Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2170bd57902ef686f75b8231a39d415a.exe
Resource
win7-20220812-en
Target
2170bd57902ef686f75b8231a39d415a.exe
Size
443KB
MD5
2170bd57902ef686f75b8231a39d415a
SHA1
d6f99beccdd9c1c9615645c54f7eb1c0f07a18b5
SHA256
0722db7a5b0b2d0f1c8d95037e4389856c2c90613bc34b5f4ffa797949d50491
SHA512
39d4c7649114cb477c3d3bd9a037b8db8bc27fa348d66703103f307b4720b2ead6b666177c328a46650791d4279b516432c33ca9161595b7b14ede7475f217c2
SSDEEP
6144:JFBPL6V26PLPv8GhHeAEr3WHwHRnfHtcQm9Uh0yo88qvm0cC0nigabwVfUvF:JFFOVZjPvBeL6HwRfHHm9Jn8LfctiHN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=94349,CN=Telegram FZ-LLC,O=Telegram FZ-LLC,STREET=Business Central Towers\, Tower A\, Office 2301 2303,L=Dubai,ST=Dubai,C=AE,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.3=#13024145
CN=COMODO RSA Extended Validation Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB
CN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FoldStringA
InterlockedCompareExchange
OpenWaitableTimerA
CreateEventW
ReadConsoleInputA
WaitNamedPipeW
CommConfigDialogA
SetSystemTimeAdjustment
SearchPathA
EnumResourceTypesW
GetModuleFileNameA
UpdateResourceA
LoadLibraryW
DeleteFileA
CopyFileW
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterA
GetConsoleAliasesLengthW
PeekConsoleInputA
GlobalGetAtomNameA
GetShortPathNameA
GetPrivateProfileStringW
GetModuleHandleA
GetProcAddress
VirtualAlloc
ReleaseActCtx
GetConsoleAliasA
FindFirstChangeNotificationA
WritePrivateProfileStringW
EnumResourceNamesW
LockFile
lstrcpynA
AddAtomA
AllocConsole
GetLongPathNameA
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
FindNextFileW
OpenJobObjectA
EnterCriticalSection
FindResourceExA
_hwrite
GlobalUnfix
GetComputerNameA
VerifyVersionInfoW
SetFileShortNameA
GetVolumeNameForVolumeMountPointA
GetFileAttributesExA
SetComputerNameW
GetFileAttributesW
GetVolumePathNameW
LocalAlloc
LoadLibraryA
CreateFileA
CloseHandle
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
ReadFile
SetStdHandle
LCMapStringA
LCMapStringW
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
ScreenToClient
GetCharWidth32A
GetCharacterPlacementW
AlphaBlend
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ