Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Disk-Drill-破解-版.exe
Resource
win7-20220901-en
Target
ff477890e02c7b1c2eb90c7959c71f2e0fb6624ed506486df4dd99b92ddb09cb
Size
243KB
MD5
4497402e6b070b5bb42d7a9f71300cdd
SHA1
d7e1aecc770ecc0cdd25cce87d5cfbecf3903cfc
SHA256
ff477890e02c7b1c2eb90c7959c71f2e0fb6624ed506486df4dd99b92ddb09cb
SHA512
205ea7c5c8259b4e582a4c29c57cf768969c54168a92996b251dfa2a95f35f0579c57b569a7083a26b75df68f262dd8ed7eff2f3da118868c590b7ceabdbf093
SSDEEP
6144:L13JvgC+1c8r7LbHdSkSTUqWNOVGhPMXI1L25hVqH:LxJvgXPr7XHYUyI1kVM
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=94349,CN=Telegram FZ-LLC,O=Telegram FZ-LLC,STREET=Business Central Towers\, Tower A\, Office 2301 2303,L=Dubai,ST=Dubai,C=AE,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.3=#13024145
CN=COMODO RSA Extended Validation Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB
CN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenWaitableTimerA
WaitNamedPipeA
CommConfigDialogA
SetSystemTimeAdjustment
SearchPathA
EnumResourceTypesA
DeleteFileW
GetConsoleAliasesLengthW
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterW
LocalAlloc
GetProcAddress
VirtualAlloc
LoadLibraryA
ReleaseActCtx
GetConsoleAliasA
FindFirstChangeNotificationA
WritePrivateProfileStringA
EnumResourceNamesW
UnlockFileEx
GetModuleHandleA
AddAtomA
GetConsoleAliasesLengthA
GenerateConsoleCtrlEvent
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
FindNextFileW
GetPriorityClass
SetConsoleCursorInfo
OpenJobObjectW
InitializeCriticalSection
FindResourceExA
GetConsoleMode
_hwrite
GlobalWire
GetComputerNameW
VerifyVersionInfoA
GetStringTypeA
FillConsoleOutputCharacterW
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
GetFileAttributesExA
SetComputerNameA
GetFileAttributesA
ReadConsoleA
GetVolumePathNameW
FoldStringA
lstrcpynA
CreateFileA
WriteConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
RaiseException
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetFilePointer
ReadFile
HeapAlloc
HeapReAlloc
SetStdHandle
GetConsoleCP
FlushFileBuffers
RtlUnwind
HeapSize
WriteConsoleA
GetConsoleOutputCP
ScreenToClient
GetCharWidth32A
GetFontLanguageInfo
AlphaBlend
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ