Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
Windows.Storage.ApplicationData.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Windows.Storage.ApplicationData.dll
Resource
win10v2004-20240426-en
Target
Windows.Storage.ApplicationData.dll
Size
147KB
MD5
0f5b44710f53e7d04f66fe1b0872e830
SHA1
bc8efdeea174e0fdcdf2bebb94450171d55932af
SHA256
48043bf01671e5863da76949289a731fc204bbdaf6cff7d1dc95c2504b6ceba9
SHA512
f9bdd8a36180eaaf78a2d9a496b4c46648ae45bab16a03e679557fe49ba19e38123d1d5fd760244dc4aaaf04f925f6feca3909689b243c9b45ddecc8c702a668
SSDEEP
3072:94kor9Li2i/HzJlcF5UCLkLg386DUHwqIrIn04DQj1kPTekw7x04i:e+ykLO86DgvIM04D9J+Di
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Windows.Storage.ApplicationData.pdb
__CxxFrameHandler3
_vsnwprintf
_onexit
__dllonexit
_except_handler4_common
_unlock
_lock
_initterm
malloc
free
_amsg_exit
memcpy
??3@YAXPAX@Z
memcmp
_ftol2
_XcptFilter
_purecall
??2@YAPAXI@Z
memset
PsmQueryCurrentAppState
ReleaseSRWLockShared
ResetEvent
CreateEventExW
AcquireSRWLockShared
WaitForSingleObject
Sleep
SetEvent
InitializeSRWLock
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
CreateEventW
InitOnceExecuteOnce
EncodePointer
DecodePointer
NdrClientCall2
RpcBindingSetAuthInfoExW
RpcStringFreeW
RpcBindingFromStringBindingW
RpcStringBindingComposeW
I_RpcExceptionFilter
NdrDllGetClassObject
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
CStdStubBuffer_AddRef
IUnknown_QueryInterface_Proxy
NdrOleFree
NdrStubForwardingFunction
NdrOleAllocate
CStdStubBuffer_CountRefs
NdrStubCall2
IUnknown_Release_Proxy
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_QueryInterface
IUnknown_AddRef_Proxy
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_Disconnect
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Connect
NdrCStdStubBuffer_Release
QueryPerformanceCounter
ProcessIdToSessionId
OpenThreadToken
GetCurrentProcess
GetCurrentThread
GetCurrentProcessId
GetCurrentThreadId
OpenProcessToken
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
GetSystemDirectoryW
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
CompareFileTime
FindClose
FindFirstFileW
SetFileAttributesW
DeleteFileW
RemoveDirectoryW
GetDiskFreeSpaceExW
FindNextFileW
RegGetValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
GetLengthSid
CopySid
IsValidSecurityDescriptor
GetTokenInformation
GetModuleHandleExW
LoadStringW
CloseHandle
WaitForThreadpoolWaitCallbacks
CloseThreadpoolWork
CloseThreadpoolWait
CreateThreadpoolWork
SetThreadpoolWait
CreateThreadpoolWait
SubmitThreadpoolWork
FreeLibraryWhenCallbackReturns
CompareStringOrdinal
RaiseFailFastException
ApiSetQueryApiSetPresence
EtwEventWrite
RtlNtStatusToDosErrorNoTeb
EtwEventUnregister
EtwEventRegister
EtwEventEnabled
RtlGetAppContainerSidType
NtQueryInformationToken
RtlReleaseSRWLockShared
RtlInitializeSRWLock
RtlReleaseSRWLockExclusive
WinSqmSetString
RtlAcquireSRWLockExclusive
WinSqmSetDWORD
RtlAcquireSRWLockShared
WinSqmIncrementDWORD
NtSetInformationThread
NtQueryInformationThread
RtlLeaveCriticalSection
RtlAllocateHeap
RtlFreeHeap
RtlGetLastWin32Error
RtlEnterCriticalSection
RtlDeleteCriticalSection
RtlInitializeCriticalSection
ord13
ord33
ord11
ord16
ord7
ord14
ord6
ord17
ord32
ord10
ord12
ord5
ord9
ord2
ord8
ord34
ord15
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
LocalFree
ResolveDelayLoadedAPI
DelayLoadFailureHook
CleanupTemporaryState
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ