Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
AppxPackaging.dll
Resource
win10v2004-20240508-en
Target
AppxPackaging.dll
Size
996KB
MD5
9e832760e021b117cc9103265658fc80
SHA1
4e4a4ca1c39f23b03c676348599612378b22c16e
SHA256
954d635f468c10faa5da86847c6d1304ed528af72e60d87c475ed848765ac22c
SHA512
4ec307cf8c8ff6ada66ccdcdbe1b89478617f8019fccc5ed642d40799f346df6f6cd44f64b8d2338fb43e6f41476a0e4faf4d37e28f987ac95af90b4ad004fb7
SSDEEP
12288:wJY+QBqFdr8afzT2YSwrLTy8+Y1CQ7ulggb/XpRxuHDrZCbcJi3AGzw:ImBadQaf2YSwrLTy8+Y1jqt4BCb+i33
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AppxPackaging.pdb
RtlIsGenericTableEmptyAvl
_vsnwprintf
_wcsnicmp
_vsnwprintf_s
wcschr
memmove
_strnicmp
wcscpy_s
towlower
wcsstr
memcpy
memset
RtlAllocateHeap
RtlReAllocateHeap
RtlSetBits
RtlFreeHeap
memcpy_s
RtlInitializeCriticalSection
RtlDeleteCriticalSection
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlReportException
RtlLookupElementGenericTableAvl
RtlInitializeGenericTableAvl
qsort
RtlInsertElementGenericTableAvl
RtlNumberGenericTableElementsAvl
RtlFreeUnicodeString
_wcsicmp
wcsncmp
RtlClearAllBits
RtlAllocateAndInitializeSid
RtlDowncaseUnicodeString
RtlInitUnicodeString
RtlConvertSidToUnicodeString
RtlInitializeBitMap
RtlFreeSid
RtlNtStatusToDosError
RtlDeleteElementGenericTableAvl
RtlEnumerateGenericTableWithoutSplayingAvl
wcsrchr
RtlSetLastWin32Error
NtQuerySystemInformation
_chkstk
memcmp
RtlUnwind
EventRegister
EventUnregister
EventWrite
LeaveCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
InitializeCriticalSectionEx
SizeofResource
GetProcAddress
FreeLibrary
GetModuleHandleExW
LoadResource
GetModuleHandleW
LoadLibraryExA
FindStringOrdinal
DisableThreadLibraryCalls
LoadLibraryExW
LockResource
UnhandledExceptionFilter
SetLastError
SetUnhandledExceptionFilter
RaiseException
GetLastError
DecodePointer
QueryPerformanceCounter
TerminateProcess
GetCurrentThreadId
TlsSetValue
GetCurrentProcess
OpenThreadToken
GetCurrentThread
GetCurrentProcessId
TlsAlloc
TlsGetValue
GetSystemTime
GetTickCount
GetVersionExW
GetSystemTimeAsFileTime
ord4
ord7
ord9
ord15
ord8
ord16
ord10
ord12
ord11
CreateUri
FormatMessageW
OutputDebugStringW
DebugBreak
WideCharToMultiByte
CompareStringEx
CompareStringW
CompareStringOrdinal
GetTempPathW
CoInitializeEx
CoTaskMemFree
CoCreateInstance
IIDFromString
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemAlloc
StringFromGUID2
DeleteFileW
GetFileAttributesW
CreateDirectoryW
DeleteFileA
CreateFileW
GetFileSize
GetFullPathNameW
FindResourceW
DosDateTimeToFileTime
GetEnvironmentVariableW
LocalFree
ImpersonateLoggedOnUser
GetSidSubAuthorityCount
GetLengthSid
RevertToSelf
GetSidSubAuthority
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
PathCreateFromUrlW
UrlIsW
PathFileExistsW
CloseHandle
VirtualAlloc
VirtualFree
DelayLoadFailureHook
CreateErrorInfo
SysAllocString
GetErrorInfo
SysStringLen
VariantInit
VariantClear
SysAllocStringLen
SetErrorInfo
SysFreeString
CreateXmlReader
DeviceIoControl
CompareStringA
TraceMessage
HeapAlloc
HeapFree
GetProcessHeap
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ