Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
unlocker1.9.0-portable.zip
Size
111KB
MD5
8f7da0d01afd03a1e366a72c231fb3fc
SHA1
e8abf005d2f7658f81b1ed29a0c426f9a63637f2
SHA256
7fb45b8ac6971cbe98d6935203e956865cd258ba02a1ac20bce07adab8dbe582
SHA512
10c23d8f13c0931470fbed337ba4a29588a71ce4b22e5f5c8a62e8af8c55d50f0568e85bd812fffad4b1bc745cf06db1d58d84199f5ac00028bdd24510262a86
SSDEEP
1536:JanPPVYDlENY/fdyCDYmnhNfjmp6+/DybLW7LrOpF2eV1WEg9DFSoOOAP1oDByds:JmPCCk1yFsquiGV1WEu7TeWDBy4cVAG8
Checks for missing Authenticode signature.
resource |
---|
unpack001/x64/UnlockerInject32.exe |
unpack001/x86/Unlocker.exe |
unpack001/x86/UnlockerAssistant.exe |
unpack001/x86/UnlockerDriver5.sys |
unpack001/x86/UnlockerHook.dll |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
e:\Documents\Sources\Visual Studio Projects\Unlocker\Release64\Unlocker.pdb
GetModuleFileNameExW
GetModuleBaseNameW
EnumProcessModules
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Create
ImageList_SetBkColor
recv
send
connect
htons
gethostbyname
socket
WSAStartup
StrStrA
PathRemoveExtensionW
PathStripPathW
SHDeleteKeyA
PathSkipRootW
StrToIntA
PathStripToRootW
PathRemoveFileSpecW
wvnsprintfA
PathFindExtensionW
StrStrW
PathIsDirectoryW
Module32NextW
GetModuleFileNameW
Module32FirstW
Process32NextW
CreateThread
ExitProcess
CreateFileA
QueryDosDeviceA
CreateToolhelp32Snapshot
lstrcmpiW
GetCommandLineW
lstrlenW
GetFileAttributesW
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
GetShortPathNameW
lstrcpyW
MoveFileW
GlobalFree
GlobalUnlock
GlobalLock
GlobalReAlloc
GlobalAlloc
FindClose
FindNextFileW
lstrcmpW
FindFirstFileW
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
lstrcpyA
GetProcAddress
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
OpenProcess
LocalFree
LoadLibraryA
ReadFile
lstrcmpA
GetLongPathNameW
CreateFileW
WriteFile
MultiByteToWideChar
GetVersionExA
lstrlenA
MoveFileExW
DuplicateHandle
GetCurrentProcess
TerminateProcess
OutputDebugStringA
Process32FirstW
DialogBoxParamA
SendDlgItemMessageA
UpdateWindow
InvalidateRect
ShowWindow
GetSysColor
MoveWindow
GetClientRect
GetDlgItemTextW
GetDlgItem
wsprintfA
CharUpperW
CallWindowProcA
DestroyCursor
SetWindowLongPtrA
SetCapture
SetCursor
LoadCursorA
PtInRect
ReleaseCapture
GetSystemMetrics
LoadIconA
DestroyIcon
SetDlgItemTextA
SetDlgItemTextW
SetWindowTextA
PostMessageA
GetWindowRect
GetWindowPlacement
EndDialog
SetWindowPlacement
GetDC
SendMessageA
DrawTextA
MessageBoxA
wsprintfW
ClientToScreen
GetObjectA
CreateFontIndirectA
SelectObject
GetSaveFileNameW
SetNamedSecurityInfoW
RegSetValueExW
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
FreeSid
SetEntriesInAclA
AllocateAndInitializeSid
RegSetValueExA
CommandLineToArgvW
ShellExecuteA
ExtractIconExW
ShellExecuteExW
SHGetMalloc
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
CoInitialize
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IofCompleteRequest
MmMapLockedPagesSpecifyCache
ObfDereferenceObject
ExFreePool
ObQueryNameString
ExAllocatePoolWithTag
ObReferenceObjectByHandle
IoFileObjectType
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrToIntW
OpenProcess
ExitProcess
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
lstrcpyW
lstrcpyA
GetProcAddress
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
GetCommandLineW
LoadLibraryA
GlobalAlloc
lstrcmpiW
MessageBoxW
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameExW
GetModuleBaseNameW
EnumProcessModules
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Create
ImageList_SetBkColor
send
recv
connect
htons
gethostbyname
socket
WSAStartup
StrStrA
PathRemoveExtensionW
PathStripPathW
SHDeleteKeyA
StrToIntA
wvnsprintfA
PathStripToRootW
PathIsDirectoryW
PathFindExtensionW
StrStrW
PathSkipRootW
PathRemoveFileSpecW
Module32NextW
GetModuleFileNameW
Module32FirstW
Process32NextW
CreateThread
ExitProcess
CreateFileA
QueryDosDeviceA
CreateToolhelp32Snapshot
lstrcmpiW
GetCommandLineW
lstrlenW
lstrcpyA
LocalFree
GetProcAddress
LoadLibraryA
lstrcpyW
GetLongPathNameW
CloseHandle
ReadFile
CreateFileW
WriteFile
GetModuleHandleA
MultiByteToWideChar
GlobalAlloc
GlobalFree
lstrcmpA
GetFileAttributesW
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
GetShortPathNameW
MoveFileW
GetVersionExA
GlobalUnlock
GlobalLock
GlobalReAlloc
FindClose
FindNextFileW
lstrcmpW
FindFirstFileW
lstrlenA
MoveFileExW
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
DuplicateHandle
GetCurrentProcess
TerminateProcess
Process32FirstW
GetDlgItemTextW
DialogBoxParamA
wsprintfA
CharUpperW
SendDlgItemMessageA
UpdateWindow
InvalidateRect
ShowWindow
LoadIconA
MoveWindow
GetClientRect
ClientToScreen
GetDlgItem
CallWindowProcA
DestroyCursor
SetWindowLongA
SetCapture
SetCursor
LoadCursorA
PtInRect
ReleaseCapture
GetSystemMetrics
DestroyIcon
SetDlgItemTextA
SetDlgItemTextW
SetWindowTextA
PostMessageA
GetWindowRect
GetWindowPlacement
EndDialog
SetWindowPlacement
GetDC
SendMessageA
DrawTextA
MessageBoxA
wsprintfW
GetSysColor
GetObjectA
CreateFontIndirectA
SelectObject
GetSaveFileNameW
SetNamedSecurityInfoW
RegSetValueExW
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
FreeSid
SetEntriesInAclA
AllocateAndInitializeSid
RegSetValueExA
CommandLineToArgvW
ShellExecuteA
ExtractIconExW
SHFileOperationW
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
CoInitialize
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
StrToIntA
wvnsprintfA
lstrcmpA
lstrcmpW
GetCommandLineW
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ExitProcess
lstrlenA
lstrcpyA
GetModuleHandleA
PostQuitMessage
DestroyWindow
PostMessageA
GetWindowTextA
DestroyIcon
DispatchMessageA
TranslateMessage
GetMessageA
GetCursorPos
CreateDialogParamA
RegisterWindowMessageA
EnumWindows
SetForegroundWindow
TrackPopupMenu
DestroyMenu
wsprintfA
MessageBoxA
CreatePopupMenu
LoadIconA
EnableMenuItem
InsertMenuA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
CommandLineToArgvW
Shell_NotifyIconA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IofCompleteRequest
MmMapLockedPagesSpecifyCache
ObfDereferenceObject
ExFreePool
ObQueryNameString
ExAllocatePoolWithTag
ObReferenceObjectByHandle
IoFileObjectType
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathStripPathW
PathRemoveFileSpecW
GetModuleHandleA
lstrcpyW
GetModuleFileNameW
GetLastError
lstrcmpA
CloseHandle
WriteProcessMemory
FlushInstructionCache
ReadProcessMemory
GetCurrentProcess
VirtualProtect
GetProcAddress
lstrlenW
lstrcmpiW
DisableThreadLibraryCalls
CallNextHookEx
PostMessageA
UnhookWindowsHookEx
EnumWindows
wsprintfW
SetWindowsHookExA
GetWindowTextA
ShellExecuteExW
HookInstall
HookUninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ