Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
32fax.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
32fax.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ppi.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ppi.exe
Resource
win10v2004-20231215-en
Target
4536364888e94b2caec069471f2dce49
Size
2.5MB
MD5
4536364888e94b2caec069471f2dce49
SHA1
782331f2bef1ce85b1b75d5a959484e6f6512604
SHA256
50fb9359b1a4eb86a837420063802405ea6808df37128b1aab284ffda83836b1
SHA512
4aec726908836aa0195c28d986ba0b0d354676932b62b96b72bbb6efd6ea58ee46fe95afeb0eda78e8590b6448a282671ae359c96b334a2508d7da4312076a5b
SSDEEP
49152:HZJpIZl51jZviD0XznhwQsuJMoDbImmg3kFKFLenjLnqSnCiLB0s:fi19bhwQ1JMC0mJ3kFWLen3nJB0s
Checks for missing Authenticode signature.
resource |
---|
unpack001/ppi.exe |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderPathA
ShellExecuteA
SetFileAttributesA
RtlUnwind
GetDriveTypeA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
SetCurrentDirectoryA
SetEnvironmentVariableA
GetFileType
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
HeapAlloc
HeapFree
TerminateProcess
HeapReAlloc
HeapSize
GetACP
SetStdHandle
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
FileTimeToLocalFileTime
CompareStringA
CompareStringW
FileTimeToSystemTime
GetProfileStringA
CopyFileA
GetWindowsDirectoryA
WriteProfileStringA
GetLastError
GetCurrentProcess
GlobalFree
GlobalUnlock
GlobalLock
GetModuleFileNameA
lstrlenA
WritePrivateProfileSectionA
GetSystemDirectoryA
LockResource
SizeofResource
LoadResource
FindResourceA
GlobalAlloc
PurgeComm
EscapeCommFunction
ClearCommError
SetCommState
BuildCommDCBA
CloseHandle
CreateEventA
SetCommTimeouts
SetCommMask
SetupComm
CreateFileA
GetOverlappedResult
WaitForSingleObject
ReadFile
Sleep
WriteFile
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
CreateDirectoryA
MoveFileA
GetFileAttributesA
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
SetFilePointer
SetErrorMode
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
GlobalFlags
lstrcpynA
lstrcmpA
GetCurrentThread
GetTickCount
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
MulDiv
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
MultiByteToWideChar
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetFileTime
SetFileTime
GetModuleHandleA
GetProcAddress
GetVersionExA
LocalSize
LocalAlloc
LocalFree
PostThreadMessageA
InvalidateRect
LoadStringA
GetSysColorBrush
PtInRect
GetClassNameA
GetMessageA
ValidateRect
GetCursorPos
PostQuitMessage
RegisterClipboardFormatA
DestroyMenu
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowDC
ClientToScreen
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
GetDlgItemTextA
CheckRadioButton
CheckDlgButton
SendDlgItemMessageA
GetSysColor
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
IsWindowVisible
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
DrawFocusRect
UnregisterClassA
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CharNextA
IsWindowUnicode
CopyRect
LoadImageA
GetSystemMetrics
EndPaint
BeginPaint
DrawIcon
GetClientRect
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SendMessageA
IsIconic
UpdateWindow
PostMessageA
GetDesktopWindow
SetCursor
LoadCursorA
ExitWindowsEx
MessageBoxA
GetDlgItem
HideCaret
DrawMenuBar
ModifyMenuA
DestroyWindow
InflateRect
EnableMenuItem
GetMenu
EnableWindow
DispatchMessageA
TranslateMessage
PeekMessageA
LoadBitmapA
LoadIconA
ReleaseDC
GetDC
SetForegroundWindow
GetWindowRect
IsWindowEnabled
GetWindowLongA
GetParent
CreateDialogIndirectParamA
IsWindow
SetActiveWindow
MapWindowPoints
IntersectClipRect
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
DeleteDC
GetStockObject
CreateDIBitmap
GetTextExtentPointA
CreateSolidBrush
PrintDlgA
DocumentPropertiesA
GetPrinterDriverDirectoryA
OpenPrinterA
DeletePrinter
ClosePrinter
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
DeleteService
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ord17
ord8
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoCreateInstance
CoRevokeClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord516
ord665
ord598
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord717
ProcCallEngine
ord537
ord644
Zombie_AddRef
ord100
ord616
ord581
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ