DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d904440d2da5f1e55f058d7f40637b06b950b97f2b560e1963465b3fc6a65e00.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d904440d2da5f1e55f058d7f40637b06b950b97f2b560e1963465b3fc6a65e00.dll
Resource
win10v2004-20221111-en
Target
d904440d2da5f1e55f058d7f40637b06b950b97f2b560e1963465b3fc6a65e00
Size
44KB
MD5
204f2b318e9d3d59b2fc8412b0a0e786
SHA1
4602982947890793639704c122a5d78ba026703b
SHA256
d904440d2da5f1e55f058d7f40637b06b950b97f2b560e1963465b3fc6a65e00
SHA512
cd2fd294e50a03f391bb6e09009051dfcf6c9826b20ae7db46a2b13e9f24d2bb71704116a526a4d3da0caca7d29e17673f5d24daea5c5e2d4f670fd9c05532cf
SSDEEP
384:kzlMj7OwX1Rtlci4wmmdmcmi2k2dVQidZGPDPONSu1aM/ECIsgvHBquhwrArgOjP:VZPd2kgVQiePDGguMMKvIuhwigjK/5r
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord518
ord660
ord666
EVENT_SINK2_Release
ord593
ord594
ord303
ord520
ord309
ord631
ord632
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord607
ord608
ord609
ord531
ord717
ProcCallEngine
ord536
ord537
ord644
ord571
EVENT_SINK2_AddRef
ord576
ord578
ord685
ord101
ord102
ord103
ord104
ord105
ord611
ord616
ord617
ord618
ord619
ord580
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ