dialog
initDialog
show
Overview
overview
7Static
static
7Keygen.exe
windows7-x64
7Keygen.exe
windows10-2004-x64
7sss2007int.exe
windows7-x64
7sss2007int.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...re.dll
windows7-x64
3$PLUGINSDI...re.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
7$PLUGINSDI...om.dll
windows10-2004-x64
7$PLUGINSDIR/nsSCM.dll
windows7-x64
3$PLUGINSDIR/nsSCM.dll
windows10-2004-x64
3$SYSDIR/Dr...15.sys
windows7-x64
1$SYSDIR/Dr...15.sys
windows10-2004-x64
1$SYSDIR/SatSrv.exe
windows7-x64
1$SYSDIR/SatSrv.exe
windows10-2004-x64
1$WINDIR/sleen1564.sys
windows7-x64
1$WINDIR/sleen1564.sys
windows10-2004-x64
1res/JSCRIP...JAX.js
windows7-x64
1res/JSCRIP...JAX.js
windows10-2004-x64
1res/JSCRIP...LOG.js
windows7-x64
1res/JSCRIP...LOG.js
windows10-2004-x64
1res/JSCRIP...ENU.js
windows7-x64
1res/JSCRIP...ENU.js
windows10-2004-x64
1res/JSCRIP...PNG.js
windows7-x64
1res/JSCRIP...PNG.js
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Keygen.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Keygen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
sss2007int.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
sss2007int.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SysRestore.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SysRestore.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsSCM.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsSCM.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$SYSDIR/Drivers/sleen15.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$SYSDIR/Drivers/sleen15.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$SYSDIR/SatSrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$SYSDIR/SatSrv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$WINDIR/sleen1564.sys
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$WINDIR/sleen1564.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
res/JSCRIPT/JS_AJAX.js
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
res/JSCRIPT/JS_AJAX.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
res/JSCRIPT/JS_CONFIGDIALOG.js
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
res/JSCRIPT/JS_CONFIGDIALOG.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
res/JSCRIPT/JS_DISABLECONTEXTMENU.js
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
res/JSCRIPT/JS_DISABLECONTEXTMENU.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
res/JSCRIPT/JS_FIXPNG.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
res/JSCRIPT/JS_FIXPNG.js
Resource
win10v2004-20240226-en
Target
b638189fdddc2959280e694dfceb58d0
Size
26.3MB
MD5
b638189fdddc2959280e694dfceb58d0
SHA1
2f2775e3dc75e59fc74aaee9d80b50a93fc134ca
SHA256
c1c837a3ad75ea227dac00b0e90ef9f14815bce1e78f493a5969b7040fb2e124
SHA512
41c8d0706ab77777b14009a207375216eaff882f1d0d3c97ffa8b753a25d42781a0a566896f7f65d2056a7c91bb87b25216b067ea7b4be6cdf61d55effdbf201
SSDEEP
393216:963hdBlf1BTJ9PQkT+t0IRvcGVwFM9fNKgs/GkjJjAckpEZriDgPI1nJ5Tx5q9:9ohdv1BvSKGOq9fNKgs95AckpEPQpJNK
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack003/$PLUGINSDIR/nsRandom.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/Keygen.exe | upx |
static1/unpack003/$PLUGINSDIR/nsRandom.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Keygen.exe |
unpack001/sss2007int.exe |
unpack003/$PLUGINSDIR/InstallOptions.dll |
unpack003/$PLUGINSDIR/Processes.dll |
unpack003/$PLUGINSDIR/SysRestore.dll |
unpack003/$PLUGINSDIR/System.dll |
unpack003/$PLUGINSDIR/UserInfo.dll |
unpack003/$PLUGINSDIR/nsRandom.dll |
unpack004/out.upx |
unpack003/$PLUGINSDIR/nsSCM.dll |
unpack003/$SYSDIR/SatSrv.exe |
unpack003/Suite.exe |
resource | yara_rule |
---|---|
static1/unpack001/sss2007int.exe | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
lstrcmpiA
ExitProcess
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcmpA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
CopyFileA
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EndDialog
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
RegisterClassA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
TrackPopupMenu
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
FreeLibrary
OpenProcess
CloseHandle
TerminateProcess
GlobalFree
lstrcpyA
GetCommandLineA
GetVersionExA
ExitProcess
GetModuleHandleA
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
UnhandledExceptionFilter
DisableThreadLibraryCalls
WriteFile
SetFilePointer
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
GetSystemInfo
FindWindowA
GetDesktopWindow
wsprintfA
UpdateWindow
FindDevice
FindProcess
KillProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
wsprintfA
SRSetRestorePointA
InstallFailed
InstallStart
InstallSuccess
UninstallFailed
UninstallStart
UninstallSuccess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
GetCurrentProcess
GetLastError
GlobalFree
CloseHandle
lstrcpynA
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetRandom
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateServiceA
StartServiceA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CloseServiceHandle
GlobalFree
GetLastError
lstrcpyA
lstrcpynA
GlobalAlloc
wsprintfA
Install
QueryStatus
Remove
Start
Stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ZwClose
ObfDereferenceObject
KeWaitForSingleObject
IofCallDriver
IoBuildDeviceIoControlRequest
KeInitializeEvent
IoGetRelatedDeviceObject
IoGetDeviceObjectPointer
RtlInitUnicodeString
IoRegisterShutdownNotification
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscpy
ExFreePoolWithTag
ObReferenceObjectByHandle
PsCreateSystemThread
ObOpenObjectByPointer
IoGetCurrentProcess
ExAllocatePoolWithTag
KeReleaseSemaphore
wcsncat
wcscat
IoDeleteSymbolicLink
SeTokenType
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
ZwCreateFile
NtAdjustPrivilegesToken
ZwOpenProcessToken
IoCreateUnprotectedSymbolicLink
wcslen
KeInitializeSpinLock
KeInitializeSemaphore
KeReleaseMutex
SeCreateClientSecurity
KeGetCurrentThread
ZwWriteFile
ZwReadFile
_allmul
KeQuerySystemTime
ExfInterlockedRemoveHeadList
PsTerminateSystemThread
KeSetEvent
PsRevertToSelf
SeImpersonateClient
KeSetPriorityThread
ExfInterlockedInsertTailList
IoSetHardErrorOrVerifyDevice
IofCompleteRequest
KeInitializeMutex
RtlQueryRegistryValues
RtlAppendUnicodeToString
RtlCopyUnicodeString
_except_handler3
IoFreeIrp
MmMapLockedPages
ProbeForWrite
IoFreeMdl
MmUnlockPages
MmUnmapLockedPages
MmMapLockedPagesSpecifyCache
KeBugCheck
_alldiv
KeClearEvent
IoFileObjectType
ZwQueryInformationFile
MmBuildMdlForNonPagedPool
IoAllocateMdl
IoAllocateIrp
KeBugCheckEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
o:\AntiTheft.engine\_output\Release\SatSrv.pdb
RaiseException
InitializeCriticalSection
DeleteCriticalSection
SetEvent
Sleep
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
GetLocalTime
FindClose
FindFirstFileA
FindFirstFileW
GetDriveTypeW
GetModuleFileNameA
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryW
FlushFileBuffers
GetDateFormatW
GetLocaleInfoA
GetFileTime
OpenFile
GetFileAttributesW
GetCurrentProcessId
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeW
GetTickCount
CreateThread
SetFileTime
SetFileAttributesW
WaitForSingleObject
CreateEventW
SetErrorMode
CreateDirectoryW
GetCPInfo
GetACP
InterlockedExchange
SetEndOfFile
SetFilePointer
WriteFile
ReadFile
UnmapViewOfFile
CreateFileMappingW
GetLastError
MapViewOfFile
GlobalLock
CloseHandle
GlobalHandle
GlobalFree
GlobalAlloc
GetTimeFormatW
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
HeapReAlloc
QueryPerformanceCounter
GetCurrentThreadId
VirtualQuery
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FindWindowExW
SendMessageW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
SetServiceStatus
RegFlushKey
RegCloseKey
CoUninitialize
CoInitialize
recv
send
socket
ioctlsocket
htons
gethostbyname
connect
WSAGetLastError
select
shutdown
closesocket
WSAStartup
WSACleanup
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
__chkstk
ZwClose
NtAdjustPrivilegesToken
ZwOpenProcessToken
ObfDereferenceObject
KeWaitForSingleObject
IofCallDriver
IoBuildDeviceIoControlRequest
KeInitializeEvent
IoGetRelatedDeviceObject
IoGetDeviceObjectPointer
RtlInitUnicodeString
IoRegisterShutdownNotification
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ExFreePoolWithTag
ObReferenceObjectByHandle
PsCreateSystemThread
ObOpenObjectByPointer
IoGetCurrentProcess
ExAllocatePoolWithTag
KeReleaseSemaphore
wcsncat
IoDeleteSymbolicLink
SeTokenType
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
ZwCreateFile
IoCreateUnprotectedSymbolicLink
KeInitializeSemaphore
KeReleaseMutex
SeCreateClientSecurity
ZwWriteFile
ZwReadFile
ExInterlockedRemoveHeadList
PsTerminateSystemThread
KeSetEvent
PsRevertToSelf
SeImpersonateClient
KeSetPriorityThread
ExInterlockedInsertTailList
IoSetHardErrorOrVerifyDevice
IofCompleteRequest
KeInitializeMutex
RtlQueryRegistryValues
RtlAppendUnicodeToString
RtlCopyUnicodeString
__C_specific_handler
IoFreeIrp
MmMapLockedPages
ProbeForWrite
IoFreeMdl
MmUnlockPages
MmUnmapLockedPages
MmMapLockedPagesSpecifyCache
KeBugCheck
KeClearEvent
IoFileObjectType
ZwQueryInformationFile
MmBuildMdlForNonPagedPool
IoAllocateMdl
IoAllocateIrp
KeBugCheckEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LocalFree
FormatMessageW
EnumResourceNamesW
GetComputerNameW
GetExitCodeProcess
CreateProcessW
MulDiv
VirtualFree
VirtualAlloc
GetFileSize
FindNextFileW
GetCurrentThread
OutputDebugStringW
DeleteFileW
SetFileAttributesW
lstrlenA
GetTempFileNameW
GetTempPathW
FindNextFileA
LoadLibraryA
SetCurrentDirectoryA
SetCurrentDirectoryW
OpenFileMappingW
SetEvent
WaitForMultipleObjects
CreateEventW
GetDiskFreeSpaceW
GetSystemDirectoryW
GetVersion
GetWindowsDirectoryW
CreateToolhelp32Snapshot
Process32First
Process32Next
GetVolumeInformationW
SetLastError
WritePrivateProfileStringW
GetFileAttributesW
OpenFile
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
QueryPerformanceCounter
SetStdHandle
IsBadCodePtr
GetFileTime
FlushFileBuffers
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetCPInfo
GetDateFormatA
GetTimeFormatA
LCMapStringW
LCMapStringA
HeapSize
SetUnhandledExceptionFilter
IsBadWritePtr
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
VirtualQuery
GetVersionExA
GetStartupInfoW
GetFullPathNameA
GetCurrentDirectoryA
GetDriveTypeA
IsBadReadPtr
GetSystemTimeAsFileTime
RtlUnwind
HeapReAlloc
TerminateProcess
GetModuleHandleA
ExitProcess
CreateSemaphoreW
Sleep
LockResource
ExitThread
CreateThread
SetThreadPriority
ResumeThread
DuplicateHandle
GetCurrentProcessId
OpenProcess
CreateFileA
GetModuleFileNameA
GetDriveTypeW
FindFirstFileW
FindFirstFileA
FindClose
GetTickCount
lstrcpynW
lstrcmpiW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
lstrcpyW
lstrlenW
GetModuleFileNameW
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
FlushInstructionCache
HeapAlloc
InterlockedDecrement
InterlockedIncrement
WaitForSingleObject
SetFileTime
GetCurrentDirectoryW
GetCurrentThreadId
GlobalUnlock
GlobalSize
ReleaseSemaphore
TerminateThread
LoadLibraryW
GetProcAddress
FreeLibrary
CreateDirectoryW
WideCharToMultiByte
MultiByteToWideChar
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateFileW
SetEndOfFile
SetFilePointer
WriteFile
ReadFile
GetProcessHeap
HeapFree
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetThreadLocale
GetLocaleInfoA
GetACP
GlobalLock
InterlockedExchange
UnmapViewOfFile
CreateFileMappingW
GetLastError
MapViewOfFile
CloseHandle
GetVersionExW
GlobalHandle
GlobalFree
GlobalAlloc
GetOEMCP
SetRectEmpty
IsRectEmpty
SetPropA
GetSystemMetrics
IsClipboardFormatAvailable
GetClipboardData
GetCursorPos
CreatePopupMenu
TrackPopupMenu
GetKeyState
RegisterWindowMessageW
GetSysColor
DestroyWindow
AppendMenuW
DestroyMenu
GetSystemMenu
FillRect
DrawFocusRect
InflateRect
SetRect
DrawTextW
DestroyIcon
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CreateWindowExW
wsprintfW
RegisterClassExW
GetClassInfoExW
AnimateWindow
CreateDialogParamW
CreateDialogIndirectParamW
SystemParametersInfoW
MapWindowPoints
FlashWindowEx
SetActiveWindow
OffsetRect
DrawStateW
SetMenu
CreateMenu
ReleaseCapture
SetCapture
PtInRect
UnionRect
SetCursor
GetSysColorBrush
UnregisterClassW
DefWindowProcW
SetWindowLongW
GetMessageW
CallWindowProcW
GetWindowDC
ReleaseDC
LoadBitmapW
LoadImageW
GetDoubleClickTime
FindWindowW
ExitWindowsEx
LoadCursorW
WinHelpW
CharNextW
SendMessageW
GetPropW
CopyRect
ScreenToClient
GetParent
GetWindowRect
BeginPaint
EndPaint
GetDC
GetClientRect
GetIconInfo
GetWindowThreadProcessId
SendMessageTimeoutW
PostQuitMessage
DispatchMessageW
TranslateMessage
PeekMessageW
GetPropA
EnumWindows
MessageBoxW
DestroyCursor
TranslateAcceleratorW
GetDialogBaseUnits
IsWindowEnabled
MoveWindow
ShowWindow
InvalidateRect
UpdateWindow
SetFocus
SetWindowTextW
EndDialog
EnableWindow
DrawEdge
GetFocus
RedrawWindow
IsWindow
SetTimer
KillTimer
GetDlgCtrlID
PostMessageW
DialogBoxIndirectParamW
DialogBoxParamW
SetParent
SetPropW
GetDlgItem
CreateCursor
GetWindowTextW
GetWindowTextLengthW
GetWindowPlacement
SetWindowPlacement
SetWindowPos
MapDialogRect
EnumChildWindows
InsertMenuW
GetDesktopWindow
TrackMouseEvent
GetWindowLongW
GetClassNameW
LockWindowUpdate
EnumThreadWindows
SetForegroundWindow
IsWindowVisible
GetWindow
SetPixel
GetObjectA
GetTextAlign
SetTextAlign
SetTextColor
GetObjectW
SelectClipRgn
GetClipBox
GetViewportOrgEx
CreateRectRgn
GetPixel
BitBlt
SetViewportOrgEx
SetBkMode
SelectObject
CreateDIBitmap
GetDeviceCaps
CreateSolidBrush
CreatePatternBrush
DeleteObject
DeleteDC
ExtTextOutW
SetBkColor
GetCurrentObject
SetMapMode
RestoreDC
SaveDC
GetTextExtentPoint32W
GetTextColor
CreateFontIndirectW
CreateFontW
OffsetWindowOrgEx
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
SetWindowOrgEx
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
RegEnumValueW
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
CreateProcessAsUserW
GetUserNameW
RegQueryValueExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegFlushKey
RegCloseKey
SHGetFileInfoW
SHGetMalloc
ShellExecuteExA
Shell_NotifyIconW
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
CoCreateGuid
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
RevokeDragDrop
RegisterDragDrop
VarUI4FromStr
GdipCreateHBITMAPFromBitmap
GdipCreateLineBrush
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDrawImageRectRectI
GdipSetTextContrast
GdipSetStringFormatHotkeyPrefix
GdipStringFormatGetGenericTypographic
GdipCloneStringFormat
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipMeasureString
GdipDrawString
GdipDrawLineI
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipSetStringFormatAlign
GdipCreateBitmapFromGraphics
GdipDeleteFont
GdipCreateStringFormat
GdipGetImageGraphicsContext
GdipCreateHICONFromBitmap
GdipDrawRectangleI
GdipDeletePen
GdipCreatePen1
GdipDrawImageRectI
GdipFillRectangleI
GdipScaleWorldTransform
GdipResetWorldTransform
GdipSetSmoothingMode
GdipCreateFromHDC
GdipCreateSolidFill
GdipDeleteGraphics
GdipDeleteBrush
GdipCreateBitmapFromResource
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromHICON
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipCloneBitmapAreaI
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipAlloc
GdipFree
GdipCloneBrush
GdipDeleteStringFormat
PathFileExistsW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ImageList_ReplaceIcon
ImageList_Create
ImageList_GetImageCount
ImageList_AddMasked
InitCommonControlsEx
UuidToStringA
RpcStringFreeA
WSAStartup
gethostname
WSACleanup
inet_ntoa
gethostbyname
CertGetNameStringW
CertVerifySubjectCertificateContext
CertFindCertificateInStore
CertOpenStore
CertCloseStore
CertFreeCertificateContext
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ