Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
3ce8900bd02...18.exe
windows7-x64
7ce8900bd02...18.exe
windows10-2004-x64
7$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/jsdrv.exe
windows7-x64
3$PLUGINSDIR/jsdrv.exe
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3JSDriver/jsdrv.exe
windows7-x64
3JSDriver/jsdrv.exe
windows10-2004-x64
3JSDriver/jsdrv.sys
windows7-x64
1JSDriver/jsdrv.sys
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
ce8900bd0256aedd98f59424c4f5798e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce8900bd0256aedd98f59424c4f5798e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccDownload.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccDownload.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/jsdrv.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/jsdrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
JSDriver/jsdrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
JSDriver/jsdrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
JSDriver/jsdrv.sys
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
JSDriver/jsdrv.sys
Resource
win10v2004-20240802-en
Target
ce8900bd0256aedd98f59424c4f5798e_JaffaCakes118
Size
4.4MB
MD5
ce8900bd0256aedd98f59424c4f5798e
SHA1
648f7799455ed1816cfd9a87c90f72642cf1c3ed
SHA256
16ee76168892a9ae9d3a7496114664f4bf8db4218b73f23762c2dbcc50837531
SHA512
a5e70ad13a5b9a8e4208fa8fc5609f93fca2e681757154391537c15a7fdb1b8b19c2526b01b0dda1774a47b1fa3bce40b686975dd932e78609f17219de0b49bf
SSDEEP
98304:8U7A2RfCb8ujb8p7kOZczFaRmYUrIGUu0W4fPKQPsUdlc:8U7A2VUv8p7kRFeaKldlc
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/AccDownload.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/jsdrv.exe |
unpack001/$PLUGINSDIR/nsProcess.dll |
unpack001/JSDriver/jsdrv.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
SearchPathA
GetShortPathNameA
CreateFileA
GetFileSize
GetModuleFileNameA
ReadFile
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
Sleep
CloseHandle
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrlenA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetVersion
GetProcAddress
GlobalAlloc
CompareFileTime
SetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
lstrcmpA
WaitForSingleObject
GlobalFree
GetExitCodeProcess
GetModuleHandleA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryExA
FindFirstFileA
FindNextFileA
DeleteFileA
SetFilePointer
WriteFile
FindClose
WritePrivateProfileStringA
MultiByteToWideChar
MulDiv
GetPrivateProfileStringA
FreeLibrary
CreateWindowExA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
GetDC
SystemParametersInfoA
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetTimer
GetDlgItem
wsprintfA
SetForegroundWindow
ShowWindow
IsWindow
LoadImageA
SetWindowLongA
SetClipboardData
EmptyClipboard
OpenClipboard
EndPaint
PostQuitMessage
FindWindowExA
SendMessageTimeoutA
SetWindowTextA
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
ord17
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\BUILDS\Build_Stub\Client\Stub\AccDownload\AccDownload\Release_ANSI\AccDownload.pdb
DeviceIoControl
LocalFree
GetComputerNameA
lstrlenA
FormatMessageA
SetLastError
GetSystemDirectoryA
GetEnvironmentVariableA
GetVersionExA
GetCurrentProcessId
IsWow64Process
MoveFileExA
InitializeCriticalSection
Sleep
GetLocalTime
WaitForMultipleObjects
GetModuleFileNameA
OutputDebugStringA
lstrcmpA
FileTimeToSystemTime
LocalAlloc
lstrcpyW
Process32First
Process32Next
CreateToolhelp32Snapshot
OpenProcess
lstrcpynA
SystemTimeToFileTime
GlobalAlloc
MultiByteToWideChar
lstrcmpiA
GlobalFree
lstrcpyA
GetFileType
CompareFileTime
GetTimeFormatA
GetDateFormatA
GlobalMemoryStatusEx
GetSystemTime
GetProcessHeap
GetStringTypeW
HeapReAlloc
LoadLibraryW
QueryPerformanceCounter
GetEnvironmentStringsW
CreateDirectoryA
FlushFileBuffers
ReadFile
WriteFile
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
CreateThread
CloseHandle
DuplicateHandle
GetCurrentThreadId
ResetEvent
InterlockedIncrement
EnterCriticalSection
GetLastError
InterlockedExchange
SetThreadPriority
ExitThread
FreeEnvironmentStringsW
WriteConsoleW
RtlUnwind
CreateFileW
SetStdHandle
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
SetHandleCount
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
CreateEventA
TerminateThread
GetTickCount
SetEvent
WaitForSingleObject
GetCurrentProcess
InterlockedDecrement
DeleteCriticalSection
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSize
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
ExitProcess
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RaiseException
GetCommandLineA
HeapAlloc
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
HeapFree
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FindWindowExA
GetWindowTextA
SendMessageTimeoutA
IsWindowVisible
GetClassNameA
GetWindowThreadProcessId
EnumChildWindows
GetWindowLongA
GetParent
GetWindow
FindWindowA
wsprintfA
RegEnumKeyA
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
LookupAccountNameA
IsValidSid
RegQueryInfoKeyA
RegEnumKeyExA
GetUserNameA
RegCloseKey
RegOpenKeyA
RegNotifyChangeKeyValue
RegEnumValueA
RegQueryValueA
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
InitializeSecurityDescriptor
SHGetFolderPathA
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoUninitialize
SysFreeString
SysAllocString
VariantClear
VariantInit
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CryptDecodeObject
CryptQueryObject
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
CertGetNameStringA
CryptMsgGetParam
CryptMsgClose
GetModuleFileNameExA
HttpOpenRequestA
InternetCloseHandle
InternetSetOptionA
HttpSendRequestA
HttpAddRequestHeadersA
InternetWriteFile
HttpEndRequestA
HttpSendRequestExA
HttpQueryInfoA
InternetConnectA
InternetGetLastResponseInfoA
InternetQueryDataAvailable
InternetOpenA
InternetReadFile
Close
DeleteScheduleDownload
DetectBrowserUrls
Free
Get
GetDownloadLastError
GetDownloadLastWarning
GetDownloadedBytes
GetTotalBytesWritten
GetUSID
Length
Read
ScheduleDownload
ScheduleTask
ScheduleTaskOnce
Utility101
Utility102
Utility201
Utility202
Utility301
Utility401
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
lstrcpynA
lstrcpyA
GetProcAddress
VirtualFree
FreeLibrary
lstrlenA
LoadLibraryA
GetModuleHandleA
GlobalAlloc
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetLastError
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Builds\Build_ShopperProMulti\JSDriver\1.42.0.0\JsDriver\Release\jsdrv.pdb
getservbyname
htonl
recvfrom
recv
sendto
send
WSASocketA
ioctlsocket
gethostbyname
inet_ntoa
gethostname
htons
inet_addr
ntohs
ntohl
WSACleanup
socket
WSAStringToAddressW
shutdown
setsockopt
WSASendTo
WSASendDisconnect
WSASend
select
WSARecvFrom
WSARecvDisconnect
WSARecv
listen
WSAJoinLeaf
WSAIoctl
WSAGetQOSByName
getsockopt
getsockname
getpeername
WSAGetOverlappedResult
WSAEventSelect
WSAEnumNetworkEvents
WSADuplicateSocketW
WSAConnect
closesocket
WSACancelBlockingCall
gethostbyaddr
getservbyport
WSASetLastError
bind
WSAAsyncSelect
WSAAddressToStringW
WSAAccept
WSAGetLastError
WSAStartup
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
LoadUserProfileA
CreateEnvironmentBlock
UnloadUserProfile
DestroyEnvironmentBlock
InternetSetCookieA
InternetGetCookieA
HttpSendRequestExA
InternetConnectA
InternetReadFile
InternetGetConnectedState
InternetSetOptionA
InternetQueryOptionA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetQueryDataAvailable
InternetWriteFile
HttpEndRequestA
HttpQueryInfoA
GetSystemInfo
SetEnvironmentVariableA
GetDriveTypeW
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetFullPathNameA
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetTimeZoneInformation
GetConsoleCP
SetHandleCount
GetEnvironmentStringsW
FreeLibrary
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
LeaveCriticalSection
InterlockedExchange
GetLastError
GetProcAddress
EnterCriticalSection
GetCurrentThreadId
GetCurrentThread
Sleep
CreateEventA
CreateFileW
GetOverlappedResult
SetThreadPriority
DeviceIoControl
GetModuleFileNameA
CloseHandle
CreateThread
ExitThread
GetLocalTime
FlushFileBuffers
GetFileSize
WaitForSingleObject
OutputDebugStringA
ResetEvent
SetEvent
WaitForMultipleObjects
DuplicateHandle
GetCurrentProcess
TerminateThread
CreateDirectoryA
MoveFileExA
WriteFile
SetFilePointer
CreateFileA
GetVersionExA
GetTickCount
LoadLibraryA
UnmapViewOfFile
OpenEventA
GetModuleHandleA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
CreateProcessA
GetCurrentProcessId
GetExitCodeProcess
IsWow64Process
DeleteCriticalSection
LocalFree
GetSystemDirectoryA
GetEnvironmentVariableA
SetConsoleCtrlHandler
GetShortPathNameA
ReleaseMutex
OpenMutexA
CreateMutexA
lstrlenA
SetLastError
GetComputerNameA
FormatMessageA
ReadFile
GetFileType
MoveFileA
DeleteFileA
FindClose
SetEndOfFile
GetFileAttributesA
HeapFree
HeapAlloc
GetProcessHeap
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
TerminateProcess
MultiByteToWideChar
WaitForMultipleObjectsEx
RemoveDirectoryA
GetTempPathA
VirtualProtect
WideCharToMultiByte
GetTempFileNameA
GetUserDefaultLangID
GetExitCodeThread
SystemTimeToFileTime
FileTimeToSystemTime
GetTimeFormatA
GetDateFormatA
InterlockedCompareExchange
EncodePointer
DecodePointer
GetStringTypeW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapValidate
IsBadReadPtr
GetCPInfo
GetModuleFileNameW
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
LCMapStringW
CompareStringW
GetStdHandle
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
HeapQueryInformation
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
WriteConsoleW
OutputDebugStringW
LoadLibraryW
QueryPerformanceCounter
FreeEnvironmentStringsW
RegisterClassA
CreateWindowExA
UnregisterClassA
DefWindowProcA
IsWindow
PostMessageA
DestroyWindow
GetSystemMetrics
GetDesktopWindow
SendNotifyMessageA
FindWindowA
GetUserObjectSecurity
GetMessageA
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjectsEx
wsprintfA
CloseWindowStation
CloseDesktop
OpenDesktopA
OpenInputDesktop
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
SetUserObjectSecurity
GetSecurityDescriptorSacl
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegSetValueExA
IsTextUnicode
AllocateAndInitializeSid
RegQueryInfoKeyA
RegEnumKeyExA
GetUserNameA
OpenProcessToken
RegOpenCurrentUser
AddAccessAllowedAce
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
AddAce
GetAce
DuplicateTokenEx
CreateProcessAsUserA
LookupPrivilegeValueA
AdjustTokenPrivileges
LookupAccountNameW
FreeSid
RevertToSelf
ImpersonateLoggedOnUser
GetTokenInformation
GetLengthSid
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegNotifyChangeKeyValue
LookupAccountNameA
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
StartServiceA
ControlService
DeleteService
CreateServiceA
QueryServiceStatus
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
RegEnumValueA
RegEnumKeyA
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
ShellExecuteA
SHGetFolderPathA
ConnectToInj
CreateConfiguration
DestroyConfiguration
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
OpenProcess
lstrcpynA
lstrlenA
LoadLibraryA
lstrcmpiA
WideCharToMultiByte
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetVersionExA
GlobalFree
GlobalAlloc
GetWindowThreadProcessId
EnumWindows
wsprintfA
PostMessageA
_CloseProcess
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Builds\Build_ShopperProMulti\JSDriver\1.42.0.0\JsDriver\Release\jsdrv.pdb
getservbyname
htonl
recvfrom
recv
sendto
send
WSASocketA
ioctlsocket
gethostbyname
inet_ntoa
gethostname
htons
inet_addr
ntohs
ntohl
WSACleanup
socket
WSAStringToAddressW
shutdown
setsockopt
WSASendTo
WSASendDisconnect
WSASend
select
WSARecvFrom
WSARecvDisconnect
WSARecv
listen
WSAJoinLeaf
WSAIoctl
WSAGetQOSByName
getsockopt
getsockname
getpeername
WSAGetOverlappedResult
WSAEventSelect
WSAEnumNetworkEvents
WSADuplicateSocketW
WSAConnect
closesocket
WSACancelBlockingCall
gethostbyaddr
getservbyport
WSASetLastError
bind
WSAAsyncSelect
WSAAddressToStringW
WSAAccept
WSAGetLastError
WSAStartup
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
LoadUserProfileA
CreateEnvironmentBlock
UnloadUserProfile
DestroyEnvironmentBlock
InternetSetCookieA
InternetGetCookieA
HttpSendRequestExA
InternetConnectA
InternetReadFile
InternetGetConnectedState
InternetSetOptionA
InternetQueryOptionA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetQueryDataAvailable
InternetWriteFile
HttpEndRequestA
HttpQueryInfoA
GetSystemInfo
SetEnvironmentVariableA
GetDriveTypeW
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetFullPathNameA
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetTimeZoneInformation
GetConsoleCP
SetHandleCount
GetEnvironmentStringsW
FreeLibrary
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
LeaveCriticalSection
InterlockedExchange
GetLastError
GetProcAddress
EnterCriticalSection
GetCurrentThreadId
GetCurrentThread
Sleep
CreateEventA
CreateFileW
GetOverlappedResult
SetThreadPriority
DeviceIoControl
GetModuleFileNameA
CloseHandle
CreateThread
ExitThread
GetLocalTime
FlushFileBuffers
GetFileSize
WaitForSingleObject
OutputDebugStringA
ResetEvent
SetEvent
WaitForMultipleObjects
DuplicateHandle
GetCurrentProcess
TerminateThread
CreateDirectoryA
MoveFileExA
WriteFile
SetFilePointer
CreateFileA
GetVersionExA
GetTickCount
LoadLibraryA
UnmapViewOfFile
OpenEventA
GetModuleHandleA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
CreateProcessA
GetCurrentProcessId
GetExitCodeProcess
IsWow64Process
DeleteCriticalSection
LocalFree
GetSystemDirectoryA
GetEnvironmentVariableA
SetConsoleCtrlHandler
GetShortPathNameA
ReleaseMutex
OpenMutexA
CreateMutexA
lstrlenA
SetLastError
GetComputerNameA
FormatMessageA
ReadFile
GetFileType
MoveFileA
DeleteFileA
FindClose
SetEndOfFile
GetFileAttributesA
HeapFree
HeapAlloc
GetProcessHeap
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
TerminateProcess
MultiByteToWideChar
WaitForMultipleObjectsEx
RemoveDirectoryA
GetTempPathA
VirtualProtect
WideCharToMultiByte
GetTempFileNameA
GetUserDefaultLangID
GetExitCodeThread
SystemTimeToFileTime
FileTimeToSystemTime
GetTimeFormatA
GetDateFormatA
InterlockedCompareExchange
EncodePointer
DecodePointer
GetStringTypeW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapValidate
IsBadReadPtr
GetCPInfo
GetModuleFileNameW
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
LCMapStringW
CompareStringW
GetStdHandle
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
HeapQueryInformation
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
WriteConsoleW
OutputDebugStringW
LoadLibraryW
QueryPerformanceCounter
FreeEnvironmentStringsW
RegisterClassA
CreateWindowExA
UnregisterClassA
DefWindowProcA
IsWindow
PostMessageA
DestroyWindow
GetSystemMetrics
GetDesktopWindow
SendNotifyMessageA
FindWindowA
GetUserObjectSecurity
GetMessageA
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjectsEx
wsprintfA
CloseWindowStation
CloseDesktop
OpenDesktopA
OpenInputDesktop
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
SetUserObjectSecurity
GetSecurityDescriptorSacl
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegSetValueExA
IsTextUnicode
AllocateAndInitializeSid
RegQueryInfoKeyA
RegEnumKeyExA
GetUserNameA
OpenProcessToken
RegOpenCurrentUser
AddAccessAllowedAce
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
AddAce
GetAce
DuplicateTokenEx
CreateProcessAsUserA
LookupPrivilegeValueA
AdjustTokenPrivileges
LookupAccountNameW
FreeSid
RevertToSelf
ImpersonateLoggedOnUser
GetTokenInformation
GetLengthSid
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegNotifyChangeKeyValue
LookupAccountNameA
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
StartServiceA
ControlService
DeleteService
CreateServiceA
QueryServiceStatus
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
RegEnumValueA
RegEnumKeyA
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
ShellExecuteA
SHGetFolderPathA
ConnectToInj
CreateConfiguration
DestroyConfiguration
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Builds\Build_ShopperProMulti\JSDriver\1.42.0.0\VA_3_2\Bin\Release\jsdrv64.pdb
MmIsAddressValid
ExUuidCreate
IoFreeMdl
IoAllocateMdl
MmBuildMdlForNonPagedPool
ExFreePoolWithTag
ExAllocatePoolWithTag
KeReleaseInStackQueuedSpinLock
KeAcquireInStackQueuedSpinLock
KeWaitForSingleObject
KeDelayExecutionThread
KeReleaseSemaphore
KeBugCheckEx
RtlCopyUnicodeString
KeInitializeSemaphore
wcsstr
wcsrchr
wcsncpy
NdisFreeGenericObject
NdisAllocateNetBufferListPool
NdisFreeNetBufferListPool
NdisAllocateGenericObject
FwpmTransactionAbort0
FwpmTransactionCommit0
FwpmTransactionBegin0
FwpmEngineClose0
FwpmEngineOpen0
FwpsCopyStreamDataToBuffer0
FwpsStreamInjectAsync0
FwpsQueryPacketInjectionState0
FwpsInjectTransportReceiveAsync0
FwpmCalloutDeleteByKey0
FwpmFilterAdd0
FwpmFilterDeleteById0
FwpmCalloutAdd0
FwpsCalloutRegister0
FwpsCalloutUnregisterByKey0
FwpsFlowAssociateContext0
FwpsFlowRemoveContext0
FwpsInjectionHandleCreate0
FwpsInjectionHandleDestroy0
FwpsAllocateNetBufferAndNetBufferList0
FwpsFreeNetBufferList0
WdfVersionBindClass
WdfVersionUnbindClass
WdfVersionBind
WdfVersionUnbind
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ