Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
7e00fa2b327...20.exe
windows7-x64
7e00fa2b327...20.exe
windows10-2004-x64
7$DESKTOP/t...r_.exe
windows7-x64
7$DESKTOP/t...r_.exe
windows10-2004-x64
7$DESKTOP/t...TV.dll
windows7-x64
1$DESKTOP/t...TV.dll
windows10-2004-x64
3$DESKTOP/t...er.exe
windows7-x64
7$DESKTOP/t...er.exe
windows10-2004-x64
7$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3Behavioral task
behavioral1
Sample
e00fa2b3277b504f4ac9aef5ec44f320.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e00fa2b3277b504f4ac9aef5ec44f320.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$DESKTOP/temp/TeamViewer3/TeamViewer_.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$DESKTOP/temp/TeamViewer3/TeamViewer_.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$DESKTOP/temp/TeamViewer3/TV.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$DESKTOP/temp/TeamViewer3/TV.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$DESKTOP/temp/TeamViewer3/TeamViewer.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$DESKTOP/temp/TeamViewer3/TeamViewer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240226-en
Target
e00fa2b3277b504f4ac9aef5ec44f320
Size
792KB
MD5
e00fa2b3277b504f4ac9aef5ec44f320
SHA1
14919260ea4e27fcd68e86c0f5072dd2db485684
SHA256
4a7edae00da50eb04a3b597cb6a97dff18afab9d7f1c21bdfa9a4d85a45af0de
SHA512
b273fced8324e73258718e66f55b33e9d1d063d741e16542d83c6af5c5767f65f20d4cdeb69e7d84ff36cf7d4c11f1ea54895300613b5e7fade6e514ea00f1da
SSDEEP
24576:tnMfcHr/hMUOqEaHJLQ+pBPL3kVlCSEe865VGxWsgqrP:tnMqeUOqB/PTOwSEe865iHP
resource | yara_rule |
---|---|
sample | upx |
static1/unpack001/$DESKTOP/temp/TeamViewer3/TeamViewer_.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack002/$DESKTOP/temp/TeamViewer3/TV.dll |
unpack002/$PLUGINSDIR/GetVersion.dll |
unpack002/$PLUGINSDIR/NSISdl.dll |
unpack002/$PLUGINSDIR/System.dll |
unpack002/$PLUGINSDIR/UAC.dll |
unpack002/$PLUGINSDIR/UserInfo.dll |
unpack002/out.upx |
unpack001/out.upx |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenMutexA
HeapAlloc
LoadLibraryA
HeapFree
FreeLibrary
GetProcAddress
CloseHandle
ReleaseMutex
OutputDebugStringA
CreateMutexA
GetProcessHeap
WaitForSingleObject
SetWindowsHookExA
ClientToScreen
UnionRect
SetRect
GetWindowThreadProcessId
RegisterWindowMessageA
SetRectEmpty
FindWindowA
MapWindowPoints
GetClientRect
FindWindowExA
IsWindowVisible
CallNextHookEx
UnhookWindowsHookEx
GetUpdateRgn
GetDesktopWindow
SetWindowPos
IsWindow
GetWindowRect
PostMessageA
GetWindowDC
ReleaseDC
Rectangle
SelectObject
DeleteObject
GetRegionData
GetStockObject
CreatePen
CreateRectRgn
GetChangeRect
GetPauseStatus
SetSingleWindow
StartHooks
StopHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\TeamViewer\TeamViewer\qs_release\TeamViewer.pdb
ImageList_Remove
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_Create
InitCommonControlsEx
ImageList_LoadImageW
GetAdaptersInfo
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStrings
FreeEnvironmentStringsA
GetOEMCP
GetConsoleMode
GetConsoleCP
HeapCreate
ExitThread
GetDateFormatA
GetTimeFormatA
GetStringTypeA
LCMapStringA
ExitProcess
GetStdHandle
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
ReleaseSemaphore
CreateSemaphoreA
GetThreadLocale
GetLocaleInfoA
GetACP
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
lstrcmpW
GetCurrentThread
SetThreadPriority
ResumeThread
CreateThread
CreateEventA
SetEvent
GetVersionExW
GlobalFree
GetCurrentProcessId
CreateFileA
SetUnhandledExceptionFilter
InterlockedExchange
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleHandleA
CompareStringA
GetLocalTime
CompareFileTime
GetFileTime
SetFileTime
GetFileType
SetEndOfFile
SetFilePointer
ReadFile
SetErrorMode
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
ResetEvent
WaitForSingleObject
FlushFileBuffers
LocalFree
WriteFile
GetModuleFileNameA
GetCommandLineW
ReleaseMutex
InterlockedDecrement
OpenProcess
InterlockedIncrement
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryA
FreeLibrary
UnmapViewOfFile
CloseHandle
Sleep
MulDiv
SetProcessShutdownParameters
CreateMutexA
DeleteCriticalSection
InitializeCriticalSection
LoadResource
LockResource
SizeofResource
RaiseException
GetTickCount
GetSystemTime
SetLastError
FlushInstructionCache
GetLastError
GetCurrentProcess
LeaveCriticalSection
VirtualQuery
EnterCriticalSection
GetCurrentThreadId
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
SetEnvironmentVariableA
RtlUnwind
DrawFocusRect
GetSystemMenu
GetSysColor
PtInRect
EndDeferWindowPos
BeginDeferWindowPos
GetCapture
GetMessagePos
GetWindowPlacement
SetWindowPlacement
DrawEdge
GetNextDlgTabItem
DestroyAcceleratorTable
FillRect
SetRectEmpty
FlashWindow
GetDialogBaseUnits
DeferWindowPos
MapDialogRect
SetCapture
ReleaseCapture
GetShellWindow
TrackPopupMenuEx
GetSubMenu
GetDlgCtrlID
PostQuitMessage
EnableMenuItem
GetMenu
BringWindowToTop
MessageBoxA
UnhookWindowsHookEx
DestroyCursor
GetFocus
ToUnicode
GetKeyboardState
ToAscii
GetAsyncKeyState
GetKeyState
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
MessageBeep
GetDlgItemTextA
CreateWindowExA
ScreenToClient
GetGUIThreadInfo
GetWindowThreadProcessId
BlockInput
ChangeClipboardChain
SetClipboardViewer
SendInput
IntersectRect
GetIconInfo
GetCursorInfo
GetWindowDC
UnionRect
EnumWindows
WindowFromPoint
CloseDesktop
GetUserObjectInformationW
FrameRect
ClientToScreen
OpenDesktopW
UnregisterClassA
GetMenuStringW
RegisterWindowMessageW
GetDC
GetScrollInfo
UpdateWindow
SetScrollPos
BeginPaint
SetParent
CallNextHookEx
EndPaint
InvalidateRect
MoveWindow
ReleaseDC
InvalidateRgn
GetMenuItemInfoW
IsWindow
GetCursorPos
GetWindow
GetWindowRect
GetParent
MapWindowPoints
SetWindowPos
ScrollWindowEx
GetDlgItem
TranslateMessage
OffsetRect
IsWindowVisible
ShowWindow
CreateIconIndirect
DestroyWindow
DestroyIcon
SetCursor
SetForegroundWindow
SetCursorPos
GetClientRect
SetScrollInfo
InflateRect
KillTimer
SetTimer
EndDialog
GetActiveWindow
SetWindowRgn
ShowScrollBar
AdjustWindowRect
SetFocus
CopyRect
GetSystemMetrics
OpenInputDesktop
SetThreadDesktop
SetRect
EqualRect
RedrawWindow
GetThreadDesktop
GetForegroundWindow
MaskBlt
PatBlt
CreatePatternBrush
SetDIBitsToDevice
DPtoLP
CreatePen
CreateSolidBrush
StrokeAndFillPath
EndPath
BeginPath
SetBkMode
GetPixel
CreateBitmap
GetDIBits
GetSystemPaletteEntries
CreateRoundRectRgn
LineTo
GetDeviceCaps
CombineRgn
CreateRectRgn
CreatePalette
DeleteDC
DeleteObject
SelectObject
SetPixel
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
RealizePalette
SelectPalette
SetBrushOrgEx
StretchBlt
SetBkColor
GetObjectType
SetTextColor
SetViewportOrgEx
MoveToEx
ExtEscape
Rectangle
SetStretchBltMode
GetStockObject
RoundRect
BitBlt
SetSecurityDescriptorDacl
RegCloseKey
CryptDestroyHash
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
CryptGetUserKey
CryptDecrypt
CryptEncrypt
CryptVerifySignatureW
CryptSignHashW
CryptReleaseContext
CryptAcquireContextA
CryptGenKey
CryptGetKeyParam
RegQueryValueExA
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptImportKey
CryptExportKey
CreateProcessAsUserW
RegOpenKeyW
DuplicateTokenEx
SetTokenInformation
CryptDestroyKey
RegSetValueExA
RegEnumValueW
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
DuplicateToken
ImpersonateLoggedOnUser
RevertToSelf
InitializeSecurityDescriptor
CommandLineToArgvW
SHGetSpecialFolderLocation
RevokeDragDrop
CoTaskMemRealloc
CoCreateInstance
RegisterDragDrop
OleInitialize
ReleaseStgMedium
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
VarUI4FromStr
PathCompactPathW
htonl
bind
listen
accept
connect
getsockname
getpeername
send
WSAGetLastError
__WSAFDIsSet
recvfrom
select
recv
inet_ntoa
sendto
socket
setsockopt
gethostname
gethostbyname
ntohs
inet_addr
htons
WSAStartup
WSACleanup
shutdown
closesocket
ioctlsocket
InternetConnectW
HttpSendRequestA
InternetGoOnlineA
HttpQueryInfoA
InternetErrorDlg
InternetReadFile
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
InternetQueryOptionW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetVersionExA
GetProcAddress
GetModuleHandleA
lstrcmpiA
FreeLibrary
GlobalAlloc
lstrcatA
lstrcpynA
wsprintfA
GetSystemMetrics
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
IEVersion
WindowsName
WindowsPlatformArchitecture
WindowsPlatformId
WindowsServerName
WindowsServicePack
WindowsServicePackBuild
WindowsType
WindowsVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
lstrcpynA
lstrlenA
lstrcatA
GlobalAlloc
GlobalFree
CloseHandle
GetTickCount
DeleteFileA
Sleep
WriteFile
CreateFileA
lstrcmpiA
lstrcpyA
MulDiv
CreateThread
CharPrevA
SetWindowLongA
RegisterWindowMessageA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
GetWindowRect
GetClientRect
ShowWindow
IsWindowVisible
GetFocus
GetDlgItem
FindWindowExA
SetWindowTextA
SendMessageA
wsprintfA
SetDlgItemTextA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
gethostbyname
inet_addr
ioctlsocket
htons
socket
closesocket
shutdown
connect
__WSAFDIsSet
select
recv
WSAGetLastError
send
WSACleanup
WSAStartup
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
SetLastError
CloseHandle
GlobalFree
LocalFree
FormatMessageA
MultiByteToWideChar
GetLastError
CreateProcessA
GlobalAlloc
lstrlenA
LoadLibraryA
FreeLibrary
lstrcatA
GetExitCodeProcess
WaitForSingleObject
lstrcmpiA
lstrcpyA
GetVersionExA
GetCurrentProcess
GetCurrentThread
GetCurrentProcessId
Sleep
CreateThread
GetStartupInfoA
GetCommandLineA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetModuleHandleA
EnableWindow
GetWindowLongA
DestroyWindow
LoadImageA
SetWindowLongA
EndDialog
MessageBoxA
SendMessageW
DialogBoxParamA
CharNextA
SendMessageTimeoutA
DefWindowProcA
PostQuitMessage
SetForegroundWindow
DispatchMessageA
GetMessageA
CreateWindowExA
RegisterClassA
UnregisterClassA
PostMessageA
IsWindow
ShowWindow
SetWindowTextA
wsprintfA
GetDlgItem
LoadStringA
SendMessageA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ShellExecuteExA
CoInitialize
CoUninitialize
Exec
ExecCodeSegment
ExecWait
GetElevationType
IsAdmin
RunElevated
ShellExec
ShellExecWait
SupportsUAC
Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
lstrcpynA
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ