DllRegisterServer
DllUnregisterServer
NSPCleanup
NSPStartup
Behavioral task
behavioral1
Sample
483c7b6e43cfa6705761f65e7536ea57.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
483c7b6e43cfa6705761f65e7536ea57.dll
Resource
win10v2004-20231222-en
Target
483c7b6e43cfa6705761f65e7536ea57
Size
371KB
MD5
483c7b6e43cfa6705761f65e7536ea57
SHA1
a2a15b649da80019caecdfb491fa870aa06a254b
SHA256
c6db7a3e7d90cb2e2b90e362544ca080500e0ee7ec52871680ba28cb7b9c350e
SHA512
efe64a906fbfab8eca15f33f7716819444d09975e293d9c36e520e4a3066be09605ff106eba9a434eaeb4ea1dea6cac53803c16a4a82e33017806ee8d0e6d103
SSDEEP
6144:scZp98E2kB1bkp59VedDf9oeVJo6A9U9b+40JGobkxi9uYM0sqltfaaVe3Z:1n98E2E1gFVmCxo+4KGobk89uYMHAfal
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
483c7b6e43cfa6705761f65e7536ea57 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSCUnInstallNameSpace
GetOEMCP
GetModuleHandleA
LoadLibraryA
VirtualAlloc
VirtualFree
GetModuleFileNameA
ExitProcess
DllRegisterServer
DllUnregisterServer
NSPCleanup
NSPStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ