DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ISTactivex.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ISTactivex.dll
Resource
win10v2004-20220901-en
Target
20e9892601e53b699bcbe8ddcfdd6476d21f8150c9d7a9b53ca7acc153fc371d
Size
18KB
MD5
4addafb6b6ef9cf8a861d31229b6727c
SHA1
057cc1bb14c76482a06cd8df31ca0389af3c9863
SHA256
20e9892601e53b699bcbe8ddcfdd6476d21f8150c9d7a9b53ca7acc153fc371d
SHA512
97c3b3d73c822362ac5b3ad473e6825c4a8567cdaf4b8b1129f550aa38ea3d7a44376b596b40a1c43724cb42753a286222664f3d2add7732a9d12c483fcc9f3e
SSDEEP
384:I1KsxdzWr5p5RcA2Nzp4OX+VI1BY1oREBsZ8negLCceuQ:I11m5p5R+tpp1BY2REBRnegL3eX
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/ISTactivex.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/ISTactivex.dll | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ