Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
dcf23cef73373ef12cda961eed280e70d9cf280b76d0306a0eb516760e2e25d0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcf23cef73373ef12cda961eed280e70d9cf280b76d0306a0eb516760e2e25d0.exe
Resource
win10v2004-20241007-en
Target
dcf23cef73373ef12cda961eed280e70d9cf280b76d0306a0eb516760e2e25d0
Size
734KB
MD5
414b5d30c088a594811b9e3d698626ba
SHA1
e2e1dd029892e568bfc1e6caf6d3aac0889d1a6b
SHA256
dcf23cef73373ef12cda961eed280e70d9cf280b76d0306a0eb516760e2e25d0
SHA512
8b6ad3707ab8f7344d384f3d4ad6852c56175fabcff01a4440efd091683f55971fcf59de7c036e6fa94e16f74f9eaf920c218ca64225947cbb021c318f120ff2
SSDEEP
12288:DoVDbp/rhqsszzJrdNUUIsvWznZsTfYkSSnN6mXJlBBXBcVX9GKVO2GPBsiBjvrr:DoVDbp/rctzSsvcnZej6qntB0X9GKVOf
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
u:\1Source\VC\UsbTreeView385\Release_Win32\UsbTreeView.pdb
lstrcpyW
FileTimeToSystemTime
lstrcmpW
lstrcmpiW
GetVolumeNameForVolumeMountPointW
GetTickCount
SystemTimeToTzSpecificLocalTime
ExpandEnvironmentStringsW
QueryDosDeviceW
Sleep
CloseHandle
CreateFileW
lstrcatW
lstrlenW
lstrcmpA
lstrcmpiA
InitializeCriticalSection
DeleteCriticalSection
GetDriveTypeW
GetLastError
GetProcAddress
GetModuleHandleA
CreateEventW
LeaveCriticalSection
WaitForSingleObject
EnterCriticalSection
GetPrivateProfileIntW
DeviceIoControl
GetExitCodeThread
SetEvent
ResetEvent
ExitProcess
WriteConsoleW
AllocConsole
ReadConsoleOutputCharacterW
GetConsoleScreenBufferInfo
GetStdHandle
WideCharToMultiByte
WriteFile
SetConsoleCursorPosition
WriteConsoleOutputCharacterW
SetConsoleCursorInfo
GetFileType
GetACP
lstrlenA
lstrcatA
lstrcpyA
WritePrivateProfileStructW
GetPrivateProfileStructW
GetFileAttributesW
SetLastError
DeleteFileW
LocalFree
LocalAlloc
ResumeThread
CreateThread
GetFileTime
GetCurrentProcess
LoadLibraryA
GetSystemDirectoryA
FreeLibrary
lstrcpynW
SetCurrentDirectoryW
GetCurrentDirectoryW
WritePrivateProfileStringW
MultiByteToWideChar
QueryPerformanceFrequency
QueryPerformanceCounter
FindVolumeClose
FindNextVolumeW
FindFirstVolumeW
OpenProcess
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
SetFilePointer
ReadFile
GetFileSize
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
CreateDirectoryW
CopyFileW
GetVersionExW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
GetCurrentThreadId
GetPrivateProfileStringW
TryEnterCriticalSection
GetLocalTime
GetUserDefaultLangID
SystemTimeToFileTime
GetSystemTime
GetProcessTimes
GetCurrentProcessId
GetCommandLineW
SetUnhandledExceptionFilter
SetErrorMode
GetSystemDirectoryW
GetSystemWindowsDirectoryW
GetProcessHeap
DuplicateHandle
GetWindowsDirectoryW
GetStartupInfoW
HeapAlloc
Beep
HeapFree
GetTempPathW
CreateProcessA
FlushFileBuffers
OutputDebugStringW
OutputDebugStringA
CreateFileA
lstrcpynA
SetFileAttributesW
InterlockedExchange
RaiseException
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ