Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
bfa7adeda4597b70bf74a9f2032df2f87e07f2dbb46e85cb7c091b83161d6b0a.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
bfa7adeda4597b70bf74a9f2032df2f87e07f2dbb46e85cb7c091b83161d6b0a.exe
Resource
win10v2004-20240226-en
Target
bfa7adeda4597b70bf74a9f2032df2f87e07f2dbb46e85cb7c091b83161d6b0a
Size
485KB
MD5
0acb06da48d86e1ef15c27a4f5a3bddd
SHA1
12dd7a86001ff2b6b661cd7de60ca6aadc9b78ae
SHA256
bfa7adeda4597b70bf74a9f2032df2f87e07f2dbb46e85cb7c091b83161d6b0a
SHA512
98fbcd4e190e0bc17dc712bbbe808c7d24610c334925381544fb16a8f75931db1c5f6597cafbe6a12a9050e482e55351bedb76b40573f8a7489e3c7755bdecd2
SSDEEP
12288:1NsUjyDukqiudnJkx3piQLmGLvdnTJ0CRUyF1I3Kl:1mkyDuZiCccQLmGpTrCm1I3g
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
d:\Projects\WinRAR\rar\build\rar32\Release\RAR.pdb
SetConsoleCtrlHandler
GetLastError
LocalFree
FormatMessageW
CreateFileW
CloseHandle
BackupRead
GetCurrentProcess
BackupSeek
CreateHardLinkW
SetFileTime
DeviceIoControl
FindClose
FindFirstFileW
DeleteFileW
RemoveDirectoryW
CreateDirectoryW
MoveFileW
GetShortPathNameW
GetLongPathNameW
SetFilePointer
SetEndOfFile
GetFileTime
ReadFile
FlushFileBuffers
GetDriveTypeW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetFileAttributesW
SetFileAttributesW
ExpandEnvironmentStringsW
FindNextFileW
GetVersionExW
GetModuleFileNameW
GetCurrentDirectoryW
GetFullPathNameW
SetErrorMode
FreeLibrary
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CompareStringA
Sleep
GetCurrentThread
SetPriorityClass
SetCurrentDirectoryW
GetFullPathNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
WaitForSingleObject
GetProcessAffinityMask
CreateEventW
CreateSemaphoreW
ReleaseSemaphore
ResetEvent
SetEvent
SystemTimeToFileTime
GetSystemTime
SystemTimeToTzSpecificLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
TzSpecificLocalTimeToSystemTime
LocalFileTimeToFileTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
CreateFileA
GetConsoleOutputCP
WriteConsoleA
SetEnvironmentVariableA
GetLocaleInfoA
GetStringTypeW
WriteFile
WriteConsoleW
SetConsoleMode
ReadConsoleW
GetStdHandle
GetFileType
GetConsoleMode
GetCommandLineW
GetModuleHandleW
GetProcAddress
GetFileInformationByHandle
SetThreadPriority
SetLastError
GetStringTypeA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
ExitProcess
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameA
SetHandleCount
GetStartupInfoA
SetStdHandle
GetConsoleCP
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapSize
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
CharUpperW
CharLowerW
MessageBeep
ExitWindowsEx
CharLowerA
LoadStringW
CharToOemBuffW
CharToOemBuffA
OemToCharBuffA
OemToCharA
CharToOemA
RegQueryValueExW
RegCloseKey
SetFileSecurityW
GetFileSecurityW
GetSecurityDescriptorLength
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
RegOpenKeyExW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHFileOperationW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ