Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3043c6ccf4bfe677be3ee2d73b142b576eac0803454e496f7c124e4770209a2b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3043c6ccf4bfe677be3ee2d73b142b576eac0803454e496f7c124e4770209a2b.dll
Resource
win10v2004-20240802-en
Target
3043c6ccf4bfe677be3ee2d73b142b576eac0803454e496f7c124e4770209a2b
Size
2.2MB
MD5
755a35134b82ca42f14ec9de94b4b311
SHA1
8b56cbf0a9fc16b3abc8c547900c713e5ea503e9
SHA256
3043c6ccf4bfe677be3ee2d73b142b576eac0803454e496f7c124e4770209a2b
SHA512
fd0cc2b94b80d1eddbdc3f9a83b4a6acea56bd27ff958e79050ef8f7d4058547fe3ac1073305d3333778156631255e844b6c68ae935b6720a88cab6abd0fc2f1
SSDEEP
49152:K7mRgpJBFzK/3AN40MeFDc74JytVfWQsY3PzkaatTWzr:9UBFzKIN40vYFWQpfUtTWn
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
msedgeupdate_unsigned.pdb
SizeofResource
HeapFree
InitializeCriticalSectionAndSpinCount
HeapSize
GetLastError
LockResource
HeapReAlloc
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
ReleaseSemaphore
DeleteTimerQueueTimer
CreateTimerQueueTimer
FreeLibraryAndExitThread
ExitThread
lstrlenW
WriteFile
GetShortPathNameW
GetPrivateProfileIntW
OutputDebugStringA
SetFilePointer
WaitForSingleObject
CreateFileW
GetCurrentThreadId
ReleaseMutex
Sleep
GetFileInformationByHandle
OutputDebugStringW
CloseHandle
GetLocalTime
GetCurrentProcessId
lstrcmpiW
lstrcmpW
CreateDirectoryW
FindFirstFileW
SetLastError
FindNextFileW
GetCurrentProcess
ExpandEnvironmentStringsW
RemoveDirectoryW
WaitForMultipleObjects
GetEnvironmentVariableW
FindClose
GetFileAttributesW
DuplicateHandle
FormatMessageW
GetCurrentThread
DeleteFileW
LoadLibraryW
GetCurrentDirectoryW
GetProcAddress
LocalFree
GetModuleHandleW
FreeLibrary
GetTempFileNameW
OpenMutexW
GetTickCount
LoadLibraryExW
GetExitCodeProcess
ReadFile
CompareFileTime
SetEndOfFile
FindFirstChangeNotificationW
SetFileAttributesW
MultiByteToWideChar
GetFileAttributesExW
FileTimeToSystemTime
FindCloseChangeNotification
FindNextChangeNotification
MoveFileExW
GetFileSize
CopyFileW
GetSystemTimeAsFileTime
FlushFileBuffers
lstrcpynW
ExitProcess
IsDebuggerPresent
WideCharToMultiByte
GetTimeZoneInformation
FileTimeToLocalFileTime
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetStringTypeExW
GetModuleFileNameW
GetTempPathW
GetSystemDirectoryW
GetWindowsDirectoryW
VirtualQuery
GetModuleHandleExW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateMutexW
CreateEventW
SetEvent
ResetEvent
GetProductInfo
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
IsWow64Process
GetLongPathNameW
LocalAlloc
OpenProcess
HeapSetInformation
SetPriorityClass
TerminateProcess
K32GetModuleFileNameExW
WaitForMultipleObjectsEx
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
ProcessIdToSessionId
Process32NextW
WaitForSingleObjectEx
Process32FirstW
K32EnumProcesses
ReadProcessMemory
K32EnumProcessModules
SetHandleInformation
DeviceIoControl
CreatePipe
SetErrorMode
GetSystemPowerStatus
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
CreateProcessW
SetProcessWorkingSetSize
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetStdHandle
QueryDosDeviceW
GetLogicalDriveStringsW
InitOnceExecuteOnce
GetComputerNameExW
SetEnvironmentVariableW
OpenEventW
GetPrivateProfileStringW
CreateThread
SetCurrentDirectoryW
GetPriorityClass
OpenThread
QueryPerformanceCounter
GetCommandLineW
CreateHardLinkW
GetThreadLocale
lstrcmpA
QueueUserWorkItem
GetTickCount64
GetStringTypeExA
SetFilePointerEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
GetStringTypeW
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
GetLocaleInfoEx
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemInfo
VirtualAlloc
VirtualProtect
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileSizeEx
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
WriteConsoleW
LoadLibraryExA
GetProcessShutdownParameters
SetProcessShutdownParameters
GetProcessId
Thread32Next
Thread32First
RegisterWaitForSingleObject
UnregisterWaitEx
QueryPerformanceFrequency
GetDriveTypeW
GetUserDefaultLangID
GetSystemDefaultLangID
QueryUnbiasedInterruptTime
GetProcessTimes
DeleteTimerQueueEx
CreateTimerQueue
QueryFullProcessImageNameW
GetNativeSystemInfo
GetModuleFileNameA
GlobalHandle
MulDiv
FreeResource
InterlockedPopEntrySList
FlushInstructionCache
VirtualFree
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SwitchToThread
GetExitCodeThread
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
NetApiBufferFree
NetGetJoinInformation
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
WTSQuerySessionInformationW
WTSEnumerateSessionsW
WTSFreeMemory
DllEntry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ