Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
10Static
static
10PKSJ Malwa...87.exe
windows7-x64
1PKSJ Malwa...87.exe
windows10-2004-x64
3PKSJ Malwa...4d.exe
windows7-x64
8PKSJ Malwa...4d.exe
windows10-2004-x64
8PKSJ Malwa...c9.xls
windows7-x64
10PKSJ Malwa...c9.xls
windows10-2004-x64
10PKSJ Malwa...f9.doc
windows7-x64
10PKSJ Malwa...f9.doc
windows10-2004-x64
10PKSJ Malwa...30.pdf
windows7-x64
1PKSJ Malwa...30.pdf
windows10-2004-x64
1PKSJ Malwa...8d.exe
windows7-x64
1PKSJ Malwa...8d.exe
windows10-2004-x64
1PKSJ Malwa...fa.exe
windows7-x64
1PKSJ Malwa...fa.exe
windows10-2004-x64
3PKSJ Malwa...c8.doc
windows7-x64
10PKSJ Malwa...c8.doc
windows10-2004-x64
10PKSJ Malwa...03.doc
windows7-x64
1PKSJ Malwa...03.doc
windows10-2004-x64
1PKSJ Malwa...40.pdf
windows7-x64
1PKSJ Malwa...40.pdf
windows10-2004-x64
1PKSJ Malwa...4e.doc
windows7-x64
1PKSJ Malwa...4e.doc
windows10-2004-x64
1PKSJ Malwa...cd.pdf
windows7-x64
1PKSJ Malwa...cd.pdf
windows10-2004-x64
1PKSJ Malwa...7b.exe
windows7-x64
10PKSJ Malwa...7b.exe
windows10-2004-x64
10PKSJ Malwa...82.exe
windows7-x64
1PKSJ Malwa...82.exe
windows10-2004-x64
3PKSJ Malwa...6f.doc
windows7-x64
10PKSJ Malwa...6f.doc
windows10-2004-x64
10PKSJ Malwa...d2.doc
windows7-x64
1PKSJ Malwa...d2.doc
windows10-2004-x64
1Behavioral task
behavioral1
Sample
PKSJ Malware/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PKSJ Malware/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
PKSJ Malware/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
PKSJ Malware/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
PKSJ Malware/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
PKSJ Malware/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
PKSJ Malware/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
PKSJ Malware/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
PKSJ Malware/2/VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
PKSJ Malware/2/VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
PKSJ Malware/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
PKSJ Malware/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
PKSJ Malware/2/VirusShare_2fe5b00079aec2d8369a798230313ec8.doc
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
PKSJ Malware/2/VirusShare_2fe5b00079aec2d8369a798230313ec8.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
PKSJ Malware/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103.doc
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
PKSJ Malware/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
PKSJ Malware/2/VirusShare_480ef02bb062a57724e1b3e14532a140.pdf
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
PKSJ Malware/2/VirusShare_480ef02bb062a57724e1b3e14532a140.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
PKSJ Malware/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
PKSJ Malware/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
PKSJ Malware/3/VirusShare_4675e87be15585e66b0c88b833dd9ecd.pdf
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
PKSJ Malware/3/VirusShare_4675e87be15585e66b0c88b833dd9ecd.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
PKSJ Malware/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
PKSJ Malware/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
PKSJ Malware/3/VirusShare_5c8b670c503455baafbff400a446cf82.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
PKSJ Malware/3/VirusShare_5c8b670c503455baafbff400a446cf82.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
PKSJ Malware/3/VirusShare_6ad036ba93c94d6976e2d93c7a3aec6f.doc
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
PKSJ Malware/3/VirusShare_6ad036ba93c94d6976e2d93c7a3aec6f.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
PKSJ Malware/4/VirusShare_4b8eb7fe75f72c1c5c1f80af9cd165d2.doc
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
PKSJ Malware/4/VirusShare_4b8eb7fe75f72c1c5c1f80af9cd165d2.doc
Resource
win10v2004-20220812-en
Target
PKSJ Malware.zip
Size
13.0MB
MD5
f364e0c7d99f303101114aa5affa3312
SHA1
1663193c0b5fd858307a7d8ae5be9c823d7244e9
SHA256
3a0f0986193d0dc5e03ca1229e2509287593c03247e32bb5424009bc35e80738
SHA512
7b7b82a2a9ba7eb180893e59f8ca251bc15b7dfb1096a513cb8f75b710e5bf12d8d3552e5ad4e24df067ed898f74a051bc8389f0855712b645ae98f967c2d691
SSDEEP
393216:jBMytqydJ/P6ucYTPZN91ZwBxF+CFa93lgf1:jaDyf/PFN91ZuIW9
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
512
256
768
256
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
GET
POST
255
\\%s\pipe\msagent_%x
5000
443
%windir%\syswow64\rundll32.exe
%windir%\sysnative\rundll32.exe
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
4096
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
/N4215/adj/amzn.us.sr.aps
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
0
trickbot
1000501
ono33
5.182.210.226:443
5.182.210.120:443
185.65.202.183:443
212.80.217.243:443
85.143.218.249:443
194.5.250.178:443
198.15.119.121:443
107.175.87.142:443
185.14.31.72:443
188.165.62.2:443
194.5.250.179:443
198.15.119.71:443
185.14.29.4:443
185.99.2.202:443
192.3.193.162:443
89.191.234.89:443
195.54.32.12:443
31.131.21.30:443
5.34.177.194:443
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
181.129.134.18:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
114.8.133.71:449
119.252.165.75:449
121.100.19.18:449
202.29.215.114:449
180.180.216.177:449
171.100.142.238:449
186.232.91.240:449
181.196.207.202:449
Detects the reflective loader used by Cobalt Strike.
Processes:
resource | yara_rule |
---|---|
static1/unpack001/PKSJ Malware/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287 | cobalt_reflective_dll |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/PKSJ Malware/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287 | xmrig |
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource | yara_rule |
---|---|
static1/unpack001/PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9 | office_macro_on_action |
static1/unpack001/PKSJ Malware/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103 | office_macro_on_action |
static1/unpack001/PKSJ Malware/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e | office_macro_on_action |
static1/unpack001/PKSJ Malware/4/VirusShare_4b8eb7fe75f72c1c5c1f80af9cd165d2 | office_macro_on_action |
static1/unpack001/PKSJ Malware/5/VirusShare_067c4f4a0dc9cbf4829faba0173b2716 | office_macro_on_action |
static1/unpack001/PKSJ Malware/5/VirusShare_9f644bd37d57a34bc92336111209e3ed | office_macro_on_action |
static1/unpack001/PKSJ Malware/6/VirusShare_26bac03db47a2a447c72096d28cf20d8 | office_macro_on_action |
Processes:
resource |
---|
static1/unpack001/PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9 |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/PKSJ Malware/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d | upx |
AutoIT scripts compiled to PE executables.
Processes:
resource | yara_rule |
---|---|
static1/unpack001/PKSJ Malware/6/VirusShare_7d1689a52a3c7d32b8b7d728bbe3efa2 | autoit_exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetKeyboardType
LoadStringW
MessageBoxA
CharNextW
CreateWindowExW
TranslateMessage
SetWindowLongW
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
GetSystemMetrics
ExitWindowsEx
DispatchMessageW
DestroyWindow
CharUpperBuffW
CallWindowProcW
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
SizeofResource
SignalObjectAndWait
SetLastError
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResetEvent
RemoveDirectoryW
ReadFile
MultiByteToWideChar
LockResource
LoadResource
LoadLibraryW
LeaveCriticalSection
InitializeCriticalSection
GetWindowsDirectoryW
GetVersionExW
GetUserDefaultLangID
GetThreadLocale
GetSystemInfo
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileSize
GetFileAttributesW
GetExitCodeProcess
GetEnvironmentVariableW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentProcess
GetCommandLineW
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindResourceW
EnumCalendarInfoW
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateProcessW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
Sleep
InitCommonControls
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord666
ord595
ord596
ord525
EVENT_SINK_AddRef
ord568
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord710
ProcCallEngine
ord646
ord571
ord575
ord100
ord689
ord541
ord544
ord545
ord546
ord547
ord580
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWsChangesEx
GetMappedFileNameW
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcessModulesEx
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
ExitProcess
GetModuleFileNameA
GetStdHandle
GetFileType
SetStdHandle
QueryPerformanceFrequency
VirtualQuery
GetSystemInfo
HeapQueryInformation
GetCommandLineW
GetCommandLineA
EnumSystemLocalesW
FreeLibraryAndExitThread
ExitThread
CreateThread
InterlockedFlushSList
RtlUnwind
GetCPInfo
LCMapStringW
GetStringTypeW
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
GetTimeZoneInformation
SetFilePointerEx
GetModuleHandleExW
GetConsoleMode
WriteConsoleW
SetConsoleCtrlHandler
SetEnvironmentVariableW
SizeofResource
ReadConsoleW
GetConsoleCP
FindFirstFileExA
FindFirstFileExW
FindNextFileA
LockResource
LoadResource
FindResourceW
MultiByteToWideChar
FindNextFileW
Sleep
CloseHandle
TerminateThread
ResumeThread
GetExitCodeThread
CreateFileW
WriteFile
GetTempPathW
GetShortPathNameW
GetLastError
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateFileA
GetFileSize
ReadFile
SetLastError
RemoveDirectoryW
LoadLibraryW
GetProcAddress
FreeLibrary
InterlockedDecrement
GetVolumeInformationW
WideCharToMultiByte
FindFirstVolumeW
GetModuleFileNameW
CreateDirectoryW
GetFileAttributesW
GetExitCodeProcess
lstrlenW
WaitForSingleObject
MulDiv
ResetEvent
SetEvent
GetPrivateProfileSectionW
GetPrivateProfileStringW
LocalFree
GetPrivateProfileIntW
WritePrivateProfileStringW
BackupRead
DebugActiveProcess
DnsHostnameToComputerNameW
EnumTimeFormatsW
FlsAlloc
GetCommState
GetDurationFormatEx
GetSystemDefaultLocaleName
GetTempFileNameW
GetThreadPreferredUILanguages
LocalLock
OpenMutexA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObjectEx
LocalUnlock
GetUserDefaultLCID
ReplaceFileW
GetDiskFreeSpaceW
GetProfileIntW
GetTickCount
FindResourceExW
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
SetErrorMode
SystemTimeToTzSpecificLocalTime
SetFileAttributesW
GetFileTime
GetFileSizeEx
GetFileAttributesExW
FileTimeToLocalFileTime
VirtualProtect
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
CompareStringW
lstrcpyW
GlobalFlags
LocalReAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
SetLocaleInfoW
CopyFileW
SetThreadpoolThreadMaximum
SetWaitableTimer
FileTimeToSystemTime
CompareStringA
GetVersionExW
GetCurrentThread
GetAtomNameW
GlobalGetAtomNameW
CreateSemaphoreW
WaitForMultipleObjects
CreateMutexW
ReleaseMutex
ReleaseSemaphore
lstrcmpA
GetStringTypeExW
MoveFileW
lstrcmpiW
DuplicateHandle
UnlockFile
SetEndOfFile
LockFile
GetFullPathNameW
FlushFileBuffers
FindFirstFileW
FindClose
DeleteFileW
GetThreadLocale
SuspendThread
SetThreadPriority
GlobalFindAtomW
GlobalAddAtomW
LoadLibraryA
lstrcmpW
GlobalDeleteAtom
LoadLibraryExW
GetSystemDirectoryW
GetCurrentThreadId
EncodePointer
GetCurrentProcessId
GetModuleHandleA
OutputDebugStringA
FormatMessageW
GlobalSize
GlobalAlloc
GetLongPathNameW
LocalAlloc
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
HeapDestroy
DecodePointer
RaiseException
HeapReAlloc
HeapSize
ExpandEnvironmentStringsW
SearchPathW
SetFilePointer
GetProcessId
CreateEventW
GlobalUnlock
GlobalLock
FreeResource
GlobalFree
OpenProcess
AssignProcessToJobObject
CreateJobObjectW
GetDriveTypeW
GetLogicalDrives
HeapFree
GetProcessHeap
HeapAlloc
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
WritePrivateProfileSectionW
GetCurrentProcess
SetUnhandledExceptionFilter
WriteConsoleA
TlsAlloc
RtlCaptureContext
GetMenuDefaultItem
MessageBeep
GetNextDlgGroupItem
DeleteMenu
WaitMessage
InvalidateRgn
CopyAcceleratorTableW
GetAsyncKeyState
CopyImage
SystemParametersInfoW
GetMenuItemInfoW
DestroyMenu
TrackMouseEvent
GetDialogBaseUnits
RealChildWindowFromPoint
GetSysColorBrush
ShowOwnedPopups
MapDialogRect
SetWindowContextHelpId
PostQuitMessage
MsgWaitForMultipleObjectsEx
CharUpperW
MapVirtualKeyW
GetKeyNameTextW
IntersectRect
CharNextW
TranslateMessage
GetMessageW
LoadMenuW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMonitorInfoW
DefMDIChildProcW
TranslateMDISysAccel
SubtractRect
SendNotifyMessageW
MonitorFromRect
WinHelpW
GetScrollInfo
EnableScrollBar
UnhookWindowsHookEx
SetWindowsHookExW
GetClassLongW
EqualRect
AdjustWindowRectEx
RemovePropW
GetPropW
SetPropW
ShowScrollBar
GetScrollRange
SetScrollRange
SetScrollPos
ScrollWindow
ValidateRect
TrackPopupMenuEx
SetMenu
GetMenu
IsIconic
SetWindowPlacement
GetWindowPlacement
IsChild
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
InSendMessage
PeekMessageW
DispatchMessageW
IsDialogMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
ScrollWindowEx
GetFocus
SetFocus
GetDlgCtrlID
SendDlgItemMessageW
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
GetDlgItemTextW
HideCaret
InvertRect
NotifyWinEvent
EnumDisplayMonitors
SetClassLongW
SetParent
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
DrawEdge
DrawFrameControl
IsZoomed
GetSystemMenu
BringWindowToTop
SetCursorPos
CopyIcon
DrawIcon
RegisterClipboardFormatW
LoadAcceleratorsW
TranslateAcceleratorW
GetMenuBarInfo
UnpackDDElParam
ReuseDDElParam
UnionRect
UpdateLayeredWindow
MonitorFromPoint
GetComboBoxInfo
PostThreadMessageW
GetKeyboardLayout
IsCharLowerW
MapVirtualKeyExW
ToUnicodeEx
GetKeyboardState
CreateAcceleratorTableW
DestroyAcceleratorTable
LockWindowUpdate
SetMenuDefaultItem
GetDoubleClickTime
ModifyMenuW
CharUpperBuffW
IsClipboardFormatAvailable
EnumChildWindows
SetScrollInfo
DrawMenuBar
GetWindowRect
SetWindowLongW
GetWindowLongW
ShowWindow
LoadCursorW
GetClientRect
FillRect
InvalidateRect
EnableWindow
MoveWindow
IsWindowVisible
GetParent
PostMessageW
MessageBoxW
LoadIconW
SendMessageW
SetTimer
KillTimer
DestroyIcon
DestroyCursor
LoadImageW
GetIconInfo
RedrawWindow
LoadBitmapW
GetActiveWindow
GetCapture
SetCapture
ClientToScreen
WindowFromPoint
ReleaseCapture
CopyRect
FrameRect
InflateRect
GetSysColor
OffsetRect
DrawStateW
DrawFocusRect
SetCursor
GetDC
PtInRect
ReleaseDC
GetSystemMetrics
SetRect
IsRectEmpty
GetCursorPos
ScreenToClient
DrawIconEx
GetScrollPos
GetMessagePos
MapWindowPoints
IsWindow
RegisterWindowMessageW
WaitForInputIdle
UpdateWindow
BeginDeferWindowPos
EndDeferWindowPos
GetWindow
GetClassNameW
FindWindowW
CreateMenu
WindowFromDC
GetWindowRgn
GetDCEx
GetTabbedTextExtentW
GetMessageTime
GetDesktopWindow
InsertMenuItemW
MonitorFromWindow
RealGetWindowClassA
SetWindowRgn
ShutdownBlockReasonQuery
AnyPopup
CallNextHookEx
CreateMDIWindowW
DefFrameProcW
EndMenu
GetCaretBlinkTime
GetClassInfoExA
GetTopWindow
SetLayeredWindowAttributes
GetKeyState
DeferWindowPos
CreatePopupMenu
AppendMenuW
SetForegroundWindow
TrackPopupMenu
GetWindowThreadProcessId
GetForegroundWindow
SetWindowPos
MessageBoxExW
DefWindowProcW
GetUpdateRect
BeginPaint
EndPaint
CallWindowProcW
SetDlgItemTextW
GetDlgItemInt
SetDlgItemInt
SetRectEmpty
SendDlgItemMessageA
GetLastActivePopup
SetActiveWindow
IsWindowEnabled
GetNextDlgTabItem
GetDlgItem
EndDialog
CreateDialogIndirectParamW
DestroyWindow
GetWindowDC
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
RemoveMenu
InsertMenuW
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetMenuState
GetMenuStringW
UnregisterClassW
wsprintfW
CreateFontIndirectW
GetObjectW
DeleteObject
CreateSolidBrush
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextCharacterExtra
SetTextColor
SetTextAlign
SetTextJustification
PlayMetaFileRecord
EnumMetaFile
SetWorldTransform
ModifyWorldTransform
SetColorAdjustment
StartDocW
ArcTo
PolyDraw
SelectClipPath
SetArcDirection
ExtCreatePen
MoveToEx
TextOutW
ExtTextOutW
PolyBezierTo
PolylineTo
SetViewportExtEx
SetWindowExtEx
SetWindowOrgEx
OffsetViewportOrgEx
OffsetWindowOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetTextColor
CombineRgn
CreateRectRgnIndirect
GetMapMode
PatBlt
SetRectRgn
DPtoLP
GetTextMetricsW
GetRgnBox
CreatePalette
SelectObject
GetPaletteEntries
GetSystemPaletteEntries
CreateDIBitmap
EnumFontFamiliesW
GetTextCharsetInfo
GetDIBits
SetPixel
CreateDIBSection
SetDIBColorTable
CreateEllipticRgn
Ellipse
CreatePolygonRgn
Polygon
Polyline
CreateRoundRectRgn
LPtoDP
EnumFontFamiliesExW
OffsetRgn
GetCurrentObject
CreateFontW
GetCharWidthW
StretchDIBits
RoundRect
FillRgn
FrameRgn
GetBoundsRect
PtInRegion
ExtFloodFill
SetPaletteEntries
SetPixelV
GetWindowOrgEx
CloseMetaFile
CreateMetaFileW
DeleteMetaFile
EndDoc
StartPage
EndPage
AbortDoc
SetAbortProc
GetROP2
GetBkMode
GetNearestColor
GetPolyFillMode
GetStretchBltMode
GetTextAlign
GetTextFaceW
StretchBlt
GetStockObject
GetTextExtentPoint32W
CreatePen
GetDeviceCaps
GetViewportOrgEx
SetViewportOrgEx
Rectangle
AddFontResourceW
CreateBrushIndirect
GetGlyphOutlineW
GetKerningPairsW
RealizePalette
SaveDC
GetBkColor
RemoveFontResourceW
DeleteDC
CopyMetaFileW
CreateDCW
CreateBitmap
CreateDIBPatternBrushPt
CreateHatchBrush
CreatePatternBrush
CreateRectRgn
Escape
ExcludeClipRect
GetClipBox
GetClipRgn
GetObjectType
GetPixel
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
LineTo
OffsetClipRgn
PlayMetaFile
PtVisible
RectVisible
RestoreDC
SelectClipRgn
ExtSelectClipRgn
SelectPalette
SetBkColor
SetBkMode
SetMapperFlags
GetLayout
SetGraphicsMode
SetMapMode
SetLayout
GetNearestPaletteIndex
GetCurrentPositionEx
AlphaBlend
TransparentBlt
GradientFill
ClosePrinter
DocumentPropertiesW
OpenPrinterW
GetJobW
OpenProcessToken
RegDeleteKeyW
RegOpenKeyW
RegCreateKeyW
SetFileSecurityW
GetFileSecurityW
RegEnumKeyExW
RegQueryValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegSetValueW
RegDeleteValueW
DuplicateTokenEx
RegSetKeySecurity
BuildExplicitAccessWithNameW
LookupAccountSidW
ConvertStringSidToSidW
RegGetKeySecurity
RegCreateKeyExA
RegOpenKeyExA
GetSecurityDescriptorDacl
GetLengthSid
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
CheckTokenMembership
RegSetValueExA
RegSaveKeyExA
RegQueryInfoKeyA
RegEnumValueW
RegEnumValueA
GetUserNameA
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
CreateWellKnownSid
FreeSid
SetSecurityInfo
SetEntriesInAclW
AllocateAndInitializeSid
GetSecurityInfo
RegCreateKeyExW
RegEnumKeyW
ShellExecuteW
SHQueryRecycleBinW
SHGetFolderPathW
SHAppBarMessage
ord165
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
SHAddToRecentDocs
ExtractIconW
SHGetDesktopFolder
DragQueryFileW
DragFinish
SHGetMalloc
SHBrowseForFolderW
ShellExecuteExW
SHGetSpecialFolderPathA
StrToIntW
SHGetValueW
PathFindFileNameW
SHSetValueW
PathFileExistsA
PathAppendA
StrCpyW
PathIsDirectoryW
UrlEscapeW
StrFormatByteSizeW
StrStrIW
PathGetCharTypeA
SHCopyKeyW
ord487
SHDeleteValueW
SHDeleteKeyW
ord217
PathRemoveFileSpecW
ord276
PathUnquoteSpacesW
PathRemoveExtensionW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathIsDirectoryA
StrFormatKBSizeW
DrawThemeBackground
GetThemeColor
GetCurrentThemeName
IsThemeBackgroundPartiallyTransparent
GetWindowTheme
IsAppThemed
GetThemeSysColor
GetThemePartSize
DrawThemeText
DrawThemeParentBackground
OpenThemeData
CloseThemeData
CoRegisterMessageFilter
CoRegisterClassObject
PropVariantCopy
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
OleSetMenuDescriptor
OleLockRunning
StgCreateDocfile
StgOpenStorage
StgIsStorageFile
CreateFileMoniker
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
OleRegGetMiscStatus
OleRegEnumVerbs
CreateGenericComposite
CreateItemMoniker
WriteClassStm
OleCreate
OleCreateFromData
OleCreateLinkFromData
OleCreateStaticFromData
OleCreateLinkToFile
OleCreateFromFile
OleLoad
OleSaveToStream
OleSetContainedObject
OleGetIconOfClass
OleGetClipboard
DoDragDrop
OleIsCurrentClipboard
OleFlushClipboard
OleSetClipboard
OleUninitialize
OleInitialize
StgOpenStorageOnILockBytes
CoGetClassObject
OleRun
CoDisconnectObject
StringFromGUID2
CLSIDFromProgID
SetConvertStg
OleRegGetUserType
OleDuplicateData
ReadFmtUserTypeStg
WriteFmtUserTypeStg
WriteClassStg
ReadClassStg
CreateBindCtx
CoTreatAsClass
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoInitializeEx
CoInitialize
OleSave
OleCreateEmbeddingHelper
HWND_UserUnmarshal
CoFreeUnusedLibraries
CoCreateFreeThreadedMarshaler
CoInitializeSecurity
CLSIDFromString
StringFromCLSID
CoCreateGuid
CoSetProxyBlanket
CoCreateInstance
GetHGlobalFromILockBytes
CreateDataAdviseHolder
CreateOleAdviseHolder
GetRunningObjectTable
OleIsRunning
CoGetMalloc
OleQueryLinkFromData
OleQueryCreateFromData
CoRevokeClassObject
ReleaseStgMedium
SafeArrayCopyData
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayLock
SysReAllocString
VarBoolFromUI4
VarDecFix
VarDecRound
VarI1FromDisp
VarI2FromDisp
VarNot
VarR4FromUI8
VarUI1FromI4
VarUI4FromR4
VarUI8FromR8
VariantInit
VariantClear
SafeArrayCreate
SafeArrayPutElement
SafeArrayDestroy
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayUnaccessData
SafeArrayCreateVector
SysAllocStringLen
SysStringByteLen
OleSavePictureFile
VariantChangeType
OleCreateFontIndirect
SysReAllocStringLen
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayRedim
CreateErrorInfo
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayUnlock
SafeArrayCopy
SafeArrayPtrOfIndex
VariantCopy
VarDateFromStr
VarCyFromStr
VarBstrFromCy
VarBstrFromDate
VarDecFromStr
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysFreeString
SysAllocStringByteLen
SysAllocString
GetErrorInfo
SetErrorInfo
VarBstrFromDec
OleUIBusyW
OleUIPromptUserW
OleUIInsertObjectW
ord5
OleUIConvertW
ord12
ord2
ord8
SetupDiDestroyDeviceInfoList
CM_Get_Device_IDW
SetupDiOpenDevRegKey
SetupDiEnumDeviceInfo
SetupDiClassNameFromGuidW
mmioStringToFOURCCW
waveInAddBuffer
waveInGetDevCapsW
waveOutGetVolume
PlaySoundW
waveOutSetVolume
CertOpenStore
CertFindCertificateInStore
CertGetNameStringW
CertCloseStore
GdipCreateBitmapFromFileICM
GdipGetImageWidth
GdipGetImagePixelFormat
GdipDisposeImage
GdipCloneImage
GdipGetImagePalette
GdipGetImagePaletteSize
GdipCreateBitmapFromStream
GdipGetImageGraphicsContext
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipDeleteGraphics
GdiplusStartup
GdipFree
GdipAlloc
GdiplusShutdown
GdipDrawImageI
GdipCreateBitmapFromHBITMAP
GdipCreateFromHDC
GdipSetInterpolationMode
GdipDrawImageRectI
GdipGetImageHeight
GdipCreateBitmapFromStreamICM
AccessibleObjectFromWindow
LresultFromObject
CreateStdAccessibleObject
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetProcAddress
LoadLibraryA
Sleep
VirtualAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
WSACleanup
socket
inet_ntoa
setsockopt
ntohs
recvfrom
ioctlsocket
htons
WSAStartup
__WSAFDIsSet
select
accept
listen
bind
closesocket
WSAGetLastError
recv
sendto
send
inet_addr
gethostbyname
gethostname
connect
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
timeGetTime
waveOutSetVolume
mciSendStringW
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Remove
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
InitCommonControlsEx
ImageList_Create
WNetUseConnectionW
WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetQueryOptionW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetReadFile
InternetConnectW
GetProcessMemoryInfo
IcmpCreateFile
IcmpCloseHandle
IcmpSendEcho
DestroyEnvironmentBlock
UnloadUserProfile
CreateEnvironmentBlock
LoadUserProfileW
IsThemeActive
DuplicateHandle
CreateThread
WaitForSingleObject
HeapAlloc
GetProcessHeap
HeapFree
Sleep
GetCurrentThreadId
MultiByteToWideChar
MulDiv
GetVersionExW
IsWow64Process
GetSystemInfo
FreeLibrary
LoadLibraryA
GetProcAddress
SetErrorMode
GetModuleFileNameW
WideCharToMultiByte
lstrcpyW
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
SetEndOfFile
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
SetCurrentDirectoryW
GetLongPathNameW
GetShortPathNameW
DeleteFileW
FindNextFileW
CopyFileExW
MoveFileW
CreateDirectoryW
RemoveDirectoryW
SetSystemPowerState
QueryPerformanceFrequency
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetTempPathW
GetTempFileNameW
DeviceIoControl
GetLocalTime
CompareStringW
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
LoadLibraryExW
FindResourceExW
CopyFileW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
SetFileAttributesW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
HeapReAlloc
HeapSize
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
GetProcessId
SetPriorityClass
LoadLibraryW
VirtualAlloc
IsDebuggerPresent
GetCurrentDirectoryW
lstrcmpiW
DecodePointer
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCurrentThread
CloseHandle
GetFullPathNameW
EncodePointer
ExitProcess
GetModuleHandleExW
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetCommandLineW
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetStringTypeW
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
RtlUnwind
ReadConsoleW
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
LCMapStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
FindClose
SetEnvironmentVariableA
AdjustWindowRectEx
CopyImage
SetWindowPos
GetCursorInfo
RegisterHotKey
ClientToScreen
GetKeyboardLayoutNameW
IsCharAlphaW
IsCharAlphaNumericW
IsCharLowerW
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
CallWindowProcW
ReleaseCapture
SetCapture
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
SetRect
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
MonitorFromRect
keybd_event
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
SetClipboardData
EmptyClipboard
CountClipboardFormats
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
BlockInput
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
CheckMenuRadioItem
CharLowerBuffW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
SystemParametersInfoW
LoadImageW
GetClassNameW
StrokePath
DeleteObject
GetTextExtentPoint32W
ExtCreatePen
GetDeviceCaps
EndPath
SetPixel
CloseFigure
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
LineTo
AngleArc
MoveToEx
Ellipse
DeleteDC
GetPixel
CreateDCW
GetStockObject
GetTextFaceW
CreateFontW
SetTextColor
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
StrokeAndFillPath
GetOpenFileNameW
GetSaveFileNameW
GetAce
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
RegCreateKeyExW
FreeSid
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
AddAce
SetSecurityDescriptorDacl
GetUserNameW
InitiateSystemShutdownExW
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHEmptyRecycleBinW
SHGetPathFromIDListW
SHBrowseForFolderW
SHCreateShellItem
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetFolderPathW
SHFileOperationW
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
IIDFromString
StringFromGUID2
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitialize
CoUninitialize
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoSetProxyBlanket
CoCreateInstanceEx
CoInitializeSecurity
LoadTypeLibEx
VariantCopyInd
SysReAllocString
SysFreeString
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SafeArrayCreateVector
RegisterTypeLi
CreateStdDispatch
DispCallFunc
VariantChangeType
SysStringLen
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
VariantCopy
VariantClear
OleLoadPicture
QueryPathOfRegTypeLi
RegisterTypeLibForUser
UnRegisterTypeLibForUser
UnRegisterTypeLi
CreateDispTypeInfo
SysAllocString
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
GetModuleFileNameA
GetLocalTime
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateMutexA
GetLastError
GetTickCount
GetTempPathA
GetSystemDirectoryA
CreateProcessA
ExitProcess
ReadFile
GetProcessHeap
SetEndOfFile
GetModuleHandleA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
HeapAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetFilePointer
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
RegisterClassExA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
MiniDumpWriteDump
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ