Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
devenum.dll
Resource
win10v2004-20240508-en
Target
devenum.dll
Size
91KB
MD5
4f291703dcc5106a40556836f957148d
SHA1
133bd99abc7211e6eedb3c758b97c416cea49b6f
SHA256
e0b04cf36ffc77d147c2d3f20c14aa5ffa0e1060568d9c5c807ac2fc39f9618f
SHA512
46cb3bacc24f9b944a4e02293b15a19e8e54d6cae28e2dc10b5c8f5a1890fcb0791e7afffad59ce09d02bc9462f1c54b49de817c9350d4b7728fbb04bd29ba6c
SSDEEP
1536:6iK+66LuCUr9OO4SWbdkNnJtxi0i0WnWRzrDQdRC3arIkW3tPzM+:6mRUr0bSC2tQ0i0WnkPkW9bF
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
devenum.pdb
memcpy_s
malloc
free
realloc
_purecall
_callnewh
_XcptFilter
_amsg_exit
memcmp
_initterm
_lock
_unlock
__dllonexit
_onexit
_except_handler4_common
memcpy
_vsnwprintf
memset
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
InitializeCriticalSection
LoadLibraryW
GetCurrentProcess
lstrcpynW
HeapDestroy
DisableThreadLibraryCalls
GetVersionExW
lstrlenW
lstrcmpW
CompareStringW
LocalFree
CreateMutexW
OpenMutexW
LocalAlloc
CompareStringOrdinal
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
lstrcmpiW
DeleteCriticalSection
IsDebuggerPresent
DebugBreak
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
CreateMutexExW
GetProcAddress
HeapAlloc
CloseHandle
OpenSemaphoreW
WaitForSingleObjectEx
OutputDebugStringW
GetLastError
FormatMessageW
ReleaseMutex
GetCurrentThreadId
WaitForSingleObject
GetModuleHandleExW
ReleaseSemaphore
SetLastError
HeapFree
CreateSemaphoreExW
GetModuleFileNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
LeaveCriticalSection
SleepConditionVariableSRW
EnterCriticalSection
LoadStringW
CharNextW
RegQueryValueExW
GetTokenInformation
OpenProcessToken
SetSecurityDescriptorDacl
RegGetValueW
SetEntriesInAclW
ConvertSidToStringSidW
RegEnumKeyW
CopySid
GetLengthSid
IsValidSid
InitializeSecurityDescriptor
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegQueryInfoKeyW
PropVariantClear
CreateAntiMoniker
IIDFromString
CoGetMalloc
CreateBindCtx
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
SafeArrayAccessData
SafeArrayCreate
VarI4FromStr
SysFreeString
SysAllocString
VariantClear
VariantInit
SafeArrayUnaccessData
waveInGetNumDevs
waveInGetDevCapsW
waveOutGetDevCapsW
waveOutMessage
midiOutGetDevCapsW
midiOutGetNumDevs
waveInMessage
CM_Locate_DevNodeW
CM_Get_DevNode_PropertyW
CM_Get_Device_Interface_List_SizeW
CM_Get_Device_Interface_ListW
CM_MapCrToWin32Err
CM_Get_Device_Interface_PropertyW
CM_Get_Device_Interface_AliasW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ