Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Target
injector.dll
Size
1.0MB
MD5
6f5515e33da8237b0e55f75b9e9b39fe
SHA1
643e7a12bf0f1c1ed618def1073a1ee6ecc18aed
SHA256
3bab6aa2f696d403fdfb47a6fed4a64bd3e3c25a498bdf7871aed3b47cd14ae0
SHA512
f20d6d98e00bb992e63dbce0c08b0c471ac2a0a64a68e99a10f3030edc72e572ad59e4a83adff1906c190fab516d7c7573c264faf6fb132bae5be8b7b6ab41e8
SSDEEP
12288:JDGE/aPXaRH6fF0MmnbzjuXTJnzfwQtI7XHgZyKhJAea3hNgKCo:JV/68U+MmG1njwBLHgZnJc1Co
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_DLL
P:\Target\x64\ship\setupexe\x-none\setupbootstrapper.pdb
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
WinVerifyTrust
ConvertSidToStringSidA
SetSecurityDescriptorDacl
RegCloseKey
RegCreateKeyExW
OpenProcessToken
AllocateAndInitializeSid
CreateWellKnownSid
EqualSid
FreeSid
GetTokenInformation
IsValidSid
OpenThreadToken
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
EventRegister
EventUnregister
EventWrite
RegQueryInfoKeyW
RegGetValueW
RegEnumKeyW
InitializeSecurityDescriptor
InitializeAcl
GetSecurityDescriptorDacl
GetLengthSid
CopySid
CheckTokenMembership
AddAccessDeniedAce
AddAccessAllowedAce
ConvertStringSecurityDescriptorToSecurityDescriptorW
CopyFileW
SetLastError
WaitForSingleObjectEx
GetCommandLineW
SetCurrentDirectoryW
GlobalFree
GetCurrentThreadId
GetFullPathNameW
GetSystemDirectoryW
MultiByteToWideChar
GetVersion
VerSetConditionMask
WriteFile
VerifyVersionInfoW
GetUserDefaultLCID
GetDiskFreeSpaceExW
TlsGetValue
GlobalAlloc
LocalAlloc
LocalFree
CreateFileW
GetFileType
SetFilePointerEx
GetTempPathW
EnterCriticalSection
LeaveCriticalSection
GetSystemTime
GetTickCount
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
ReleaseMutex
GetSystemTimeAsFileTime
GetLocalTime
GetTickCount64
RaiseFailFastException
GetFileSize
GlobalMemoryStatusEx
GetNativeSystemInfo
GetProductInfo
GetUserGeoID
GetUserDefaultUILanguage
GetSystemDefaultLCID
TerminateProcess
LCIDToLocaleName
CreateMutexA
OpenMutexA
GetACP
IsValidLocale
ReadFile
RtlCaptureStackBackTrace
EnumCalendarInfoExEx
HeapAlloc
HeapFree
GetProcessHeap
FlsSetValue
GetCommandLineA
EncodePointer
DecodePointer
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapReAlloc
HeapSize
FlsGetValue
FlsFree
FlsAlloc
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSetInformation
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCPInfo
GetOEMCP
IsValidCodePage
GetStringTypeW
LCMapStringW
LoadLibraryW
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
WriteConsoleW
lstrcmpW
InitializeCriticalSection
SetFileAttributesW
RemoveDirectoryW
GetFileAttributesExW
FindNextFileW
FindFirstFileW
DeleteFileW
CreateDirectoryW
GetCurrentThread
GetCurrentProcessId
CloseHandle
ExpandEnvironmentStringsW
WideCharToMultiByte
FormatMessageW
LoadLibraryExW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
GetVersionExW
SetErrorMode
FindFirstFileExW
FindClose
CompareStringEx
IsWow64Process
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
LoadLibraryA
LoadResource
LockResource
SizeofResource
FindResourceW
GetShortPathNameA
LocaleNameToLCID
GetUserDefaultLocaleName
GetSystemDefaultLocaleName
GetLocaleInfoEx
CompareStringW
EnumSystemLocalesEx
GetDateFormatEx
GetCalendarInfoEx
EnumDateFormatsExEx
EnumTimeFormatsEx
GetThreadUILanguage
RaiseException
CoCreateInstance
CoCreateGuid
CoUninitialize
CoInitializeEx
VariantClear
VariantInit
SysFreeString
SysAllocString
DeleteObject
CreateSolidBrush
DeleteDC
GetDeviceCaps
CreateDCA
NdrClientCall2
WinMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ