it is a call heres a clip from quick view
00cc 00101e51 GetMemVar
039c 00109c1b IID_IVbaHost
0063 00109c29 MethCallEngine
0056 00109cb3 ProcCallEngine
00da 00109ca3 PutMem1
00ce 00109c7c PutMem2
this is from ida
ENGINE:0F102FFC public MethCallEngine
ENGINE:0F102FFC MethCallEngine proc near
ENGINE:0F102FFC
ENGINE:0F102FFC arg_0 = dword ptr 4
ENGINE:0F102FFC
ENGINE:0F102FFC sub [esp+arg_0], eax
ENGINE:0F103000 mov ecx, offset unk_F0FE302
ENGINE:0F103005 jmp loc_F0FD243
ENGINE:0F103005 MethCallEngine endp
jumped call...
loc_F0FD243: ; CODE XREF: ProcCallEngine+Fj
ENGINE:0F0FD243 ; MethCallEngine+9j
ENGINE:0F0FD243 push ebp
ENGINE:0F0FD244 mov ebp, esp
ENGINE:0F0FD246 sub esp, 78h
ENGINE:0F0FD249 push ebx
ENGINE:0F0FD24A push esi
ENGINE:0F0FD24B push edi
ENGINE:0F0FD24C mov ebx, edx
ENGINE:0F0FD24E mov [ebp-50h], ebx
ENGINE:0F0FD251 mov [ebp-6Ch], ecx
ENGINE:0F0FD254 mov edx, dword_F10F064
ENGINE:0F0FD25A or edx, edx
ENGINE:0F0FD25C jnz loc_F10356B
ENGINE:0F0FD262 mov edx, dword_F10F06C
ENGINE:0F0FD268 mov edi, [ebx]
ENGINE:0F0FD26A mov esi, [edi+34h]
ENGINE:0F0FD26D mov [ebp-54h], esi
ENGINE:0F0FD270 mov esi, [edi+4]
ENGINE:0F0FD273 mov esi, [esi+14h]
ENGINE:0F0FD276 mov esi, [esi+0Ch]
ENGINE:0F0FD279 mov [ebp-2Ch], esi
ENGINE:0F0FD27C
from what i can see its like this calls all the vb exports
humm i think i just got lost again
