Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
Inject.exe
Size
34KB
MD5
395b16c8c5921a3573e43b59ac297afc
SHA1
8c4d6c2166dbab0cafbaf5434c4e4f6c9aead612
SHA256
219e2cf8da82589407165bf4a53b8239dc6f4034769c788268251e2089e30bcc
SHA512
21e8904a0ab08360b9d931f75818dbec04407fb2ed9e7927470d22d84afc158377223239333becd16bf36b1ac95a580071077d845476831c4da0ec038acd69b4
SSDEEP
384:1TTM2r4JZuzufmNT6N2MVW9VjiW/R6zL+UMmWPtRQQrbAVWhoHaILVJyfGPtrHCP:xxZpx/R6zSRTMQrbOawXwYtrHTCIfo
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\furiosdestruct\source\repos\SetWindowsHookEx-Injector\x64\release\bin\hookloader.pdb
GetFileAttributesW
GetProcAddress
LoadLibraryExW
FindClose
CreateFileW
GetLocaleInfoEx
FormatMessageA
LocalFree
GetFileAttributesExW
AreFileApisANSI
CloseHandle
GetLastError
GetFileInformationByHandleEx
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetModuleHandleW
IsDebuggerPresent
FindFirstFileW
PostThreadMessageW
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowThreadProcessId
FindWindowW
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Winerror_map@std@@YAHH@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Syserror_map@std@@YAPEBDH@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
__CxxFrameHandler4
__std_terminate
__current_exception
__C_specific_handler
__std_exception_copy
__std_exception_destroy
memcpy
_CxxThrowException
memmove
__current_exception_context
memset
_set_new_mode
_callnewh
malloc
free
_initialize_onexit_table
_register_onexit_function
_register_thread_local_exe_atexit_callback
_c_exit
__p___argc
_crt_atexit
__p___wargv
_initterm_e
_initterm
_get_initial_wide_environment
_initialize_wide_environment
_configure_wide_argv
_set_app_type
_seh_filter_exe
exit
terminate
_cexit
_invalid_parameter_noinfo_noreturn
system
_exit
_configthreadlocale
___lc_codepage_func
__setusermatherr
__p__commode
_set_fmode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ