onoHmJ7yQwiAPX290WMEh4ThR6VV:m0l5JU36VV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord518
ord662
ord593
ord594
ord595
ord598
ord631
EVENT_SINK_AddRef
ord529
DllFunctionCall
ord569
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord716
ord717
ProcCallEngine
ord535
ord644
ord570
ord648
ord571
ord573
ord578
ord685
ord101
ord102
ord103
ord104
ord610
ord105
ord612
ord617
ord619
ord546
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ