Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
KofaxPowerPDFAdvanced-5.0.0.exe
Resource
win10v2004-20230703-en
Target
KofaxPowerPDFAdvanced-5.0.0.exe
Size
1843.9MB
MD5
691e5d91e79a5282e76efd80d8682f83
SHA1
01a767c5407d25019ee0e1a03866dd2816f449da
SHA256
e5e6f120e1e23186ebb21d89e19a22ece0570ccc133e85ac32580e05f57e03aa
SHA512
33fb256a93a1388ec77ed13697b778de7e85b4ea55f16bc634e431b92051c0a03e3c6e7a2493d1ee5edc4bac16ec4a1de4ac7b3dfb85f9bbea7bb77eaaa72a50
SSDEEP
50331648:Cr3DegSX0oJCwU2lNqwFt3DegSPXJCwUYlNqrRsm:Cr3DoX0OUH6t3DoP9U1dsm
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
FindExecutableA
SHBrowseForFolderA
SHGetMalloc
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetWindowLongA
SetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
SetDlgItemTextA
GetKeyState
CharUpperBuffA
GetParent
SendDlgItemMessageA
GetSysColor
InvalidateRect
UpdateWindow
LoadStringA
MessageBoxA
SetTimer
KillTimer
DialogBoxParamA
GetDlgItemTextA
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
PeekMessageA
TranslateMessage
DispatchMessageA
SetCursor
CharNextA
BeginPaint
SetWindowWord
GetWindowWord
DefWindowProcA
RegisterClassA
GetDlgItem
GetLocaleInfoA
Sleep
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetLastError
GetVersionExA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
LoadLibraryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GetDriveTypeA
GetEnvironmentVariableA
SetFilePointer
CloseHandle
CreateFileA
GetWindowsDirectoryA
_lclose
GlobalFree
GlobalUnlock
GlobalHandle
_llseek
_lread
_lopen
GlobalLock
GlobalAlloc
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
lstrlenA
LocalFree
ExitProcess
GetModuleHandleA
_lcreat
GetVolumeInformationA
WinExec
lstrcmpiA
SetErrorMode
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
WriteConsoleW
CreateDirectoryA
_lwrite
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
DeleteObject
SetBkColor
RegQueryValueA
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ