Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
PCPKsp.dll
Resource
win10v2004-20240508-en
Target
PCPKsp.dll
Size
867KB
MD5
d230060662eb7b05f081a0438776e571
SHA1
965ce80447be805868f4cc2703c92c6b403857ba
SHA256
a8b30f3856f352ee58cd70d706e551151ea680998bcbef49c9cfdda66f0b8645
SHA512
c8a15e68643b5abdf7034ad264d76cbd390236b30537ded38777a840fb82029009c752bf6a7a866ae808e42111185ef41398e2cb263cac93fd438cd5a7c33858
SSDEEP
12288:pvcPnHFemTp+JvVqMcD8EHlPj0qr434Uj0mR+tSCnDxK4rOIu:+Hrp+JkMcD8EFPLraWbSCDxK4rZu
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PCPKsp.pdb
memcpy
_XcptFilter
_CxxThrowException
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@ABQBD@Z
_wcsicmp
_amsg_exit
wcsncmp
strncmp
_unlock
free
time
srand
memmove_s
__dllonexit
_onexit
malloc
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_vsnprintf_s
??0exception@@QAE@ABV0@@Z
memmove
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_purecall
_except_handler4_common
memcmp
_initterm
_lock
__CxxFrameHandler3
memcpy_s
_vsnwprintf
rand
memset
LoadLibraryExW
GetModuleHandleExW
GetProcAddress
DisableThreadLibraryCalls
LoadStringW
FreeLibrary
GetModuleFileNameA
GetModuleHandleW
OpenSemaphoreW
InitializeCriticalSection
AcquireSRWLockShared
ReleaseSRWLockShared
CreateMutexExW
WaitForSingleObjectEx
CreateSemaphoreExW
DeleteCriticalSection
EnterCriticalSection
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSemaphore
LeaveCriticalSection
ReleaseSRWLockExclusive
InitializeCriticalSectionEx
ReleaseMutex
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
InitializeSRWLock
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
SetUnhandledExceptionFilter
SetLastError
UnhandledExceptionFilter
CreateThreadpoolTimer
CloseThreadpoolTimer
WaitForThreadpoolTimerCallbacks
SetThreadpoolTimer
TerminateProcess
OpenThreadToken
GetCurrentThread
OpenProcessToken
GetCurrentProcessId
GetCurrentProcess
GetCurrentThreadId
FormatMessageW
DebugBreak
OutputDebugStringW
IsDebuggerPresent
CloseHandle
RegSetKeyValueW
RegQueryValueExW
RegCloseKey
RegEnumValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegGetValueW
EventRegister
EventActivityIdControl
EventSetInformation
EventWriteTransfer
EventUnregister
Sleep
InitOnceBeginInitialize
InitOnceComplete
GetSystemTimeAsFileTime
GetTickCount
GetTickCount64
LocalFree
LocalAlloc
FindFirstFileW
FindNextFileW
GetFileAttributesExW
GetFileAttributesW
CreateDirectoryW
FindClose
CompareFileTime
FlushFileBuffers
WriteFile
ReadFile
GetFileSize
DeleteFileW
CreateFileW
GetFileTime
GetTokenInformation
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorSacl
GetSecurityDescriptorLength
GetSecurityDescriptorOwner
QueryPerformanceCounter
RtlGetPersistedStateLocation
RtlNtStatusToDosError
ResolveDelayLoadedAPI
DelayLoadFailureHook
DllInstall
DllMain
DllUnregisterServer
GetKeyStorageInterface
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ