Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
517ce2461cf...18.exe
windows7-x64
717ce2461cf...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3bomgar-jpt.exe
windows7-x64
3bomgar-jpt.exe
windows10-2004-x64
3bomgar-plk.exe
windows7-x64
1bomgar-plk.exe
windows10-2004-x64
3bomgar-sjp.exe
windows7-x64
3bomgar-sjp.exe
windows10-2004-x64
3nsnetpush.exe
windows7-x64
1nsnetpush.exe
windows10-2004-x64
3Behavioral task
behavioral1
Sample
17ce2461cf41dc55fd1432dd9b461086_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17ce2461cf41dc55fd1432dd9b461086_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
bomgar-jpt.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
bomgar-jpt.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
bomgar-plk.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
bomgar-plk.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
bomgar-sjp.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
bomgar-sjp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
nsnetpush.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
nsnetpush.exe
Resource
win10v2004-20240802-en
Target
17ce2461cf41dc55fd1432dd9b461086_JaffaCakes118
Size
3.2MB
MD5
17ce2461cf41dc55fd1432dd9b461086
SHA1
6548f1d8eb93f7847d43de307c9fcf783983b042
SHA256
b9968149cdedf77356e26d68d82bc47ac20d11a14763c026ec36b842850b4af0
SHA512
93f725bd9d74da2191e2e658f6ac73df8da86bdfc371a8610f32bdc4fc19363b76802ac219ba2172abee3bb794c66fcbe3db932b8ecc17220ce32537de6b3add
SSDEEP
98304:XbLB5a8V1wMQlFvacoQpOLVLTAr9PtganH9:rLB5lwMQwbL0kc9
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/UserInfo.dll |
unpack001/bomgar-plk.exe |
unpack001/bomgar-sjp.exe |
unpack001/nsnetpush.exe |
unpack001/out.upx |
resource | yara_rule |
---|---|
static1/unpack001/out.upx | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
lstrcpynA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
bomgar-jpt.pdb
accept
listen
socket
send
getsockname
getpeername
bind
connect
select
__WSAFDIsSet
recv
ioctlsocket
closesocket
WSAAsyncSelect
WSAStartup
gethostname
WSACleanup
shutdown
WSASetLastError
ntohs
getservbyport
gethostbyaddr
htons
getservbyname
htonl
inet_ntoa
gethostbyname
WSAGetLastError
inet_addr
setsockopt
GetIconInfo
CreateIconIndirect
SetCursorPos
DestroyCursor
CreateCursor
FlashWindowEx
GetCaretBlinkTime
GetSysColor
MessageBeep
GetParent
WindowFromPoint
GetKeyState
GetCursorPos
ClipCursor
GetSysColorBrush
GetDoubleClickTime
LoadImageW
SetDoubleClickTime
GetClassInfoW
GetWindowRgn
SetCaretBlinkTime
EndPaint
BeginPaint
InvalidateRgn
GetUpdateRect
ScreenToClient
SetParent
UpdateWindow
ShowWindow
ScrollWindowEx
IsWindowVisible
EnableMenuItem
GetSystemMenu
ClientToScreen
GetWindowRect
GetClientRect
SetWindowPlacement
SetWindowPos
GetWindowPlacement
AdjustWindowRectEx
DrawIconEx
GetDesktopWindow
InvalidateRect
MoveWindow
GetSystemMetrics
IsZoomed
IsIconic
SetForegroundWindow
ReleaseCapture
SetWindowRgn
SetCursor
SendMessageW
DestroyIcon
SetWindowTextW
SystemParametersInfoW
IsChild
GetActiveWindow
ReleaseDC
SetFocus
GetDC
GetFocus
SetTimer
SetWindowLongW
CreateWindowExW
RegisterClassW
CallNextHookEx
GetQueueStatus
DefWindowProcW
GetWindowLongW
KillTimer
PostMessageW
PeekMessageW
UnregisterClassW
DestroyWindow
UnhookWindowsHookEx
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjectsEx
SetWindowsHookExW
CharNextExA
RegisterClipboardFormatW
GetKeyboardLayoutList
RegisterWindowMessageW
SetCaretPos
DestroyCaret
CreateCaret
HideCaret
ToUnicode
SetMenuItemInfoW
TrackPopupMenuEx
GetKeyboardLayout
GetKeyboardState
MapVirtualKeyW
ToAscii
GetMenu
LoadIconW
ChangeClipboardChain
SetClipboardViewer
GetClipboardFormatNameW
PostQuitMessage
ValidateRgn
SetCapture
SHFileOperationW
ShellExecuteW
SHGetPathFromIDListW
SHGetFileInfoW
SHGetSpecialFolderLocation
LCMapStringA
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
SetFileTime
GetDateFormatA
GetTimeFormatA
SetStdHandle
SetFileAttributesW
GetCurrentDirectoryA
GetConsoleMode
GetConsoleCP
LCMapStringW
GetCPInfo
GetStringTypeA
MoveFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetStringTypeW
CompareStringA
HeapDestroy
HeapCreate
CloseHandle
GetCurrentThread
GetLastError
Sleep
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
GetProcAddress
WideCharToMultiByte
GetCurrentProcess
TerminateProcess
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
GetFileAttributesW
MultiByteToWideChar
VirtualFree
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetStdHandle
FreeEnvironmentStringsA
FindFirstChangeNotificationW
FindCloseChangeNotification
FindNextChangeNotification
QueryPerformanceFrequency
EnumSystemLocalesA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEnvironmentVariableA
FlushFileBuffers
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
GetTimeZoneInformation
CreateThread
ExitThread
HeapReAlloc
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
VirtualQuery
GetModuleHandleA
VirtualAlloc
VirtualProtect
HeapAlloc
IsDebuggerPresent
UnhandledExceptionFilter
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
GetLocaleInfoA
InterlockedExchange
InterlockedCompareExchange
InterlockedIncrement
CreateNamedPipeW
ConnectNamedPipe
PeekNamedPipe
GetOverlappedResult
WaitNamedPipeW
DisconnectNamedPipe
GetEnvironmentStrings
GetComputerNameA
lstrlenA
lstrcatA
SetLastError
GetTempFileNameW
OpenEventW
GetComputerNameW
lstrcpynW
lstrcpyW
lstrcatW
CreateProcessA
LocalAlloc
OpenProcess
SetFilePointer
GetTickCount
CreateMutexW
ReleaseMutex
SetUnhandledExceptionFilter
GetModuleFileNameA
DeleteFileA
CreateFileA
RaiseException
GetDriveTypeW
lstrcmpW
GlobalFree
GlobalSize
ExpandEnvironmentStringsW
GetUserDefaultLangID
IsValidLocale
IsValidLanguageGroup
GlobalAlloc
GlobalUnlock
GlobalLock
InterlockedDecrement
GetVolumeInformationW
FindNextFileW
MapViewOfFile
DeleteFileW
CreateFileMappingW
GetFileType
GetFileTime
SystemTimeToTzSpecificLocalTime
WriteFile
FileTimeToSystemTime
SetEndOfFile
ReadFile
SetFilePointerEx
GetFileInformationByHandle
FindClose
FindFirstFileW
GetFileAttributesExW
CreateFileW
GetFullPathNameW
DeviceIoControl
LoadLibraryW
GetLogicalDrives
GetTempPathW
GetCurrentDirectoryW
SetCurrentDirectoryW
RemoveDirectoryW
CreateDirectoryW
MoveFileW
UnmapViewOfFile
CopyFileW
SetErrorMode
ReleaseSemaphore
CreateSemaphoreW
OutputDebugStringW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleW
GetModuleFileNameW
GetVersionExW
CompareStringW
GetUserDefaultLCID
GetCommandLineW
GetCurrentProcessId
GetSystemInfo
GetThreadPriority
SetThreadPriority
ResumeThread
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
DuplicateHandle
GetCurrentThreadId
CreateEventW
SetEvent
WaitForMultipleObjects
GetLocalTime
GetLocaleInfoW
ResetEvent
GetDateFormatW
GetTimeFormatW
FormatMessageW
LocalFree
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
RegDeleteValueW
GetSecurityDescriptorLength
MakeSelfRelativeSD
RegEnumKeyW
RegSetKeySecurity
RegConnectRegistryW
RegSetValueExW
RegFlushKey
LookupPrivilegeValueA
AdjustTokenPrivileges
FreeSid
AllocateAndInitializeSid
DuplicateToken
LookupAccountSidW
RevertToSelf
GetUserNameW
ImpersonateLoggedOnUser
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AddAccessAllowedAce
SetServiceStatus
QueryServiceStatus
CloseServiceHandle
OpenServiceW
OpenSCManagerW
ControlService
StartServiceA
RegOpenKeyExW
AddAce
InitializeAcl
GetAclInformation
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
OpenProcessToken
OpenThreadToken
GetLengthSid
IsValidSid
CopySid
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
GetTokenInformation
OpenServiceA
DeleteService
CreateServiceW
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
WNetCancelConnection2W
WNetAddConnection2W
WNetOpenEnumW
WNetGetLastErrorW
WNetEnumResourceW
WNetCloseEnum
WNetGetResourceInformationW
CryptHashPublicKeyInfo
CryptProtectData
UnloadUserProfile
LoadUserProfileW
UuidToStringW
RpcStringFreeW
DetectAutoProxyUrl
URLDownloadToFileA
SelectClipRgn
GetDeviceCaps
CombineRgn
OffsetRgn
DeleteObject
CreateRectRgn
GetRegionData
SelectPalette
RealizePalette
GetStockObject
GetObjectW
PtInRegion
DeleteDC
CreateDIBSection
GetDIBits
CreateBitmap
CreateCompatibleBitmap
SelectObject
BitBlt
CreateFontIndirectW
GetFontData
EnumFontFamiliesExW
GetTextMetricsW
GetTextFaceW
GetCharABCWidthsW
SetTextColor
SetBkMode
SetTextAlign
ExtTextOutW
GetOutlineTextMetricsW
GetTextExtentPoint32W
SetGraphicsMode
SetWorldTransform
GetGlyphOutlineW
GetCharABCWidthsFloatW
CreatePalette
GetPaletteEntries
GdiFlush
CreateCompatibleDC
GetOpenFileNameW
SysFreeString
VariantInit
SysStringLen
SysAllocStringByteLen
SysAllocString
ImmAssociateContext
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmSetCompositionFontW
ImmGetCompositionStringW
ImmNotifyIME
ImmReleaseContext
ImmGetContext
ImmGetDefaultIMEWnd
timeGetTime
PlaySoundW
CoGetMalloc
StringFromGUID2
CoCreateInstance
CoInitialize
CoUninitialize
CoLockObjectExternal
RegisterDragDrop
RevokeDragDrop
CoCreateGuid
OleInitialize
OleUninitialize
ReleaseStgMedium
DoDragDrop
OleGetClipboard
OleSetClipboard
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateEventA
CreateThread
GetVersionExA
GetProcAddress
LoadLibraryA
FreeLibrary
FormatMessageA
GetPrivateProfileStringA
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
WaitForMultipleObjects
GetCurrentThreadId
GetFileType
GetLastError
CreateProcessA
SetHandleInformation
CreatePipe
ClearCommBreak
SetCommTimeouts
SetCommState
GetCommState
CreateFileA
SetCommBreak
SetLastError
GetLocalTime
WaitForSingleObject
GetOverlappedResult
SetEvent
CloseHandle
WriteFile
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadFile
GetTickCount
IsDebuggerPresent
OpenEventA
UnhandledExceptionFilter
GetTimeFormatA
GetDateFormatA
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapReAlloc
HeapFree
SetUnhandledExceptionFilter
GetModuleHandleA
ExitProcess
ExitThread
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
RtlUnwind
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
WideCharToMultiByte
GetConsoleCP
FlushFileBuffers
Sleep
GetTimeZoneInformation
LCMapStringA
MultiByteToWideChar
LCMapStringW
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
HeapSize
InitializeCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetFilePointer
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyA
RegCloseKey
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Source\maintenance-ingredi-10.5\networkstreaming\trymax\push_agent\win32\bomgar-sjp.pdb
SizeofResource
lstrcmpiW
FreeLibrary
WaitForSingleObject
GetModuleHandleW
FindResourceW
InterlockedIncrement
LoadLibraryExW
CreateEventW
GetModuleFileNameW
LeaveCriticalSection
DeleteCriticalSection
GetCommandLineW
lstrlenW
RaiseException
EnterCriticalSection
SetEvent
InterlockedDecrement
CloseHandle
OpenEventW
InitializeCriticalSection
LoadResource
MultiByteToWideChar
GetLastError
ReadFile
WriteFile
WideCharToMultiByte
TerminateProcess
GetCurrentProcess
GetThreadLocale
SetEnvironmentVariableA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetProcAddress
LoadLibraryA
SetLastError
DeleteFileA
GlobalFree
lstrcatA
lstrlenA
GetComputerNameA
QueryPerformanceCounter
QueryPerformanceFrequency
LoadLibraryW
ExpandEnvironmentStringsW
GetTickCount
GetVersionExW
MoveFileW
DeleteFileW
SetEndOfFile
SetFilePointer
CreateFileW
FindClose
FindFirstFileW
GetDriveTypeA
FindNextFileW
GetLogicalDrives
ReleaseMutex
GetCurrentThreadId
CreateMutexW
LocalFree
LocalAlloc
GetCurrentThread
Sleep
GetExitCodeProcess
CreateProcessW
lstrcpyW
GetComputerNameW
ResetEvent
WaitForMultipleObjects
SetCurrentDirectoryW
RemoveDirectoryW
CreateDirectoryW
DuplicateHandle
CreatePipe
OpenProcess
FormatMessageW
GetTempPathW
GetTempFileNameW
GetSystemInfo
GetCurrentProcessId
CreateFileA
GetModuleFileNameA
SetUnhandledExceptionFilter
SetErrorMode
InterlockedCompareExchange
InterlockedExchange
GetLocaleInfoA
HeapFree
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
GetVersionExA
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetTimeZoneInformation
GetFullPathNameW
MoveFileA
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetModuleHandleA
VirtualQuery
GetTimeFormatA
GetDateFormatA
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
GetCurrentDirectoryA
CharNextW
GetSystemMetrics
UnregisterClassA
IsValidSid
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
RegFlushKey
RegConnectRegistryW
RegQueryValueExW
RegEnumValueW
RegEnumKeyW
FreeSid
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
DuplicateToken
OpenProcessToken
OpenThreadToken
GetUserNameW
SetServiceStatus
AdjustTokenPrivileges
LookupPrivilegeValueA
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
InitializeSecurityDescriptor
RegDeleteKeyW
SetSecurityDescriptorDacl
RegCloseKey
ImpersonateLoggedOnUser
RevertToSelf
LookupAccountSidW
RegEnumKeyExA
CopySid
GetTokenInformation
CoInitialize
CoUninitialize
CoCreateGuid
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
SysAllocString
VarUI4FromStr
SysFreeString
CryptHashPublicKeyInfo
recv
send
getsockname
inet_ntoa
ntohs
getpeername
setsockopt
htons
bind
WSAGetLastError
connect
select
__WSAFDIsSet
shutdown
inet_addr
gethostbyname
socket
WSAStartup
WSACleanup
closesocket
ioctlsocket
DetectAutoProxyUrl
URLDownloadToFileA
LoadUserProfileW
UnloadUserProfile
UuidToStringW
RpcStringFreeW
timeGetTime
SHGetPathFromIDListW
SHGetSpecialFolderLocation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ