DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ea4eae9c372406a4557d538741b4dba25a6cc71aa9f7f6a94fe2ef782f64a5d0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea4eae9c372406a4557d538741b4dba25a6cc71aa9f7f6a94fe2ef782f64a5d0.dll
Resource
win10v2004-20220812-en
Target
ea4eae9c372406a4557d538741b4dba25a6cc71aa9f7f6a94fe2ef782f64a5d0
Size
2.0MB
MD5
177afc0ada9af2bf8f5564a2446941d0
SHA1
0b50b84a3ca05c4ca74fb083addd68794b07f1c7
SHA256
ea4eae9c372406a4557d538741b4dba25a6cc71aa9f7f6a94fe2ef782f64a5d0
SHA512
3cf42160850c88522b6c05263870a707c30d4612a22af9f9748062bd711ceee6bba5262b0d37e9f53a8a332a9a9f31904f501caeeb43ad850dfb339ed4f8aa53
SSDEEP
49152:RIWAOiYYmqOAE0jLzeOyfScki9Vl5+k2aaDUHPOmY:KYd0jLz1Bcks4UvOmY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord626
ord666
ord598
ord631
ord632
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord531
ProcCallEngine
ord645
ord648
ord685
ord578
ord101
ord102
ord103
ord104
ord105
ord617
ord619
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ