C:\ReleaseAI\win\Release\stubs\x86\uwpstublauncher.pdb
Overview
overview
8Static
static
38c6b2b0c79...a.appx
windows7-x64
8c6b2b0c79...a.appx
windows10-2004-x64
AI_STUBS/A...86.exe
windows7-x64
1AI_STUBS/A...86.exe
windows10-2004-x64
3ChromeSetup.exe
windows7-x64
7ChromeSetup.exe
windows10-2004-x64
7PsfRunDll32.exe
windows7-x64
1PsfRunDll32.exe
windows10-2004-x64
3PsfRunDll64.exe
windows7-x64
1PsfRunDll64.exe
windows10-2004-x64
1PsfRuntime32.dll
windows7-x64
3PsfRuntime32.dll
windows10-2004-x64
3PsfRuntime64.dll
windows7-x64
1PsfRuntime64.dll
windows10-2004-x64
1StartingSc...er.ps1
windows7-x64
3StartingSc...er.ps1
windows10-2004-x64
3VFS/AppDat...pg.exe
windows7-x64
1VFS/AppDat...pg.exe
windows10-2004-x64
3VFS/AppDat...nv.dll
windows7-x64
3VFS/AppDat...nv.dll
windows10-2004-x64
3boci.ps1
windows7-x64
3boci.ps1
windows10-2004-x64
8Static task
static1
Behavioral task
behavioral1
Sample
8c6b2b0c794ec4d97773b11e379cde4ceccaf08a.appx
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c6b2b0c794ec4d97773b11e379cde4ceccaf08a.appx
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
AI_STUBS/AiStubX86.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
AI_STUBS/AiStubX86.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
ChromeSetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
ChromeSetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
PsfRunDll32.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
PsfRunDll32.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
PsfRunDll64.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
PsfRunDll64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
PsfRuntime32.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
PsfRuntime32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
PsfRuntime64.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
PsfRuntime64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
StartingScriptWrapper.ps1
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
StartingScriptWrapper.ps1
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
VFS/AppData/local/gpg.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
VFS/AppData/local/gpg.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
VFS/AppData/local/iconv.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
VFS/AppData/local/iconv.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
boci.ps1
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
boci.ps1
Resource
win10v2004-20240709-en
General
-
Target
MDE_File_Sample_8c6b2b0c794ec4d97773b11e379cde4ceccaf08a.zip
-
Size
120.3MB
-
MD5
8c46d1ed471ef49d8e5f8ff59dc7248d
-
SHA1
10af53d714b9f0d27822d70d18747526033e24ed
-
SHA256
f2b46154cfaae9958df9cb0ca1e0b9cf12aac5bcb56bf686b5d343a28cee8807
-
SHA512
eca6a0f91cfe435c8fac11e3aa2558a26e113c94f7e97e0fd6987a5eac2f94647988bb5b8535d2a7ff277cd189fd1c64c35bac557acd5fa76f0e1df44d08238b
-
SSDEEP
3145728:WGjOtXVHMVFv9XbQWMwYXM0geg8L6xnSexJgzryv6:OzQVBsnLFpgDnVJgY6
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack002/AI_STUBS/AiStubX86.exe unpack002/VFS/AppData/local/gpg.exe unpack002/VFS/AppData/local/iconv.dll
Files
-
MDE_File_Sample_8c6b2b0c794ec4d97773b11e379cde4ceccaf08a.zip.zip
Password: Spring2017*
-
8c6b2b0c794ec4d97773b11e379cde4ceccaf08a.appx
Password: Spring2017*
-
AI_STUBS/AiStubX86.exe.exe windows:6 windows x86 arch:x86
Password: Spring2017*
64b5039365296ac40cba1f2811b17e68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord205
ord70
api-ms-win-core-winrt-l1-1-0
RoInitialize
RoUninitialize
RoGetActivationFactory
RoActivateInstance
api-ms-win-core-winrt-string-l1-1-0
WindowsCreateStringReference
kernel32
GetProcAddress
LocalFree
DeleteCriticalSection
GetProcessHeap
FreeLibrary
GetCurrentProcess
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
SizeofResource
EnterCriticalSection
WriteFile
GetModuleFileNameW
LeaveCriticalSection
CreateFileW
GetCurrentThreadId
OutputDebugStringW
LockResource
CloseHandle
FindResourceExW
LoadResource
FindResourceW
GetCurrentProcessId
FlushFileBuffers
HeapDestroy
WaitForSingleObject
GetSystemDefaultLangID
CreateProcessW
GetEnvironmentStringsW
GetExitCodeProcess
RaiseException
lstrcmpiW
LoadLibraryExW
GetModuleFileNameA
SetLastError
GetModuleHandleExW
OutputDebugStringA
InitializeProcThreadAttributeList
FormatMessageW
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
GetCurrentPackageFamilyName
GetCurrentPackageFullName
DebugBreak
IsDebuggerPresent
GetStartupInfoW
SetEnvironmentVariableW
GetEnvironmentVariableW
GetFileAttributesW
GetSystemDirectoryW
GetCurrentDirectoryW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
DecodePointer
HeapAlloc
LoadLibraryW
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
HeapFree
EnumSystemLocalesW
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
ExpandEnvironmentStringsW
WriteConsoleW
GetFileType
GetStdHandle
ExitProcess
FreeLibraryAndExitThread
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
SetStdHandle
FreeEnvironmentStringsW
GetCommandLineW
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
FormatMessageA
GetLocaleInfoEx
GetStringTypeW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
EncodePointer
LCMapStringEx
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
CompareStringEx
GetCPInfo
QueryPerformanceCounter
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
user32
MessageBoxW
LoadStringW
CharNextW
advapi32
RegEnumKeyW
RegEnumValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
OpenProcessToken
GetTokenInformation
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetKnownFolderPath
ShellExecuteExW
SHGetFolderPathW
ole32
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
shlwapi
PathFileExistsW
Sections
.text Size: 353KB - Virtual size: 352KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
AI_STUBS/ChromeSetup.0.ico
-
AppxBlockMap.xml.xml
-
AppxManifest.xml.xml
-
AppxMetadata/CodeIntegrity.cat
-
AppxSignature.p7x
-
Assets/ChromeSetup.exeBadgeLogo.scale-100.png.png
Password: Spring2017*
-
Assets/ChromeSetup.exeBadgeLogo.scale-125.png.png
Password: Spring2017*
-
Assets/ChromeSetup.exeBadgeLogo.scale-150.png.png
Password: Spring2017*
-
Assets/ChromeSetup.exeBadgeLogo.scale-200.png.png
Password: Spring2017*
-
Assets/ChromeSetup.exeBadgeLogo.scale-400.png.png
Password: Spring2017*
-
Assets/ChromeSetup.exeSplashScreen.scale-100.png.png
Password: Spring2017*
-
Assets/ChromeSetup.exeSplashScreen.scale-125.png.png
-
Assets/ChromeSetup.exeSplashScreen.scale-150.png.png
-
Assets/ChromeSetup.exeSplashScreen.scale-200.png.png
-
Assets/ChromeSetup.exeSplashScreen.scale-400.png.png
-
Assets/ChromeSetup.exeSquare150x150Logo.scale-100.png.png
-
Assets/ChromeSetup.exeSquare150x150Logo.scale-125.png.png
-
Assets/ChromeSetup.exeSquare150x150Logo.scale-150.png.png
-
Assets/ChromeSetup.exeSquare150x150Logo.scale-200.png.png
-
Assets/ChromeSetup.exeSquare150x150Logo.scale-400.png.png
-
Assets/ChromeSetup.exeSquare310x310Logo.scale-100.png.png
-
Assets/ChromeSetup.exeSquare310x310Logo.scale-125.png.png
-
Assets/ChromeSetup.exeSquare310x310Logo.scale-150.png.png
-
Assets/ChromeSetup.exeSquare310x310Logo.scale-200.png.png
-
Assets/ChromeSetup.exeSquare310x310Logo.scale-400.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.scale-100.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.scale-125.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.scale-150.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.scale-200.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.scale-400.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-16.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-16_altform-lightunplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-16_altform-unplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-24.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-24_altform-lightunplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-24_altform-unplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-256.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-256_altform-lightunplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-256_altform-unplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-32.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-32_altform-lightunplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-32_altform-unplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-48.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-48_altform-lightunplated.png.png
-
Assets/ChromeSetup.exeSquare44x44Logo.targetsize-48_altform-unplated.png.png
-
Assets/ChromeSetup.exeSquare71x71Logo.scale-100.png.png
-
Assets/ChromeSetup.exeSquare71x71Logo.scale-125.png.png
-
Assets/ChromeSetup.exeSquare71x71Logo.scale-150.png.png
-
Assets/ChromeSetup.exeSquare71x71Logo.scale-200.png.png
-
Assets/ChromeSetup.exeSquare71x71Logo.scale-400.png.png
-
Assets/ChromeSetup.exeWide310x150Logo.scale-100.png.png
-
Assets/ChromeSetup.exeWide310x150Logo.scale-125.png.png
-
Assets/ChromeSetup.exeWide310x150Logo.scale-150.png.png
-
Assets/ChromeSetup.exeWide310x150Logo.scale-200.png.png
-
Assets/ChromeSetup.exeWide310x150Logo.scale-400.png.png
-
Assets/Store50x50Logo.scale-100.png.png
-
Assets/Store50x50Logo.scale-125.png.png
-
Assets/Store50x50Logo.scale-150.png.png
-
Assets/Store50x50Logo.scale-200.png.png
-
Assets/Store50x50Logo.scale-400.png.png
-
ChromeSetup.exe.exe windows:5 windows x86 arch:x86
7e2f200a9ecaa7ee1d0f7298f297d727
Code Sign
08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9Certificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before29/04/2021, 00:00Not After28/04/2036, 23:59SubjectCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:44:18:e2:de:de:36:dd:29:74:c3:44:3a:fb:5c:e5Certificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before02/07/2021, 00:00Not After10/07/2024, 23:59SubjectCN=Google LLC,O=Google LLC,L=Mountain View,ST=California,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
01Certificate
IssuerCN=Unknown issuerNot Before01/01/2013, 10:00Not After01/04/2013, 10:00SubjectCN=Dummy certificateExtended Key Usages
Key Usages
KeyUsageCertSign
0c:4d:69:72:4b:94:fa:3c:2a:4a:3d:29:07:80:3d:5aCertificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before21/09/2022, 00:00Not After21/11/2033, 23:59SubjectCN=DigiCert Timestamp 2022 - 2,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
5d:78:64:ad:83:d1:0a:df:74:12:91:dc:08:71:32:3c:fe:36:c1:8a:24:78:a7:7e:57:39:21:94:6b:41:9e:21Signer
Actual PE Digest5d:78:64:ad:83:d1:0a:df:74:12:91:dc:08:71:32:3c:fe:36:c1:8a:24:78:a7:7e:57:39:21:94:6b:41:9e:21Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
TEST_mi_exe_stub.pdb
Imports
kernel32
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
OutputDebugStringW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
ReadFile
CreateFileW
CloseHandle
WriteConsoleW
DecodePointer
GetExitCodeProcess
CreateProcessW
WaitForSingleObject
SetFilePointer
VirtualQuery
CreateDirectoryW
SizeofResource
RemoveDirectoryW
GetEnvironmentVariableW
GetTempPathW
FormatMessageW
GetFileAttributesExW
LockResource
DeleteFileW
FindResourceExW
LoadResource
FindResourceW
HeapDestroy
LocalFree
VerSetConditionMask
CopyFileW
VerifyVersionInfoW
GetTempFileNameW
lstrcmpiW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
shlwapi
PathAppendW
PathCanonicalizeW
PathQuoteSpacesW
ole32
CoUninitialize
CoInitializeEx
shell32
ord680
SHGetFolderPathW
user32
MessageBoxW
CharLowerBuffW
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PsfRunDll32.exe.exe windows:6 windows x86 arch:x86
2a22b6fe5189b8928e2d5bffd5eb859c
Code Sign
54:98:d2:d1:d4:5b:19:95:48:13:79:c8:11:c0:87:99Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before16/04/2020, 18:36Not After16/04/2045, 18:44SubjectCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:00:04:96:50:4b:d2:db:ee:cb:88:00:00:00:00:00:04Certificate
IssuerCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USNot Before13/04/2021, 17:31Not After13/04/2026, 17:31SubjectCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:07:87:a3:34:a3:7b:a5:8e:1c:00:00:00:00:00:07Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before01/04/2021, 20:05Not After01/04/2036, 20:15SubjectCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:05:e5:cf:0f:ff:66:2e:c9:87:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before19/11/2020, 20:32Not After19/11/2035, 20:42SubjectCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:3a:33:28:ed:15:29:98:a2:04:00:00:00:00:00:3aCertificate
IssuerCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USNot Before15/02/2024, 20:36Not After15/02/2025, 20:36SubjectCN=Microsoft Public RSA Time Stamping Authority,OU=Microsoft America Operations+OU=Thales TSS ESN:3DA5-963B-E1F4,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
17:0a:3f:cc:61:4b:ce:49:62:44:80:20:f7:5c:34:78:b0:ee:84:bc:dd:22:68:02:aa:12:a1:83:b9:1d:0b:f9Signer
Actual PE Digest17:0a:3f:cc:61:4b:ce:49:62:44:80:20:f7:5c:34:78:b0:ee:84:bc:dd:22:68:02:aa:12:a1:83:b9:1d:0b:f9Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\ReleaseAI\tools\msix-psf\Win32\Release\PsfRunDll32.pdb
Imports
kernel32
GetLastError
LoadLibraryA
GetProcAddress
WriteConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
CloseHandle
DecodePointer
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PsfRunDll64.exe.exe windows:6 windows x64 arch:x64
fbfe9cc74dcec3523d7b9afacb5c4d17
Code Sign
54:98:d2:d1:d4:5b:19:95:48:13:79:c8:11:c0:87:99Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before16/04/2020, 18:36Not After16/04/2045, 18:44SubjectCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:00:04:96:50:4b:d2:db:ee:cb:88:00:00:00:00:00:04Certificate
IssuerCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USNot Before13/04/2021, 17:31Not After13/04/2026, 17:31SubjectCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:07:87:a3:34:a3:7b:a5:8e:1c:00:00:00:00:00:07Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before01/04/2021, 20:05Not After01/04/2036, 20:15SubjectCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:05:e5:cf:0f:ff:66:2e:c9:87:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before19/11/2020, 20:32Not After19/11/2035, 20:42SubjectCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:39:62:06:a6:f0:2e:c2:6c:de:00:00:00:00:00:39Certificate
IssuerCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USNot Before15/02/2024, 20:36Not After15/02/2025, 20:36SubjectCN=Microsoft Public RSA Time Stamping Authority,OU=Microsoft America Operations+OU=nShield TSS ESN:7A00-05E0-D947,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
18:97:b7:1b:14:eb:98:35:9d:ba:76:aa:db:33:99:1a:84:d6:a1:63:a6:fa:87:27:cd:6b:09:7e:1d:88:e4:ecSigner
Actual PE Digest18:97:b7:1b:14:eb:98:35:9d:ba:76:aa:db:33:99:1a:84:d6:a1:63:a6:fa:87:27:cd:6b:09:7e:1d:88:e4:ecDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\ReleaseAI\tools\msix-psf\x64\Release\PsfRunDll64.pdb
Imports
kernel32
GetLastError
LoadLibraryA
GetProcAddress
WriteConsoleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
CloseHandle
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PsfRuntime32.dll.dll windows:6 windows x86 arch:x86
a17591684e7aeb718d0c838e2837fe98
Code Sign
54:98:d2:d1:d4:5b:19:95:48:13:79:c8:11:c0:87:99Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before16/04/2020, 18:36Not After16/04/2045, 18:44SubjectCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:00:04:96:50:4b:d2:db:ee:cb:88:00:00:00:00:00:04Certificate
IssuerCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USNot Before13/04/2021, 17:31Not After13/04/2026, 17:31SubjectCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:07:87:a3:34:a3:7b:a5:8e:1c:00:00:00:00:00:07Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before01/04/2021, 20:05Not After01/04/2036, 20:15SubjectCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:05:e5:cf:0f:ff:66:2e:c9:87:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before19/11/2020, 20:32Not After19/11/2035, 20:42SubjectCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:36:d9:36:1c:89:0a:2e:6b:81:00:00:00:00:00:36Certificate
IssuerCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USNot Before15/02/2024, 20:35Not After15/02/2025, 20:35SubjectCN=Microsoft Public RSA Time Stamping Authority,OU=Microsoft America Operations+OU=Thales TSS ESN:45D6-96C5-5E63,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
4b:b5:c0:68:cd:05:3d:70:aa:18:57:74:a4:f6:66:cc:22:60:1c:95:27:50:e6:2f:59:06:db:03:28:49:fe:04Signer
Actual PE Digest4b:b5:c0:68:cd:05:3d:70:aa:18:57:74:a4:f6:66:cc:22:60:1c:95:27:50:e6:2f:59:06:db:03:28:49:fe:04Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
C:\ReleaseAI\tools\msix-psf\Win32\Release\PsfRuntime32.pdb
Imports
kernel32
HeapFree
GetModuleHandleExW
GetCurrentApplicationUserModelId
OutputDebugStringA
GetFinalPathNameByHandleW
GetModuleFileNameW
CreateFileW
GetCurrentThreadId
MultiByteToWideChar
GetLastError
OutputDebugStringW
CloseHandle
HeapAlloc
GetCurrentPackageFamilyName
GetProcAddress
GetCurrentPackageFullName
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
SetLastError
TerminateProcess
ResumeThread
CreateProcessW
WideCharToMultiByte
QueryFullProcessImageNameW
CreateProcessA
GetCurrentThread
LoadLibraryW
FreeLibrary
SetEndOfFile
HeapSize
SetFilePointerEx
VirtualProtect
VirtualFree
GetCurrentProcess
VirtualAlloc
SuspendThread
VirtualProtectEx
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualQuery
VirtualQueryEx
WriteProcessMemory
GetEnvironmentVariableW
WaitForSingleObject
OpenProcess
VirtualAllocEx
ExitProcess
ReadProcessMemory
IsWow64Process
GetExitCodeProcess
LoadLibraryExW
LocalFree
FormatMessageA
GetLocaleInfoEx
GetStringTypeW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
CompareStringEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapReAlloc
GetStdHandle
GetFileType
ReadFile
GetConsoleMode
ReadConsoleW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
WriteConsoleW
user32
MessageBoxW
Exports
Exports
?PSFQueryPackageFamilyName@@YGPB_WXZ
DetourFinishHelperProcess
_PSFQueryAppLaunchConfig@8
_PSFQueryAppMonitorConfig@0
_PSFQueryApplicationId@0
_PSFQueryApplicationUserModelId@0
_PSFQueryConfig@8
_PSFQueryConfigRoot@0
_PSFQueryCurrentAppLaunchConfig@4
_PSFQueryCurrentExeConfig@0
_PSFQueryDllConfig@4
_PSFQueryEndScriptInfo@0
_PSFQueryExeConfig@4
_PSFQueryFinalPackageRootPath@0
_PSFQueryPackageFullName@0
_PSFQueryPackageRootPath@0
_PSFQueryStartScriptInfo@0
_PSFRegister@8
_PSFReportError@4
_PSFUnregister@8
Sections
.text Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
psf Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PsfRuntime64.dll.dll windows:6 windows x64 arch:x64
422d9d5ae950b18d15f6e774aaf5b3ed
Code Sign
54:98:d2:d1:d4:5b:19:95:48:13:79:c8:11:c0:87:99Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before16/04/2020, 18:36Not After16/04/2045, 18:44SubjectCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:f0:30:66:79:d4:a8:66:ba:c4:1e:00:00:00:00:f0:30Certificate
IssuerCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USNot Before25/04/2024, 18:32Not After28/04/2024, 18:32SubjectCN=Caphyon SRL,O=Caphyon SRL,L=Craiova,C=ROExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
33:00:00:00:04:96:50:4b:d2:db:ee:cb:88:00:00:00:00:00:04Certificate
IssuerCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USNot Before13/04/2021, 17:31Not After13/04/2026, 17:31SubjectCN=Microsoft ID Verified CS AOC CA 02,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:07:87:a3:34:a3:7b:a5:8e:1c:00:00:00:00:00:07Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before01/04/2021, 20:05Not After01/04/2036, 20:15SubjectCN=Microsoft ID Verified Code Signing PCA 2021,O=Microsoft Corporation,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:05:e5:cf:0f:ff:66:2e:c9:87:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Identity Verification Root Certificate Authority 2020,O=Microsoft Corporation,C=USNot Before19/11/2020, 20:32Not After19/11/2035, 20:42SubjectCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:3b:8a:69:59:be:14:05:64:71:00:00:00:00:00:3bCertificate
IssuerCN=Microsoft Public RSA Timestamping CA 2020,O=Microsoft Corporation,C=USNot Before15/02/2024, 20:36Not After15/02/2025, 20:36SubjectCN=Microsoft Public RSA Time Stamping Authority,OU=Microsoft America Operations+OU=nShield TSS ESN:7800-05E0-D947,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
dc:43:f4:44:7a:c6:4b:30:4b:19:15:43:8b:2b:81:cb:83:4b:9e:b2:5e:9f:20:35:d3:0e:da:af:1d:90:1d:5aSigner
Actual PE Digestdc:43:f4:44:7a:c6:4b:30:4b:19:15:43:8b:2b:81:cb:83:4b:9e:b2:5e:9f:20:35:d3:0e:da:af:1d:90:1d:5aDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\ReleaseAI\tools\msix-psf\x64\Release\PsfRuntime64.pdb
Imports
kernel32
HeapFree
GetModuleHandleExW
GetCurrentApplicationUserModelId
OutputDebugStringA
GetFinalPathNameByHandleW
GetModuleFileNameW
CreateFileW
GetCurrentThreadId
MultiByteToWideChar
GetLastError
OutputDebugStringW
CloseHandle
HeapAlloc
GetCurrentPackageFamilyName
GetProcAddress
GetCurrentPackageFullName
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
SetLastError
TerminateProcess
ResumeThread
CreateProcessW
WideCharToMultiByte
QueryFullProcessImageNameW
CreateProcessA
GetCurrentThread
LoadLibraryW
FreeLibrary
WriteConsoleW
SetEndOfFile
HeapSize
VirtualProtect
VirtualFree
GetCurrentProcess
VirtualAlloc
SuspendThread
VirtualProtectEx
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualQuery
VirtualQueryEx
WriteProcessMemory
GetEnvironmentVariableW
WaitForSingleObject
OpenProcess
VirtualAllocEx
ExitProcess
ReadProcessMemory
IsWow64Process
GetExitCodeProcess
LoadLibraryExW
LocalFree
FormatMessageA
GetLocaleInfoEx
GetStringTypeW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
CompareStringEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapReAlloc
GetStdHandle
GetFileType
ReadFile
GetConsoleMode
ReadConsoleW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
SetFilePointerEx
user32
MessageBoxW
Exports
Exports
?PSFQueryPackageFamilyName@@YAPEB_WXZ
DetourFinishHelperProcess
PSFQueryAppLaunchConfig
PSFQueryAppMonitorConfig
PSFQueryApplicationId
PSFQueryApplicationUserModelId
PSFQueryConfig
PSFQueryConfigRoot
PSFQueryCurrentAppLaunchConfig
PSFQueryCurrentExeConfig
PSFQueryDllConfig
PSFQueryEndScriptInfo
PSFQueryExeConfig
PSFQueryFinalPackageRootPath
PSFQueryPackageFullName
PSFQueryPackageRootPath
PSFQueryStartScriptInfo
PSFRegister
PSFReportError
PSFUnregister
Sections
.text Size: 277KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
psf Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Registry.dat
-
StartingScriptWrapper.ps1.ps1
-
SwapRegHelper10.zip
-
SwapRegHelper100.zip
-
VFS/AppData/local/gpg.exe.exe windows:4 windows x86 arch:x86
b94d5b6e4b62e1e66866eed7dc715e51
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateFileA
CreateProcessA
DeviceIoControl
ExitProcess
ExpandEnvironmentStringsA
FindAtomA
FormatMessageA
FreeLibrary
GetACP
GetAtomNameA
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessTimes
GetProcessWorkingSetSize
GetStartupInfoA
GetStdHandle
GetTempPathA
GetThreadTimes
GetTickCount
GetVersionExA
GlobalMemoryStatus
IsDBCSLeadByte
LoadLibraryA
QueryPerformanceCounter
ReadConsoleA
ReadFile
SetConsoleMode
SetFilePointer
SetUnhandledExceptionFilter
Sleep
VirtualProtect
WaitForSingleObject
WriteConsoleA
WriteFile
msvcrt
_access
_chsize
_close
_fdopen
_fstat
_getpid
_isatty
_lseek
_mkdir
_open
_putenv
_read
_rmdir
_setmode
_umask
_unlink
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_errno
_iob
_isctype
_onexit
_open_osfhandle
_pctype
_setmode
_stricmp
_strnicmp
_vsnprintf
abort
atexit
atoi
calloc
clearerr
clock
exit
fclose
fflush
fgetc
fgets
fopen
fprintf
fputc
fputs
fread
free
fseek
fwrite
getc
getenv
gmtime
isalnum
isalpha
iscntrl
isdigit
isgraph
islower
isprint
ispunct
isspace
isupper
isxdigit
localtime
malloc
memchr
memcmp
memcpy
memmove
memset
mktime
printf
putc
putchar
puts
raise
rand
realloc
remove
rename
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtol
strtoul
time
toupper
ungetc
vfprintf
vsprintf
user32
GetActiveWindow
GetCapture
GetCaretPos
GetClipboardOwner
GetClipboardViewer
GetCursorPos
GetDesktopWindow
GetFocus
GetInputState
GetMessagePos
GetMessageTime
GetOpenClipboardWindow
GetProcessWindowStation
GetQueueStatus
wsock32
WSAGetLastError
closesocket
recv
send
Sections
.text Size: 815KB - Virtual size: 814KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
VFS/AppData/local/iconv.dll.dll windows:4 windows x86 arch:x86
e7aa0aeef61e4ca89f4b87b602f40e02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
memset
malloc
memcmp
free
qsort
strlen
strcmp
_errno
_initterm
_adjust_fdiv
sprintf
abort
memcpy
kernel32
DisableThreadLibraryCalls
GetACP
Exports
Exports
_libiconv_version
libiconv
libiconv_close
libiconv_open
libiconv_set_relocation_prefix
libiconvctl
libiconvlist
locale_charset
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 800KB - Virtual size: 798KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 380B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
[Content_Types].xml.xml
-
boci.ps1
-
chrome.png.png
-
config.json
-
icon.png.png
-
resources.pri