Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
UsbTreeView.exe
Resource
win10-20230220-en
Target
UsbTreeView_x64.zip
Size
380KB
MD5
5a1e7200ee48c49c3e8bd1aad34575c1
SHA1
e132a7e74eb8d65274a616fda8e5bd7c8ae154c3
SHA256
0ba2ed37dd46b46aa087e3979c5b2673ba189bb41e68c2dfce6cbeb68e29e661
SHA512
0a1294731e766cf8c9b958b01186b7863fdc17ddca6a489a6f0efa0ded09da910cba9ed51cdc6cf073a029b6c624c38a42070cf7c885d9cd22671486095c4290
SSDEEP
6144:hupA5ijLwrD0M4F5MyQCCSFuXWonHu0D8/+KHwk6Snv1GD+XJlrlXyeE3N4ccqjx:IpAdrD0M4F5mSpAOg8/XQk6Snv6+XJlA
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
lstrcpyW
FileTimeToSystemTime
lstrcmpW
lstrcmpiW
GetVolumeNameForVolumeMountPointW
GetTickCount
SystemTimeToTzSpecificLocalTime
ExpandEnvironmentStringsW
QueryDosDeviceW
Sleep
CloseHandle
CreateFileW
lstrcatW
lstrlenW
lstrcmpA
lstrcmpiA
InitializeCriticalSection
DeleteCriticalSection
GetDriveTypeW
GetLastError
GetProcAddress
GetModuleHandleA
CreateEventW
LeaveCriticalSection
WaitForSingleObject
EnterCriticalSection
GetPrivateProfileIntW
DeviceIoControl
GetExitCodeThread
SetEvent
ResetEvent
ExitProcess
WriteConsoleW
AllocConsole
ReadConsoleOutputCharacterW
GetConsoleScreenBufferInfo
GetStdHandle
WideCharToMultiByte
WriteFile
SetConsoleCursorPosition
WriteConsoleOutputCharacterW
SetConsoleCursorInfo
GetFileType
GetACP
lstrlenA
lstrcatA
lstrcpyA
WritePrivateProfileStructW
GetPrivateProfileStructW
GetFileAttributesW
SetLastError
DeleteFileW
LocalFree
LocalAlloc
ResumeThread
CreateThread
GetFileTime
LoadLibraryA
GetSystemDirectoryA
FreeLibrary
lstrcpynW
SetCurrentDirectoryW
GetCurrentDirectoryW
WritePrivateProfileStringW
MultiByteToWideChar
QueryPerformanceFrequency
QueryPerformanceCounter
FindVolumeClose
FindNextVolumeW
FindFirstVolumeW
OpenProcess
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
SetFilePointer
ReadFile
GetFileSize
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
CreateDirectoryW
CopyFileW
GetVersionExW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
GetCurrentThreadId
GetPrivateProfileStringW
GetCurrentProcess
TryEnterCriticalSection
GetLocalTime
GetUserDefaultLangID
SystemTimeToFileTime
GetSystemTime
GetProcessTimes
GetCurrentProcessId
GetCommandLineW
SetUnhandledExceptionFilter
SetErrorMode
GetSystemDirectoryW
GetSystemWindowsDirectoryW
GetProcessHeap
DuplicateHandle
GetWindowsDirectoryW
GetStartupInfoW
HeapAlloc
Beep
HeapFree
GetTempPathW
CreateProcessA
FlushFileBuffers
OutputDebugStringW
OutputDebugStringA
CreateFileA
lstrcpynA
SetFileAttributesW
RaiseException
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ