Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
05a74488097d0cf867cd53f64f6cae515c8907cdc83ec54d41b1a83fb9b47e69.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05a74488097d0cf867cd53f64f6cae515c8907cdc83ec54d41b1a83fb9b47e69.dll
Resource
win10v2004-20240508-en
Target
05a74488097d0cf867cd53f64f6cae515c8907cdc83ec54d41b1a83fb9b47e69
Size
403KB
MD5
1d45ad719945a86d390e7fee20dfc645
SHA1
2d6e83f438a3b41b3cc0d9580b3e97059af56034
SHA256
05a74488097d0cf867cd53f64f6cae515c8907cdc83ec54d41b1a83fb9b47e69
SHA512
07d54f2f9a96630f6d193ab92755a6ebb25b1ada83ebe6c139563894c3f3834ce0211e07feeb27e9b7245ccaf295d10797f4fbab21d1b4cd1e6378fef98fd222
SSDEEP
6144:pBZaxruVD+PPLUXzCE+uvbQIw1BefvwPDm7tBV+UdvrEFp7hK4oz:Xyu+PDUmE+uu1BVDStBjvrEH7/oz
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\ZeroDay\Project\TouchEn_WebExe\ZDSGuard\release\ZDSGuard32.pdb
OpenProcess
GetCurrentProcessId
TerminateProcess
WaitForSingleObject
CloseHandle
GetModuleFileNameW
LoadLibraryA
GetModuleFileNameA
GetProcAddress
LocalAlloc
LocalFree
SetLastError
GetUserDefaultLangID
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
lstrcpynA
CreateThread
GetVersionExA
lstrcmpA
lstrcpyA
Sleep
OutputDebugStringA
WideCharToMultiByte
GetVersion
lstrlenW
MultiByteToWideChar
lstrcmpiA
lstrlenA
GetLastError
CreateEventA
CreateEventW
CreateFileW
CreateFileMappingA
CreateFileMappingW
CreateMutexA
CreateMutexW
CreatePipe
CreateProcessA
CreateProcessW
CreateSemaphoreA
DeviceIoControl
DuplicateHandle
ExitThread
FormatMessageA
GetCurrentDirectoryA
GetCurrentDirectoryW
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetModuleHandleW
GetSystemDirectoryA
GetSystemDirectoryW
GetThreadContext
GetWindowsDirectoryW
LoadLibraryW
LoadLibraryExA
MapViewOfFile
OpenEventA
OpenEventW
OpenFileMappingA
OpenFileMappingW
OpenMutexA
OpenMutexW
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetModuleHandleA
VirtualQuery
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapSize
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
RaiseException
InitializeCriticalSection
RtlUnwind
FreeLibrary
SetFilePointer
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
lstrcpyW
lstrcatW
WriteProcessMemory
WaitForMultipleObjects
VirtualQueryEx
VirtualProtectEx
UnmapViewOfFile
TerminateThread
SetThreadPriority
SetEvent
ResumeThread
IsWindowVisible
PostMessageA
CloseClipboard
EmptyClipboard
SetClipboardData
IsClipboardFormatAvailable
OpenClipboard
GetKeyState
GetClientRect
IsWindow
UnhookWinEvent
UnhookWindowsHookEx
WindowFromDC
CallNextHookEx
WindowFromPoint
GetKeyboardType
MessageBoxA
TranslateMessage
PeekMessageA
OpenInputDesktop
MsgWaitForMultipleObjects
GetUserObjectInformationA
GetThreadDesktop
DispatchMessageA
CloseDesktop
SetWinEventHook
SetWindowsHookExA
GetCursorPos
GetForegroundWindow
GetWindowTextA
EnumChildWindows
GetClassNameA
GetWindowThreadProcessId
wsprintfA
IsWindowEnabled
CoCreateInstance
CoInitialize
VariantInit
SysReAllocStringLen
SysAllocStringLen
SysFreeString
StrStrIA
GetObjectType
AccessibleObjectFromPoint
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetLengthSid
GetKernelObjectSecurity
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
RegSetValueExW
RegSetValueExA
RegOpenKeyExW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
OpenProcessToken
LookupPrivilegeValueA
InitializeSecurityDescriptor
GetTokenInformation
AdjustTokenPrivileges
FreeSid
AllocateAndInitializeSid
PermitProcssInsert
SetHook
SetPolicy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ