Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
10Static
static
82019-05-01...ts.zip
windows7-x64
12019-05-01...ts.zip
windows10-2004-x64
12019-05-01...ro.exe
windows7-x64
52019-05-01...ro.exe
windows10-2004-x64
102019-05-01...-2.exe
windows7-x64
102019-05-01...-2.exe
windows10-2004-x64
102019-05-01...-2.exe
windows7-x64
102019-05-01...-2.exe
windows10-2004-x64
102019-05-01...st.exe
windows7-x64
82019-05-01...st.exe
windows10-2004-x64
72019-05-01...nt.txt
windows7-x64
12019-05-01...nt.txt
windows10-2004-x64
12019-05-01...nt.txt
windows7-x64
12019-05-01...nt.txt
windows10-2004-x64
12019-05-01...19.doc
windows7-x64
102019-05-01...19.doc
windows10-2004-x64
102019-05-01...19.zip
windows7-x64
12019-05-01...19.zip
windows10-2004-x64
12019-05-01...tDll64
windows7-x64
12019-05-01...tDll64
windows10-2004-x64
12019-05-01...tDll64
windows7-x64
12019-05-01...tDll64
windows10-2004-x64
12019-05-01...s/dinj
windows7-x64
12019-05-01...s/dinj
windows10-2004-x64
12019-05-01.../dpost
windows7-x64
12019-05-01.../dpost
windows10-2004-x64
12019-05-01...s/sinj
windows7-x64
12019-05-01...s/sinj
windows10-2004-x64
12019-05-01...cher64
windows7-x64
12019-05-01...cher64
windows10-2004-x64
12019-05-01...ilconf
windows7-x64
12019-05-01...ilconf
windows10-2004-x64
1Behavioral task
behavioral1
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-2-of-2.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-2-of-2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Trickbot-malware-retrieved-by-Emotet-infected-host.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Trickbot-malware-retrieved-by-Emotet-infected-host.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-registry-update-to-keep-Emotet-persistent.txt
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-registry-update-to-keep-Emotet-persistent.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-sched-task-to-keep-Trickbot-persistent.txt
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-sched-task-to-keep-Trickbot-persistent.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.doc
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.zip
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/importDll64
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/importDll64
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dinj
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dinj
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dpost
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dpost
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/sinj
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/sinj
Resource
win10v2004-20230221-en
Behavioral task
behavioral29
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64_configs/mailconf
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64_configs/mailconf
Resource
win10v2004-20230220-en
Target
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts.zip
Size
11.7MB
MD5
9d6afea5fd7fd56405fc4dbd1170131d
SHA1
0c294bece575234aeaff788ba7506537d0acfa01
SHA256
69a2ab72eb15c6bc8cc6cbd3d66bb445821c822f41494b54c48bc94388fa1f0c
SHA512
514cc2064deaba4f3dc5df59d879aa77dfe2e0b9c8b1bfd92c12296f2996a91ab1dfaa30668853f9200f7087add980d5d68aeef0dfa7638312cc1803c76f4dd0
SSDEEP
196608:aP0P1L+jwvDGDlRmzvBOuQUNsc4KqIZlmMkbSrhkRKzZ/nEX2ivvfiZ4SZxBPeQB:aP0P1L+jqDg8BLsc4KqIZgMcSNTZ/nE+
resource |
---|
static1/unpack001/2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.doc |
Checks for missing Authenticode signature.
resource |
---|
unpack001/2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Trickbot-malware-retrieved-by-Emotet-infected-host.exe |
unpack001/2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/ng0UTZoBwEptBZGtus.exe |
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
GetModuleHandleW
lstrcmpiA
LocalFree
LocalAlloc
Sleep
VirtualFree
VirtualAlloc
SwitchToThread
GetACP
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
ExitThread
CreateThread
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
lstrcmpW
WritePrivateProfileStringW
WaitForSingleObject
WaitForMultipleObjectsEx
VirtualQueryEx
VirtualProtect
SuspendThread
SizeofResource
SetThreadPriority
SetThreadLocale
SetLastError
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResumeThread
ResetEvent
ReadFile
MulDiv
LockResource
LoadResource
LoadLibraryW
GlobalUnlock
GlobalLock
GlobalFree
GlobalFindAtomW
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomW
GetVersionExW
GetThreadPriority
GetThreadLocale
GetPrivateProfileStringW
GetModuleFileNameA
GetLocalTime
GetFullPathNameW
GetFileAttributesW
GetExitCodeThread
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCPInfoExW
GetCPInfo
FreeResource
InterlockedExchangeAdd
InterlockedExchange
InterlockedCompareExchange
FormatMessageW
FindResourceW
FindNextFileW
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumSystemLocalesW
EnumCalendarInfoW
CreateFileW
CreateEventW
GetModuleHandleA
GetProcessWindowStation
GetQueueStatus
LoadCursorFromFileW
PaintDesktop
CharUpperA
IsWindow
GetSysColorBrush
IsClipboardFormatAvailable
AnyPopup
CloseWindowStation
GetDesktopWindow
GetClipboardOwner
GetThreadDesktop
GetCaretBlinkTime
DestroyWindow
GetKeyState
IsIconic
GetTopWindow
GetSysColor
GetListBoxInfo
CharNextW
IsWindowVisible
GetSystemMetrics
EnumWindows
FindWindowA
ExitWindowsEx
SetWindowLongA
GetSystemMenu
InsertMenuA
LoadImageA
GetMenuItemCount
MessageBeep
GetDlgItem
SetRectEmpty
PtInRect
PostThreadMessageA
GetFocus
CopyRect
GetMessagePos
ScreenToClient
GetDC
ReleaseDC
GetClientRect
GetWindowRect
OffsetRect
GetAsyncKeyState
SetParent
IntersectRect
wsprintfA
LoadBitmapA
FindWindowExA
SetForegroundWindow
MessageBoxA
InvalidateRect
KillTimer
GetParent
SetTimer
EnableWindow
PostMessageA
LoadIconA
SendMessageA
GetWindowTextA
MessageBoxExA
LoadStringA
LoadStringW
wsprintfW
SystemParametersInfoA
GetActiveWindow
GetForegroundWindow
DeleteObject
UpdateColors
GetLayout
CreateMetaFileW
DeleteEnhMetaFile
GetTextAlign
GetDCPenColor
CloseMetaFile
CreateMetaFileA
FillPath
RealizePalette
EndDoc
SwapBuffers
GetFontLanguageInfo
GetSystemPaletteUse
Pie
RegOpenKeyA
RegQueryValueExA
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_controlfp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
GetModuleHandleW
lstrcmpiA
LocalFree
LocalAlloc
Sleep
VirtualFree
VirtualAlloc
SwitchToThread
GetACP
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
ExitThread
CreateThread
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
lstrcmpW
WritePrivateProfileStringW
WaitForSingleObject
WaitForMultipleObjectsEx
VirtualQueryEx
VirtualProtect
SuspendThread
SizeofResource
SetThreadPriority
SetThreadLocale
SetLastError
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResumeThread
ResetEvent
ReadFile
MulDiv
LockResource
LoadResource
LoadLibraryW
GlobalUnlock
GlobalLock
GlobalFree
GlobalFindAtomW
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomW
GetVersionExW
GetThreadPriority
GetThreadLocale
GetPrivateProfileStringW
GetModuleFileNameA
GetLocalTime
GetFullPathNameW
GetFileAttributesW
GetExitCodeThread
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCPInfoExW
GetCPInfo
FreeResource
InterlockedExchangeAdd
InterlockedExchange
InterlockedCompareExchange
FormatMessageW
FindResourceW
FindNextFileW
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumSystemLocalesW
EnumCalendarInfoW
CreateFileW
CreateEventW
GetModuleHandleA
GetProcessWindowStation
GetQueueStatus
LoadCursorFromFileW
PaintDesktop
CharUpperA
IsWindow
GetSysColorBrush
IsClipboardFormatAvailable
AnyPopup
CloseWindowStation
GetDesktopWindow
GetClipboardOwner
GetThreadDesktop
GetCaretBlinkTime
DestroyWindow
GetKeyState
IsIconic
GetTopWindow
GetSysColor
GetListBoxInfo
CharNextW
IsWindowVisible
GetSystemMetrics
EnumWindows
FindWindowA
ExitWindowsEx
SetWindowLongA
GetSystemMenu
InsertMenuA
LoadImageA
GetMenuItemCount
MessageBeep
GetDlgItem
SetRectEmpty
PtInRect
PostThreadMessageA
GetFocus
CopyRect
GetMessagePos
ScreenToClient
GetDC
ReleaseDC
GetClientRect
GetWindowRect
OffsetRect
GetAsyncKeyState
SetParent
IntersectRect
wsprintfA
LoadBitmapA
FindWindowExA
SetForegroundWindow
MessageBoxA
InvalidateRect
KillTimer
GetParent
SetTimer
EnableWindow
PostMessageA
LoadIconA
SendMessageA
GetWindowTextA
DeleteObject
UpdateColors
GetLayout
CreateMetaFileW
DeleteEnhMetaFile
GetTextAlign
GetDCPenColor
CloseMetaFile
CreateMetaFileA
FillPath
RealizePalette
EndDoc
SwapBuffers
GetFontLanguageInfo
GetSystemPaletteUse
Pie
RegOpenKeyA
RegQueryValueExA
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_controlfp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileSize
GetFileType
GetLastError
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetPriorityClass
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetProcessIoCounters
GetProcessVersion
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetThreadLocale
GetThreadPriority
GetTickCount
GetVersion
GetVersionExA
GetVersionExW
GetVolumeInformationA
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomW
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
GetFileAttributesW
LocalFileTimeToFileTime
LocalFree
LockResource
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingA
OpenMutexW
OpenProcess
OutputDebugStringW
PulseEvent
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
ResetEvent
ResumeThread
RtlUnwind
SetConsoleDisplayMode
SetConsoleTitleA
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
SetStdHandle
SetThreadAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WaitForMultipleObjectsEx
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
lstrlenW
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetEnvironmentStringsW
GetEnvironmentStrings
GetDriveTypeW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetModuleHandleW
GetConsoleTitleA
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
FreeResource
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FormatMessageA
FlushFileBuffers
FindResourceW
FindResourceA
FindNextFileW
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToDosDateTime
ExitProcess
EnumResourceNamesW
EnterCriticalSection
DuplicateHandle
DeleteCriticalSection
CreateThread
CreateSemaphoreW
CreateProcessW
CreateProcessA
CreateMutexW
CreateMutexA
CreateJobObjectW
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CopyFileW
CompareStringW
CloseHandle
VirtualAllocEx
LocalAlloc
IsZoomed
KillTimer
LoadAcceleratorsW
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
LoadKeyboardLayoutW
LoadStringW
LookupIconIdFromDirectory
MessageBoxW
MsgWaitForMultipleObjects
OemToCharA
OffsetRect
OpenWindowStationA
PostMessageA
PostMessageW
PostQuitMessage
PostThreadMessageA
RegisterClassExW
RegisterHotKey
RegisterWindowMessageW
ReleaseDC
RemovePropA
ReuseDDElParam
ScrollDC
SendInput
SendMessageA
SendMessageCallbackA
SendMessageTimeoutA
SendMessageTimeoutW
SendMessageW
SetClassLongW
SetClipboardData
SetCursorPos
SetForegroundWindow
SetParent
SetPropA
SetTimer
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowRgn
ShowOwnedPopups
ShowWindow
SystemParametersInfoW
TabbedTextOutA
TranslateAcceleratorW
TranslateMessage
UpdateWindow
WaitForInputIdle
wsprintfW
wvsprintfA
IsWindowVisible
GetSystemMetrics
GetSystemMenu
GetPropA
GetParent
GetMessageW
GetMenuInfo
GetMenu
GetIconInfo
GetForegroundWindow
GetDC
GetClipboardFormatNameA
GetClientRect
GetClassWord
GetClassNameA
GetClassLongW
GetAsyncKeyState
GetActiveWindow
FrameRect
FindWindowW
FindWindowExW
FindWindowExA
EnumWindows
EnumThreadWindows
EnumDisplaySettingsW
EnumDisplayDevicesW
EnumDesktopWindows
EndPaint
EndDialog
EnableWindow
EnableMenuItem
DrawTextW
DrawFrameControl
DrawFocusRect
DispatchMessageW
DialogBoxParamW
DestroyWindow
DestroyIcon
DefWindowProcW
DefDlgProcW
DdeGetData
CreateWindowExW
CreatePopupMenu
CreateMDIWindowA
CreateDesktopA
CharUpperW
CharUpperBuffW
IsWindowUnicode
IsWindowEnabled
IsWindow
IsIconic
IsCharAlphaNumericW
InvalidateRect
InflateRect
ImpersonateDdeClientWindow
IMPQueryIMEA
GetWindowThreadProcessId
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindow
AdjustWindowRectEx
AnimateWindow
AttachThreadInput
BeginPaint
CallMsgFilter
CascadeChildWindows
ChangeDisplaySettingsExW
CharLowerW
GetUserObjectInformationW
GetThreadDesktop
GetTopWindow
ChildWindowFromPointEx
cGetTTFFromFOT
SetDIBits
RectInRegion
GetDeviceGammaRamp
GetCharacterPlacementA
GdiConvertToDevmodeW
GdiConvertBitmap
FlattenPath
FONTOBJ_pifi
EudcLoadLinkW
EngReleaseSemaphore
EngQueryLocalTime
EngEraseSurface
DescribePixelFormat
CreateEllipticRgn
CryptReleaseContext
LookupAccountSidW
LookupAccountSidA
InitializeSecurityDescriptor
GetUserNameW
GetTokenInformation
GetLengthSid
GetKernelObjectSecurity
SetSecurityDescriptorDacl
ReportEventW
RegisterEventSourceW
RegUnLoadKeyW
RegOpenKeyExA
RegLoadKeyW
RegCloseKey
RegQueryValueExA
RegOpenKeyA
CryptAcquireContextA
CryptCreateHash
CryptDecrypt
CryptDestroyHash
CryptDestroyKey
CryptExportKey
CryptGetProvParam
CryptGetUserKey
CryptImportKey
CryptSignHashA
CryptSetHashParam
CryptSetProvParam
OpenProcessToken
SHGetDataFromIDListW
Shell_NotifyIconW
ExtractAssociatedIconA
FindExecutableA
SHCreateDirectoryExW
SHFileOperation
SHFormatDrive
WOWShellExecute
SHGetDesktopFolder
SHGetFolderPathA
SHGetPathFromIDListA
ShellAboutA
ShellExecuteW
OleUninitialize
GetHGlobalFromStream
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
CoCreateGuid
StrRStrIW
StrCmpNIA
ImageList_Create
ImageList_Destroy
ImageList_GetIcon
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Read
ImageList_ReplaceIcon
ImageList_Write
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
DeleteFileA
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
HeapSize
Wow64EnableWow64FsRedirection
SetFilePointer
GetStringTypeW
MultiByteToWideChar
LCMapStringW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapAlloc
LoadLibraryW
IsProcessorFeaturePresent
Sleep
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
DecodePointer
EncodePointer
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
GetMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
DefFrameProcA
CreateMenu
SendMessageA
TranslateMessage
MessageBoxA
CreateWindowExA
ShowWindow
SetMenu
CreatePopupMenu
AppendMenuA
PostMessageA
DispatchMessageA
DefMDIChildProcA
SetWindowTextA
LoadCursorA
TranslateMDISysAccel
GetStockObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
DeleteFileA
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
HeapSize
Wow64EnableWow64FsRedirection
SetFilePointer
GetStringTypeW
MultiByteToWideChar
LCMapStringW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapAlloc
LoadLibraryW
IsProcessorFeaturePresent
Sleep
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
DecodePointer
EncodePointer
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
GetMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
DefFrameProcA
CreateMenu
SendMessageA
TranslateMessage
MessageBoxA
CreateWindowExA
ShowWindow
SetMenu
CreatePopupMenu
AppendMenuA
PostMessageA
DispatchMessageA
DefMDIChildProcA
SetWindowTextA
LoadCursorA
TranslateMDISysAccel
GetStockObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ