Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
dbf8f4608e27ee76acba29749c9bc9f9807188e7348cc36bf96e2b9b941a4690.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dbf8f4608e27ee76acba29749c9bc9f9807188e7348cc36bf96e2b9b941a4690.dll
Resource
win10v2004-20240802-en
Target
dbf8f4608e27ee76acba29749c9bc9f9807188e7348cc36bf96e2b9b941a4690
Size
215KB
MD5
b76803aa759fb813d2acc8b01d29d729
SHA1
adbce62987c91cd5a5a39293a5ad7b9256fad61d
SHA256
dbf8f4608e27ee76acba29749c9bc9f9807188e7348cc36bf96e2b9b941a4690
SHA512
ef3f08a962454d5ef9b9679dc4e75a1772e38dc661fffa157a8aed5e2c06daa0e3f69a4bb3306dbbbd8af3307123117d3cc2f29e975367320658b32634bda910
SSDEEP
3072:W00N0HQ89pDyCmsiE9HFjW7nZ4juuAx2LZRWA4Gh8TyG4nljLfluu3l2lEBJ8:r0N08BsiE9EIuzx2LZaGhDGoB5xB8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
d:\windrvnew3\windrv_src\it5_bk_v4.0\kmsrc_2.06.62-0.05\driver\driver\build\xps\filter\filters\cleanup\objfre_wlh_amd64\amd64\KOAXVX_C.pdb
ExitProcess
EncodePointer
DecodePointer
FlsFree
SetLastError
FlsGetValue
GetLastError
GetCurrentThreadId
FlsAlloc
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapSetInformation
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwindEx
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WriteFile
LeaveCriticalSection
GetModuleHandleW
EnterCriticalSection
OutputDebugStringA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
Sleep
LoadLibraryW
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
VirtualProtect
VirtualAlloc
SetThreadStackGuarantee
GetSystemInfo
VirtualQuery
GetProcAddress
GetVersionExW
GetCommandLineA
FlushFileBuffers
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
FlsSetValue
GetProcessHeap
lstrlenW
RaiseException
RtlPcToFileHeader
HeapSize
SetFilePointer
CoInitializeEx
CoUninitialize
CoCreateInstance
CoFileTimeNow
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
SysAllocStringLen
SysStringByteLen
VariantClear
SysFreeString
SysStringLen
SysAllocString
VariantCopy
VariantInit
SetJobW
GetJobW
ord30
ord4
ImpersonateLoggedOnUser
RevertToSelf
CharUpperW
DllCanUnloadNow
DllGetClassObject
DllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ