Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
DeviceReactivation.dll
Resource
win10v2004-20240508-en
Target
DeviceReactivation.dll
Size
67KB
MD5
fde49e8532395549ddd56a20cd2ea9a5
SHA1
b2b0c7d71e9383d79a4d6fbb38a5a67e5eeca5e3
SHA256
18daf549c52d028c16234eac9dbe38ebf86926dce55f993fd67e52d86aed6af3
SHA512
2fa6575c861b26cf078dee3d1caf51b2929f1a696faa6d9a4e0bf6b8a5214cff519d7acb66b6b8d5d38a64b68e86cec250caf32f24b71446804c29e5617df32f
SSDEEP
1536:va+QExbu3sUi1G6OaMMJtO3BPpshjK5Pmz72:S+fxbqsUi1GfaMatORPpspK5O/2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeviceReactivation.pdb
free
malloc
_vsnwprintf
_amsg_exit
_lock
_XcptFilter
_unlock
_vsnprintf_s
__dllonexit
__CxxFrameHandler3
_onexit
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??3@YAXPAX@Z
memcpy_s
_initterm
memmove
memcpy
_CxxThrowException
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@ABQBD@Z
_callnewh
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_purecall
_except_handler4_common
memcmp
??0exception@@QAE@XZ
memset
GetProcAddress
DisableThreadLibraryCalls
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
ReleaseMutex
WaitForSingleObjectEx
WaitForSingleObject
ReleaseSemaphore
OpenSemaphoreW
CreateMutexExW
AcquireSRWLockExclusive
ReleaseSRWLockShared
ReleaseSRWLockExclusive
CreateSemaphoreExW
AcquireSRWLockShared
HeapAlloc
GetProcessHeap
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
SetLastError
GetLastError
DecodePointer
EncodePointer
OpenProcessToken
TerminateProcess
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
FormatMessageW
OutputDebugStringW
IsDebuggerPresent
DebugBreak
CloseHandle
InitOnceExecuteOnce
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
IUnknown_Release_Proxy
NdrDllGetClassObject
CStdStubBuffer_Connect
NdrDllCanUnloadNow
CStdStubBuffer_IsIIDSupported
IUnknown_QueryInterface_Proxy
NdrCStdStubBuffer_Release
CStdStubBuffer_Disconnect
CStdStubBuffer_DebugServerRelease
NdrOleAllocate
CStdStubBuffer_QueryInterface
CStdStubBuffer_CountRefs
CStdStubBuffer_Invoke
NdrStubForwardingFunction
NdrStubCall2
IUnknown_AddRef_Proxy
CStdStubBuffer_AddRef
CStdStubBuffer_DebugServerQueryInterface
NdrOleFree
NdrCStdStubBuffer2_Release
ObjectStublessClient3
CStdStubBuffer2_QueryInterface
NdrProxyForwardingFunction4
CStdStubBuffer2_CountRefs
CStdStubBuffer2_Disconnect
ObjectStublessClient6
ObjectStublessClient8
NdrProxyForwardingFunction3
CStdStubBuffer2_Connect
NdrProxyForwardingFunction5
ObjectStublessClient7
RegGetValueW
RoGetActivationFactory
OpenProcess
GetTokenInformation
DuplicateTokenEx
SHTaskPoolAllowThreadReuse
SHTaskPoolQueueTask
ResolveDelayLoadedAPI
DelayLoadFailureHook
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ