Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
52532bef8f0...18.exe
windows7-x64
72532bef8f0...18.exe
windows10-2004-x64
7$TEMP/Team...r_.exe
windows7-x64
7$TEMP/Team...r_.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$TEMP/Team...AS.exe
windows7-x64
1$TEMP/Team...AS.exe
windows10-2004-x64
3$TEMP/Team...TV.dll
windows7-x64
3$TEMP/Team...TV.dll
windows10-2004-x64
3$TEMP/Team...er.exe
windows7-x64
7$TEMP/Team...er.exe
windows10-2004-x64
7$TEMP/Team...ce.exe
windows7-x64
3$TEMP/Team...ce.exe
windows10-2004-x64
3Behavioral task
behavioral1
Sample
2532bef8f0fc88b683fa5aaee9b86457_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2532bef8f0fc88b683fa5aaee9b86457_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/TeamViewer/Version4/TeamViewer_.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/TeamViewer/Version4/TeamViewer_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$TEMP/TeamViewer/Version4/SAS.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$TEMP/TeamViewer/Version4/SAS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$TEMP/TeamViewer/Version4/TV.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMP/TeamViewer/Version4/TV.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$TEMP/TeamViewer/Version4/TeamViewer.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$TEMP/TeamViewer/Version4/TeamViewer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$TEMP/TeamViewer/Version4/TeamViewer_Service.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$TEMP/TeamViewer/Version4/TeamViewer_Service.exe
Resource
win10v2004-20241007-en
Target
2532bef8f0fc88b683fa5aaee9b86457_JaffaCakes118
Size
1.5MB
MD5
2532bef8f0fc88b683fa5aaee9b86457
SHA1
b1925f7e1f7fcbe4f44ac6ff9ea386e32caf634a
SHA256
9d2d1dc69b611430ee9e527cd8d289b96ff4c16f7783831f11375a840b79c350
SHA512
891cee823ce70b08d9646edbe79b7bd82bb4c99f36e8e21792f6d4f2333926f10f45e795ca8cda6acbdb068c8d0ce3ed6bad545367a2bcd7580d1d4cde773210
SSDEEP
49152:qnmQs2JQmTTqiJen+v1ceb3DEQxR59tw1Qv7tuF52L:xGmWW+KMdx39teQv7G5A
resource | yara_rule |
---|---|
sample | upx |
static1/unpack001/$TEMP/TeamViewer/Version4/TeamViewer_.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack002/$PLUGINSDIR/NSISdl.dll |
unpack002/$PLUGINSDIR/System.dll |
unpack002/$PLUGINSDIR/TvGetVersion.dll |
unpack002/$PLUGINSDIR/UAC.dll |
unpack002/$PLUGINSDIR/UserInfo.dll |
unpack002/$TEMP/TeamViewer/Version4/TV.dll |
unpack002/out.upx |
unpack001/out.upx |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
lstrcpynA
lstrlenA
lstrcatA
GlobalAlloc
GlobalFree
CloseHandle
GetTickCount
DeleteFileA
Sleep
WriteFile
CreateFileA
lstrcmpiA
lstrcpyA
MulDiv
CreateThread
CharPrevA
SetWindowLongA
RegisterWindowMessageA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
GetWindowRect
GetClientRect
ShowWindow
IsWindowVisible
GetFocus
GetDlgItem
FindWindowExA
SetWindowTextA
SendMessageA
wsprintfA
SetDlgItemTextA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
gethostbyname
inet_addr
ioctlsocket
htons
socket
closesocket
shutdown
connect
__WSAFDIsSet
select
recv
WSAGetLastError
send
WSACleanup
WSAStartup
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemInfo
lstrcmpiA
GetModuleHandleA
lstrcpynA
GlobalAlloc
GetProcAddress
lstrcatA
GetVersionExA
GetSystemMetrics
wsprintfA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
WindowsName
WindowsPlatformArchitecture
WindowsPlatformId
WindowsServerName
WindowsServicePack
WindowsServicePackBuild
WindowsType
WindowsVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
SetLastError
CloseHandle
GlobalFree
LocalFree
FormatMessageA
MultiByteToWideChar
GetLastError
CreateProcessA
GlobalAlloc
lstrlenA
LoadLibraryA
FreeLibrary
lstrcatA
GetExitCodeProcess
WaitForSingleObject
lstrcmpiA
lstrcpyA
GetVersionExA
GetCurrentProcess
GetCurrentThread
GetCurrentProcessId
Sleep
CreateThread
GetStartupInfoA
GetCommandLineA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetModuleHandleA
EnableWindow
GetWindowLongA
DestroyWindow
LoadImageA
SetWindowLongA
EndDialog
MessageBoxA
SendMessageW
DialogBoxParamA
CharNextA
SendMessageTimeoutA
DefWindowProcA
PostQuitMessage
SetForegroundWindow
DispatchMessageA
GetMessageA
CreateWindowExA
RegisterClassA
UnregisterClassA
PostMessageA
IsWindow
ShowWindow
SetWindowTextA
wsprintfA
GetDlgItem
LoadStringA
SendMessageA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ShellExecuteExA
CoInitialize
CoUninitialize
Exec
ExecCodeSegment
ExecWait
GetElevationType
IsAdmin
RunElevated
ShellExec
ShellExecWait
SupportsUAC
Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
lstrcpynA
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\TeamViewer\SAS Lib\release\SAS.pdb
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcBindingSetAuthInfoExW
RpcStringFreeW
RpcBindingFree
I_RpcExceptionFilter
NdrClientCall2
FlushFileBuffers
CloseHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FreeLibrary
GetProcAddress
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
SetLastError
GetVersionExA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\TeamViewer\TeamViewer\qs_release\TV.pdb
InitCommonControlsEx
GetLastError
HeapSize
RtlUnwind
InitializeCriticalSection
WriteFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
Sleep
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LCMapStringW
WideCharToMultiByte
LCMapStringA
MultiByteToWideChar
ReleaseMutex
GetCurrentThreadId
LocalAlloc
GetTickCount
CreateMutexA
OpenMutexA
LoadLibraryA
FreeLibrary
LocalUnlock
GetModuleFileNameA
LocalFree
LocalLock
WaitForSingleObject
GetCurrentProcessId
GetProcAddress
CloseHandle
VirtualQuery
GetVersionExA
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SystemParametersInfoA
GetSysColor
BeginPaint
LoadBitmapA
TrackMouseEvent
SetWindowPos
GetWindowRect
GetSystemMetrics
UnregisterClassA
IsWindowVisible
AllowSetForegroundWindow
SetActiveWindow
GetWindowLongA
GetDC
ShowWindow
GetWindowDC
CallNextHookEx
GetWindowThreadProcessId
CreateWindowExA
RegisterClassA
GetWindowInfo
GetActiveWindow
ReleaseDC
GetClassInfoA
MoveWindow
EndPaint
IsWindow
MapWindowPoints
PostMessageA
FindWindowExA
SendNotifyMessageA
IsRectEmpty
DestroyWindow
FindWindowA
IsZoomed
DefWindowProcA
GetClientRect
SetRect
LoadCursorA
SetWindowsHookExA
SetWindowLongA
RedrawWindow
SendMessageA
UnionRect
InvalidateRect
SetRectEmpty
RegisterWindowMessageA
GetClassNameA
UnhookWindowsHookEx
GetDesktopWindow
Rectangle
DeleteDC
DeleteObject
SelectObject
GetDeviceCaps
Polyline
CreatePen
CreateCompatibleDC
CreateSolidBrush
LineTo
ExtCreatePen
MoveToEx
GetPixel
GetObjectA
GetStockObject
BitBlt
SetPixel
CreateCompatibleBitmap
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\TeamViewer\TeamViewer\qs_release\TeamViewer_qs.pdb
ImageList_Destroy
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Remove
ImageList_LoadImageW
ImageList_SetBkColor
ImageList_Create
GetAdaptersInfo
DeleteIPAddress
GetAdapterIndex
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
GetCurrentThread
CreateEventW
GetOverlappedResult
lstrcmpW
FileTimeToLocalFileTime
SetUnhandledExceptionFilter
DeleteFileA
CreateFileA
FindFirstFileA
FindNextFileA
QueryPerformanceCounter
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
SetHandleCount
GetOEMCP
HeapCreate
GetTimeZoneInformation
ExitThread
GetStringTypeA
LCMapStringA
GetStdHandle
SetThreadPriority
ExitProcess
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetDateFormatA
GetTimeFormatA
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
FormatMessageA
GetFileTime
CreateWaitableTimerA
SetWaitableTimer
TlsSetValue
ResetEvent
TlsGetValue
TlsFree
TlsAlloc
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
ResumeThread
CreateThread
DeviceIoControl
lstrcpyW
GetFileType
SetEndOfFile
SetEnvironmentVariableA
GetTickCount
WaitForSingleObject
CreateEventA
GetSystemTimeAsFileTime
CloseHandle
GetCurrentThreadId
ReleaseSemaphore
LocalAlloc
GetProcAddress
WritePrivateProfileStringW
OpenProcess
GlobalFree
InterlockedExchange
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleHandleA
CompareStringA
SetProcessShutdownParameters
LocalSize
LocalLock
LocalUnlock
CompareFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
SetErrorMode
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFilePointer
GetLocalTime
LockResource
MoveFileExW
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
FlushFileBuffers
ReadFile
WriteFile
GetFileSize
GetModuleFileNameA
DeleteCriticalSection
FreeLibrary
ReleaseMutex
CreateMutexA
LoadResource
SizeofResource
LocalFree
GetCommandLineW
GetLastError
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
Sleep
GetCurrentProcessId
HeapAlloc
WaitForMultipleObjects
LeaveCriticalSection
DuplicateHandle
EnterCriticalSection
SetLastError
FlushInstructionCache
RaiseException
HeapFree
SetEvent
GetProcessHeap
CreateSemaphoreA
GetCurrentProcess
CreatePopupMenu
CloseDesktop
GetUserObjectInformationW
GetThreadDesktop
GetCursorInfo
SetThreadDesktop
OpenInputDesktop
EnumWindows
CreateIconIndirect
InvalidateRgn
ScrollWindowEx
SetScrollInfo
SetScrollPos
SetCursorPos
GetScrollInfo
GetSystemMenu
GetMessagePos
SetRectEmpty
GetNextDlgTabItem
EndDeferWindowPos
BeginDeferWindowPos
DrawEdge
GetWindowPlacement
SetWindowPlacement
DestroyAcceleratorTable
FlashWindow
GetDialogBaseUnits
DeferWindowPos
MapDialogRect
DrawIconEx
CreateWindowExA
GetDlgItemTextA
GetIconInfo
GetCapture
DrawFocusRect
FrameRect
IsMenu
GetWindowDC
WindowFromPoint
GetShellWindow
PostQuitMessage
RedrawWindow
ScreenToClient
SetActiveWindow
IsWindowEnabled
CreateMenu
OpenDesktopW
RegisterWindowMessageW
CharLowerW
UnregisterClassA
TranslateMessage
IsWindow
ShowWindow
MoveWindow
GetWindow
GetWindowRect
MapWindowPoints
InvalidateRect
SetWindowPos
SetTimer
KillTimer
GetParent
GetClientRect
MessageBoxA
UnhookWindowsHookEx
CallNextHookEx
GetAsyncKeyState
GetFocus
SendInput
GetKeyState
ToUnicode
GetKeyboardState
ToAscii
MessageBeep
DestroyWindow
CheckMenuItem
EnableMenuItem
TrackPopupMenuEx
GetSubMenu
RemoveMenu
CheckMenuRadioItem
SetFocus
GetDC
DestroyMenu
SetWindowRgn
GetDlgCtrlID
GetDlgItem
GetDesktopWindow
BringWindowToTop
CopyRect
CharUpperW
GetSystemMetrics
AdjustWindowRect
SetForegroundWindow
FillRect
UpdateWindow
OffsetRect
ShowScrollBar
SetParent
BeginPaint
EndPaint
DestroyIcon
IntersectRect
IsRectEmpty
EqualRect
InflateRect
UnionRect
SetRect
GetSysColor
ReleaseDC
EndDialog
BlockInput
GetActiveWindow
GetCursorPos
GetForegroundWindow
GetWindowThreadProcessId
GetGUIThreadInfo
DestroyCursor
ReleaseCapture
SetCursor
SetCapture
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
ChangeClipboardChain
IsWindowVisible
PtInRect
TrackMouseEvent
ClientToScreen
SetClipboardViewer
MaskBlt
CreatePalette
SetViewportOrgEx
SetBrushOrgEx
SelectPalette
RealizePalette
GetSystemPaletteEntries
GetDIBits
CreateDIBSection
RoundRect
PatBlt
CreatePatternBrush
SetStretchBltMode
SetDIBitsToDevice
CreateCompatibleBitmap
DPtoLP
SetPixel
SetDIBColorTable
Polygon
Ellipse
LineTo
MoveToEx
SetTextColor
GetDeviceCaps
CreateCompatibleDC
BitBlt
DeleteObject
GetStockObject
SelectObject
StretchBlt
DeleteDC
CreateRoundRectRgn
CreateRectRgn
CombineRgn
CreatePen
Rectangle
CreateSolidBrush
CreateBitmap
SetBkColor
GetPixel
SetBkMode
BeginPath
EndPath
GetObjectType
StrokeAndFillPath
DuplicateToken
GetTokenInformation
EqualSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
DeregisterEventSource
ReportEventW
RegisterEventSourceW
FreeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
SetTokenInformation
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegSetValueExA
RegEnumValueW
RegEnumKeyExA
RegEnumValueA
GetSidIdentifierAuthority
LookupAccountNameW
RegOpenKeyW
CreateProcessAsUserW
ImpersonateLoggedOnUser
RevertToSelf
SetEntriesInAclW
SetNamedSecurityInfoW
AllocateAndInitializeSid
OpenProcessToken
DuplicateTokenEx
SHAppBarMessage
ord680
ord155
DragAcceptFiles
SHGetSpecialFolderLocation
CommandLineToArgvW
ReleaseStgMedium
RevokeDragDrop
OleInitialize
RegisterDragDrop
CoTaskMemRealloc
CoInitializeSecurity
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoCreateGuid
CoTaskMemAlloc
SysAllocString
SysFreeString
SafeArrayGetElement
VariantCopy
VariantClear
SafeArrayGetDim
VarUI4FromStr
VariantInit
VariantChangeType
PathRemoveFileSpecW
PathCompactPathW
WSAStartup
WSACleanup
socket
gethostbyname
bind
listen
accept
connect
getpeername
send
recvfrom
recv
inet_ntoa
htons
sendto
setsockopt
select
getsockname
__WSAFDIsSet
ntohs
WSAGetLastError
htonl
ioctlsocket
shutdown
closesocket
gethostname
inet_addr
HttpEndRequestA
InternetQueryOptionW
InternetSetOptionW
InternetOpenW
HttpSendRequestA
InternetGoOnlineA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestExA
InternetWriteFile
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetErrorDlg
HttpQueryInfoW
HttpQueryInfoA
InternetReadFile
CertGetNameStringW
CertGetNameStringA
CertFreeCertificateContext
CryptVerifyMessageSignature
ImageGetCertificateData
ImageGetCertificateHeader
ImageEnumerateCertificates
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateEnvironmentBlock
DestroyEnvironmentBlock
CertFreeCertificateContext
CryptVerifyMessageSignature
CertGetNameStringA
ImageEnumerateCertificates
ImageGetCertificateHeader
ImageGetCertificateData
WinVerifyTrust
WTSQuerySessionInformationA
WTSFreeMemory
WritePrivateProfileStringA
FreeLibrary
GetExitCodeProcess
ProcessIdToSessionId
DisconnectNamedPipe
GetModuleFileNameA
WaitForSingleObject
DeleteFileA
SetEvent
CreateEventA
GetConsoleCP
SetFilePointer
IsValidLocale
SetCurrentDirectoryA
MultiByteToWideChar
CreateFileA
SetLastError
CreateNamedPipeA
GetPrivateProfileIntA
LocalFree
GetVersionExA
LoadLibraryA
GetProcAddress
GetCurrentProcessId
OpenProcess
GetLastError
CloseHandle
TerminateProcess
Sleep
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetPrivateProfileStringA
CreateProcessA
LocalAlloc
GetCurrentProcess
ReadFile
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapFree
HeapAlloc
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
LCMapStringW
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSection
InterlockedExchange
GetStringTypeA
GetStringTypeW
MessageBoxA
ExitWindowsEx
CreateServiceA
StartServiceCtrlDispatcherA
SetServiceStatus
RegDeleteKeyA
CreateProcessAsUserA
DuplicateToken
ImpersonateLoggedOnUser
RevertToSelf
RegCreateKeyA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
DuplicateTokenEx
SetTokenInformation
RegOpenKeyExA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ShellExecuteExA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ