Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
AppxPackaging.dll
Resource
win10v2004-20240426-en
Target
AppxPackaging.dll
Size
996KB
MD5
5bdc446adc47bfa7c91fb156d7148072
SHA1
bdf1aef51a83afb89d2c610ed3ea97e77181b14b
SHA256
e2a003e0a109ba2badf64860dc2fdbc2dd024aafc9814df92ef41d4ea65cf055
SHA512
f173af0e9ab394c133cc82d7913e76aed8feef3294f21629f239a98a241289d0b6220b4c9cb608167803d8f776e73744178c217e2384924992ce1caf3c00fe33
SSDEEP
12288:LJY+EBqFdG8afzT2YSwrLTy8+Y1/Q7ulgg7/XpRxuHDrZCbcJiY3Gzwy:dKBadbaf2YSwrLTy8+Y16qN4BCb+iYWr
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AppxPackaging.pdb
RtlIsGenericTableEmptyAvl
_vsnwprintf
_wcsnicmp
_vsnwprintf_s
wcschr
memmove
_strnicmp
wcscpy_s
towlower
wcsstr
memcpy
memset
RtlAllocateHeap
RtlReAllocateHeap
RtlSetBits
RtlFreeHeap
memcpy_s
RtlInitializeCriticalSection
RtlDeleteCriticalSection
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlReportException
RtlLookupElementGenericTableAvl
RtlInitializeGenericTableAvl
qsort
RtlInsertElementGenericTableAvl
RtlNumberGenericTableElementsAvl
RtlFreeUnicodeString
_wcsicmp
wcsncmp
RtlClearAllBits
RtlAllocateAndInitializeSid
RtlDowncaseUnicodeString
RtlInitUnicodeString
RtlConvertSidToUnicodeString
RtlInitializeBitMap
RtlFreeSid
RtlNtStatusToDosError
RtlDeleteElementGenericTableAvl
RtlEnumerateGenericTableWithoutSplayingAvl
wcsrchr
RtlSetLastWin32Error
NtQuerySystemInformation
_chkstk
memcmp
RtlUnwind
EventRegister
EventUnregister
EventWrite
LeaveCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
InitializeCriticalSectionEx
SizeofResource
GetProcAddress
FreeLibrary
GetModuleHandleExW
LoadResource
GetModuleHandleW
LoadLibraryExA
FindStringOrdinal
DisableThreadLibraryCalls
LoadLibraryExW
LockResource
UnhandledExceptionFilter
SetLastError
SetUnhandledExceptionFilter
RaiseException
GetLastError
DecodePointer
QueryPerformanceCounter
TerminateProcess
GetCurrentThreadId
TlsSetValue
GetCurrentProcess
OpenThreadToken
GetCurrentThread
GetCurrentProcessId
TlsAlloc
TlsGetValue
GetSystemTime
GetTickCount
GetVersionExW
GetSystemTimeAsFileTime
ord4
ord7
ord9
ord15
ord8
ord16
ord10
ord12
ord11
CreateUri
FormatMessageW
OutputDebugStringW
DebugBreak
WideCharToMultiByte
CompareStringEx
CompareStringW
CompareStringOrdinal
GetTempPathW
CoInitializeEx
CoTaskMemFree
CoCreateInstance
IIDFromString
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemAlloc
StringFromGUID2
DeleteFileW
GetFileAttributesW
CreateDirectoryW
DeleteFileA
CreateFileW
GetFileSize
GetFullPathNameW
FindResourceW
DosDateTimeToFileTime
GetEnvironmentVariableW
LocalFree
ImpersonateLoggedOnUser
GetSidSubAuthorityCount
GetLengthSid
RevertToSelf
GetSidSubAuthority
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
PathCreateFromUrlW
UrlIsW
PathFileExistsW
CloseHandle
VirtualAlloc
VirtualFree
DelayLoadFailureHook
CreateErrorInfo
SysAllocString
GetErrorInfo
SysStringLen
VariantInit
VariantClear
SysAllocStringLen
SetErrorInfo
SysFreeString
CreateXmlReader
DeviceIoControl
CompareStringA
TraceMessage
HeapAlloc
HeapFree
GetProcessHeap
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ