Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
UsbTreeView.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
UsbTreeView.exe
Resource
win10v2004-20231215-en
Target
UsbTreeView.exe
Size
807KB
MD5
34a0d93a90c1157cb9aeb86e981d76a5
SHA1
14c9f75fb58fbd721267340175e9d52527f2eac1
SHA256
90cfdca6c27139870bbeb9ca38f645329307a552e347afcc065bd6bfda0106e2
SHA512
864d6b845d656f9889ac1eccfbea8a1202e48ec65e714bbe42a352b636aec44e793a390bdde13a79a37e32b8e2ecc22b0bb07d1098d08f0d7d3d835c694a878e
SSDEEP
24576:Jtsslv1PFFUyXwiQnRq1UF32f5rNXVO2:jssl9PFF4iQRq1J5r1VO2
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
u:\1Source\VC\UsbTreeView403\Release_x64\UsbTreeView.pdb
HeapSize
lstrcpyW
FileTimeToSystemTime
lstrcmpW
lstrcmpiW
GetVolumeNameForVolumeMountPointW
GetTickCount
SystemTimeToTzSpecificLocalTime
ExpandEnvironmentStringsW
QueryDosDeviceW
Sleep
CloseHandle
CreateFileW
lstrcatW
lstrlenW
lstrcmpA
lstrcmpiA
InitializeCriticalSection
DeleteCriticalSection
GetDriveTypeW
lstrcpyA
GetLastError
GetDiskFreeSpaceW
GetVolumeInformationW
GetDiskFreeSpaceExW
DeviceIoControl
SetLastError
CreateThread
GetProcAddress
GetModuleHandleA
CreateEventW
LeaveCriticalSection
WaitForSingleObject
EnterCriticalSection
GetPrivateProfileIntW
lstrcpynW
GetExitCodeThread
SetEvent
ResetEvent
ExitProcess
WriteConsoleW
AllocConsole
ReadConsoleOutputCharacterW
GetConsoleScreenBufferInfo
GetStdHandle
WideCharToMultiByte
WriteFile
SetConsoleCursorPosition
WriteConsoleOutputCharacterW
SetConsoleCursorInfo
GetFileType
GetACP
lstrlenA
lstrcatA
WritePrivateProfileStructW
GetPrivateProfileStructW
GetCurrentProcess
GetFileAttributesW
DeleteFileW
LocalFree
LocalAlloc
ResumeThread
GetFileTime
LoadLibraryA
GetSystemDirectoryA
FreeLibrary
SetCurrentDirectoryW
GetCurrentDirectoryW
WritePrivateProfileStringW
MultiByteToWideChar
QueryPerformanceFrequency
QueryPerformanceCounter
FindVolumeClose
FindNextVolumeW
FindFirstVolumeW
OpenProcess
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
SetFilePointer
ReadFile
GetFileSize
GetModuleFileNameW
MulDiv
GetModuleHandleW
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
CreateDirectoryW
CopyFileW
GetPrivateProfileStringW
GetVersionExW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentThreadId
SizeofResource
LockResource
LoadResource
FindResourceW
TryEnterCriticalSection
GetLocalTime
SetProcessWorkingSetSize
GetUserDefaultLangID
SystemTimeToFileTime
GetSystemTime
GetProcessTimes
GetCurrentProcessId
GetCommandLineW
SetUnhandledExceptionFilter
SetErrorMode
GetSystemDirectoryW
GetSystemWindowsDirectoryW
GetProcessHeap
DuplicateHandle
GetWindowsDirectoryW
GetStartupInfoW
HeapAlloc
Beep
HeapFree
GetTempPathW
CreateProcessA
FlushFileBuffers
OutputDebugStringW
OutputDebugStringA
CreateFileA
lstrcpynA
SetFileAttributesW
RaiseException
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ