Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
81e356050e865cd7bd55b962045fc4b4211a18b436e395aa8d6395ef2ced954c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81e356050e865cd7bd55b962045fc4b4211a18b436e395aa8d6395ef2ced954c.dll
Resource
win10v2004-20240611-en
Target
81e356050e865cd7bd55b962045fc4b4211a18b436e395aa8d6395ef2ced954c
Size
2.5MB
MD5
93b8cbd2876c433dc0749d60734c26ab
SHA1
c1fc45e437bbb7cb44a1b7ba8d476bd3f89c76b2
SHA256
81e356050e865cd7bd55b962045fc4b4211a18b436e395aa8d6395ef2ced954c
SHA512
b2de70eda9c56a1776d73b9071e4bd36f06462132aadeb232e0233e5972403b56fd4a2e1fc8a6755f97b98e6c9d9db31376c34162d65dcd22a229c6b2e23e3a7
SSDEEP
49152:eFIAtQz67N9Nu+XesQj4G/W1NKXY5D9KRhnMnwWVq7oPvrBrlITZ0Jn1viqIA1qN:eCN2Nu+OsQjZ/ebSMnwWU7OvrBrltkaU
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
msedgeupdate_unsigned.pdb
SizeofResource
HeapFree
InitializeCriticalSectionAndSpinCount
HeapSize
GetLastError
LockResource
HeapReAlloc
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
QueryDepthSList
GetModuleHandleA
GetThreadTimes
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
GetLogicalProcessorInformation
SignalObjectAndWait
SetLastError
lstrlenW
WriteFile
GetShortPathNameW
GetPrivateProfileIntW
OutputDebugStringA
SetFilePointer
WaitForSingleObject
CreateFileW
GetCurrentThreadId
ReleaseMutex
Sleep
GetFileInformationByHandle
OutputDebugStringW
CloseHandle
GetLocalTime
GetCurrentProcessId
lstrcmpiW
lstrcmpW
CreateDirectoryW
FindFirstFileW
FindNextFileW
GetCurrentProcess
ExpandEnvironmentStringsW
RemoveDirectoryW
WaitForMultipleObjects
GetEnvironmentVariableW
FindClose
GetFileAttributesW
DuplicateHandle
FormatMessageW
DeleteFileW
LoadLibraryW
GetCurrentDirectoryW
GetProcAddress
LocalFree
GetModuleHandleW
FreeLibrary
GetTempFileNameW
OpenMutexW
GetTickCount
LoadLibraryExW
GetExitCodeProcess
ReadFile
CompareFileTime
SetEndOfFile
SetFileAttributesW
MultiByteToWideChar
GetFileAttributesExW
FileTimeToSystemTime
MoveFileExW
GetFileSize
CopyFileW
GetSystemTimeAsFileTime
GetFileTime
FlushFileBuffers
lstrcpynW
ExitProcess
IsDebuggerPresent
WideCharToMultiByte
GetTimeZoneInformation
FileTimeToLocalFileTime
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetStringTypeExW
GetModuleFileNameW
GetTempPathW
GetSystemDirectoryW
GetCurrentThread
GetWindowsDirectoryW
VirtualQuery
GetModuleHandleExW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateMutexW
CreateEventW
SetEvent
ResetEvent
GetProductInfo
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
IsWow64Process
GetLongPathNameW
LocalAlloc
OpenProcess
HeapSetInformation
SetPriorityClass
TerminateProcess
K32GetModuleFileNameExW
WaitForMultipleObjectsEx
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
ProcessIdToSessionId
Process32NextW
WaitForSingleObjectEx
Process32FirstW
K32EnumProcesses
ReadProcessMemory
K32EnumProcessModules
SetHandleInformation
DeviceIoControl
CreatePipe
GetSystemPowerStatus
GlobalMemoryStatusEx
CreateProcessW
SetProcessWorkingSetSize
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetStdHandle
QueryDosDeviceW
GetLogicalDriveStringsW
InitOnceExecuteOnce
GetComputerNameExW
SetEnvironmentVariableW
OpenEventW
GetPrivateProfileStringW
CreateThread
SetCurrentDirectoryW
OpenThread
QueryPerformanceCounter
GetCommandLineW
CreateHardLinkW
GetThreadLocale
lstrcmpA
QueueUserWorkItem
GetTickCount64
GetStringTypeExA
SetFilePointerEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
FormatMessageA
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetSystemInfo
VirtualAlloc
VirtualProtect
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileSizeEx
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
WriteConsoleW
LoadLibraryExA
GetProcessShutdownParameters
SetProcessShutdownParameters
GetProcessId
Thread32Next
Thread32First
RegisterWaitForSingleObject
UnregisterWaitEx
QueryPerformanceFrequency
GetSystemTime
SetThreadPriority
GetThreadPriority
GetUserDefaultLangID
GetSystemDefaultLangID
QueryUnbiasedInterruptTime
DeleteTimerQueueEx
CreateTimerQueue
GetNativeSystemInfo
GetModuleFileNameA
AreFileApisANSI
HeapCreate
GetFullPathNameW
GetDiskFreeSpaceW
LockFile
GetFullPathNameA
UnlockFileEx
UnmapViewOfFile
HeapValidate
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
FlushViewOfFile
CreateFileA
LoadLibraryA
GetVersionExA
DeleteFileA
HeapCompact
UnlockFile
CreateFileMappingA
LockFileEx
CreateFileMappingW
MapViewOfFile
GlobalHandle
MulDiv
FreeResource
InterlockedPopEntrySList
FlushInstructionCache
VirtualFree
GetExitCodeThread
ExitThread
FreeLibraryAndExitThread
CreateTimerQueueTimer
DeleteTimerQueueTimer
ReleaseSemaphore
NetApiBufferFree
NetWkstaUserGetInfo
NetGetJoinInformation
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
WTSQuerySessionInformationW
WTSEnumerateSessionsW
WTSFreeMemory
DllEntry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ