Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
DTS Sound Unbound fissuré[RPAurdOOPm].exe
Resource
win11-20240802-en
Target
DTS Sound Unbound fissuré[RPAurdOOPm].exe
Size
72.4MB
MD5
aa839c4ce778f6c5b7ed3b7421d03c46
SHA1
da3b42365aa4bc0187d07d923d27b8bf7c12383e
SHA256
72edf2df847b2ef47a4c048f9fa0cd6acf18065d6ee62959628afe9d92d6e384
SHA512
7e8c05dcebada0996ea4427d21d09fe2a9eba98302a7485092bad84a1c9107255f497b2b1aaf355abb9568af1fee2af1e8a5ba52371b49d109588360f561a453
SSDEEP
1572864:iWLpl4l5haDKqT6KOipjnvSyPlvWs9ucbVYhNeS4/FO+3JVl7NwHzLtfTXrV:hlle5xKOiJSyPlvKmS4Z3/l7uHzL9T7V
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyW
RegEnumValueW
RegQueryValueExW
RegSetValueExW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCreateKeyExW
RegOpenKeyExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
SHFileOperationW
ShellExecuteExW
CoTaskMemFree
OleInitialize
OleUninitialize
IIDFromString
CoCreateInstance
ord17
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
wsprintfA
SystemParametersInfoW
LoadCursorW
SetClassLongW
GetWindowLongW
GetSysColor
ScreenToClient
SetCursor
GetWindowRect
TrackPopupMenu
AppendMenuW
EnableMenuItem
CreatePopupMenu
GetSystemMenu
GetSystemMetrics
IsWindowEnabled
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CheckDlgButton
EndDialog
DialogBoxParamW
IsWindowVisible
SetWindowPos
CreateWindowExW
GetClassInfoW
RegisterClassW
DispatchMessageW
GetMessagePos
CharNextW
ExitWindowsEx
SetDlgItemTextW
SetTimer
CreateDialogParamW
DestroyWindow
LoadImageW
FindWindowExW
SetWindowLongW
InvalidateRect
ReleaseDC
GetDC
SetForegroundWindow
EnableWindow
GetDlgItem
ShowWindow
IsWindow
PostQuitMessage
SendMessageTimeoutW
SendMessageW
wsprintfW
FillRect
GetClientRect
EndPaint
BeginPaint
DrawTextW
DefWindowProcW
PeekMessageW
GetDlgItemTextW
CharNextA
CharPrevW
MessageBoxIndirectW
CallWindowProcW
SetWindowTextW
GetDeviceCaps
SetBkColor
SetBkMode
SetTextColor
CreateBrushIndirect
CreateFontIndirectW
DeleteObject
SelectObject
lstrcmpiA
lstrcpyA
lstrcatW
GetModuleHandleA
GetSystemDirectoryW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetLastError
WriteFile
RemoveDirectoryW
GetTempFileNameW
CreateDirectoryW
WideCharToMultiByte
lstrlenW
lstrcpynW
GlobalLock
GlobalUnlock
CreateThread
GetDiskFreeSpaceW
CopyFileW
GetVersionExW
GetWindowsDirectoryW
MoveFileExW
GetCurrentProcess
SetErrorMode
GetTempPathW
SetEnvironmentVariableW
GetCommandLineW
GetModuleFileNameW
GetTickCount
GetFileSize
CreateFileW
MultiByteToWideChar
MoveFileW
WritePrivateProfileStringW
GetPrivateProfileStringW
lstrlenA
lstrcmpiW
lstrcmpW
MulDiv
GlobalFree
GlobalAlloc
LoadLibraryExW
GetModuleHandleW
FreeLibrary
Sleep
CloseHandle
SetFileTime
SetFilePointer
SetFileAttributesW
ReadFile
GetShortPathNameW
GetFullPathNameW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CompareFileTime
SearchPathW
SetCurrentDirectoryW
IsProcessorFeaturePresent
ExpandEnvironmentStringsW
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
ExitProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ