Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a5219362cbb0c09963e6fe68b63565180a53ce4fac271770aeb180c03442575d.exe
Resource
win7-en-20211208
Target
a5219362cbb0c09963e6fe68b63565180a53ce4fac271770aeb180c03442575d
Size
1.6MB
MD5
5ca4eb1b6296d6f6f2e118e0a2a228ba
SHA1
9ae9bb0b2edc22af695974b784cd0dd3c62a7f97
SHA256
a5219362cbb0c09963e6fe68b63565180a53ce4fac271770aeb180c03442575d
SHA512
c5ca3629c71e7d38e71e1eb341fafeb31dac8b34aa27dcdd8ce8c556e6167f3e4f05a3f66c7c01a2d15efa114dca6a9e8a6e8ec99d8e98a562bf8969089a2073
SSDEEP
49152:znlK2gK5Ohl+yviNZUMSDoL+1jiiOeE3xpB+e:zg2VF3SDz9i3xL
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=94349,CN=Telegram FZ-LLC,O=Telegram FZ-LLC,STREET=Business Central Towers\, Tower A\, Office 2301 2303,L=Dubai,ST=Dubai,C=AE,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.3=#13024145
CN=COMODO RSA Extended Validation Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB
CN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
GetStartupInfoW
HeapSize
GetStdHandle
InitializeSListHead
SetCurrentDirectoryW
FindResourceExW
HeapReAlloc
HeapAlloc
FindFirstFileExA
IsBadReadPtr
HeapDestroy
GetModuleHandleW
LockResource
OutputDebugStringW
SetFilePointerEx
TlsGetValue
WideCharToMultiByte
TlsSetValue
IsDebuggerPresent
EnterCriticalSection
LoadLibraryA
SetLastError
GetLastError
SetUnhandledExceptionFilter
GetUserDefaultUILanguage
GetModuleFileNameA
GetACP
SizeofResource
FindNextFileA
HeapFree
VirtualQuery
GetProcAddress
WaitForSingleObject
GetCPInfo
IsProcessorFeaturePresent
GetCurrentThreadId
MultiByteToWideChar
UnhandledExceptionFilter
GetStringTypeW
VirtualProtectEx
IsValidCodePage
GetEnvironmentStringsW
DeleteCriticalSection
RtlUnwind
FindFirstFileW
ExitProcess
TlsAlloc
LeaveCriticalSection
GetCommandLineW
CloseHandle
WriteConsoleW
QueryPerformanceCounter
GetFileType
GetModuleHandleExW
GetFileAttributesW
lstrlenA
TerminateProcess
GetConsoleCP
WriteFile
FindResourceW
SetStdHandle
FindNextFileW
RaiseException
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentVariableW
CreateFileW
FreeLibrary
GetCurrentProcessId
GetOEMCP
GetCurrentProcess
GetCommandLineA
VirtualAlloc
GetConsoleMode
GetSystemInfo
FindClose
CreateProcessW
GetModuleFileNameW
FlushFileBuffers
TlsFree
GetProcessHeap
LoadResource
LCMapStringW
VirtualProtect
InitializeCriticalSectionAndSpinCount
ShellExecuteExW
PathAppendW
PathRemoveFileSpecW
LoadStringW
CharNextW
MessageBoxW
VerQueryValueW
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ