Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
77eeb0bc1ccf7c21cbc922120351087c8469c2161b12800fa4efcf9aa29a402b_AppvIsvSubsystems64.dll
Resource
win10v2004-20231020-en
Target
77eeb0bc1ccf7c21cbc922120351087c8469c2161b12800fa4efcf9aa29a402b_AppvIsvSubsystems64.dll
Size
1.9MB
MD5
b01f0b474e0b0655088b51f9403a2eeb
SHA1
d23fab2959049c7432c79fa71bf00cb9eaa81032
SHA256
77eeb0bc1ccf7c21cbc922120351087c8469c2161b12800fa4efcf9aa29a402b
SHA512
f356dafeea36a07fb86b7c9046af8bbffd800a60a0b3d0bdab394aca10f89aed37a8e15bf76fdc93551e8addba026b32b0cf7dc7e9f460eb71df8049afc55061
SSDEEP
49152:kQnyn7JbCRS8P9dekKVP6sk7Wxobwl1+y46c6icrBFDhkixo4y70heNruv93A0rc:fnoK8y
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
APIExportForDetours
CurrentThreadIsVirtualized
IsProcessHooked
RequestUnhookedFunctionList
VirtualizeCurrentProcess
VirtualizeCurrentThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ