IxpExecuteTest
IxpExecuteTestEx
IxpShowAdress
Static task
static1
Behavioral task
behavioral1
Sample
539e1a35e64ff77df571c60e8fbb05dd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
539e1a35e64ff77df571c60e8fbb05dd.dll
Resource
win10v2004-20231215-en
Target
539e1a35e64ff77df571c60e8fbb05dd
Size
2.2MB
MD5
539e1a35e64ff77df571c60e8fbb05dd
SHA1
fbf2a60ec0b28f4752d5131603063ea90cbc7e31
SHA256
dc3047818b143e1ba7bfa0dcde969d129939c85926d061a6e7de4d77a64b4ff7
SHA512
1afe689d1faa8421f90da593a73697d83b08b5dcdfe5f37f85c13072b1c6782cb08fdd943ea26914d19ccd5250590b25e159f92a931bf6b0191e1a3f84606fa8
SSDEEP
49152:wr2OzTBxHdFTY71uRNctjxYU5a85TZZAHp/3d3MQOibBAdb:wrVvnEztjKU5a8ed3U4ydb
Checks for missing Authenticode signature.
resource |
---|
539e1a35e64ff77df571c60e8fbb05dd |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
GetLastError
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetProcessTimes
SwitchToThread
MapViewOfFileEx
UnmapViewOfFile
GetProcAddress
LocalFree
FormatMessageA
CreateSemaphoreA
CreateFileMappingA
OpenProcess
GetSystemTimeAsFileTime
GetEnvironmentVariableW
CreateDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFileTime
RemoveDirectoryW
SetFileTime
DeviceIoControl
GetWindowsDirectoryW
GetModuleHandleW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryA
GetEnvironmentVariableA
SetCurrentDirectoryA
GetFileAttributesA
GetFullPathNameA
GetSystemTime
FileTimeToSystemTime
GetTimeZoneInformation
GetExitCodeProcess
CreateProcessA
GetStdHandle
GetConsoleMode
ExitThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DeleteFileA
IsWow64Process
GetProfileStringA
FlushFileBuffers
ReadFile
SetFilePointer
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
GetCPInfo
CreateThread
FreeLibraryAndExitThread
GetFileType
RaiseException
GetConsoleCP
WriteFile
GetStringTypeW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
HeapSize
IsValidCodePage
GetOEMCP
ReadConsoleW
GetModuleFileNameW
WriteConsoleW
EncodePointer
DecodePointer
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
LocalAlloc
MapViewOfFile
OpenFileMappingA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
CreateToolhelp32Snapshot
Thread32First
Thread32Next
SetEvent
ResetEvent
CreateEventA
OpenEventA
WaitForMultipleObjects
ProcessIdToSessionId
IsBadWritePtr
OpenSemaphoreA
FlushInstructionCache
GetVersion
LockFile
UnlockFile
IsBadStringPtrA
IsBadStringPtrW
GetDriveTypeA
GetCommandLineA
FindFirstFileExW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
InitializeSListHead
CreateEventW
WaitForSingleObjectEx
CompareStringEx
GetLocaleInfoEx
LCMapStringEx
TryEnterCriticalSection
InitializeCriticalSectionEx
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSRWLock
SetFilePointerEx
SetEndOfFile
RemoveDirectoryA
GetFileSizeEx
FindNextFileA
FindFirstFileA
FindClose
CreateFileA
CreateDirectoryA
GlobalFree
GlobalAlloc
Process32Next
Process32First
Sleep
GetModuleHandleExA
IsBadReadPtr
GetComputerNameA
GetNativeSystemInfo
GetSystemWindowsDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemInfo
SetLastError
GetModuleHandleA
GetModuleFileNameA
VirtualQuery
VirtualProtect
GetVersionExA
SetPriorityClass
SetThreadPriority
GetCurrentThread
TerminateProcess
HeapFree
GetCurrentDirectoryA
SetConsoleCtrlHandler
GetTickCount
GetACP
SystemTimeToFileTime
GetLocalTime
GetTempPathA
GetDiskFreeSpaceA
GetUserDefaultUILanguage
GetExitCodeThread
GetCurrentThreadId
DuplicateHandle
GetTickCount64
GetStartupInfoW
GetCurrentProcessId
GetCurrentProcess
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapCreate
GetCommandLineW
LoadStringA
wsprintfA
AppendMenuA
TranslateMessage
DispatchMessageA
PeekMessageA
MessageBoxA
GetSystemMetrics
DrawMenuBar
GetSystemMenu
CharLowerBuffA
CallMsgFilterA
CharUpperBuffA
ShellExecuteExA
RegDeleteValueA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CloseEventLog
OpenEventLogA
ReadEventLogA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
QueryServiceStatusEx
StartServiceA
QueryServiceStatus
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
RegFlushKey
RegDeleteKeyA
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
GetSecurityDescriptorSacl
RegCreateKeyExA
GetUserNameA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
GetModuleFileNameExA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
gethostbyname
gethostbyaddr
sendto
recvfrom
inet_addr
bind
getpeername
WSAGetLastError
socket
shutdown
gethostname
send
select
recv
getsockopt
ioctlsocket
connect
closesocket
accept
__WSAFDIsSet
inet_ntoa
htons
WSACleanup
WSAStartup
freeaddrinfo
getaddrinfo
setsockopt
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCloseHandle
WinHttpGetDefaultProxyConfiguration
CertFindCertificateInStore
CertGetNameStringW
CertGetNameStringA
CertFreeCertificateContext
CryptQueryObject
CertCloseStore
CryptMsgGetParam
CryptMsgClose
WinVerifyTrust
IxpExecuteTest
IxpExecuteTestEx
IxpShowAdress
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE