Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
Multiboot2Disk_X64.exe
Size
1.9MB
MD5
87302f3d47cfd3dbaeeed0f1a6c0b739
SHA1
4299547f85ebe306a5e118d149b48b40fd564e12
SHA256
dbaefe83f6fa3a8cccd62a5277a7a2959b23860fde9091a6b390ade1786001da
SHA512
343129bf57ae006ac2a87db0e86983195e80582b45d48efef4f7d3776cd6b469931b6d58ef28ce3301381803a01bca033be0ccaf2dfbe644d32918d64f7c0984
SSDEEP
12288:FZZ1EcX6EaQP8l9ZMbrY41bzSv2MKtdhDencnN4/NRK0OqfTZvu5hiXhxMU7Ds2F:F/1kQkl9ZMbVzk2CTnftv2MPQLx40o0w
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\GitHub\Ventoy2Diskv1.0.97\x64\Debug\Multiboot2Disk_X64.pdb
GetLastError
SetLastError
GetSystemDirectoryW
FreeLibrary
LoadResource
LockResource
FindResourceW
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
LCIDToLocaleName
GetUserDefaultUILanguage
GetEnvironmentVariableA
GetDriveTypeW
GetProcAddress
LoadLibraryA
GetCurrentDirectoryA
DeleteFileA
GetVolumeInformationA
CloseHandle
WaitForSingleObject
GetCurrentProcessId
CreateProcessA
GetStartupInfoA
Sleep
FormatMessageW
GetVolumeNameForVolumeMountPointA
DeviceIoControl
ReadFile
SetFilePointerEx
WriteFile
CreateFileA
FindVolumeClose
GetLogicalDrives
SetFilePointer
GetTickCount64
GetLogicalDriveStringsA
QueryDosDeviceA
FindFirstVolumeA
FindNextVolumeA
SetVolumeMountPointA
DeleteVolumeMountPointA
GetFileType
GetCurrentProcess
GetNativeSystemInfo
ReadProcessMemory
IsWow64Process
GetModuleHandleA
QueryFullProcessImageNameW
K32GetModuleFileNameExW
K32GetProcessImageFileNameW
VerSetConditionMask
GetFileAttributesA
GetLocalTime
GetVersionExA
GetProductInfo
GetSystemWow64DirectoryA
VerifyVersionInfoA
GetDiskFreeSpaceA
GetPrivateProfileIntA
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
GetFileSize
CreateThread
OpenProcess
GetWindowsDirectoryA
GetModuleFileNameW
LoadLibraryExA
lstrcmpW
lstrcpyW
lstrlenW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
SetDllDirectoryA
GetSystemDefaultUILanguage
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetEndOfFile
FlushFileBuffers
HeapQueryInformation
HeapReAlloc
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetConsoleCtrlHandler
WriteConsoleW
OutputDebugStringW
ReadConsoleW
RtlUnwind
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetTempPathW
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetCurrentThread
HeapValidate
HeapSize
ExitProcess
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
IsDebuggerPresent
HeapAlloc
HeapFree
GetProcessHeap
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
RtlUnwindEx
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RtlPcToFileHeader
GetCommandLineA
GetCommandLineW
GetModuleHandleExW
GetStdHandle
LoadImageW
LoadIconW
ScreenToClient
SetWindowTextA
UpdateWindow
DeleteMenu
ModifyMenuW
AppendMenuW
GetSubMenu
CheckMenuItem
GetMenuState
SetMenu
GetMenu
LoadMenuW
IsWindowEnabled
SetFocus
SendDlgItemMessageW
DialogBoxParamW
MoveWindow
ShowWindow
wsprintfW
GetSystemMetrics
MessageBoxW
GetWindowRect
GetWindowTextA
SetWindowTextW
InvalidateRect
EnableWindow
CheckRadioButton
GetDlgItem
EndDialog
SendMessageA
SetWinEventHook
EnumChildWindows
GetWindowLongPtrW
GetWindowTextW
SendMessageW
LoadStringW
CreateWindowExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ