Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
7Adobe.Cont...en.exe
windows7-x64
7Adobe.Cont...en.exe
windows10-2004-x64
7CORE10k.exe
windows7-x64
7CORE10k.exe
windows10-2004-x64
7keygen.exe
windows7-x64
7keygen.exe
windows10-2004-x64
7CORE10k.exe
windows7-x64
7CORE10k.exe
windows10-2004-x64
7keygen.exe
windows7-x64
7keygen.exe
windows10-2004-x64
7Adobe.Drea...en.exe
windows7-x64
1Adobe.Drea...en.exe
windows10-2004-x64
1Adobe.Flas...en.exe
windows7-x64
7Adobe.Flas...en.exe
windows10-2004-x64
7Adobe.Flas...en.exe
windows7-x64
1Adobe.Flas...en.exe
windows10-2004-x64
1Adobe.Illu...en.exe
windows7-x64
7Adobe.Illu...en.exe
windows10-2004-x64
7Adobe.InDe...en.exe
windows7-x64
1Adobe.InDe...en.exe
windows10-2004-x64
1Adobe.Phot...en.exe
windows7-x64
1Adobe.Phot...en.exe
windows10-2004-x64
1CS5.5 Crac...ib.dll
windows7-x64
1CS5.5 Crac...ib.dll
windows10-2004-x64
1CS5.5 Crac...ib.dll
windows7-x64
1CS5.5 Crac...ib.dll
windows10-2004-x64
1CS5.5 Crac...ib.dll
windows7-x64
1CS5.5 Crac...ib.dll
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Adobe.Contribute.CS5.v6.0.Keymaker.Only-CORE/keygen.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Adobe.Contribute.CS5.v6.0.Keymaker.Only-CORE/keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
CORE10k.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
CORE10k.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
keygen.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
CORE10k.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
CORE10k.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Adobe.Dreamweaver.CS5.v11.0.4909.Incl.Keymaker-EMBRACE/keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Adobe.Dreamweaver.CS5.v11.0.4909.Incl.Keymaker-EMBRACE/keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Adobe.Flash.Catalyst.CS5.v1.0.Keymaker.Only-CORE/keygen.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Adobe.Flash.Catalyst.CS5.v1.0.Keymaker.Only-CORE/keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Adobe.Flash.Professional.CS5.Keymaker-EMBRACE/keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Adobe.Flash.Professional.CS5.Keymaker-EMBRACE/keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Adobe.Illustrator.CS5.v15.0.Keymaker.Only-CORE/keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Adobe.Illustrator.CS5.v15.0.Keymaker.Only-CORE/keygen.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
Adobe.InDesign.CS5.Premium.v7.0.Incl.Keymaker-EMBRACE/keygen.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Adobe.InDesign.CS5.Premium.v7.0.Incl.Keymaker-EMBRACE/keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Adobe.Photoshop.CS5.Extended.v12.0.ONLY.Keymaker-EMBRACE/keygen.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
Adobe.Photoshop.CS5.Extended.v12.0.ONLY.Keymaker-EMBRACE/keygen.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
CS5.5 Crack/Crackx86/amtlib.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
CS5.5 Crack/Crackx86/amtlib.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
CS5.5 Crack/amtlib文件/Acrobat X/amtlib.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
CS5.5 Crack/amtlib文件/Acrobat X/amtlib.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
CS5.5 Crack/crackx64/amtlib.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
CS5.5 Crack/crackx64/amtlib.dll
Resource
win10v2004-20231222-en
Target
4f63b0d21d9ddeec273c1f657352b945
Size
1.9MB
MD5
4f63b0d21d9ddeec273c1f657352b945
SHA1
35f9e4e432b486c1f80e7c2afbb6552b6c48e9df
SHA256
5846c97a1c1597a1a4294923d38d1f4237f6c85d7c7cf5c659f35ce4c58671b8
SHA512
7de80a7a58c53f6e814d1ea1ee769c35f34f7fde3527b0c7fda4a55abdc9822184a7ddccb50f0c227ac46fd2ada6a145430c4171314048b1a7687360eb042940
SSDEEP
49152:BwHwX0u37rLAylDEkTvhvTKIgPUMypWNQVOVttheL:qHwX0u3MylAkTvMI02WSVOV9eL
resource | yara_rule |
---|---|
static1/unpack002/Adobe.Contribute.CS5.v6.0.Keymaker.Only-CORE/keygen.exe | upx |
static1/unpack004/CORE10k.EXE | upx |
static1/unpack004/keygen.exe | upx |
static1/unpack007/CORE10k.EXE | upx |
static1/unpack007/keygen.exe | upx |
static1/unpack002/Adobe.Flash.Catalyst.CS5.v1.0.Keymaker.Only-CORE/keygen.exe | upx |
static1/unpack002/Adobe.Illustrator.CS5.v15.0.Keymaker.Only-CORE/keygen.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack002/Adobe.Contribute.CS5.v6.0.Keymaker.Only-CORE/keygen.exe |
unpack004/CORE10k.EXE |
unpack004/keygen.exe |
unpack007/CORE10k.EXE |
unpack007/keygen.exe |
unpack002/Adobe.Dreamweaver.CS5.v11.0.4909.Incl.Keymaker-EMBRACE/keygen.exe |
unpack002/Adobe.Flash.Catalyst.CS5.v1.0.Keymaker.Only-CORE/keygen.exe |
unpack002/Adobe.Flash.Professional.CS5.Keymaker-EMBRACE/keygen.exe |
unpack002/Adobe.Illustrator.CS5.v15.0.Keymaker.Only-CORE/keygen.exe |
unpack002/Adobe.InDesign.CS5.Premium.v7.0.Incl.Keymaker-EMBRACE/keygen.exe |
unpack002/Adobe.Photoshop.CS5.Extended.v12.0.ONLY.Keymaker-EMBRACE/keygen.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
QueryPerformanceFrequency
GetEnvironmentVariableA
GetModuleFileNameW
CreateSemaphoreW
ReleaseSemaphore
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetTickCount
CreateThread
SetEvent
OpenEventW
QueryPerformanceCounter
GetVersionExW
GetComputerNameExW
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
GetTempPathW
TryEnterCriticalSection
SwitchToThread
ResumeThread
IsDBCSLeadByteEx
GetFileAttributesW
CompareStringW
CompareStringA
GetProcAddress
LocalFree
LoadLibraryW
FreeLibrary
FormatMessageW
SetLastError
GetCurrentThread
GetLastError
GetCurrentProcess
GetTimeZoneInformation
CloseHandle
GetProcessHeap
SetEndOfFile
CreateFileW
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
Sleep
HeapFree
HeapAlloc
RaiseException
RtlUnwind
HeapReAlloc
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetFullPathNameW
GetCurrentThreadId
GetCommandLineA
GetCurrentProcessId
GetTimeFormatA
GetDateFormatA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
DeleteFileW
CreateDirectoryW
MoveFileA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetModuleHandleA
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
HeapDestroy
VirtualFree
FatalAppExitA
VirtualAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCurrentDirectoryA
SetCurrentDirectoryA
SetStdHandle
CreateFileA
GetFileAttributesA
SetFilePointer
GetDriveTypeA
GetFullPathNameA
GetLocaleInfoA
GetStringTypeA
SetConsoleCtrlHandler
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
MessageBoxW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
SetTokenInformation
SetEntriesInAclW
ShellExecuteA
SHGetFolderPathW
AMTBackgroundUpdateCheck
AMTForegroundUpdateCheck
AMTForegroundUpdateCheckEnabled
AMTGetLibVersion
AMTGetParentLEIDLicenseStatus
AMTGetProductClearSerialNumber
AMTObtainProductLicense
AMTPlugPlugRequest
AMTPreObtainProductLicense
AMTPreValidateProductLicense
AMTReleaseProductLicense
AMTSuppressBackgroundUpdateChecks
AMTValidateProductLicense
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
QueryPerformanceFrequency
GetEnvironmentVariableA
GetModuleFileNameW
CreateSemaphoreW
ReleaseSemaphore
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetTickCount
CreateThread
SetEvent
OpenEventW
QueryPerformanceCounter
GetVersionExW
GetComputerNameExW
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
GetTempPathW
TryEnterCriticalSection
SwitchToThread
ResumeThread
IsDBCSLeadByteEx
GetFileAttributesW
CompareStringW
CompareStringA
GetProcAddress
LocalFree
LoadLibraryW
FreeLibrary
FormatMessageW
SetLastError
GetCurrentThread
GetLastError
GetCurrentProcess
GetTimeZoneInformation
CloseHandle
GetProcessHeap
SetEndOfFile
CreateFileW
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
Sleep
GetSystemTimeAsFileTime
RaiseException
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapAlloc
HeapReAlloc
GetFullPathNameW
GetCurrentThreadId
GetCommandLineA
GetCurrentProcessId
GetTimeFormatA
GetDateFormatA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
DeleteFileW
CreateDirectoryW
MoveFileA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
HeapCreate
HeapDestroy
VirtualFree
FatalAppExitA
VirtualAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetModuleHandleA
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCurrentDirectoryA
SetCurrentDirectoryA
SetStdHandle
CreateFileA
GetFileAttributesA
SetFilePointer
GetDriveTypeA
GetFullPathNameA
GetLocaleInfoA
GetStringTypeA
SetConsoleCtrlHandler
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
MessageBoxW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
SetTokenInformation
SetEntriesInAclW
ShellExecuteA
SHGetFolderPathW
AMTBackgroundUpdateCheck
AMTForegroundUpdateCheck
AMTForegroundUpdateCheckEnabled
AMTGetLibVersion
AMTGetParentLEIDLicenseStatus
AMTGetProductClearSerialNumber
AMTObtainProductLicense
AMTPlugPlugRequest
AMTPreObtainProductLicense
AMTPreValidateProductLicense
AMTReleaseProductLicense
AMTRetrieveAdobeID
AMTSuppressBackgroundUpdateChecks
AMTValidateProductLicense
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
QueryPerformanceFrequency
GetEnvironmentVariableA
GetModuleFileNameW
CreateSemaphoreW
ReleaseSemaphore
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetTickCount
CreateThread
SetEvent
OpenEventW
QueryPerformanceCounter
GetVersionExW
GetComputerNameExW
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
GetTempPathW
TryEnterCriticalSection
SwitchToThread
ResumeThread
IsDBCSLeadByteEx
GetFileAttributesW
CompareStringW
CompareStringA
GetProcAddress
LocalFree
LoadLibraryW
FreeLibrary
FormatMessageW
SetLastError
GetCurrentThread
GetLastError
GetCurrentProcess
GetTimeZoneInformation
CloseHandle
GetProcessHeap
SetEndOfFile
CreateFileW
Sleep
HeapFree
HeapAlloc
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapReAlloc
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetFullPathNameW
GetCurrentThreadId
FlsSetValue
GetCommandLineA
GetCurrentProcessId
GetDateFormatA
GetTimeFormatA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
DeleteFileW
CreateDirectoryW
MoveFileA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
TlsAlloc
FlsGetValue
FlsFree
FlsAlloc
HeapSetInformation
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetStdHandle
CreateFileA
GetFileAttributesA
SetFilePointer
GetDriveTypeA
GetFullPathNameA
GetLocaleInfoA
GetStringTypeA
SetConsoleCtrlHandler
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
MessageBoxW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
SetTokenInformation
SetEntriesInAclW
ShellExecuteA
SHGetFolderPathW
AMTBackgroundUpdateCheck
AMTForegroundUpdateCheck
AMTForegroundUpdateCheckEnabled
AMTGetLibVersion
AMTGetParentLEIDLicenseStatus
AMTGetProductClearSerialNumber
AMTObtainProductLicense
AMTPlugPlugRequest
AMTPreObtainProductLicense
AMTPreValidateProductLicense
AMTReleaseProductLicense
AMTSuppressBackgroundUpdateChecks
AMTValidateProductLicense
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ