it is a call heres a clip from quick view
00cc	00101e51	GetMemVar
039c	00109c1b	                IID_IVbaHost
0063	00109c29	                MethCallEngine
0056	00109cb3	                ProcCallEngine
00da	00109ca3	                PutMem1
00ce	00109c7c	                PutMem2
this is from ida
 
ENGINE:0F102FFC                 public MethCallEngine
ENGINE:0F102FFC    MethCallEngine  proc near
ENGINE:0F102FFC 
ENGINE:0F102FFC    arg_0           = dword ptr  4
ENGINE:0F102FFC 
ENGINE:0F102FFC                 sub     [esp+arg_0], eax
ENGINE:0F103000                 mov     ecx, offset unk_F0FE302
ENGINE:0F103005                 jmp     loc_F0FD243
ENGINE:0F103005    MethCallEngine  endp
jumped call...
 loc_F0FD243:                            ; CODE XREF: ProcCallEngine+Fj
ENGINE:0F0FD243                                         ; MethCallEngine+9j
ENGINE:0F0FD243                 push    ebp
ENGINE:0F0FD244                 mov     ebp, esp
ENGINE:0F0FD246                 sub     esp, 78h
ENGINE:0F0FD249                 push    ebx
ENGINE:0F0FD24A                 push    esi
ENGINE:0F0FD24B                 push    edi
ENGINE:0F0FD24C                 mov     ebx, edx
ENGINE:0F0FD24E                 mov     [ebp-50h], ebx
ENGINE:0F0FD251                 mov     [ebp-6Ch], ecx
ENGINE:0F0FD254                 mov     edx, dword_F10F064
ENGINE:0F0FD25A                 or      edx, edx
ENGINE:0F0FD25C                 jnz     loc_F10356B
ENGINE:0F0FD262                 mov     edx, dword_F10F06C
ENGINE:0F0FD268                 mov     edi, [ebx]
ENGINE:0F0FD26A                 mov     esi, [edi+34h]
ENGINE:0F0FD26D                 mov     [ebp-54h], esi
ENGINE:0F0FD270                 mov     esi, [edi+4]
ENGINE:0F0FD273                 mov     esi, [esi+14h]
ENGINE:0F0FD276                 mov     esi, [esi+0Ch]
ENGINE:0F0FD279                 mov     [ebp-2Ch], esi
ENGINE:0F0FD27C 
 
from what i can see its like this calls all the vb exports
humm i think i just got lost again 
