Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/Program Files (x86)/ProductivityBoss_e5/bar/1.bin/ToolbarGuard64.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume2/Program Files (x86)/ProductivityBoss_e5/bar/1.bin/ToolbarGuard64.dll
Resource
win10v2004-20230220-en
Target
ToolbarGuard64.dll
Size
119KB
MD5
eab2b7b456577126612ed2e8230aeefa
SHA1
be648d28a64b3d5e07d6d10f4ff9d8dd5ec09141
SHA256
ba03454dd67681c2bb62740ac133fccffe2739440b7ce983a479ea59f5a8ac8d
SHA512
708309ccc641a97aea27a3f074cf4ad9e1299e38220998a5a02a2f386481514198bfc5c71a920bf781e35f4ae67fa883502d099b2f90edb77ed08c5c0da52ce8
SSDEEP
3072:DTjQfWlUn7gQJob0RBprbEGhFELm8KgRf3sZTDK:DIq67YI3EYF58Kgd3sZvK
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateEventW
LoadLibraryW
SetEvent
CloseHandle
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
OutputDebugStringA
QueryPerformanceCounter
SetLastError
lstrlenA
OutputDebugStringW
GetCurrentThreadId
SwitchToThread
GetFileAttributesW
CreateDirectoryW
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentProcessId
GetModuleFileNameW
GetCurrentProcess
GetPrivateProfileSectionW
CreateFileW
WriteFile
GetModuleHandleExW
LoadLibraryExW
FindResourceW
LoadResource
LockResource
FreeLibrary
HeapFree
FlsSetValue
GetCommandLineA
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
InitializeCriticalSectionAndSpinCount
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapSize
ExitProcess
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsFree
GetCurrentThread
FlsAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
ReadFile
FlushFileBuffers
GetProcessHeap
TlsFree
WaitForSingleObject
OpenEventA
CreateEventA
ResetEvent
DeleteCriticalSection
InitializeCriticalSection
VerSetConditionMask
VerifyVersionInfoW
GetLastError
GetProcAddress
RtlUnwindEx
GetModuleHandleW
LocalAlloc
LoadLibraryA
GetThreadTimes
InitializeSListHead
RegSetValueExW
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CoTaskMemFree
CoGetCurrentLogicalThreadId
PathFindFileNameW
PathAppendW
PathIsRootW
PathRemoveFileSpecW
PathFileExistsW
UnloadUserProfile
ApisToHook
DllRegisterServer
DllUnregisterServer
GetHookedListener
ProcessesToInject
SetupForAppIntegrator
SetupForInjectedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ