Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
10Static
static
10AnyDesk.exe
windows7-x64
1AnyDesk.exe
windows10-2004-x64
1Archevod_XWorm.exe
windows7-x64
10Archevod_XWorm.exe
windows10-2004-x64
10ClickMe.lnk
windows7-x64
8ClickMe.lnk
windows10-2004-x64
8Cmstp.bat
windows7-x64
10Cmstp.bat
windows10-2004-x64
10GoogleChrome.exe
windows7-x64
10GoogleChrome.exe
windows10-2004-x64
10Hidden_Und...on.ps1
windows7-x64
8Hidden_Und...on.ps1
windows10-2004-x64
8Hidden_magic.vbs
windows7-x64
3Hidden_magic.vbs
windows10-2004-x64
7Manage.bat
windows7-x64
1Manage.bat
windows10-2004-x64
1Night_uac/...in.ps1
windows7-x64
8Night_uac/...in.ps1
windows10-2004-x64
8Night_uac/...ge.ps1
windows7-x64
8Night_uac/...ge.ps1
windows10-2004-x64
8Night_uac/...gen.py
windows7-x64
3Night_uac/...gen.py
windows10-2004-x64
3Night_uac/amsi.ps1
windows7-x64
3Night_uac/amsi.ps1
windows10-2004-x64
3Night_uac/amsi.ps1
windows7-x64
3Night_uac/amsi.ps1
windows10-2004-x64
3Night_uac/command.ps1
windows7-x64
3Night_uac/command.ps1
windows10-2004-x64
3Night_uac/down.ps1
windows7-x64
8Night_uac/down.ps1
windows10-2004-x64
8Night_uac/...gp.ps1
windows7-x64
3Night_uac/...gp.ps1
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Archevod_XWorm.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Archevod_XWorm.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ClickMe.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ClickMe.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Cmstp.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Cmstp.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
GoogleChrome.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
GoogleChrome.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Hidden_Undected_CMSTP-Reflection.ps1
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Hidden_Undected_CMSTP-Reflection.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Hidden_magic.vbs
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Hidden_magic.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Manage.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Manage.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Night_uac/Uac_main.ps1
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Night_uac/Uac_main.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Night_uac/Uac_stage.ps1
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Night_uac/Uac_stage.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Night_uac/Uac_stage_gen.py
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Night_uac/Uac_stage_gen.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Night_uac/amsi.ps1
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Night_uac/amsi.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Night_uac/amsi.ps1
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Night_uac/amsi.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Night_uac/command.ps1
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Night_uac/command.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Night_uac/down.ps1
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Night_uac/down.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Night_uac/payloads/0malm7gp.ps1
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Night_uac/payloads/0malm7gp.ps1
Resource
win10v2004-20241007-en
Target
3264d09d3a398417226b7d346c2fc4757ffa445373763e2d7c2f18ef6edb2354
Size
6.6MB
MD5
ed24b048880a8a2a3b7ac4911a7e81df
SHA1
80f631b5481ec48729c3a738dc7ab003b4cd61c1
SHA256
3264d09d3a398417226b7d346c2fc4757ffa445373763e2d7c2f18ef6edb2354
SHA512
fab270e82961ecf6c1db9a53eb0dc81b0a3d6251b39421486dfa6e6f20826577c2db0624444de39f8a91465fb5ab1530e5530480cdc9b5b33b8ab260350bfe2f
SSDEEP
196608:Xx3sgZH4wNNHmaqTE6kTcSzCkNBcjx3sgZdJ:h8CnDm7HORBcF8CdJ
xworm
3.0
topics-junior.at.ply.gg:45283
7K8kkC78j4IfMAr6
%AppData%
wininit.exe
quasar
1.4.0
Test
scambaiting2022.ddns.net:25565
192.168.1.3:25565
41845399-4858-4791-bd1c-b2526f38e8cc
77693888CF811B44AE75658ADBCA8897192A96FF
update.exe
Logs
3000
Chrome Update
Chrome
http://54.208.157.120:80/Night_uac/amsi.ps1
http://54.208.157.120:80/Night_uac/uac.ps1
http://54.208.157.120:80/Night_uac/command.ps1
http://54.208.157.120:80/Night_uac/down.ps1
http://54.208.157.120:80/Night_uac/Uac_main.ps1
http://54.208.157.120:80/Night_uac/payloads/9usd7yge.ps1
http://54.208.157.120:80/winlogin.exe
asyncrat
0.5.7B
Default
16.ip.gl.ply.gg:56795
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:10001
127.0.0.1:9147
windowsddns.duckdns.org:6606
windowsddns.duckdns.org:7707
windowsddns.duckdns.org:8808
windowsddns.duckdns.org:10001
windowsddns.duckdns.org:9147
country-wellness.gl.at.ply.gg:6606
country-wellness.gl.at.ply.gg:7707
country-wellness.gl.at.ply.gg:8808
country-wellness.gl.at.ply.gg:10001
country-wellness.gl.at.ply.gg:9147
AsyncMutex_6SI8OkPnk
3
true
Days Out.exe
%AppData%
njrat
im523
scammer
topics-junior.at.ply.gg:45283
87fbb7d05011dd3c6b564f136007bf19
87fbb7d05011dd3c6b564f136007bf19
|'|'|
quasar
1.4.1
My VM
myownvm.anondns.net:13832
37.120.141.165:13832
server1.trustedvpnservices.com:13832
higradevpn.xyz:13832
071e2576-e94a-492e-8303-baae1cb4641c
402F6F1B2F63357285F585A5880FBC2C0F468F55
ShellExperienceHost.exe
Logs
3000
Windows Shell Experience Host
drivers
orcus
Scammers
44.203.122.41:1604
b040a0c11d1a4273bc5428c0c9cb2c5b
Registry
true
%appdata%\Orcus\explorer.exe
9000
Orcus
Orcus
AppData\AnyDex.exe
http://54.208.157.120:80/scambtr_uac/amsi.ps1
http://54.208.157.120:80/scambtr_uac/uac.ps1
http://54.208.157.120:80/scambtr_uac/command.ps1
http://54.208.157.120:80/scambtr_uac/down.ps1
http://54.208.157.120:80/scambtr_uac/Uac_main.ps1
http://54.208.157.120:80/scambtr_uac/payloads/fm1ri21p.ps1
xworm
3.1
miles-c.at.ply.gg:49826
qzx0AtyVDsrQphps
%AppData%
USB.exe
xworm
180.ip.ply.gg:48892
QWgaicbZP6H1puz7
USB.exe
Processes:
resource | yara_rule |
---|---|
static1/unpack001/Runtimebroker.exe | family_asyncrat |
static1/unpack001/spoolsvc.exe | family_asyncrat |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/Archevod_XWorm.exe | family_xworm |
static1/unpack001/taskhosts.exe | family_xworm |
static1/unpack001/winlogin.exe | family_xworm |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/explorer_orcus.exe | orcus |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/explorer_orcus.exe | family_orcus |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/GoogleChrome.exe | family_quasar |
static1/unpack001/ShellExperienceHost.exe | family_quasar |
static1/unpack001/fontdrvhost.exe | family_quasar |
Checks for missing Authenticode signature.
Processes:
resource |
---|
unpack001/Archevod_XWorm.exe |
unpack001/GoogleChrome.exe |
unpack001/Runtimebroker.exe |
unpack001/Server.exe |
unpack001/ShellExperienceHost.exe |
unpack001/Svchost.exe |
unpack001/UltraViewerUpdateService.exe |
unpack001/explorer_orcus.exe |
unpack001/fontdrvhost.exe |
unpack001/spoolsvc.exe |
unpack001/taskhosts.exe |
unpack001/winlogin.exe |
unpack001/wlms.exe |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdb
setsockopt
getsockopt
WSAGetLastError
gethostbyname
inet_ntoa
htons
htonl
WSACleanup
__WSAFDIsSet
accept
bind
WSAIoctl
closesocket
select
shutdown
listen
WSAStartup
getpeername
inet_addr
getsockname
send
socket
connect
recv
ntohl
WSASendTo
gethostname
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ExpandEnvironmentStringsForUserA
DestroyEnvironmentBlock
CreateEnvironmentBlock
WritePrivateProfileStringA
GetPrivateProfileStructA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileSectionA
CreateFileMappingA
Sleep
CreateThread
MulDiv
VerSetConditionMask
VerifyVersionInfoW
ReadFile
WriteFile
OutputDebugStringA
WaitForMultipleObjects
GetEnvironmentVariableA
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
SetCurrentDirectoryA
lstrcatW
LoadLibraryW
SetFileAttributesA
CreateEventA
WaitNamedPipeW
GetExitCodeProcess
ResumeThread
ResetEvent
CompareFileTime
CreateFileA
GetFileSize
GetFileTime
GetStdHandle
WriteConsoleA
FreeConsole
FormatMessageA
AllocConsole
GetExitCodeThread
MoveFileA
GetDriveTypeA
SetFileTime
SetErrorMode
SetFilePointer
SetEndOfFile
GetFileAttributesA
MoveFileExA
FileTimeToSystemTime
GetLogicalDriveStringsA
SystemTimeToFileTime
CreateDirectoryA
GetSystemTime
FlushFileBuffers
TerminateProcess
VirtualAllocEx
ReadProcessMemory
SetThreadExecutionState
VirtualFreeEx
TerminateThread
SizeofResource
FindResourceA
LockResource
LoadResource
CreateMutexA
ReleaseMutex
GlobalGetAtomNameA
GlobalDeleteAtom
GetModuleHandleW
SetProcessShutdownParameters
WinExec
WritePrivateProfileStructA
HeapReAlloc
RaiseException
FreeLibraryAndExitThread
ExitThread
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetCPInfo
SetStdHandle
SetFilePointerEx
ReadConsoleW
GetTimeZoneInformation
GetConsoleMode
GetConsoleOutputCP
GetModuleHandleExW
ExitProcess
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
RtlUnwind
EncodePointer
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateSemaphoreA
TlsFree
TlsGetValue
TlsAlloc
GetCurrentThread
DuplicateHandle
SetThreadPriority
ReleaseSemaphore
TlsSetValue
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SwitchToThread
GetFileType
lstrcatA
lstrcmpiA
lstrcpynA
DosDateTimeToFileTime
GetLocalTime
FileTimeToLocalFileTime
SetVolumeLabelA
LocalFileTimeToFileTime
GetVersion
GetLocaleInfoA
GetFullPathNameA
lstrcpyA
CompareStringW
LCMapStringW
GetLocaleInfoW
OpenProcess
FlsAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
DecodePointer
GetModuleFileNameW
GetStringTypeW
CreateDirectoryW
GetFileSizeEx
DeleteFileW
GetCurrentProcessId
WTSGetActiveConsoleSessionId
Process32FirstW
Process32Next
Process32NextW
GlobalAddAtomA
ProcessIdToSessionId
CreateToolhelp32Snapshot
Process32First
GetComputerNameA
GetSystemInfo
GetSystemDirectoryA
MapViewOfFile
OpenFileMappingA
UnmapViewOfFile
DeleteFileA
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
GetProcessTimes
GetSystemTimeAsFileTime
DeleteCriticalSection
GetModuleHandleA
InitializeCriticalSection
LeaveCriticalSection
GetCurrentProcess
EnterCriticalSection
CloseHandle
GetVersionExA
SetEvent
GetLastError
GetCurrentThreadId
OpenEventA
GetModuleFileNameA
GetTickCount
FreeLibrary
GetProcessHeap
GetProcAddress
HeapAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
lstrlenA
SetLastError
HeapFree
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GetFileAttributesExW
GlobalAlloc
GlobalSize
MultiByteToWideChar
SetFileAttributesW
MoveFileExW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
RemoveDirectoryW
HeapSize
WriteConsoleW
FlsGetValue
FlsSetValue
FlsFree
OpenThread
QueryPerformanceFrequency
LocalFree
SetThreadAffinityMask
InitializeCriticalSectionEx
GetVolumeInformationA
GetSubMenu
SetMenuDefaultItem
DestroyMenu
TrackPopupMenuEx
RemoveMenu
EnableMenuItem
EnableWindow
GetWindow
VkKeyScanA
IsWindow
GetAsyncKeyState
MapVirtualKeyA
ToAscii
SendInput
SetClipboardViewer
GetClipboardOwner
WaitMessage
PostThreadMessageA
ChangeClipboardChain
SendNotifyMessageA
PeekMessageA
IsWindowVisible
LoadMenuA
GetIconInfo
GetClassNameA
WindowFromPoint
ChangeWindowMessageFilter
EnumDesktopWindows
SetRect
DrawIconEx
DestroyIcon
GetKeyboardState
mouse_event
PtInRect
MessageBeep
FlashWindow
EnumDisplaySettingsExA
EnumDisplayDevicesA
ChangeDisplaySettingsExA
GetKeyState
keybd_event
EnumDisplaySettingsA
EnumWindows
GetWindowLongA
SetWindowLongA
RedrawWindow
SetDlgItemInt
CheckDlgButton
GetDlgItemInt
IntersectRect
GetWindowRect
LoadStringA
ScreenToClient
GetScrollInfo
IsDlgButtonChecked
FillRect
MoveWindow
SetFocus
SendDlgItemMessageA
GetCursorPos
ExitWindowsEx
LockWorkStation
DrawIcon
SetLayeredWindowAttributes
UpdateWindow
InvalidateRect
GetMessageA
LoadImageA
DispatchMessageA
LoadCursorA
DestroyWindow
SetWindowPos
DrawTextA
SetWindowDisplayAffinity
AdjustWindowRect
DefWindowProcA
IsRectEmpty
CreateWindowExA
TranslateMessage
LoadIconA
GetClientRect
PostQuitMessage
RegisterClassExA
BeginPaint
EndPaint
wsprintfA
SystemParametersInfoA
GetWindowThreadProcessId
GetUserObjectInformationA
PostMessageA
RegisterWindowMessageA
FindWindowExA
OpenDesktopA
MessageBoxA
GetProcessWindowStation
FindWindowA
GetSystemMetrics
EndDialog
DialogBoxParamA
ShowWindow
GetDlgItemTextA
SetTimer
SetDlgItemTextA
SendMessageA
GetDlgItem
GetWindowLongPtrA
KillTimer
SetWindowLongPtrA
SetForegroundWindow
SetThreadDesktop
GetThreadDesktop
CloseDesktop
GetForegroundWindow
OpenInputDesktop
GetDesktopWindow
GetDC
ReleaseDC
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetTopWindow
OemToCharA
CharToOemA
wvsprintfA
SetWindowTextA
GetBitmapBits
SetDIBColorTable
GdiFlush
RealizePalette
SelectPalette
SetBkColor
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
DeleteObject
DeleteDC
GetPixel
GetDeviceCaps
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
BitBlt
CreateFontA
CreateDCA
CreateSolidBrush
Rectangle
CreatePen
SetBkMode
SetTextColor
GetClipBox
GetStockObject
StretchBlt
PatBlt
GetRgnBox
CombineRgn
PtInRegion
GetRegionData
CreateRectRgn
OffsetRgn
CreatePalette
SetRectRgn
SetSecurityInfo
RegCreateKeyA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
CreateServiceA
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
IsValidSid
IsValidSecurityDescriptor
GetKernelObjectSecurity
SetKernelObjectSecurity
IsValidAcl
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
QueryServiceStatus
RegDeleteKeyA
SetTokenInformation
LookupPrivilegeValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
DuplicateTokenEx
ImpersonateLoggedOnUser
EqualSid
AllocateAndInitializeSid
FreeSid
OpenProcessToken
RevertToSelf
CloseServiceHandle
OpenSCManagerA
GetUserNameA
LookupAccountSidA
OpenServiceA
GetTokenInformation
CreateProcessAsUserA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
ShellExecuteA
SHGetMalloc
Shell_NotifyIconA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
CoInitialize
CoCreateInstance
CoUninitialize
PathStripPathA
ImmGetDefaultIMEWnd
DwmIsCompositionEnabled
ord102
GetAdaptersInfo
adler32
adler32_combine
adler32_z
compress
compress2
compressBound
crc32
crc32_combine
crc32_final
crc32_init
crc32_update
crc32_z
deflate
deflateBound
deflateCopy
deflateEnd
deflateGetDictionary
deflateInit2_
deflateInit_
deflateParams
deflatePending
deflatePrime
deflateReset
deflateResetKeep
deflateSetDictionary
deflateSetHeader
deflateTune
get_crc_table
inflate
inflateCodesUsed
inflateCopy
inflateEnd
inflateGetDictionary
inflateGetHeader
inflateInit2_
inflateInit_
inflateMark
inflatePrime
inflateReset
inflateReset2
inflateResetKeep
inflateSetDictionary
inflateSync
inflateSyncPoint
inflateUndermine
inflateValidate
uncompress
uncompress2
zError
zlibCompileFlags
zlibVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdb
setsockopt
getsockopt
WSAGetLastError
gethostbyname
inet_ntoa
htons
htonl
WSACleanup
__WSAFDIsSet
accept
bind
WSAIoctl
closesocket
select
shutdown
listen
WSAStartup
getpeername
inet_addr
getsockname
send
socket
connect
recv
ntohl
WSASendTo
gethostname
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ExpandEnvironmentStringsForUserA
DestroyEnvironmentBlock
CreateEnvironmentBlock
WritePrivateProfileStringA
GetPrivateProfileStructA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileSectionA
CreateFileMappingA
Sleep
CreateThread
MulDiv
VerSetConditionMask
VerifyVersionInfoW
ReadFile
WriteFile
OutputDebugStringA
WaitForMultipleObjects
GetEnvironmentVariableA
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
SetCurrentDirectoryA
lstrcatW
LoadLibraryW
SetFileAttributesA
CreateEventA
WaitNamedPipeW
GetExitCodeProcess
ResumeThread
ResetEvent
CompareFileTime
CreateFileA
GetFileSize
GetFileTime
GetStdHandle
WriteConsoleA
FreeConsole
FormatMessageA
AllocConsole
GetExitCodeThread
MoveFileA
GetDriveTypeA
SetFileTime
SetErrorMode
SetFilePointer
SetEndOfFile
GetFileAttributesA
MoveFileExA
FileTimeToSystemTime
GetLogicalDriveStringsA
SystemTimeToFileTime
CreateDirectoryA
GetSystemTime
FlushFileBuffers
TerminateProcess
VirtualAllocEx
ReadProcessMemory
SetThreadExecutionState
VirtualFreeEx
TerminateThread
SizeofResource
FindResourceA
LockResource
LoadResource
CreateMutexA
ReleaseMutex
GlobalGetAtomNameA
GlobalDeleteAtom
GetModuleHandleW
SetProcessShutdownParameters
WinExec
WritePrivateProfileStructA
HeapReAlloc
RaiseException
FreeLibraryAndExitThread
ExitThread
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetCPInfo
SetStdHandle
SetFilePointerEx
ReadConsoleW
GetTimeZoneInformation
GetConsoleMode
GetConsoleOutputCP
GetModuleHandleExW
ExitProcess
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
RtlUnwind
EncodePointer
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateSemaphoreA
TlsFree
TlsGetValue
TlsAlloc
GetCurrentThread
DuplicateHandle
SetThreadPriority
ReleaseSemaphore
TlsSetValue
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SwitchToThread
GetFileType
lstrcatA
lstrcmpiA
lstrcpynA
DosDateTimeToFileTime
GetLocalTime
FileTimeToLocalFileTime
SetVolumeLabelA
LocalFileTimeToFileTime
GetVersion
GetLocaleInfoA
GetFullPathNameA
lstrcpyA
CompareStringW
LCMapStringW
GetLocaleInfoW
OpenProcess
FlsAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
DecodePointer
GetModuleFileNameW
GetStringTypeW
CreateDirectoryW
GetFileSizeEx
DeleteFileW
GetCurrentProcessId
WTSGetActiveConsoleSessionId
Process32FirstW
Process32Next
Process32NextW
GlobalAddAtomA
ProcessIdToSessionId
CreateToolhelp32Snapshot
Process32First
GetComputerNameA
GetSystemInfo
GetSystemDirectoryA
MapViewOfFile
OpenFileMappingA
UnmapViewOfFile
DeleteFileA
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
GetProcessTimes
GetSystemTimeAsFileTime
DeleteCriticalSection
GetModuleHandleA
InitializeCriticalSection
LeaveCriticalSection
GetCurrentProcess
EnterCriticalSection
CloseHandle
GetVersionExA
SetEvent
GetLastError
GetCurrentThreadId
OpenEventA
GetModuleFileNameA
GetTickCount
FreeLibrary
GetProcessHeap
GetProcAddress
HeapAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
lstrlenA
SetLastError
HeapFree
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GetFileAttributesExW
GlobalAlloc
GlobalSize
MultiByteToWideChar
SetFileAttributesW
MoveFileExW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
RemoveDirectoryW
HeapSize
WriteConsoleW
FlsGetValue
FlsSetValue
FlsFree
OpenThread
QueryPerformanceFrequency
LocalFree
SetThreadAffinityMask
InitializeCriticalSectionEx
GetVolumeInformationA
GetSubMenu
SetMenuDefaultItem
DestroyMenu
TrackPopupMenuEx
RemoveMenu
EnableMenuItem
EnableWindow
GetWindow
VkKeyScanA
IsWindow
GetAsyncKeyState
MapVirtualKeyA
ToAscii
SendInput
SetClipboardViewer
GetClipboardOwner
WaitMessage
PostThreadMessageA
ChangeClipboardChain
SendNotifyMessageA
PeekMessageA
IsWindowVisible
LoadMenuA
GetIconInfo
GetClassNameA
WindowFromPoint
ChangeWindowMessageFilter
EnumDesktopWindows
SetRect
DrawIconEx
DestroyIcon
GetKeyboardState
mouse_event
PtInRect
MessageBeep
FlashWindow
EnumDisplaySettingsExA
EnumDisplayDevicesA
ChangeDisplaySettingsExA
GetKeyState
keybd_event
EnumDisplaySettingsA
EnumWindows
GetWindowLongA
SetWindowLongA
RedrawWindow
SetDlgItemInt
CheckDlgButton
GetDlgItemInt
IntersectRect
GetWindowRect
LoadStringA
ScreenToClient
GetScrollInfo
IsDlgButtonChecked
FillRect
MoveWindow
SetFocus
SendDlgItemMessageA
GetCursorPos
ExitWindowsEx
LockWorkStation
DrawIcon
SetLayeredWindowAttributes
UpdateWindow
InvalidateRect
GetMessageA
LoadImageA
DispatchMessageA
LoadCursorA
DestroyWindow
SetWindowPos
DrawTextA
SetWindowDisplayAffinity
AdjustWindowRect
DefWindowProcA
IsRectEmpty
CreateWindowExA
TranslateMessage
LoadIconA
GetClientRect
PostQuitMessage
RegisterClassExA
BeginPaint
EndPaint
wsprintfA
SystemParametersInfoA
GetWindowThreadProcessId
GetUserObjectInformationA
PostMessageA
RegisterWindowMessageA
FindWindowExA
OpenDesktopA
MessageBoxA
GetProcessWindowStation
FindWindowA
GetSystemMetrics
EndDialog
DialogBoxParamA
ShowWindow
GetDlgItemTextA
SetTimer
SetDlgItemTextA
SendMessageA
GetDlgItem
GetWindowLongPtrA
KillTimer
SetWindowLongPtrA
SetForegroundWindow
SetThreadDesktop
GetThreadDesktop
CloseDesktop
GetForegroundWindow
OpenInputDesktop
GetDesktopWindow
GetDC
ReleaseDC
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetTopWindow
OemToCharA
CharToOemA
wvsprintfA
SetWindowTextA
GetBitmapBits
SetDIBColorTable
GdiFlush
RealizePalette
SelectPalette
SetBkColor
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
DeleteObject
DeleteDC
GetPixel
GetDeviceCaps
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
BitBlt
CreateFontA
CreateDCA
CreateSolidBrush
Rectangle
CreatePen
SetBkMode
SetTextColor
GetClipBox
GetStockObject
StretchBlt
PatBlt
GetRgnBox
CombineRgn
PtInRegion
GetRegionData
CreateRectRgn
OffsetRgn
CreatePalette
SetRectRgn
SetSecurityInfo
RegCreateKeyA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
CreateServiceA
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
IsValidSid
IsValidSecurityDescriptor
GetKernelObjectSecurity
SetKernelObjectSecurity
IsValidAcl
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
QueryServiceStatus
RegDeleteKeyA
SetTokenInformation
LookupPrivilegeValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
DuplicateTokenEx
ImpersonateLoggedOnUser
EqualSid
AllocateAndInitializeSid
FreeSid
OpenProcessToken
RevertToSelf
CloseServiceHandle
OpenSCManagerA
GetUserNameA
LookupAccountSidA
OpenServiceA
GetTokenInformation
CreateProcessAsUserA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
ShellExecuteA
SHGetMalloc
Shell_NotifyIconA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
CoInitialize
CoCreateInstance
CoUninitialize
PathStripPathA
ImmGetDefaultIMEWnd
DwmIsCompositionEnabled
ord102
GetAdaptersInfo
adler32
adler32_combine
adler32_z
compress
compress2
compressBound
crc32
crc32_combine
crc32_final
crc32_init
crc32_update
crc32_z
deflate
deflateBound
deflateCopy
deflateEnd
deflateGetDictionary
deflateInit2_
deflateInit_
deflateParams
deflatePending
deflatePrime
deflateReset
deflateResetKeep
deflateSetDictionary
deflateSetHeader
deflateTune
get_crc_table
inflate
inflateCodesUsed
inflateCopy
inflateEnd
inflateGetDictionary
inflateGetHeader
inflateInit2_
inflateInit_
inflateMark
inflatePrime
inflateReset
inflateReset2
inflateResetKeep
inflateSetDictionary
inflateSync
inflateSyncPoint
inflateUndermine
inflateValidate
uncompress
uncompress2
zError
zlibCompileFlags
zlibVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\Kyle\source\repos\Disable\Disable\obj\Release\Disable.pdb
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\Users\rudi\Desktop\git_ultravnc\winvnc\x64\Release\vnchooks.pdb
CreateFileW
OutputDebugStringW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
SetConsoleCtrlHandler
GetFileType
GetStdHandle
GetProcessHeap
MapViewOfFile
CreateFileMappingA
GlobalAddAtomA
CloseHandle
Sleep
GetModuleHandleA
UnmapViewOfFile
GlobalDeleteAtom
WriteFile
GetModuleFileNameA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
GetCurrentThread
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
RtlUnwind
GetUpdateRgn
SetPropA
GetWindowRect
IsWindowVisible
PostMessageA
CallNextHookEx
GetCursor
RemovePropA
PostThreadMessageA
ClientToScreen
SetWindowsHookExA
UnhookWindowsHookEx
GetPropA
EnumWindows
GetClientRect
FindWindowA
RegisterWindowMessageA
GetRegionData
DeleteObject
CreateRectRgn
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
HooksType
SetHooks
SetKeyboardFilterHook
SetMouseFilterHook
UnSetHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdb
setsockopt
getsockopt
WSAGetLastError
gethostbyname
inet_ntoa
htons
htonl
WSACleanup
__WSAFDIsSet
accept
bind
WSAIoctl
closesocket
select
shutdown
listen
WSAStartup
getpeername
inet_addr
getsockname
send
socket
connect
recv
ntohl
WSASendTo
gethostname
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ExpandEnvironmentStringsForUserA
DestroyEnvironmentBlock
CreateEnvironmentBlock
WritePrivateProfileStringA
GetPrivateProfileStructA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileSectionA
CreateFileMappingA
Sleep
CreateThread
MulDiv
VerSetConditionMask
VerifyVersionInfoW
ReadFile
WriteFile
OutputDebugStringA
WaitForMultipleObjects
GetEnvironmentVariableA
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
SetCurrentDirectoryA
lstrcatW
LoadLibraryW
SetFileAttributesA
CreateEventA
WaitNamedPipeW
GetExitCodeProcess
ResumeThread
ResetEvent
CompareFileTime
CreateFileA
GetFileSize
GetFileTime
GetStdHandle
WriteConsoleA
FreeConsole
FormatMessageA
AllocConsole
GetExitCodeThread
MoveFileA
GetDriveTypeA
SetFileTime
SetErrorMode
SetFilePointer
SetEndOfFile
GetFileAttributesA
MoveFileExA
FileTimeToSystemTime
GetLogicalDriveStringsA
SystemTimeToFileTime
CreateDirectoryA
GetSystemTime
FlushFileBuffers
TerminateProcess
VirtualAllocEx
ReadProcessMemory
SetThreadExecutionState
VirtualFreeEx
TerminateThread
SizeofResource
FindResourceA
LockResource
LoadResource
CreateMutexA
ReleaseMutex
GlobalGetAtomNameA
GlobalDeleteAtom
GetModuleHandleW
SetProcessShutdownParameters
WinExec
WritePrivateProfileStructA
HeapReAlloc
RaiseException
FreeLibraryAndExitThread
ExitThread
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetCPInfo
SetStdHandle
SetFilePointerEx
ReadConsoleW
GetTimeZoneInformation
GetConsoleMode
GetConsoleOutputCP
GetModuleHandleExW
ExitProcess
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
RtlUnwind
EncodePointer
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateSemaphoreA
TlsFree
TlsGetValue
TlsAlloc
GetCurrentThread
DuplicateHandle
SetThreadPriority
ReleaseSemaphore
TlsSetValue
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SwitchToThread
GetFileType
lstrcatA
lstrcmpiA
lstrcpynA
DosDateTimeToFileTime
GetLocalTime
FileTimeToLocalFileTime
SetVolumeLabelA
LocalFileTimeToFileTime
GetVersion
GetLocaleInfoA
GetFullPathNameA
lstrcpyA
CompareStringW
LCMapStringW
GetLocaleInfoW
OpenProcess
FlsAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
DecodePointer
GetModuleFileNameW
GetStringTypeW
CreateDirectoryW
GetFileSizeEx
DeleteFileW
GetCurrentProcessId
WTSGetActiveConsoleSessionId
Process32FirstW
Process32Next
Process32NextW
GlobalAddAtomA
ProcessIdToSessionId
CreateToolhelp32Snapshot
Process32First
GetComputerNameA
GetSystemInfo
GetSystemDirectoryA
MapViewOfFile
OpenFileMappingA
UnmapViewOfFile
DeleteFileA
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
GetProcessTimes
GetSystemTimeAsFileTime
DeleteCriticalSection
GetModuleHandleA
InitializeCriticalSection
LeaveCriticalSection
GetCurrentProcess
EnterCriticalSection
CloseHandle
GetVersionExA
SetEvent
GetLastError
GetCurrentThreadId
OpenEventA
GetModuleFileNameA
GetTickCount
FreeLibrary
GetProcessHeap
GetProcAddress
HeapAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
lstrlenA
SetLastError
HeapFree
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GetFileAttributesExW
GlobalAlloc
GlobalSize
MultiByteToWideChar
SetFileAttributesW
MoveFileExW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
RemoveDirectoryW
HeapSize
WriteConsoleW
FlsGetValue
FlsSetValue
FlsFree
OpenThread
QueryPerformanceFrequency
LocalFree
SetThreadAffinityMask
InitializeCriticalSectionEx
GetVolumeInformationA
GetSubMenu
SetMenuDefaultItem
DestroyMenu
TrackPopupMenuEx
RemoveMenu
EnableMenuItem
EnableWindow
GetWindow
VkKeyScanA
IsWindow
GetAsyncKeyState
MapVirtualKeyA
ToAscii
SendInput
SetClipboardViewer
GetClipboardOwner
WaitMessage
PostThreadMessageA
ChangeClipboardChain
SendNotifyMessageA
PeekMessageA
IsWindowVisible
LoadMenuA
GetIconInfo
GetClassNameA
WindowFromPoint
ChangeWindowMessageFilter
EnumDesktopWindows
SetRect
DrawIconEx
DestroyIcon
GetKeyboardState
mouse_event
PtInRect
MessageBeep
FlashWindow
EnumDisplaySettingsExA
EnumDisplayDevicesA
ChangeDisplaySettingsExA
GetKeyState
keybd_event
EnumDisplaySettingsA
EnumWindows
GetWindowLongA
SetWindowLongA
RedrawWindow
SetDlgItemInt
CheckDlgButton
GetDlgItemInt
IntersectRect
GetWindowRect
LoadStringA
ScreenToClient
GetScrollInfo
IsDlgButtonChecked
FillRect
MoveWindow
SetFocus
SendDlgItemMessageA
GetCursorPos
ExitWindowsEx
LockWorkStation
DrawIcon
SetLayeredWindowAttributes
UpdateWindow
InvalidateRect
GetMessageA
LoadImageA
DispatchMessageA
LoadCursorA
DestroyWindow
SetWindowPos
DrawTextA
SetWindowDisplayAffinity
AdjustWindowRect
DefWindowProcA
IsRectEmpty
CreateWindowExA
TranslateMessage
LoadIconA
GetClientRect
PostQuitMessage
RegisterClassExA
BeginPaint
EndPaint
wsprintfA
SystemParametersInfoA
GetWindowThreadProcessId
GetUserObjectInformationA
PostMessageA
RegisterWindowMessageA
FindWindowExA
OpenDesktopA
MessageBoxA
GetProcessWindowStation
FindWindowA
GetSystemMetrics
EndDialog
DialogBoxParamA
ShowWindow
GetDlgItemTextA
SetTimer
SetDlgItemTextA
SendMessageA
GetDlgItem
GetWindowLongPtrA
KillTimer
SetWindowLongPtrA
SetForegroundWindow
SetThreadDesktop
GetThreadDesktop
CloseDesktop
GetForegroundWindow
OpenInputDesktop
GetDesktopWindow
GetDC
ReleaseDC
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetTopWindow
OemToCharA
CharToOemA
wvsprintfA
SetWindowTextA
GetBitmapBits
SetDIBColorTable
GdiFlush
RealizePalette
SelectPalette
SetBkColor
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
DeleteObject
DeleteDC
GetPixel
GetDeviceCaps
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
BitBlt
CreateFontA
CreateDCA
CreateSolidBrush
Rectangle
CreatePen
SetBkMode
SetTextColor
GetClipBox
GetStockObject
StretchBlt
PatBlt
GetRgnBox
CombineRgn
PtInRegion
GetRegionData
CreateRectRgn
OffsetRgn
CreatePalette
SetRectRgn
SetSecurityInfo
RegCreateKeyA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
CreateServiceA
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
IsValidSid
IsValidSecurityDescriptor
GetKernelObjectSecurity
SetKernelObjectSecurity
IsValidAcl
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
QueryServiceStatus
RegDeleteKeyA
SetTokenInformation
LookupPrivilegeValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
DuplicateTokenEx
ImpersonateLoggedOnUser
EqualSid
AllocateAndInitializeSid
FreeSid
OpenProcessToken
RevertToSelf
CloseServiceHandle
OpenSCManagerA
GetUserNameA
LookupAccountSidA
OpenServiceA
GetTokenInformation
CreateProcessAsUserA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
ShellExecuteA
SHGetMalloc
Shell_NotifyIconA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
CoInitialize
CoCreateInstance
CoUninitialize
PathStripPathA
ImmGetDefaultIMEWnd
DwmIsCompositionEnabled
ord102
GetAdaptersInfo
adler32
adler32_combine
adler32_z
compress
compress2
compressBound
crc32
crc32_combine
crc32_final
crc32_init
crc32_update
crc32_z
deflate
deflateBound
deflateCopy
deflateEnd
deflateGetDictionary
deflateInit2_
deflateInit_
deflateParams
deflatePending
deflatePrime
deflateReset
deflateResetKeep
deflateSetDictionary
deflateSetHeader
deflateTune
get_crc_table
inflate
inflateCodesUsed
inflateCopy
inflateEnd
inflateGetDictionary
inflateGetHeader
inflateInit2_
inflateInit_
inflateMark
inflatePrime
inflateReset
inflateReset2
inflateResetKeep
inflateSetDictionary
inflateSync
inflateSyncPoint
inflateUndermine
inflateValidate
uncompress
uncompress2
zError
zlibCompileFlags
zlibVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ