Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
b1af534491b1a096acbbc40c3452609648656a58fa7a2d415f655ddd72360056.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1af534491b1a096acbbc40c3452609648656a58fa7a2d415f655ddd72360056.dll
Resource
win10v2004-20240802-en
Target
b1af534491b1a096acbbc40c3452609648656a58fa7a2d415f655ddd72360056
Size
622KB
MD5
21c8d3a20b8b36fe2c2ec86ecf12ac1b
SHA1
56ec0c5ecef72123979ce9527be63e7c899c17bf
SHA256
b1af534491b1a096acbbc40c3452609648656a58fa7a2d415f655ddd72360056
SHA512
a6b1957090c0d759a36b8aa66f759839074f68bf5a217c9cba7cef93d069ebc1703f761f1ff271accd8bd7f6bf27012f8ebea5d4391226328b7d211ee2e3c69d
SSDEEP
12288:8QO0gQTLCYLLM9YC9iR8Qjd5KLe8CCWXe8nKbuVh:8x0gQTLvLBR8a7KLlCCWXe8nKa
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\dailybuild_fix\wegame_client\build\lib\Release\tcls.pdb
GetProcessImageFileNameW
GetModuleFileNameExW
GetModuleFileNameExA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
DebugBreak
GetModuleFileNameW
GetModuleHandleW
WideCharToMultiByte
CreateThread
TerminateThread
WaitForSingleObject
GetFileSize
CloseHandle
GetPrivateProfileStringW
CreateFileW
MoveFileExW
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
LoadLibraryW
OutputDebugStringW
WinExec
lstrcpynW
lstrcatW
lstrlenW
CopyFileW
MultiByteToWideChar
OpenProcess
GetLastError
SetLastError
FindClose
MapViewOfFile
UnmapViewOfFile
CreateMutexW
OpenFileMappingA
GetLogicalDriveStringsW
QueryDosDeviceW
SetFileAttributesW
GetFileAttributesW
FindFirstFileW
FindNextFileW
Process32FirstW
Process32NextW
FlushInstructionCache
VirtualAlloc
VirtualFree
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetTickCount
OpenMutexW
CreateEventW
CreateProcessW
GetCommandLineW
WritePrivateProfileStringW
GetDiskFreeSpaceExW
DeleteFileW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
WriteFile
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
HeapSize
GetTimeZoneInformation
HeapReAlloc
SetStdHandle
FlushFileBuffers
GetFullPathNameW
GetCurrentDirectoryW
GetConsoleCP
GetConsoleMode
CreateToolhelp32Snapshot
SetEndOfFile
SetFilePointerEx
ReadConsoleW
EncodePointer
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
GetFileAttributesExW
CreateDirectoryW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
GetStdHandle
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
PostMessageW
SetWindowLongW
GetWindowLongW
UpdateWindow
ShowWindow
DestroyWindow
CreateWindowExW
DefWindowProcW
GetWindowThreadProcessId
FindWindowExW
KillTimer
SetTimer
PostQuitMessage
GetWindowRect
SetForegroundWindow
FindWindowW
IsWindow
ShellExecuteW
SHGetSpecialFolderPathW
SHFileOperationW
RegOpenKeyExW
RegCloseKey
RegQueryValueW
inet_addr
CreateComponent
GetComponentIDs
SetDLLRegistry
SetFactoryHandle
TenioDllCanUnloadNow
TenioDllFreeMap
TenioSetDllSafe
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ