Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Overview
overview
10Static
static
10021865faa3...bf.dll
windows7_x64
10021865faa3...bf.dll
windows10-2004_x64
1026de26ea18...ff.dll
windows7_x64
1026de26ea18...ff.dll
windows10-2004_x64
10305e8e14bc...f8.dll
windows7_x64
10305e8e14bc...f8.dll
windows10-2004_x64
1047ea7ae3c9...94.dll
windows7_x64
1047ea7ae3c9...94.dll
windows10-2004_x64
1051ab9788b9...77.dll
windows7_x64
1051ab9788b9...77.dll
windows10-2004_x64
10587547a79f...fd.dll
windows7_x64
10587547a79f...fd.dll
windows10-2004_x64
1058878537dc...14.dll
windows7_x64
1058878537dc...14.dll
windows10-2004_x64
106909c2801f...37.dll
windows7_x64
106909c2801f...37.dll
windows10-2004_x64
1069ac3f3a76...85.dll
windows7_x64
1069ac3f3a76...85.dll
windows10-2004_x64
106ce8fbedc5...f2.dll
windows7_x64
106ce8fbedc5...f2.dll
windows10-2004_x64
107a91436b7a...0c.dll
windows7_x64
107a91436b7a...0c.dll
windows10-2004_x64
108f5843efe1...d4.dll
windows7_x64
108f5843efe1...d4.dll
windows10-2004_x64
1098d07ae48b...0b.dll
windows7_x64
1098d07ae48b...0b.dll
windows10-2004_x64
109c5c2af628...c7.dll
windows7_x64
109c5c2af628...c7.dll
windows10-2004_x64
109e00cf7d03...0d.dll
windows7_x64
109e00cf7d03...0d.dll
windows10-2004_x64
109e7db9c87f...2b.dll
windows7_x64
109e7db9c87f...2b.dll
windows10-2004_x64
10Static task
static1
Behavioral task
behavioral1
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win7-20220310-en
Behavioral task
behavioral16
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win7-20220310-en
Behavioral task
behavioral20
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral21
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral25
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win7-20220310-en
Behavioral task
behavioral26
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win7-20220310-en
Behavioral task
behavioral30
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral31
Sample
9e7db9c87fc4374a2c88cc5f1bdc540205e161423010b2ee826b88b7b3503f2b.dll
Resource
win7-20220310-en
Target
5701246587142144.zip
Size
7.2MB
MD5
e1ec71ecb5d99295a40281144b04aa5f
SHA1
40a2ec5306e14d65f38b4653a01583a8f4a8297d
SHA256
863c95381f044af0f3c8a012cb8de00f0ef51e078602a880e1945e76fc869c4a
SHA512
9208287681d1d26ea974e19f17a016d9474224127d20692ccf97570a6be79e932f14f91f17f9b573caa4a9cc8f2828da4c9a9198a741eec4398fcb1345cc1298
qakbot
401.62
abc108m
1607356318
92.59.35.196:2083
2.89.122.180:995
78.181.19.134:443
5.193.175.76:2078
24.139.72.117:443
62.38.114.12:2222
2.51.240.250:995
174.62.13.151:443
189.210.115.207:443
71.197.126.250:443
187.7.236.197:995
187.149.126.53:443
96.247.180.108:443
174.55.197.4:443
187.190.250.175:443
24.206.4.203:2222
72.36.11.22:443
197.135.240.243:443
216.137.142.200:2222
160.3.184.253:443
186.189.208.238:443
84.232.252.202:2222
106.51.85.162:443
120.151.95.167:443
74.124.191.6:443
108.46.145.30:443
75.136.40.155:443
184.21.136.237:995
68.186.192.69:443
185.105.131.233:443
185.138.134.114:443
24.43.22.220:993
187.192.151.3:443
94.69.242.254:2222
141.193.83.107:443
187.213.105.132:995
93.113.177.152:443
151.27.88.197:443
97.69.160.4:2222
77.30.79.74:443
172.87.134.226:443
94.52.160.116:443
161.199.180.159:443
87.27.110.90:2222
86.162.13.35:2222
67.82.244.199:2222
185.163.221.77:2222
94.59.236.155:995
84.117.176.32:443
71.182.142.63:443
196.151.252.84:443
67.177.196.177:0
197.51.82.115:995
72.240.200.181:2222
105.198.236.101:443
81.214.126.173:2222
67.237.68.126:2222
185.125.151.138:443
197.45.110.165:995
149.28.101.90:443
73.32.115.251:443
196.204.207.111:443
109.115.125.81:50000
185.246.9.69:995
78.96.199.79:443
172.87.157.235:3389
72.36.59.46:2222
47.146.34.236:443
24.27.82.216:2222
24.95.61.62:443
73.55.254.225:443
24.179.13.119:443
32.212.117.188:443
87.218.53.206:2222
63.155.29.193:995
71.163.223.144:443
184.97.145.239:443
176.45.218.26:995
24.201.61.153:2078
151.33.226.156:443
78.101.158.1:61201
173.18.126.193:2222
90.101.62.189:2222
65.131.41.96:995
178.87.18.221:443
99.244.210.10:443
83.202.68.220:2222
80.195.103.146:2222
180.233.150.134:443
96.225.88.23:443
96.41.93.96:443
110.142.205.182:443
41.228.242.14:443
37.106.7.7:443
47.44.217.98:443
174.87.65.179:443
202.185.199.172:443
85.204.189.105:443
90.53.103.229:2222
86.122.248.164:2222
86.99.134.235:2222
164.155.230.98:443
208.99.100.129:443
216.201.162.158:443
193.83.25.177:995
80.106.85.24:2222
24.178.196.158:443
109.154.193.21:2222
172.78.30.215:443
67.141.11.98:443
80.14.22.234:2222
73.51.245.231:995
37.116.152.122:2078
96.40.175.33:443
2.90.124.155:995
70.45.219.126:443
193.248.154.174:2222
162.157.19.33:2222
189.252.62.238:995
109.205.204.229:2222
37.210.255.225:8443
78.132.96.100:6881
5.15.54.40:443
208.93.202.41:443
120.150.218.241:995
41.39.134.183:443
120.150.218.241:443
116.240.78.45:995
184.179.14.130:22
109.209.94.165:2222
109.93.245.93:995
199.116.241.147:443
83.114.243.80:2222
82.12.157.95:995
2.50.56.81:443
47.21.192.182:2222
78.97.207.104:443
98.240.24.57:443
77.211.30.202:995
184.98.97.227:995
79.113.119.125:443
93.146.133.102:2222
174.76.21.134:443
190.85.91.154:443
85.132.36.111:2222
96.21.251.127:2222
58.179.21.147:995
98.124.76.187:443
86.121.3.80:443
78.97.110.47:443
jHxastDcds)oMc=jvh7wdUhxcsdt2
qakbot
401.138
abc119
1611224824
106.51.52.111:443
83.110.12.140:2222
89.3.198.238:443
86.220.60.133:2222
45.77.115.208:8443
45.77.115.208:995
71.117.132.169:443
82.76.47.211:443
125.63.101.62:443
86.98.93.124:2078
178.152.70.12:995
78.97.207.104:443
77.27.174.49:995
173.70.165.101:995
64.121.114.87:443
188.24.128.253:443
89.137.211.239:995
80.227.5.70:443
81.97.154.100:443
98.121.187.78:443
42.3.8.54:443
31.5.21.66:995
80.7.129.64:995
84.72.35.226:443
188.25.63.105:443
140.82.49.12:443
216.201.162.158:443
2.50.2.216:443
75.136.40.155:443
79.129.252.62:2222
2.7.69.217:2222
51.9.198.164:2222
96.19.117.140:443
75.67.192.125:443
24.27.82.216:2222
105.198.236.99:443
95.77.223.148:443
97.69.160.4:2222
78.63.226.32:443
172.78.30.215:443
202.184.210.27:443
86.236.77.68:2222
197.161.154.132:443
105.198.236.101:443
41.205.16.179:443
85.132.36.111:2222
203.106.195.67:443
172.87.157.235:3389
193.248.221.184:2222
69.123.179.70:443
149.28.98.196:443
207.246.116.237:995
207.246.77.75:2222
207.246.116.237:2222
149.28.98.196:995
45.77.115.208:2222
207.246.77.75:995
149.28.99.97:443
149.28.99.97:2222
149.28.99.97:995
149.28.101.90:995
149.28.101.90:2222
149.28.101.90:8443
149.28.101.90:443
45.63.107.192:995
197.45.110.165:995
144.202.38.185:443
45.32.211.207:2222
45.32.211.207:443
45.32.211.207:8443
45.63.107.192:2222
207.246.77.75:8443
149.28.98.196:2222
45.77.115.208:443
45.32.211.207:995
207.246.77.75:443
45.63.107.192:443
207.246.116.237:443
144.202.38.185:995
207.246.116.237:8443
144.202.38.185:2222
173.21.10.71:2222
27.223.92.142:995
86.124.93.144:443
217.133.54.140:32100
95.76.27.6:443
106.250.150.98:443
94.53.92.42:443
69.47.239.10:443
47.208.8.187:443
71.14.110.199:443
75.136.26.147:443
71.74.12.34:443
96.37.113.36:993
76.111.128.194:443
202.188.138.162:443
74.68.144.202:443
180.222.161.85:443
70.168.130.172:995
201.143.95.254:443
201.127.5.175:443
76.25.142.196:443
67.165.206.193:993
50.244.112.106:443
90.175.88.99:2222
186.155.151.167:443
24.201.61.153:2078
80.106.85.24:2222
72.204.242.138:443
151.60.82.200:443
96.227.127.13:995
83.110.248.121:995
184.189.122.72:443
47.146.169.85:443
47.22.148.6:443
76.94.200.148:995
71.197.126.250:443
92.59.35.196:2222
190.85.91.154:443
189.237.7.9:443
71.187.170.235:443
79.129.121.81:995
12.5.37.4:995
81.88.254.62:443
189.210.115.207:443
67.6.91.75:443
83.110.108.181:2222
24.152.219.253:995
108.160.123.244:443
50.29.166.232:995
105.226.208.140:443
45.46.53.140:2222
142.129.227.86:443
68.225.60.77:995
184.179.14.130:22
196.151.252.84:443
78.96.168.18:443
72.240.200.181:2222
209.210.187.52:443
74.75.237.11:443
46.153.36.53:995
84.232.252.202:2222
24.43.22.218:993
71.182.142.63:443
31.215.69.207:443
68.186.192.69:443
98.116.21.115:443
72.252.201.69:443
151.205.102.42:443
172.87.134.226:995
jHxastDcds)oMc=jvh7wdUhxcsdt2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetACP
HeapSize
HeapReAlloc
GetProfileStringA
RaiseException
HeapAlloc
HeapFree
TerminateProcess
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
FormatMessageA
GetFileTime
GetFileSize
GetFileAttributesA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetErrorMode
GetOEMCP
GetCPInfo
GetThreadLocale
SizeofResource
GetProcessVersion
GetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
MulDiv
SetLastError
InterlockedDecrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
lstrlenA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LCMapStringA
lstrlenW
InvalidateRect
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
SetForegroundWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
CharNextA
GetWindowRect
CopyRect
GetDC
ReleaseDC
MapDialogRect
SetWindowPos
SetWindowContextHelpId
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
SetRect
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
LoadIconA
SendMessageA
DrawIcon
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
wsprintfA
GetDlgItemTextW
GetWindow
DestroyMenu
InflateRect
MessageBeep
GetForegroundWindow
GetNextDlgGroupItem
GetWindowLongA
SetDlgItemTextW
SetParent
ShowWindow
SetWindowRgn
EnableWindow
SetWindowLongA
MessageBoxW
IsIconic
GetSystemMetrics
DefDlgProcA
IsWindowUnicode
GetClientRect
LoadStringA
GetSysColorBrush
PtInRect
GetClassNameA
GetDesktopWindow
LoadCursorA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
GetDlgItemTextA
ModifyMenuA
CopyAcceleratorTableA
GetWindowPlacement
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SetViewportOrgEx
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
PatBlt
CreateBitmap
CreatePolygonRgn
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateRectRgn
ord8
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
SysAllocStringLen
SysFreeString
VariantClear
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysAllocStringByteLen
SysStringLen
SysAllocString
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualProtect
GetCurrentThread
CheckDlgButton
GetCursorInfo
CheckMenuRadioItem
GetCaretBlinkTime
CheckRadioButton
GetCapture
CheckMenuItem
CoCreateGuid
CoGetCurrentLogicalThreadId
CoFileTimeNow
OleUninitialize
CoGetContextToken
CoFreeUnusedLibraries
CoGetCurrentProcess
OleInitialize
LsaOpenTrustedDomain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
inet_ntoa
GetModuleFileNameExW
_time64
strtod
_HUGE
localeconv
strchr
strncpy
malloc
free
qsort
memcpy
memmove
memset
atol
_vsnwprintf
_snprintf
_vsnprintf
_strtoi64
memchr
_errno
lstrcmpA
lstrcpynA
GetCurrentProcess
GetCurrentThread
GetExitCodeThread
CreateMutexA
DuplicateHandle
GetLastError
lstrcatA
CreateDirectoryW
lstrlenA
DisconnectNamedPipe
lstrcpynW
GetProcessId
CopyFileW
lstrcatW
DeleteFileW
lstrcpyW
lstrcmpiW
CloseHandle
GetCurrentProcessId
GetDriveTypeW
GetModuleHandleA
lstrlenW
MoveFileW
GetProcAddress
SwitchToThread
InterlockedIncrement
SetThreadPriority
HeapAlloc
HeapFree
HeapCreate
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetSystemTimeAsFileTime
SetLastError
lstrcmpiA
LoadLibraryA
GetExitCodeProcess
CreatePipe
GetWindowsDirectoryW
FindFirstFileW
FindNextFileW
SetFileAttributesW
FlushFileBuffers
LocalAlloc
LoadLibraryW
GetTickCount
GetModuleFileNameW
GetSystemInfo
GetVersionExA
CreateWindowExA
CharUpperBuffW
CharUpperBuffA
GetSystemMetrics
RegisterClassExA
DestroyWindow
DefWindowProcA
UnregisterClassA
GetSidSubAuthority
OpenProcessToken
RegSetValueExW
RegQueryValueExW
IsTextUnicode
RegDeleteValueA
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegQueryInfoKeyW
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
LookupAccountNameW
LookupAccountSidW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
SafeArrayGetUBound
SysAllocString
SysFreeString
SafeArrayGetElement
SafeArrayDestroy
VariantClear
SafeArrayGetLBound
GetUserProfileDirectoryW
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteAtom
SetFilePointerEx
HeapCreate
ReleaseMutex
CreateMutexW
WaitForMultipleObjects
GetCurrentThreadId
CreateTimerQueue
GetSystemInfo
AddAtomW
CreateFileW
GetDlgItem
SetDlgItemInt
SetDlgItemTextA
GetDlgItemTextA
CheckDlgButton
CheckRadioButton
IsDlgButtonChecked
SendDlgItemMessageA
DefDlgProcA
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EnumClipboardFormats
EmptyClipboard
CharUpperA
CharLowerBuffA
SetFocus
GetActiveWindow
SetTimer
KillTimer
EnableWindow
LoadAcceleratorsA
DestroyAcceleratorTable
DialogBoxParamA
GetSystemMetrics
GetMenu
GetSystemMenu
CreatePopupMenu
DestroyMenu
CheckMenuItem
EnableMenuItem
GetSubMenu
AppendMenuA
RemoveMenu
TrackPopupMenu
InsertMenuItemA
SetMenuItemInfoA
SetActiveWindow
InvalidateRect
RedrawWindow
SetWindowTextA
GetWindowTextA
GetClientRect
GetWindowRect
MessageBoxA
SetCursor
GetCursorPos
ClientToScreen
ChildWindowFromPoint
GetSysColor
GetSysColorBrush
GetWindowLongA
SetWindowLongA
FindWindowA
CheckMenuRadioItem
LoadCursorA
DestroyCursor
LoadIconA
DestroyIcon
IsDialogMessageA
CreateDialogParamA
SetWindowPlacement
GetWindowPlacement
SetWindowPos
MoveWindow
DestroyWindow
IsMenu
IsWindow
GetClassInfoA
UnregisterClassA
RegisterClassA
CallWindowProcA
PostQuitMessage
PostMessageA
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
wvsprintfA
EndDialog
TranslateAcceleratorA
SelectObject
SetBkMode
SetTextColor
GetObjectA
DeleteObject
GetStockObject
CreateFontIndirectA
GetOpenFileNameA
GetSaveFileNameA
RegSetValueA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
GetUserNameA
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
GetUserProfileDirectoryW
GetProfilesDirectoryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualProtect
GetCurrentThread
lstrcmpA
SetWindowPos
ShowCursor
ShowWindow
CoCreateGuid
OleUninitialize
CoFreeUnusedLibraries
CoGetCurrentProcess
CoGetCurrentLogicalThreadId
CoFileTimeNow
CoGetContextToken
OleInitialize
GdiGetBitmapBitsSize
SystemFunction003
FindFileInPath
AlphaBlend
GetFileVersionInfoSizeA
auxGetVolume
AddPortW
GetEffectiveClientRect
OleUIPromptUserW
GetFileTitleA
GdipImageSelectActiveFrame
SHFileOperationA
SHRegSetUSValueA
SysAllocString
GetClass
SetClass
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetACP
HeapSize
HeapReAlloc
GetProfileStringA
RaiseException
HeapAlloc
HeapFree
TerminateProcess
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
FormatMessageA
GetFileTime
GetFileSize
GetFileAttributesA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetErrorMode
GetOEMCP
GetCPInfo
GetThreadLocale
SizeofResource
GetProcessVersion
GetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
MulDiv
SetLastError
InterlockedDecrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
lstrlenA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LCMapStringA
lstrlenW
InvalidateRect
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
SetForegroundWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
CharNextA
GetWindowRect
CopyRect
GetDC
ReleaseDC
MapDialogRect
SetWindowPos
SetWindowContextHelpId
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
SetRect
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
LoadIconA
SendMessageA
DrawIcon
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
wsprintfA
GetDlgItemTextW
GetWindow
DestroyMenu
InflateRect
MessageBeep
GetForegroundWindow
GetNextDlgGroupItem
GetWindowLongA
SetDlgItemTextW
SetParent
ShowWindow
SetWindowRgn
EnableWindow
SetWindowLongA
MessageBoxW
IsIconic
GetSystemMetrics
DefDlgProcA
IsWindowUnicode
GetClientRect
LoadStringA
GetSysColorBrush
PtInRect
GetClassNameA
GetDesktopWindow
LoadCursorA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
GetDlgItemTextA
ModifyMenuA
CopyAcceleratorTableA
GetWindowPlacement
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SetViewportOrgEx
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
PatBlt
CreateBitmap
CreatePolygonRgn
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateRectRgn
ord8
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
SysAllocStringLen
SysFreeString
VariantClear
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysAllocStringByteLen
SysStringLen
SysAllocString
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetVolumeInformationW
TlsSetValue
RemoveDirectoryW
GetTempPathW
CreateFileW
GetVersionExW
GetSystemDirectoryW
FindFirstChangeNotificationW
OpenProcess
TlsAlloc
FindResourceW
GetCurrentDirectoryW
VirtualProtectEx
GetWindowsDirectoryW
GetModuleHandleW
GetSystemTime
QueryPerformanceCounter
GetDateFormatW
WriteConsoleW
SetEndOfFile
HeapReAlloc
HeapSize
GetStringTypeW
ReadConsoleW
ReadFile
SetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
HeapFree
CloseHandle
HeapAlloc
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
DecodePointer
socket
getprotobynumber
send
WSAStartup
htons
recvfrom
getservbyname
setsockopt
getservbyport
recv
ntohs
WSACleanup
getsockopt
OpenPrinterW
GetPrinterW
ClosePrinter
DocumentPropertiesW
DeletePrinterConnectionW
EnumPrintersW
Black
Bloodbroad
Callnation
Foresthome
JumpCreate
Lightwind
Rockline
Subtractmost
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
inet_ntoa
GetModuleFileNameExW
_time64
strtod
_HUGE
localeconv
strchr
strncpy
malloc
free
qsort
memcpy
memmove
memset
atol
_vsnwprintf
_snprintf
_vsnprintf
_strtoi64
memchr
_errno
lstrcmpA
lstrlenA
lstrcpynA
GetCurrentProcess
GetCurrentThread
MultiByteToWideChar
GetExitCodeThread
GetOEMCP
CreateMutexA
DuplicateHandle
GetCurrentProcessId
GetLastError
lstrcatA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
CopyFileW
lstrcatW
DeleteFileW
lstrcpyW
lstrcmpiW
CloseHandle
GetDriveTypeW
GetModuleHandleA
lstrlenW
MoveFileW
GetProcAddress
SwitchToThread
InterlockedIncrement
SetThreadPriority
HeapAlloc
HeapFree
HeapCreate
WideCharToMultiByte
FreeLibrary
GetSystemTimeAsFileTime
SetLastError
lstrcmpiA
LoadLibraryA
GetExitCodeProcess
CreatePipe
GetWindowsDirectoryW
FindFirstFileW
FindNextFileW
SetFileAttributesW
FlushFileBuffers
LocalAlloc
LoadLibraryW
GetTickCount
GetModuleFileNameW
GetSystemInfo
GetVersionExA
CreateWindowExA
CharUpperBuffW
CharUpperBuffA
GetSystemMetrics
RegisterClassExA
DestroyWindow
DefWindowProcA
UnregisterClassA
GetSidSubAuthority
OpenProcessToken
RegSetValueExW
RegQueryValueExW
IsTextUnicode
RegDeleteValueA
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegQueryInfoKeyW
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
LookupAccountNameW
LookupAccountSidW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
SafeArrayGetUBound
SysAllocString
SysFreeString
SafeArrayGetElement
SafeArrayDestroy
VariantClear
SafeArrayGetLBound
GetUserProfileDirectoryW
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualProtect
GetCurrentThread
lstrcmpA
SetWindowPos
ShowCursor
ShowWindow
CoCreateGuid
OleUninitialize
CoFreeUnusedLibraries
CoGetCurrentProcess
CoGetCurrentLogicalThreadId
CoFileTimeNow
CoGetContextToken
OleInitialize
GdiGetBitmapBitsSize
SystemFunction003
FindFileInPath
AlphaBlend
GetFileVersionInfoSizeA
auxGetVolume
AddPortW
GetEffectiveClientRect
OleUIPromptUserW
GetFileTitleA
GdipImageSelectActiveFrame
SHFileOperationA
SHRegSetUSValueA
SysAllocString
GetClass
SetClass
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualProtect
GetCurrentThread
lstrcmpA
CreateTapePartition
MapAndLoad
FindFileInSearchPath
SymSetContext
FindTextW
GetICMProfileA
FrameRgn
GetStretchBltMode
FreeMRUList
VerFindFileA
GetFileVersionInfoA
SafeArraySetRecordInfo
VarI8FromUI8
OleUIChangeIconA
OleUIChangeSourceW
LoadMenuIndirectA
RestartDialogEx
StrStrIA
CreatePrivateObjectSecurityEx
GetAclInformation
midiStreamPause
IID_IAccessible
AccessibleChildren
ComPs_NdrDllGetClassObject
DllGetClassObject
CoDeactivateObject
DllRegisterServer
DllInitialize
StrFromTimeIntervalA
AddPrinterDriverA
FreePrinterNotifyInfo
GetClass
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualProtect
GetCurrentThread
lstrcmpA
SetWindowPos
ShowCursor
ShowWindow
CoCreateGuid
OleUninitialize
CoFreeUnusedLibraries
CoGetCurrentProcess
CoGetCurrentLogicalThreadId
CoFileTimeNow
CoGetContextToken
OleInitialize
GdiGetBitmapBitsSize
SystemFunction003
FindFileInPath
AlphaBlend
GetFileVersionInfoSizeA
auxGetVolume
AddPortW
GetEffectiveClientRect
OleUIPromptUserW
GetFileTitleA
GdipImageSelectActiveFrame
SHFileOperationA
SHRegSetUSValueA
SysAllocString
GetClass
SetClass
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetVersion
LoadLibraryA
VirtualAlloc
VirtualProtect
GetProcAddress
lstrlenA
lstrcatA
SymGetLinePrev64
GdipIsEmptyRegion
FreeEncryptionCertificateHashList
DllRegister
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
CN=Trade in Brasil s.r.o.,O=Trade in Brasil s.r.o.,L=mestská časť Nové Mesto,ST=Bratislavský kraj,C=SK
CN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
CN=Trade in Brasil s.r.o.,O=Trade in Brasil s.r.o.,L=mestská časť Nové Mesto,ST=Bratislavský kraj,C=SK
CN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
CN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptDestroyKey
CryptEncrypt
CryptGetHashParam
CryptHashData
CryptImportKey
CryptReleaseContext
AbortDoc
BitBlt
ChoosePixelFormat
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
CreateFontW
CreatePatternBrush
CreateSolidBrush
DeleteDC
DeleteObject
EndDoc
EndPage
GetCharABCWidthsW
GetCharWidth32W
GetClipBox
GetDeviceCaps
GetObjectW
GetStockObject
GetTextFaceW
GetTextMetricsW
RestoreDC
SaveDC
SelectObject
SetBkColor
SetBkMode
SetDIBits
SetMapMode
SetPixelFormat
SetStretchBltMode
SetTextColor
StartDocW
StartPage
StretchBlt
SwapBuffers
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateMutexW
CreateProcessA
CreateProcessW
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExpandEnvironmentStringsA
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetFullPathNameW
GetHandleInformation
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalSize
GlobalUnlock
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
MultiByteToWideChar
OpenProcess
OutputDebugStringA
PeekNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SetEvent
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SleepEx
SuspendThread
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VerSetConditionMask
VerifyVersionInfoA
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_beginthreadex
_cexit
_chdir
_chmod
_close
_endthreadex
_errno
_findclose
_findfirst
_findnext
_fstati64
_fullpath
_getcwd
_initterm
_iob
_lock
_lseeki64
_mkdir
_onexit
_open
_putws
_putenv
_rmdir
_read
_setjmp3
_stat
_stati64
_strdup
_sys_nerr
_ultoa
_unlock
_utime
_vsnprintf
_vsnwprintf
_wchdir
_wchmod
_wfindfirst
_wfindnext
_wfopen
_wfullpath
_wgetcwd
_wgetenv
_wmkdir
_wputenv
_wremove
_wrename
_wrmdir
_write
_wstat
abort
atof
atoi
calloc
exit
fclose
feof
ferror
fflush
fgets
fgetwc
fopen
fprintf
fputc
fputs
fputws
fread
free
fseek
ftell
fwrite
getc
getchar
getenv
gmtime
isalnum
isalpha
isgraph
islower
isprint
isspace
isupper
isxdigit
rename
mktime
localtime
localeconv
longjmp
malloc
memchr
memcmp
memcpy
memmove
memset
printf
puts
qsort
rand
realloc
remove
srand
setlocale
signal
strchr
strcmp
strcpy
strerror
strftime
strlen
strncmp
strncpy
strpbrk
strrchr
strstr
strtol
strtoul
time
tolower
toupper
ungetc
vfprintf
wcscat
wcscpy
wcslen
IIDFromString
OleCreate
OleInitialize
OleSetContainedObject
SysAllocString
SysAllocStringLen
SysFreeString
DragAcceptFiles
DragFinish
DragQueryFileW
DragQueryPoint
SHBrowseForFolderA
SHBrowseForFolderW
SHGetPathFromIDListA
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteW
Shell_NotifyIconW
AdjustWindowRect
AdjustWindowRectEx
AppendMenuW
BeginDeferWindowPos
CallNextHookEx
CallWindowProcA
CallWindowProcW
ChangeDisplaySettingsA
CheckMenuItem
ClientToScreen
CloseClipboard
CopyImage
CopyRect
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExA
CreateWindowExW
DefDlgProcW
DefWindowProcA
DefWindowProcW
DeferWindowPos
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageA
DrawFocusRect
DrawFrameControl
DrawMenuBar
DrawTextW
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EnumChildWindows
EnumDisplaySettingsA
EnumWindows
FillRect
FrameRect
GetActiveWindow
GetClassLongW
GetClassNameW
GetClientRect
GetClipboardData
GetCursor
GetCursorPos
GetDC
GetDesktopWindow
GetFocus
GetForegroundWindow
GetKeyState
GetMenu
GetMenuItemCount
GetParent
GetScrollPos
GetSysColor
GetSystemMetrics
GetUpdateRect
GetWindowInfo
GetWindowLongA
GetWindowLongW
GetWindowModuleFileNameW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageA
IsIconic
IsRectEmpty
IsZoomed
LoadCursorA
LoadCursorW
LoadIconW
MessageBoxA
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostMessageW
PostThreadMessageA
RedrawWindow
RegisterClassA
RegisterClassExA
RegisterClassExW
RegisterClassW
RegisterHotKey
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetMenu
SetMenuInfo
SetMenuItemBitmaps
SetMenuItemInfoW
SetScrollPos
SetWindowLongA
SetWindowLongW
SetWindowPos
SetWindowTextW
SetWindowsHookExA
SetWindowsHookExW
ShowCursor
ShowWindow
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
UnregisterHotKey
ValidateRect
timeBeginPeriod
timeEndPeriod
timeGetTime
timeKillEvent
timeSetEvent
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualProtect
GetCurrentThread
CheckDlgButton
GetCursorInfo
CheckMenuRadioItem
GetCaretBlinkTime
CheckRadioButton
GetCapture
CheckMenuItem
CoCreateGuid
CoGetCurrentLogicalThreadId
CoFileTimeNow
OleUninitialize
CoGetContextToken
CoFreeUnusedLibraries
CoGetCurrentProcess
OleInitialize
LsaOpenTrustedDomain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
CN=Protover LLC,O=Protover LLC,L=Moscow,C=RU
CN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
CN=Protover LLC,O=Protover LLC,L=Moscow,C=RU
CN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
CN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ