Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
tqwea.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tqwea.dll
Resource
win10v2004-20240508-en
Target
tqwea.dll
Size
5.8MB
MD5
97592247d5f48f447768e857d4873102
SHA1
40c4d01c17b1dd6a3fdd1f5f31f5d60623ef2988
SHA256
e1a13b4cca6688120b9ef85d93b433213f851cdb14d7db18b3d06b8ffee955bb
SHA512
1d04cf278eb246f1c6b5c8d64f21bb9d0a605f4c88c8be9f1bd31ccecd979eec0c93ff79aca13bcd2a9ca15bbfb569e555cc03db908f97e795cdf53a8134b7af
SSDEEP
98304:wmcWp0m1NHSgEqbkFBib39KygUAGRHCyeVoN04opI3+2Ro73p/foZMtdcfktn1DP:wpWemM9C9KBjcLeVv4FZo7J5dik3DP
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\魔域反木马反外挂\TQRAS\Release\tqwea.pdb
LoadLibraryA
GlobalMemoryStatusEx
GetModuleFileNameA
GetVersionExA
GetWindowsDirectoryA
Sleep
CreateFileA
GetFileSize
IsBadReadPtr
FileTimeToSystemTime
ReadFile
GetModuleFileNameW
GetFileTime
CloseHandle
FileTimeToLocalFileTime
GetModuleHandleA
OpenProcess
WideCharToMultiByte
VirtualFree
ReadProcessMemory
GetFileAttributesW
GetLastError
VirtualAlloc
VirtualFreeEx
VirtualAllocEx
GetCurrentProcessId
FindVolumeClose
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
MultiByteToWideChar
QueryDosDeviceW
FindFirstVolumeW
ExitProcess
SetUnhandledExceptionFilter
GetTickCount
CreateDirectoryA
GetLocalTime
GetCurrentThreadId
lstrlenA
WaitForSingleObject
SetEvent
GetSystemTimeAsFileTime
TerminateThread
CreateEventA
GetTempPathA
DeleteFileA
CreateThread
GetProcAddress
GetEnvironmentVariableW
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
VirtualProtect
VirtualQuery
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateFileW
OpenFileMappingA
OpenEventA
FindResourceExA
FindResourceA
SizeofResource
LockResource
LoadResource
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetComputerNameA
WaitForMultipleObjects
GetVolumeInformationA
GetProcessHeap
SetEndOfFile
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemDirectoryA
GetFileAttributesA
GetSystemWow64DirectoryA
GetModuleHandleW
GetCurrentProcess
GetNativeSystemInfo
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
RaiseException
RtlUnwind
CompareStringA
GetCPInfo
CompareStringW
LCMapStringA
LCMapStringW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapCreate
HeapDestroy
WriteFile
GetStdHandle
GetACP
GetOEMCP
IsValidCodePage
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
FreeLibrary
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
EnumWindows
GetWindowTextA
SetTimer
KillTimer
GetForegroundWindow
MessageBoxA
GetWindowThreadProcessId
FindWindowA
SendMessageA
FindWindowExA
EnumChildWindows
GetParent
GetClassNameA
EnumThreadWindows
GetLastInputInfo
wsprintfW
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
CoInitialize
CoUninitialize
CoCreateInstance
CoInitializeEx
CoSetProxyBlanket
MiniDumpWriteDump
InternetGetConnectedState
HttpQueryInfoA
InternetOpenA
InternetConnectA
InternetReadFile
HttpOpenRequestA
InternetCloseHandle
HttpSendRequestA
inet_addr
recv
WSAStartup
connect
gethostbyname
inet_ntoa
send
closesocket
socket
htons
SysAllocString
VariantClear
SysFreeString
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
iefl
iehs
iexk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ