Extended Key Usages
ExtKeyUsageTimeStamping
Overview
overview
7Static
static
3828f8e0f21...18.exe
windows7-x64
7828f8e0f21...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$TEMP/SCSIinst.exe
windows7-x64
3$TEMP/SCSIinst.exe
windows10-2004-x64
3$TEMP/SPTD...86.exe
windows7-x64
3$TEMP/SPTD...86.exe
windows10-2004-x64
3Lang/1033.dll
windows7-x64
1Lang/1033.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3SetupDTSB.exe
windows7-x64
7SetupDTSB.exe
windows10-2004-x64
7daemon.dll
windows7-x64
3daemon.dll
windows10-2004-x64
3daemon.exe
windows7-x64
3daemon.exe
windows10-2004-x64
3pfctoc.dll
windows7-x64
3pfctoc.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
828f8e0f21c496f56c218c062a954014_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
828f8e0f21c496f56c218c062a954014_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
$TEMP/SCSIinst.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$TEMP/SCSIinst.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
$TEMP/SPTDinst-x86.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$TEMP/SPTDinst-x86.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
Lang/1033.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Lang/1033.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
Plugins/Images/bw5mount.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Plugins/Images/bw5mount.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
Plugins/Images/ccdmount.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Plugins/Images/ccdmount.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
Plugins/Images/mdsmount.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Plugins/Images/mdsmount.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
Plugins/Images/nrgmount.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Plugins/Images/nrgmount.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
Plugins/Images/pdimount.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Plugins/Images/pdimount.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
SetupDTSB.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
SetupDTSB.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
daemon.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
daemon.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
daemon.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
daemon.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
pfctoc.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
pfctoc.dll
Resource
win10v2004-20240730-en
Target
828f8e0f21c496f56c218c062a954014_JaffaCakes118
Size
1.4MB
MD5
828f8e0f21c496f56c218c062a954014
SHA1
8fd4a974d345889f2aa222a895dc5ef9123b6c62
SHA256
81caa6cf6ce08e857c4589fe54c2642c2b0b5a981660af16bd34c862ee179f51
SHA512
f21777b1c5b28498a6ca0d3502d8cfaeac92e2c8b9c1fbe8941d8360a88e8421a21ae59527565b44570728523903762ddcc80f9094765da98d1303eaa780ee5d
SSDEEP
24576:6XBC2KHTjzCen41CtlOHKOCvuf9y/bqUvmKchdQYfHdu+dfmc0nQR5879cQ+d7y:6XBVAnzCen41CtlOHKBvaE/OImRhdzfW
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/setuphlp.dll |
unpack001/$TEMP/SCSIinst.exe |
unpack001/Lang/1033.dll |
unpack001/Plugins/Images/bw5mount.dll |
unpack001/Plugins/Images/ccdmount.dll |
unpack001/Plugins/Images/mdsmount.dll |
unpack001/Plugins/Images/nrgmount.dll |
unpack001/Plugins/Images/pdimount.dll |
unpack001/pfctoc.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetModuleHandleA
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
LoadLibraryA
ExitProcess
GetCurrentProcess
CopyFileA
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
GetTempFileNameA
lstrcpyA
lstrlenA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
RemoveDirectoryA
GlobalFree
MulDiv
GetProcAddress
FreeLibrary
MultiByteToWideChar
DeleteFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
SetWindowTextA
SetTimer
DestroyWindow
CreateDialogParamA
ExitWindowsEx
CharNextA
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
DefWindowProcA
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
OleUninitialize
OleInitialize
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetModuleHandleA
GetPrivateProfileIntA
GlobalAlloc
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
lstrcmpiA
GetDlgCtrlID
GetClientRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
MapWindowPoints
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
SendMessageA
SetWindowTextA
GetWindowTextA
wsprintfA
CharNextA
CreateWindowExA
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CreateEventA
LocalAlloc
lstrcatA
lstrcpyA
GlobalAlloc
GlobalFree
GetLastError
GetCurrentThread
FreeLibrary
GetModuleFileNameA
CreateMutexA
MultiByteToWideChar
LoadLibraryA
GlobalReAlloc
IsDBCSLeadByte
WideCharToMultiByte
GetExitCodeProcess
SetCurrentDirectoryA
CreateProcessA
ReleaseMutex
Sleep
lstrcmpiA
GetCurrentDirectoryA
WaitForSingleObject
CloseHandle
LocalFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetSystemDirectoryA
lstrcmpA
lstrlenA
SetEvent
MessageBoxA
wsprintfA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
EqualSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
FreeSid
OpenProcessToken
OpenThreadToken
RegCloseKey
GetTokenInformation
A0DB34FC6FE35D429A28ADDE5467D4D7
Hlp1
Hlp2
Hlp3
Hlp4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpiW
CreateFileW
GetCommandLineW
GetLastError
WriteFile
CloseHandle
DeleteFileW
Sleep
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GetSystemWindowsDirectoryW
ExitProcess
lstrlenW
MessageBoxW
wsprintfW
RegSetValueExW
OpenServiceW
DeleteService
RegOpenKeyExW
RegDeleteKeyW
RegCloseKey
CloseServiceHandle
CreateServiceW
OpenSCManagerW
RegCreateKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\SPTDinst.pdb
OpenSCManagerA
FreeSid
EqualSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegSetKeySecurity
RegGetKeySecurity
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
CreateServiceA
RegOpenKeyA
GetModuleHandleA
LocalFree
CreateMutexA
LocalAlloc
CloseHandle
ReleaseMutex
GetTickCount
WaitForSingleObject
GetCommandLineA
VirtualFree
VirtualAlloc
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
DeleteFileA
ExitProcess
WriteFile
GetProcAddress
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
MultiByteToWideChar
LCMapStringW
ReadFile
SetFilePointer
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetStdHandle
FlushFileBuffers
CreateFileA
SetEndOfFile
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
TerminateProcess
GetSystemDirectoryA
GetCurrentThread
GetLastError
GetCurrentProcess
Sleep
GetStdHandle
GetSystemTimeAsFileTime
MessageBoxA
SetupDiGetClassDescriptionA
CertOpenStore
CertAddEncodedCertificateToStore
CertSetCertificateContextProperty
CertFreeCertificateContext
CertCloseStore
CheckSumMappedFile
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadReadPtr
MultiByteToWideChar
ImagePluginClose
ImagePluginCreate
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
ImagePluginReadSectors
ImagePluginSetInfo
ImagePluginWriteSectors
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Projects.NET\UInstall\UInstall\Release\UInstall.pdb
LockResource
GetVersionExA
LoadLibraryA
FreeLibrary
GetTempPathA
GetFileAttributesA
GetWindowsDirectoryA
lstrcpyA
CreateDirectoryA
GetLastError
GetCurrentProcessId
DeleteFileA
GetProcAddress
WaitForSingleObject
CloseHandle
CreateFileA
WriteFile
GetModuleFileNameA
lstrlenA
GetTempFileNameA
GetShortPathNameA
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
ResumeThread
GetProcessHeap
RaiseException
lstrcmpiA
GetStringTypeExA
GetThreadLocale
lstrcmpA
FindResourceExA
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
DeleteCriticalSection
InitializeCriticalSection
GetFileSize
LoadResource
MapViewOfFile
CompareStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
lstrcatA
MultiByteToWideChar
OpenProcess
TerminateProcess
lstrlenW
RemoveDirectoryA
lstrcpynA
FileTimeToSystemTime
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
VirtualQuery
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
SizeofResource
FindResourceA
SystemTimeToFileTime
GetLocalTime
GetCommandLineA
CreateFileMappingA
HeapFree
DestroyWindow
PostQuitMessage
CharNextA
wsprintfA
UnregisterClassA
RegisterClassExA
GetClassInfoExA
LoadCursorA
CreateWindowExA
GetSystemMetrics
SendMessageTimeoutA
IsWindow
GetWindowThreadProcessId
FindWindowA
CallWindowProcA
DefWindowProcA
GetWindowLongA
SetWindowLongA
wvsprintfA
CharUpperA
MessageBoxA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
SHGetPathFromIDListA
SHFileOperationA
SHGetMalloc
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderLocation
CoUninitialize
CoInitialize
CoCreateInstance
VarR8FromStr
PathGetArgsA
PathFindFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CM_Open_Class_KeyA
CM_Get_Child
CM_Get_Sibling
CM_Get_Device_IDW
CM_Locate_DevNodeW
CM_Get_DevNode_Status
SetupDiDestroyDeviceInfoList
SetupDiDestroyDriverInfoList
SetupDiCallClassInstaller
SetupDiSetSelectedDevice
SetupDiSetSelectedDriverW
SetupDiEnumDriverInfoW
SetupDiBuildDriverInfoList
SetupDiSetDeviceInstallParamsW
SetupDiGetDeviceInstallParamsW
SetupDiRegisterDeviceInfo
SetupDiSetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoW
SetupDiOpenDeviceInfoW
SetupDiCreateDeviceInfoList
SetupDiRemoveDevice
SetupDiDeleteDevRegKey
SetupDiSetClassInstallParamsA
SetupDiGetDeviceRegistryPropertyW
SetupDiGetINFClassW
SetCurrentDirectoryA
HeapSize
Sleep
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
CloseHandle
LocalFree
CreateMutexA
LocalAlloc
GetCurrentProcess
GetLastError
GetCurrentThread
FreeLibrary
GetModuleFileNameA
IsBadReadPtr
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
GetModuleHandleA
ReleaseMutex
WaitForSingleObject
DeviceIoControl
CreateFileA
WriteFile
SetLastError
CompareStringA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
InterlockedExchange
GetLocaleInfoA
IsBadCodePtr
GetStringTypeA
FlushFileBuffers
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
UnhandledExceptionFilter
GetEnvironmentStrings
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
LCMapStringA
IsBadWritePtr
HeapReAlloc
GetFileType
GetFullPathNameA
RemoveDirectoryA
CreateDirectoryA
GetDriveTypeA
GetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
MoveFileA
DeleteFileA
ReadFile
HeapFree
HeapAlloc
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
GetVersionExA
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetEndOfFile
SetHandleCount
GetStdHandle
GetStartupInfoA
SetStdHandle
TerminateProcess
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GetACP
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
RegisterWindowMessageA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegCreateKeyExA
OpenThreadToken
RegCloseKey
RegDeleteKeyA
OpenSCManagerA
FreeSid
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLogicalDrives
CloseHandle
GetCurrentProcess
WaitForMultipleObjects
SetLastError
OutputDebugStringA
FreeLibrary
InitializeCriticalSectionAndSpinCount
ReleaseMutex
WaitForSingleObject
CreateThread
GetCommandLineW
InterlockedExchange
CompareStringA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
SetEvent
FlushFileBuffers
HeapSize
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
SetStdHandle
InitializeCriticalSection
GetExitCodeProcess
GetOEMCP
GetACP
GetStringTypeA
GetLocaleInfoA
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
GetLastError
LocalFree
Sleep
GetVersion
GetModuleHandleA
LoadLibraryA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
HeapAlloc
HeapFree
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
RtlUnwind
VirtualQuery
FileTimeToSystemTime
FileTimeToLocalFileTime
TerminateProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
SetFilePointer
SetEnvironmentVariableA
TranslateMessage
DestroyIcon
CreatePopupMenu
GetCursorPos
TrackPopupMenu
DestroyMenu
GetParent
GetWindowRect
GetSystemMetrics
MoveWindow
PostQuitMessage
ExitWindowsEx
GetDlgItem
EndDialog
ShowWindow
DestroyWindow
SetForegroundWindow
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegCloseKey
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RaiseException
GetModuleHandleA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetCommandLineA
HeapAlloc
WritePrivateProfileStringA
ExitProcess
TerminateProcess
HeapSize
GetTimeZoneInformation
GetACP
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapFree
GlobalFlags
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
DuplicateHandle
GlobalFree
GlobalAlloc
GlobalReAlloc
FindFirstFileA
FindClose
UnlockFile
LockFile
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVersion
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GetEnvironmentStrings
GlobalLock
SetFilePointer
SetEndOfFile
GetCurrentThread
GlobalDeleteAtom
GetLastError
LocalFree
GetCurrentThreadId
lstrcmpA
GetFileTime
InterlockedDecrement
GetFileAttributesA
WideCharToMultiByte
InterlockedIncrement
GetModuleFileNameA
lstrcmpiA
GetVolumeInformationA
GetFullPathNameA
lstrcpynA
MultiByteToWideChar
lstrcpyA
lstrlenA
LoadLibraryA
GetProcAddress
FlushFileBuffers
CloseHandle
CreateFileA
WriteFile
ReadFile
GetEnvironmentStringsW
GetCurrentProcess
GetEnvironmentVariableA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetFileSize
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsIconic
SystemParametersInfoA
GetWindowPlacement
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetSystemMetrics
CharUpperA
wsprintfA
LoadBitmapA
GetMenuCheckMarkDimensions
LoadStringA
DeleteObject
SaveDC
RestoreDC
GetStockObject
SelectObject
SetBkColor
SetTextColor
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
CreateBitmap
DeleteDC
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
ord17
PfcFreeToc
PfcGetToc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ