Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
NVIDIA-Control-Panel-Application_8HR8D_WIN64_8.1.961.0_A02.exe
Resource
win10-20220901-en
Target
NVIDIA-Control-Panel-Application_8HR8D_WIN64_8.1.961.0_A02.EXE
Size
19.4MB
MD5
44820d19afd58392f2dd7894780aa26d
SHA1
8a0237641fa809f565996a43dd07c6b803ea1cf3
SHA256
c52b7527d6fa847b11017242c865a5b9671018f26ec03f892b694095f886fe55
SHA512
2dec3a7baec1da0d13ef7bd47ad05dbc2cd27d04213f2854ebe4be194ed08d1445b2d94308953c03611fbd390d5ec21e4310b7c5265c92a1165858292bf26cf7
SSDEEP
393216:ggjpCFzD2Rm7GDH+8sH3VELs7U6brYxZIpSQUj:tPqyHfNunYfIp74
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WinVerifyTrust
GetLastError
LoadResource
LockResource
SizeofResource
FindResourceW
MultiByteToWideChar
FreeLibrary
LocalFree
FormatMessageW
LoadLibraryW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFullPathNameW
GetShortPathNameW
GetTempFileNameW
ReadFile
RemoveDirectoryW
SetFileAttributesW
CloseHandle
SetUnhandledExceptionFilter
WaitForSingleObject
WaitForSingleObjectEx
GetCurrentProcess
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
GetSystemDirectoryW
GetVersionExW
IsWow64Process
GetModuleFileNameW
GetModuleHandleW
AddDllDirectory
SetDefaultDllDirectories
GetSystemWow64DirectoryA
SetDllDirectoryW
CopyFileW
WideCharToMultiByte
GetLocaleInfoW
GetCommandLineW
FindResourceA
LocalAlloc
GetProcAddress
GetCurrentProcessId
FreeConsole
AttachConsole
DecodePointer
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
DuplicateHandle
InitializeCriticalSection
ReleaseMutex
CreateMutexA
Sleep
GetCurrentThread
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
LoadLibraryA
FindVolumeClose
InitializeCriticalSectionAndSpinCount
GetLogicalDriveStringsA
GetVolumeInformationA
FindFirstVolumeA
GetSystemFirmwareTable
GetStdHandle
SetCurrentDirectoryA
GetCurrentDirectoryA
FindFirstFileA
FindNextFileA
CreateProcessA
GetStartupInfoA
SetDllDirectoryA
GetFileInformationByHandleEx
GetFileTime
SetFileTime
WriteConsoleW
SystemTimeToFileTime
GetDateFormatW
GetTimeFormatW
GetTempPathW
GetSystemInfo
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
FileTimeToSystemTime
SetLastError
GlobalAlloc
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
MulDiv
lstrcmpA
OutputDebugStringA
EncodePointer
FreeResource
GetModuleHandleExW
LoadLibraryExW
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomW
GlobalFindAtomW
CreateActCtxW
ActivateActCtx
DeactivateActCtx
FindActCtxSectionStringW
QueryActCtxW
FlushFileBuffers
GetFileSize
LoadLibraryExA
LockFile
SetEndOfFile
SetFilePointer
UnlockFile
WriteFile
lstrcmpiW
MoveFileW
GetStringTypeExW
GetThreadLocale
SetEvent
CreateEventW
SetThreadPriority
SuspendThread
ResumeThread
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
CompareStringA
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
GlobalGetAtomNameW
GetAtomNameW
GlobalFlags
CompareStringW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
VirtualProtect
GetFileAttributesExW
GetFileSizeEx
SystemTimeToTzSpecificLocalTime
SetErrorMode
GetCurrentDirectoryW
VerSetConditionMask
lstrcpyW
VerifyVersionInfoW
FindResourceExW
GetWindowsDirectoryW
GetTickCount
SearchPathW
GetProfileIntW
GetDiskFreeSpaceW
ReplaceFileW
GetUserDefaultLCID
LocalLock
LocalUnlock
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
ResetEvent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
VirtualQuery
GetSystemTime
GetVolumeInformationW
SetConsoleCtrlHandler
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
FindFirstFileExA
MoveFileExW
SetFilePointerEx
SetCurrentDirectoryW
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetFullPathNameA
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
QueryPerformanceFrequency
HeapQueryInformation
GetCommandLineA
VirtualAlloc
SetStdHandle
FreeLibraryAndExitThread
OutputDebugStringW
GetStringTypeW
GetCPInfo
LCMapStringW
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
GetDriveTypeW
GetFileType
PeekNamedPipe
ExitProcess
CreateThread
ExitThread
InitCommonControlsEx
GdipSetInterpolationMode
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipDrawImageI
GdipDeleteGraphics
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFile
GdipDrawImageRectI
GdipGetImagePaletteSize
GdipGetImagePalette
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusStartup
GdipFree
GdipAlloc
GdiplusShutdown
GdipCreateBitmapFromStream
??0DSMIPMIInterfaceImpl@@QEAA@XZ
??1DSMIPMIInterfaceImpl@@UEAA@XZ
??4DSMIPMIInterfaceImpl@@QEAAAEAV0@AEBV0@@Z
??_7DSMIPMIInterfaceImpl@@6B@
?IPMIRequest@DSMIPMIInterfaceImpl@@QEAAIPEAU_DSMIPMICommandData@@@Z
?Initialize@DSMIPMIInterfaceImpl@@QEAAIPEBU_DSMIPMIConfiguration@@@Z
?Initialize@DSMIPMIInterfaceImpl@@QEAAIVDSMString@@@Z
?InitializeDSMLogger@DSMIPMIInterfaceImpl@@AEAAXXZ
?Release@DSMIPMIInterfaceImpl@@QEAAIXZ
?freePMInfo@@YAHPEAUPMInfo@@@Z
?getPMInfo@@YAHHPEAPEAUPMInfo@@@Z
?getPMStatus@@YAHXZ
?getTestPMInfo@@YAHHPEAPEAUPMInfo@@@Z
?mDrvHandler@DSMIPMIInterfaceImpl@@0VDriverManager@@A
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ