Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5b415d64e043098bf6b42edfdb3d3000N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5b415d64e043098bf6b42edfdb3d3000N.dll
Resource
win10v2004-20240802-en
Target
5b415d64e043098bf6b42edfdb3d3000N
Size
335KB
MD5
5b415d64e043098bf6b42edfdb3d3000
SHA1
fa025b674b69e09ab3b9a3c537f8aeae8a681b72
SHA256
31a1d72d8aa0bb944585cb1c310820f403593a4bc3d398043bdad3cbf81f8b9e
SHA512
08a7dcc84889835ed0ee85846d1f62d2c169b37351082485b184d4b6c38430d12c7e901ca6bc029f0da18fe39bee31793da15a2fe3428795fab6cdf0d68d37db
SSDEEP
3072:ZCCXAt35oeqVI3VEpnvwebPT1TYOe1eHewI3A5tG/Tbq/+daDqrL21P9e90cPDUZ:VQU5gWRBbPT1TYOBHKoeHJ9hx8Bt
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
E:\trunk\CSP\out\x64\debug\cpui.pdb
CertCreateCertificateContext
CertFreeCertificateContext
ord137
ord141
ord10
ord37
ord173
GetLocaleInfoW
SetLastError
GetLastError
DeactivateActCtx
OutputDebugStringA
ActivateActCtx
LoadLibraryW
GetModuleHandleExW
CreateActCtxW
FindActCtxSectionStringW
GetModuleFileNameW
WideCharToMultiByte
DisableThreadLibraryCalls
CreateEventW
SetEvent
WaitForSingleObject
CloseHandle
FreeLibrary
GetModuleHandleW
LoadLibraryExW
GetProcAddress
lstrcmpiW
FlushFileBuffers
QueryActCtxW
HeapDestroy
LocalAlloc
LocalFree
LoadLibraryA
RaiseException
SetErrorMode
GetLongPathNameW
HeapSize
HeapValidate
IsBadReadPtr
RtlUnwindEx
GetCurrentThreadId
FlsSetValue
GetCommandLineA
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetModuleFileNameA
CreateFileW
GetVersion
HeapCreate
HeapSetInformation
HeapReAlloc
HeapQueryInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapFree
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
FlsGetValue
FlsAlloc
FlsFree
MultiByteToWideChar
LCMapStringW
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteFile
WriteConsoleW
OutputDebugStringW
GetStringTypeW
GetProcessHeap
VirtualQuery
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlPcToFileHeader
SetStdHandle
GetObjectW
CreateFontIndirectW
DeleteObject
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
cpui_display_message
cpui_query_pin
cpui_select_container
cpuifkc_query_pin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ