Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
Faultrep.dll
Resource
win10v2004-20240426-en
Target
Faultrep.dll
Size
378KB
MD5
adc0c54c30ebdcf959be07a3270d7a6a
SHA1
6e38c86e0d86cb56085ac3b6323238234d86778e
SHA256
c9fae3b5c3424c80705347cc400b5d09b8aef1bb3f1ff3edff69e2d5a75363a4
SHA512
e3092342e6033b92843cba6f0254ec6bf85d0f33386c5f8c8345d445400e16794205aaea2b02bdcaf7f163c7fbcaf81ab2c187405e6ade282d6bc380ea611d3c
SSDEEP
6144:EjrlSAIkzEXBCk7zI2n6KxnYEqdTTVr50dhyZoVpZRE0maNVJyB60OHyLC7vD:qrlSAIkzSzI2nf9FuVlc9DnmCc2HywL
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FaultRep.pdb
_purecall
rand_s
??1exception@@UAE@XZ
__CxxFrameHandler3
memcpy_s
_except_handler4_common
_lock
??1type_info@@UAE@XZ
_vsnwprintf
_callnewh
_unlock
malloc
memmove
_amsg_exit
srand
time
rand
_XcptFilter
printf
?terminate@@YAXXZ
_onexit
__dllonexit
realloc
_vsnprintf_s
??0exception@@QAE@ABV0@@Z
_initterm
_CxxThrowException
??0exception@@QAE@XZ
_local_unwind4
memcmp
memcpy
free
memset
GetModuleHandleW
GetModuleFileNameW
FreeLibraryAndExitThread
LoadLibraryExW
GetProcAddress
FreeLibrary
LoadStringW
GetModuleFileNameA
GetModuleHandleExW
DisableThreadLibraryCalls
OpenMutexW
CreateSemaphoreExW
ResetEvent
CreateMutexW
WaitForSingleObjectEx
OpenSemaphoreW
InitializeSRWLock
SetEvent
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
InitializeCriticalSectionEx
ReleaseSRWLockExclusive
CreateEventW
CreateMutexExW
AcquireSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockShared
WaitForSingleObject
ReleaseSemaphore
OpenEventW
GetProcessHeap
HeapFree
HeapAlloc
SetUnhandledExceptionFilter
SetErrorMode
GetLastError
SetLastError
UnhandledExceptionFilter
RaiseException
GetExitCodeProcess
CreateProcessW
OpenProcessToken
CreateRemoteThread
GetThreadId
CreateThread
GetProcessTimes
GetExitCodeThread
OpenThread
GetProcessId
GetThreadPriority
GetCurrentProcessId
TerminateProcess
DeleteProcThreadAttributeList
GetCurrentThread
UpdateProcThreadAttribute
SetThreadPriority
GetCurrentThreadId
GetCurrentProcess
InitializeProcThreadAttributeList
FormatMessageW
LCMapStringW
IsDebuggerPresent
DebugBreak
OutputDebugStringW
DuplicateHandle
CloseHandle
EventRegister
EventWrite
EventUnregister
EventWriteTransfer
EventSetInformation
Sleep
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemInfo
GetVersionExW
GlobalMemoryStatusEx
GetSystemTimeAsFileTime
GetTickCount64
GetSystemDirectoryW
GetWindowsDirectoryW
GetTickCount
MultiByteToWideChar
CompareStringW
LocalFree
GetSystemWow64DirectoryW
GetSystemWow64Directory2W
IsWow64Process2
RtlAcquireSRWLockExclusive
RtlReleaseSRWLockExclusive
wcscpy_s
NtCreateFile
NtDeviceIoControlFile
NtAllocateVirtualMemory
NtFreeVirtualMemory
RtlAdjustPrivilege
_wcstoui64
DbgPrint
isspace
RtlSetThreadErrorMode
RtlFreeHeap
RtlAllocateHeap
tolower
memmove_s
RtlNtStatusToDosError
RtlDecodeSystemPointer
NtClearEvent
NtWaitForMultipleObjects
RtlSetCurrentTransaction
RtlGetCurrentTransaction
RtlGetNtSystemRoot
RtlDetermineDosPathNameType_U
NtQueryValueKey
RtlInitUnicodeStringEx
NtOpenKey
wcsstr
RtlReleasePebLock
wcsncmp
RtlTryAcquirePebLock
RtlGetUnloadEventTraceEx
ZwQueryInformationThread
EtwCheckCoverage
NtSetInformationProcess
towlower
NtResumeProcess
NtSuspendThread
NtResumeThread
NtSuspendProcess
RtlSubAuthorityCountSid
RtlIdentifierAuthoritySid
ShipAssert
NtSetSystemInformation
RtlWakeAllConditionVariable
PssNtFreeSnapshot
ZwQueryWnfStateNameInformation
ZwUpdateWnfStateData
EtwEventWriteNoRegistration
NtQuerySystemInformation
NtOpenEvent
NtWaitForSingleObject
RtlAllocateAndInitializeSid
RtlInitUnicodeString
NtAlpcConnectPort
NtAlpcSendWaitReceivePort
RtlFreeSid
RtlQueryResourcePolicy
NtOpenProcess
RtlCompareUnicodeString
RtlNtStatusToDosErrorNoTeb
NtQueryInformationToken
NtQueryLicenseValue
NtQueryInformationThread
RtlImageNtHeaderEx
NtQueryEvent
NtSetInformationFile
RtlSecondsSince1970ToTime
swprintf_s
wcscat_s
wcsncpy_s
RtlCompareMemory
NtSystemDebugControl
RtlWerpReportException
RtlCreateProcessReflection
PssNtCaptureSnapshot
NtClose
wcsrchr
NtQueryInformationProcess
_wtoi
wcschr
iswspace
_wcsicmp
_wcsnicmp
_vscwprintf
DbgPrintEx
EtwUnregisterTraceGuids
EtwRegisterTraceGuidsW
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
EtwGetTraceLoggerHandle
EtwTraceMessage
RtlSleepConditionVariableSRW
CreateProcessAsUserW
I_QueryTagInformation
MiniDumpWriteDump
GetApplicationRecoveryCallback
WerGetFlags
ApiSetQueryApiSetPresence
ResolveDelayLoadedAPI
DelayLoadFailureHook
CStdStubBuffer_Connect
CStdStubBuffer_IsIIDSupported
IUnknown_QueryInterface_Proxy
CStdStubBuffer_Disconnect
CStdStubBuffer_DebugServerRelease
NdrOleAllocate
CStdStubBuffer_QueryInterface
CStdStubBuffer_CountRefs
IUnknown_Release_Proxy
UuidToStringW
NdrOleFree
CStdStubBuffer_DebugServerQueryInterface
IUnknown_AddRef_Proxy
CStdStubBuffer_Invoke
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
UuidCreate
CStdStubBuffer_AddRef
RpcStringFreeW
ObjectStublessClient5
ObjectStublessClient3
ObjectStublessClient4
CoInitializeEx
CoTaskMemAlloc
CoImpersonateClient
CoUninitialize
CoRevertToSelf
CoSetProxyBlanket
CoGetMalloc
CoUnmarshalInterface
CoTaskMemFree
CoCreateInstance
OpenProcess
GetThreadContext
ReadFile
WriteFile
GetDriveTypeW
QueryDosDeviceW
GetLogicalDriveStringsW
GetFinalPathNameByHandleW
GetFileAttributesW
SetFileAttributesW
FlushFileBuffers
SetFilePointerEx
DeleteFileW
FindFirstFileW
FindClose
GetTempFileNameW
CreateDirectoryW
GetLongPathNameW
SetEndOfFile
FindNextFileW
CreateFileW
LookupPrivilegeValueW
LookupAccountSidW
AllocateAndInitializeSid
GetLengthSid
AdjustTokenPrivileges
GetSidSubAuthority
GetTokenInformation
GetSidSubAuthorityCount
CopySid
RevertToSelf
DuplicateToken
ImpersonateLoggedOnUser
CheckTokenMembership
FreeSid
CreateWellKnownSid
IsValidSid
WaitForThreadpoolTimerCallbacks
SetThreadpoolWait
CloseThreadpoolWait
CreateThreadpoolWait
WaitForThreadpoolWaitCallbacks
CloseThreadpoolTimer
SetThreadpoolTimer
CreateThreadpoolTimer
K32GetMappedFileNameW
K32EnumProcessModules
K32GetModuleFileNameExW
QueryFullProcessImageNameW
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
WaitForMultipleObjects
SetThreadErrorMode
VirtualFreeEx
MapViewOfFile
VirtualAllocEx
UnmapViewOfFile
VirtualQuery
VirtualAlloc
WriteProcessMemory
VirtualQueryEx
VirtualFree
CreateFileMappingW
ReadProcessMemory
PssWalkMarkerFree
PssQuerySnapshot
PssDuplicateSnapshot
PssWalkMarkerCreate
PssFreeSnapshot
GetTempPathW
SearchPathW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
StartServiceW
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
RegGetKeySecurity
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetKeySecurity
RegGetValueW
RoGetActivationFactory
RoInitialize
RoUninitialize
CheckRemoteDebuggerPresent
WindowsCreateStringReference
IsWow64Process
RegSetKeyValueW
LoadLibraryW
StartTraceW
VerQueryValueW
GetFileVersionInfoSizeExW
GetFileVersionInfoExW
FileTimeToSystemTime
RegDeleteKeyA
RegDeleteKeyW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CommandLineToArgvW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
Module32FirstW
Module32NextW
Process32NextW
Process32FirstW
StrStrIW
BuildSecurityDescriptorW
GetUserDefaultUILanguage
AddERExcludedApplicationA
AddERExcludedApplicationW
BasepReportFault
CancelHangReporting
CheckForReadOnlyResourceFilter
CheckPerUserCrossProcessThrottle
DllCanUnloadNow
DllGetClassObject
ReportCoreHang
ReportFault
ReportHang
UpdatePerUserLastCrossProcessCollectionTime
WerReportHang
WerpGetDebugger
WerpInitiateCrashReporting
WerpLaunchAeDebug
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ