Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Realtek-Audio-Console-Application_R0FF8_WIN64_1.16.228.0_A02_03.exe
Resource
win11-20240709-en
Target
Realtek-Audio-Console-Application_R0FF8_WIN64_1.16.228.0_A02_03.EXE
Size
12.0MB
MD5
6777d41e676ff95b666385ab794d871e
SHA1
0b9d329d70712c0f82a07c7976a6a035419fac05
SHA256
d1bf4c64f42ca664a355e848b10c75fd12ad3fdf3704868cf480c8bcb23801ab
SHA512
a0c93b60223124901183f9879633cfd9ef55682c5ddefb191f7dc0df73a9b72662253d783ca2e54468fbf64a73edbadcdd6bc584da4746c64fc1cd2b140f8416
SSDEEP
196608:dMVAemaWFsczWbzrcrSDE7cRGo8sOgZo0aH8:dM/maWzz4v5
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetLastError
LoadResource
LockResource
SizeofResource
FindResourceW
MultiByteToWideChar
FreeLibrary
LoadLibraryExW
LocalFree
FormatMessageW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFullPathNameW
GetShortPathNameW
GetTempFileNameW
ReadFile
RemoveDirectoryW
SetFileAttributesW
CloseHandle
SetUnhandledExceptionFilter
WaitForSingleObject
WaitForSingleObjectEx
GetCurrentProcess
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
GetSystemDirectoryW
GetVersionExW
IsWow64Process
GetSystemWow64DirectoryA
GetModuleFileNameW
GetModuleHandleW
AddDllDirectory
SetDefaultDllDirectories
SetDllDirectoryW
CopyFileW
WideCharToMultiByte
GetLocaleInfoW
GetCommandLineW
FindResourceA
LocalAlloc
GetProcAddress
LoadLibraryW
GetCurrentProcessId
FreeConsole
AttachConsole
DecodePointer
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetModuleHandleA
GetModuleFileNameA
DuplicateHandle
InitializeCriticalSection
GetCurrentThread
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemDirectoryA
LoadLibraryA
FindVolumeClose
RaiseException
InitializeCriticalSectionAndSpinCount
Sleep
GetLogicalDriveStringsA
GetVolumeInformationA
FindFirstVolumeA
GetSystemFirmwareTable
GetStdHandle
SetCurrentDirectoryA
GetCurrentDirectoryA
FindFirstFileA
FindNextFileA
CreateProcessA
GetStartupInfoA
SetDllDirectoryA
GetFileInformationByHandleEx
GetFileTime
SetFileTime
GetSystemTime
SystemTimeToFileTime
GetDateFormatW
GetTimeFormatW
GetTempPathW
GetSystemInfo
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
FileTimeToSystemTime
SetLastError
GlobalAlloc
GlobalSize
GlobalUnlock
GlobalLock
GlobalFree
MulDiv
lstrcmpA
OutputDebugStringA
EncodePointer
GetModuleHandleExW
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomW
GlobalFindAtomW
CreateActCtxW
ActivateActCtx
DeactivateActCtx
FindActCtxSectionStringW
QueryActCtxW
CompareStringW
FlushFileBuffers
GetFileSize
GetVolumeInformationW
LockFile
SetEndOfFile
SetFilePointer
UnlockFile
WriteFile
lstrcmpiW
MoveFileW
GetStringTypeExW
GetThreadLocale
SetEvent
CreateEventW
SetThreadPriority
SuspendThread
ResumeThread
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
CompareStringA
GlobalReAlloc
GlobalHandle
LocalReAlloc
GlobalGetAtomNameW
GetAtomNameW
GlobalFlags
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
VirtualProtect
GetFileAttributesExW
GetFileSizeEx
SystemTimeToTzSpecificLocalTime
SetErrorMode
GetCurrentDirectoryW
VerSetConditionMask
lstrcpyW
VerifyVersionInfoW
FindResourceExW
GetWindowsDirectoryW
GetTickCount64
SearchPathW
GetProfileIntW
GetDiskFreeSpaceW
ReplaceFileW
GetUserDefaultLCID
GetTickCount
LocalLock
LocalUnlock
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
ResetEvent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
VirtualQuery
WriteConsoleW
OutputDebugStringW
FormatMessageA
GetStringTypeW
GetLocaleInfoEx
LCMapStringEx
CompareStringEx
GetCPInfo
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
ExitProcess
CreateThread
ExitThread
FreeLibraryAndExitThread
SetStdHandle
VirtualAlloc
GetCommandLineA
HeapQueryInformation
QueryPerformanceFrequency
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
IsValidLocale
EnumSystemLocalesW
GetTimeZoneInformation
SetFilePointerEx
SetCurrentDirectoryW
MoveFileExW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetConsoleCtrlHandler
LoadLibraryExA
??0DSMIPMIInterfaceImpl@@QEAA@XZ
??1DSMIPMIInterfaceImpl@@UEAA@XZ
??4DSMIPMIInterfaceImpl@@QEAAAEAV0@AEBV0@@Z
??_7DSMIPMIInterfaceImpl@@6B@
?IPMIRequest@DSMIPMIInterfaceImpl@@QEAAIPEAU_DSMIPMICommandData@@@Z
?Initialize@DSMIPMIInterfaceImpl@@QEAAIPEBU_DSMIPMIConfiguration@@@Z
?Initialize@DSMIPMIInterfaceImpl@@QEAAIVDSMString@@@Z
?InitializeDSMLogger@DSMIPMIInterfaceImpl@@AEAAXXZ
?Release@DSMIPMIInterfaceImpl@@QEAAIXZ
?freePMInfo@@YAHPEAUPMInfo@@@Z
?getPMInfo@@YAHHPEAPEAUPMInfo@@@Z
?getPMStatus@@YAHXZ
?getTestPMInfo@@YAHHPEAPEAUPMInfo@@@Z
?mDrvHandler@DSMIPMIInterfaceImpl@@0VDriverManager@@A
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ