DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f4d4a735adde1f423d8962cf617539302f99a9d9dbe3fcce14937cd9c918f93b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4d4a735adde1f423d8962cf617539302f99a9d9dbe3fcce14937cd9c918f93b.dll
Resource
win10v2004-20221111-en
Target
f4d4a735adde1f423d8962cf617539302f99a9d9dbe3fcce14937cd9c918f93b
Size
996KB
MD5
e16540415623359f565e2b98477cdebd
SHA1
8b5cf572ddcd0bf3af653925b78bc32b7fee569b
SHA256
f4d4a735adde1f423d8962cf617539302f99a9d9dbe3fcce14937cd9c918f93b
SHA512
c779303b6917b2254ffa7c42a2474d7504bd717b62826d837d31e1307581ff73c79096b045ce87ab5d100206cb64a98cedec961a325b97a841531245bfdb5ca1
SSDEEP
24576:ptuNEUl0MxSd6SjBI7eUNiHEUD05phF4Di:6NE60MxSsOBUeU8kqCphYi
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord626
ord666
ord598
ord631
ord632
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord531
ProcCallEngine
ord645
ord648
ord685
ord578
ord101
ord102
ord103
ord104
ord105
ord617
ord619
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ