Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
devenum.dll
Resource
win10v2004-20240426-en
Target
devenum.dll
Size
92KB
MD5
47810e92d0a2599561d790a75a0a08e7
SHA1
cf11171675da086b2f70c4c2cae77f4007a63f88
SHA256
6db3440b40f7dba42ce939fde3928a11b0ea7f81340ed0f8f565ec92866768d9
SHA512
da07e9a65dae5fced249f9fb1678cd95d4805f9229590e56d8aa0819d6ad6ef2cc37a3569cdfcdfe1b46bbfc89ba1e72e5772a8739901393c63b02a47ccad1c5
SSDEEP
1536:eiK+66DuCUr9OO4SWbdkNnJtxi0VwW3gUyrDQdRC3arIkJqLPiz1:emZUr0bSC2tQ0VwW37iks6J
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
devenum.pdb
memcpy_s
malloc
free
realloc
_purecall
_callnewh
_XcptFilter
_amsg_exit
memcmp
_initterm
_lock
_unlock
__dllonexit
_onexit
_except_handler4_common
memcpy
_vsnwprintf
memset
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
InitializeCriticalSection
LoadLibraryW
GetCurrentProcess
lstrcpynW
HeapDestroy
DisableThreadLibraryCalls
GetVersionExW
lstrlenW
lstrcmpW
CompareStringW
LocalFree
CreateMutexW
OpenMutexW
LocalAlloc
CompareStringOrdinal
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
lstrcmpiW
DeleteCriticalSection
IsDebuggerPresent
DebugBreak
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
CreateMutexExW
GetProcAddress
HeapAlloc
CloseHandle
OpenSemaphoreW
WaitForSingleObjectEx
OutputDebugStringW
GetLastError
FormatMessageW
ReleaseMutex
GetCurrentThreadId
WaitForSingleObject
GetModuleHandleExW
ReleaseSemaphore
SetLastError
HeapFree
CreateSemaphoreExW
GetModuleFileNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
LeaveCriticalSection
SleepConditionVariableSRW
EnterCriticalSection
LoadStringW
CharNextW
RegQueryValueExW
GetTokenInformation
OpenProcessToken
SetSecurityDescriptorDacl
RegGetValueW
SetEntriesInAclW
ConvertSidToStringSidW
RegEnumKeyW
CopySid
GetLengthSid
IsValidSid
InitializeSecurityDescriptor
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegQueryInfoKeyW
PropVariantClear
CreateAntiMoniker
IIDFromString
CoGetMalloc
CreateBindCtx
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
SafeArrayAccessData
SafeArrayCreate
VarI4FromStr
SysFreeString
SysAllocString
VariantClear
VariantInit
SafeArrayUnaccessData
waveInGetNumDevs
waveInGetDevCapsW
waveOutGetDevCapsW
waveOutMessage
midiOutGetDevCapsW
midiOutGetNumDevs
waveInMessage
CM_Locate_DevNodeW
CM_Get_DevNode_PropertyW
CM_Get_Device_Interface_List_SizeW
CM_Get_Device_Interface_ListW
CM_MapCrToWin32Err
CM_Get_Device_Interface_PropertyW
CM_Get_Device_Interface_AliasW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ