DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f3993e46be018f57df52f0d87a4cd6cf98a2c9a1988c624c3ddd84e128fdef89.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3993e46be018f57df52f0d87a4cd6cf98a2c9a1988c624c3ddd84e128fdef89.dll
Resource
win10v2004-20221111-en
Target
f3993e46be018f57df52f0d87a4cd6cf98a2c9a1988c624c3ddd84e128fdef89
Size
32KB
MD5
5310eede1e000dfbf256027a3ac3c8f8
SHA1
5644a7f2c812aec8bf32aa41f17e90a3b1cb411c
SHA256
f3993e46be018f57df52f0d87a4cd6cf98a2c9a1988c624c3ddd84e128fdef89
SHA512
c9f23aee3b9a9bfcad93fe0340c930a6eccb88ee030d8cfaff21b9bf5c73ea0ddf91f3a4b18f49552cd241f0db4fed58ea5f5ff21ebe4ed643ee2f35274d21a7
SSDEEP
768:H8aCuQEv0Rjn9r9DZ/NhQ6qjn9r9DZ/xhq6XZ:dOEX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord598
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord644
ord573
ord101
ord102
ord103
ord104
ord105
ord619
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ