Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
AppxPackaging.dll
Resource
win10v2004-20240508-en
Target
AppxPackaging.dll
Size
996KB
MD5
a726e87e35fd30188f904abd640c3ee8
SHA1
c497aebdc0314655ab8101682b2ea7ec9f5df8a1
SHA256
bc6aeddb94bd2a5e4605168c20bede888d45d3e8ee19ba030c2709c1b4175ecb
SHA512
8e7507727500b1c3a703cc15dc5cf601cd5de8019d44bfa5d4a7e660ee6393940d2588f6cb7ab015063c0bcfae7a78f10ad99c7a863d40779fa5d8c593906d61
SSDEEP
12288:pY+kBqTdWF7IsQ6UDloynqK72WAcFclptQvifoHL7cqDBGG/:piB8dMUsQ6UDloynqKFXmpOfcuBZ/
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AppxPackaging.pdb
RtlIsGenericTableEmptyAvl
_vsnwprintf
_wcsnicmp
_vsnwprintf_s
wcschr
memmove
_strnicmp
wcscpy_s
towlower
wcsstr
memcpy
memset
RtlAllocateHeap
RtlReAllocateHeap
RtlSetBits
RtlFreeHeap
memcpy_s
RtlInitializeCriticalSection
RtlDeleteCriticalSection
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlReportException
RtlLookupElementGenericTableAvl
RtlInitializeGenericTableAvl
qsort
RtlInsertElementGenericTableAvl
RtlNumberGenericTableElementsAvl
RtlFreeUnicodeString
_wcsicmp
wcsncmp
RtlClearAllBits
RtlAllocateAndInitializeSid
RtlDowncaseUnicodeString
RtlInitUnicodeString
RtlConvertSidToUnicodeString
RtlInitializeBitMap
RtlFreeSid
RtlNtStatusToDosError
RtlDeleteElementGenericTableAvl
RtlEnumerateGenericTableWithoutSplayingAvl
wcsrchr
RtlSetLastWin32Error
NtQuerySystemInformation
_chkstk
memcmp
RtlUnwind
EventRegister
EventUnregister
EventWrite
LeaveCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
InitializeCriticalSectionEx
SizeofResource
GetProcAddress
FreeLibrary
GetModuleHandleExW
LoadResource
GetModuleHandleW
LoadLibraryExA
FindStringOrdinal
DisableThreadLibraryCalls
LoadLibraryExW
LockResource
UnhandledExceptionFilter
SetLastError
SetUnhandledExceptionFilter
RaiseException
GetLastError
DecodePointer
QueryPerformanceCounter
TerminateProcess
GetCurrentThreadId
TlsSetValue
GetCurrentProcess
OpenThreadToken
GetCurrentThread
GetCurrentProcessId
TlsAlloc
TlsGetValue
GetSystemTime
GetTickCount
GetVersionExW
GetSystemTimeAsFileTime
ord4
ord7
ord9
ord15
ord8
ord16
ord10
ord12
ord11
CreateUri
FormatMessageW
OutputDebugStringW
DebugBreak
WideCharToMultiByte
CompareStringEx
CompareStringW
CompareStringOrdinal
GetTempPathW
CoInitializeEx
CoTaskMemFree
CoCreateInstance
IIDFromString
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemAlloc
StringFromGUID2
DeleteFileW
GetFileAttributesW
CreateDirectoryW
DeleteFileA
CreateFileW
GetFileSize
GetFullPathNameW
FindResourceW
DosDateTimeToFileTime
GetEnvironmentVariableW
LocalFree
ImpersonateLoggedOnUser
GetSidSubAuthorityCount
GetLengthSid
RevertToSelf
GetSidSubAuthority
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
PathCreateFromUrlW
UrlIsW
PathFileExistsW
CloseHandle
VirtualAlloc
VirtualFree
DelayLoadFailureHook
CreateErrorInfo
SysAllocString
GetErrorInfo
SysStringLen
VariantInit
VariantClear
SysAllocStringLen
SetErrorInfo
SysFreeString
CreateXmlReader
DeviceIoControl
CompareStringA
TraceMessage
HeapAlloc
HeapFree
GetProcessHeap
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ