Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b9df481311010f4ffc0a76b37c402348004c69abb0e9afe4f54d756ecd430518.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b9df481311010f4ffc0a76b37c402348004c69abb0e9afe4f54d756ecd430518.dll
Resource
win10v2004-20240802-en
Target
b9df481311010f4ffc0a76b37c402348004c69abb0e9afe4f54d756ecd430518
Size
119KB
MD5
837a302989db6b5558d234c3c10005aa
SHA1
a9c86ace082dfe6b40c86ba933eee099ab76ae5d
SHA256
b9df481311010f4ffc0a76b37c402348004c69abb0e9afe4f54d756ecd430518
SHA512
5ad18e0e4f7371069273e36cbba4d3238a0bfaaa5ad3cb771aacff616bb6da0c0e28fe21f17e71f674a846515e49d27efd0cd52a710b77dfab6f70451921c71e
SSDEEP
3072:QOU7AJ08LNSedQYhcM1QZV0eGmxh4fr2K:bUUJ08LLdQlM1zu4CK
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\a\_work\1\s\artifacts\obj\coreclr\windows.x86.Release\dlls\dbgshim\dbgshim.pdb
DuplicateHandle
OpenProcess
ProcessIdToSessionId
Sleep
SetEvent
CreateThread
GetProcAddress
GetFileSize
ReadProcessMemory
CreateProcessW
FreeLibrary
K32EnumProcessModules
CreateFileMappingW
MapViewOfFile
LoadLibraryW
HeapAlloc
HeapFree
GetProcessHeap
RaiseException
MultiByteToWideChar
FormatMessageW
LocalFree
SetLastError
LoadLibraryExW
UnmapViewOfFile
GetFullPathNameW
GetSystemTimeAsFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemInfo
TerminateProcess
IsDebuggerPresent
TlsSetValue
TlsGetValue
TlsFree
ResumeThread
OpenEventW
GetCurrentThreadId
K32GetModuleFileNameExW
GetCurrentProcess
CreateFileW
GetCurrentProcessId
CloseHandle
GetLastError
CreateEventW
WaitForSingleObject
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
InterlockedFlushSList
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadStringW
CopySid
SetSecurityDescriptorSacl
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
CoTaskMemFree
SetErrorInfo
GetFileVersionInfoSizeExW
GetFileVersionInfoExW
VerQueryValueW
free
malloc
calloc
__stdio_common_vsnprintf_s
__stdio_common_vsnwprintf_s
__stdio_common_vswscanf
__stdio_common_vswprintf_s
wcscpy_s
_wcsicmp
_stricmp
strncmp
wcsncmp
strcpy_s
wcsncpy_s
terminate
_cexit
_errno
abort
_initterm
_initterm_e
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_execute_onexit_table
CLRCreateInstance
CloseCLREnumeration
CloseResumeHandle
CreateDebuggingInterfaceFromVersion
CreateDebuggingInterfaceFromVersion2
CreateDebuggingInterfaceFromVersionEx
CreateProcessForLaunch
CreateVersionStringFromModule
EnumerateCLRs
GetStartupNotificationEvent
RegisterForRuntimeStartup
RegisterForRuntimeStartupEx
ResumeProcess
UnregisterForRuntimeStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ