Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Overview
overview
7Static
static
1Adobe XD 2...up.exe
windows7-x64
3Adobe XD 2...up.exe
windows10-2004-x64
7Adobe XD 2...PC.xml
windows7-x64
1Adobe XD 2...PC.xml
windows10-2004-x64
1Adobe XD 2...re.xml
windows7-x64
1Adobe XD 2...re.xml
windows10-2004-x64
1Adobe XD 2...ox.xml
windows7-x64
1Adobe XD 2...ox.xml
windows10-2004-x64
1Adobe XD 2...ox.xml
windows7-x64
1Adobe XD 2...ox.xml
windows10-2004-x64
1Adobe XD 2...CC.xml
windows7-x64
1Adobe XD 2...CC.xml
windows10-2004-x64
1Adobe XD 2...me.xml
windows7-x64
1Adobe XD 2...me.xml
windows10-2004-x64
1Adobe XD 2...ion.js
windows7-x64
1Adobe XD 2...ion.js
windows10-2004-x64
1Adobe XD 2...IM.dll
windows7-x64
4Adobe XD 2...IM.dll
windows10-2004-x64
4Static task
static1
Behavioral task
behavioral1
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/Set-up.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/Set-up.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/AAM/IPC/IPC.xml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/AAM/IPC/IPC.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/Core/Core.xml
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/Core/Core.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/HDBox/HDBox.xml
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/HDBox/HDBox.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/IPCBox/IPCBox.xml
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/IPCBox/IPCBox.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/LCC/LCC.xml
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/LCC/LCC.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/Runtime/Runtime.xml
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/packages/ADC/Runtime/Runtime.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/products/SPRK/application.js
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/products/SPRK/application.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/resources/AdobePIM.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Adobe XD 2020 v29.2.32 [www.tecnotutoshd.net]/resources/AdobePIM.dll
Resource
win10v2004-20230220-en
Target
AXD2020 [www.tecnotutoshd.net].zip
Size
322.6MB
MD5
56e999c9986c58520c74691b666d72fe
SHA1
0efe5cdfe211ade1ab07c17c12b1bb50f7e1133b
SHA256
5b719d7059c7668a8a12bade2fc06121f6e53c3d3cf52f87aba23927b4711b39
SHA512
0661451419149b0641aaff2e8a2e333ce748da4df859118b09f6b1188df42e2e9b2beb64f2b82a86b68c852b9f2566e023dc4adf66b8f86b71b1ef75eb2d0bd6
SSDEEP
6291456:8Fh2mDChrJveP0tP+WlCyEpdBws6OLtD86q4ZEEDrusjbeSSKUmRqSeVjYG1d2jo:87DMlmWP+WlCyEjB8OLV86q4ZEITjypF
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=2748129,CN=Adobe Inc.,OU=AAM 256,O=Adobe Inc.,L=San Jose,ST=ca,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CM_Get_DevNode_Status
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
InitCommonControlsEx
SHGetFolderLocation
SHGetPathFromIDListW
SHGetFolderPathW
ord680
SHGetSpecialFolderPathW
SHGetKnownFolderPath
SHCreateDirectoryExW
SHGetMalloc
SHBrowseForFolderW
SHGetSpecialFolderLocation
ord51
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
PathFileExistsA
PathAppendW
PathIsSystemFolderW
SHGetValueW
UrlIsW
PathRemoveExtensionW
PathAddExtensionW
PathIsFileSpecW
PathIsRootW
PathIsNetworkPathW
PathRenameExtensionW
PathRemoveBackslashW
PathFileExistsW
PathIsDirectoryW
PathRemoveFileSpecW
PathStripPathW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathAddBackslashW
PathIsRelativeW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
GetTempPathW
CreateFileW
GetVersionExW
GetComputerNameExW
FileTimeToSystemTime
CloseHandle
RaiseException
LoadLibraryW
GetProcAddress
LocalFree
CreateProcessW
GetModuleHandleW
FreeLibrary
FindFirstFileW
FindNextFileW
TerminateProcess
RemoveDirectoryW
GetModuleFileNameW
FindClose
WaitForSingleObject
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
DeleteFileW
Process32FirstW
CopyFileW
GetExitCodeProcess
ReadFile
SetLastError
lstrlenW
LocalAlloc
GetFileAttributesW
FormatMessageW
GetDiskFreeSpaceExW
GetCurrentDirectoryW
SetCurrentDirectoryW
MoveFileExW
GetFileSize
lstrcpyW
lstrcmpiW
lstrcmpW
GetDriveTypeW
InitializeCriticalSectionEx
DecodePointer
DeleteCriticalSection
GetFullPathNameW
HeapSize
HeapReAlloc
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetSystemDirectoryW
SetDllDirectoryW
GetStdHandle
AttachConsole
FreeConsole
GetConsoleWindow
CreateMutexW
ReleaseMutex
AreFileApisANSI
TryEnterCriticalSection
HeapCreate
WriteFile
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
UnmapViewOfFile
GetModuleHandleA
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
GetVersionExA
DeleteFileA
GetSystemInfo
HeapCompact
UnlockFile
CreateFileMappingA
LockFileEx
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetProcessHeap
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
SizeofResource
LockResource
LoadResource
FindResourceW
CreateEventW
GlobalFree
VerSetConditionMask
VerifyVersionInfoW
GetUserDefaultLCID
LCMapStringW
DuplicateHandle
ProcessIdToSessionId
SetEvent
TerminateThread
CreateThread
FindResourceExW
ResetEvent
GetThreadTimes
QueryFullProcessImageNameW
WaitForMultipleObjects
GetFileSizeEx
GetUserDefaultLangID
GetUserDefaultUILanguage
SetNamedPipeHandleState
CreateNamedPipeW
ConnectNamedPipe
CreateDirectoryW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
ReleaseSemaphore
OpenSemaphoreW
CreateSemaphoreW
GetLocalTime
GetTimeFormatW
GetDateFormatW
OpenMutexW
GetTimeZoneInformation
CreateSymbolicLinkW
QueryPerformanceFrequency
GetCurrentThread
SetFilePointerEx
ResumeThread
LoadLibraryExW
InterlockedPopEntrySList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
CompareStringW
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
SwitchToThread
GetStringTypeW
LoadLibraryExA
VirtualQuery
VirtualProtect
HeapAlloc
HeapFree
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
VirtualFree
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RtlUnwind
GetFileType
SetStdHandle
ExitThread
GetModuleHandleExW
WriteConsoleW
ExitProcess
IsValidLocale
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
GetConsoleCP
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
RegisterWaitForSingleObject
UnregisterWait
GetSystemTime
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FreeLibraryAndExitThread
HeapValidate
InvalidateRgn
DispatchMessageW
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
AttachThreadInput
GetSysColor
GetForegroundWindow
AllowSetForegroundWindow
CreateAcceleratorTableW
SetFocus
CharNextW
ShowWindow
GetShellWindow
EnumWindows
PostThreadMessageW
wsprintfW
GetWindowLongW
PostMessageW
IsWindow
SystemParametersInfoW
EnableMenuItem
BringWindowToTop
TranslateAcceleratorW
TranslateMessage
GetParent
GetClassNameW
LoadIconW
GetSystemMetrics
GetWindowThreadProcessId
GetSystemMenu
GetClassLongW
SetCapture
SetWindowLongW
GetClientRect
GetDlgItem
PostQuitMessage
GetClassInfoExW
RegisterWindowMessageW
ReleaseCapture
SetForegroundWindow
InvalidateRect
IsIconic
BeginPaint
EndPaint
GetWindowTextW
GetWindowRect
GetDC
SetWindowPos
MessageBoxW
SendMessageW
GetDesktopWindow
ReleaseDC
UnregisterClassW
GetWindowTextLengthW
GetMessageW
DefWindowProcW
CallWindowProcW
GetActiveWindow
RegisterClassExW
AppendMenuW
SetWindowTextW
ScreenToClient
CreateWindowExW
FillRect
DestroyWindow
GetFocus
GetWindow
GetAsyncKeyState
SetClassLongW
LoadImageW
MoveWindow
LoadCursorW
DeleteDC
GetObjectW
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
DeleteObject
CreateSolidBrush
GetDeviceCaps
GetStockObject
GetTokenInformation
CreateWellKnownSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegCreateKeyExW
SetNamedSecurityInfoW
SetEntriesInAclW
RegFlushKey
LookupAccountSidW
EqualSid
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
DuplicateTokenEx
ConvertSidToStringSidW
ImpersonateLoggedOnUser
ConvertStringSidToSidW
RevertToSelf
CryptReleaseContext
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextW
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
GetNamedSecurityInfoW
CoAddRefServerProcess
CoReleaseServerProcess
CoCreateGuid
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoInitialize
OleLockRunning
CLSIDFromString
OleInitialize
CreateStreamOnHGlobal
CLSIDFromProgID
CoTaskMemAlloc
OleUninitialize
CoGetClassObject
CoCreateInstance
StringFromGUID2
CoTaskMemFree
OleRun
SysAllocStringLen
SysStringLen
SysAllocString
OleCreateFontIndirect
LoadTypeLi
VariantInit
VariantClear
VariantChangeType
SysAllocStringByteLen
VariantCopy
SysStringByteLen
DispCallFunc
LoadRegTypeLi
GetErrorInfo
SysFreeString
CertGetNameStringW
CertGetIssuerCertificateFromStore
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
WTHelperGetProvSignerFromChain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=2748129,CN=Adobe Inc.,OU=AAM 256,O=Adobe Inc.,L=San Jose,ST=ca,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord147
ord74
ord145
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcessModules
WTSEnumerateSessionsW
WTSFreeMemory
PathIsFileSpecW
PathAddExtensionW
PathRemoveFileSpecA
PathIsDirectoryA
PathIsDirectoryEmptyW
PathIsSystemFolderW
PathIsRootW
PathRenameExtensionW
PathIsDirectoryW
PathAppendW
PathRemoveBackslashW
PathStripPathW
PathAppendA
PathFileExistsW
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsA
PathRemoveExtensionW
ShellExecuteExW
SHCreateDirectoryExW
SHGetFolderLocation
SHGetSpecialFolderPathW
SHGetKnownFolderPath
SHGetPathFromIDListW
SHGetFolderPathW
ord680
CommandLineToArgvW
ord51
SHCreateItemFromParsingName
WinHttpOpen
WinHttpReceiveResponse
WinHttpSetTimeouts
WinHttpQueryHeaders
WinHttpQueryAuthSchemes
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetCredentials
WinHttpSendRequest
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetOption
TlsFree
TlsSetValue
TlsGetValue
CompareStringW
SwitchToThread
InitializeCriticalSectionAndSpinCount
GetStringTypeW
EncodePointer
TlsAlloc
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetTimeZoneInformation
ExitProcess
GetStdHandle
GetFileType
IsValidLocale
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
GetConsoleCP
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionEx
GetLastError
RaiseException
DecodePointer
DeleteCriticalSection
ReleaseSemaphore
CreateMutexW
WaitForSingleObject
LocalAlloc
ReleaseMutex
Sleep
OpenSemaphoreW
CloseHandle
LocalFree
GetCurrentProcessId
CreateSemaphoreW
CreateDirectoryW
GetTempPathW
MultiByteToWideChar
SetEvent
ResetEvent
GetCommandLineW
CreateProcessW
GetLocalTime
GetTimeFormatW
GetDateFormatW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
FindFirstFileW
FindNextFileW
TerminateProcess
RemoveDirectoryW
FindClose
SetEnvironmentVariableW
SetFileAttributesW
CreateEventW
GetDiskFreeSpaceExW
CreateThread
CopyFileW
lstrcmpiW
lstrcmpW
GetExitCodeProcess
AreFileApisANSI
ReadFile
TryEnterCriticalSection
HeapCreate
HeapFree
EnterCriticalSection
GetFullPathNameW
WriteFile
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
CreateFileW
GetFileAttributesW
GetCurrentThreadId
UnmapViewOfFile
HeapValidate
HeapSize
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
GetVersionExA
DeleteFileA
DeleteFileW
HeapReAlloc
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
GetProcAddress
CreateFileMappingA
LockFileEx
GetFileSize
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
GetCurrentProcess
GetFileSizeEx
lstrlenW
GetACP
SizeofResource
GetModuleFileNameW
LockResource
LoadResource
FindResourceW
MoveFileExW
GlobalAlloc
GlobalFree
VerSetConditionMask
GetModuleHandleW
VerifyVersionInfoW
SetLastError
DuplicateHandle
ProcessIdToSessionId
TerminateThread
FindResourceExW
lstrcpyW
QueryFullProcessImageNameW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
FileTimeToSystemTime
OpenMutexW
GetUserDefaultLCID
LCMapStringW
GetUserDefaultLangID
GetUserDefaultUILanguage
SetFilePointerEx
ResumeThread
SetStdHandle
WriteConsoleW
QueryPerformanceFrequency
GetVersionExW
CreateFileMappingW
wsprintfW
EnumWindows
GetWindowThreadProcessId
GetShellWindow
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
RegQueryValueExW
FreeSid
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
LookupAccountSidW
CreateWellKnownSid
EqualSid
GetTokenInformation
DuplicateTokenEx
GetUserNameW
ConvertSidToStringSidW
ImpersonateLoggedOnUser
ConvertStringSidToSidW
RevertToSelf
CryptReleaseContext
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextW
CoUninitialize
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoInitialize
CoCreateGuid
StringFromGUID2
CLSIDFromProgID
OleRun
CLSIDFromString
SysStringLen
VariantChangeType
VariantInit
SysFreeString
SysAllocString
VariantClear
VariantCopy
GetErrorInfo
CertGetNameStringW
WinVerifyTrust
WTHelperGetProvCertFromChain
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
AAMIU_Uninstall
AAMIU_getDeploymentValidationStatus
AAMIU_preInstallPropertySet
pim_createLibraryRef
pim_freeLibraryRef
pim_freeLiraryRef
pim_freeString
pim_getAppletAndPackageInfo
pim_getAppletRegistrationInfo
pim_getAppletRelationshipInfo
pim_getCurrentCCVersion
pim_getCurrentPackagesVersion
pim_getInstallStatus
pim_getInstalledPackagesInfo
pim_launchACCCUninstallerExecutableAsAdmin
pim_selfUpdateCheck
pim_selfUpdateCheckWithData
pim_startWorkflow
pim_startWorkflowWithData
pim_syncFromPathToACF
pim_syncFromPathToPath
pim_syncUSFToACF
pim_uninstallAAMFromAAMCleanerTool
pim_uninstallAAMUsingAAMCleanerTool
pim_uninstallACCC64FromACCCCleanerTool
pim_uninstallACCCFromACCCCleanerTool
pim_uninstallADC64UsingADCCleanerTool
pim_uninstallADCUsingADCCleanerTool
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ