?GetLanguage@OeProductInfo@NativeCore@OE@Avira@@QBE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@XZ
?GetOeSettingsContent@OeProductInfo@NativeCore@OE@Avira@@ABE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@XZ
?GetOeSettingsPath@OeProductInfo@NativeCore@OE@Avira@@ABE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@ABV56@@Z
?GetOeSettingsPath@OeProductInfo@NativeCore@OE@Avira@@ABE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@XZ
?GetOldOeSettingsPath@OeProductInfo@NativeCore@OE@Avira@@ABE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@XZ
ActivateWindow
DotNet_GetHighestVersionInstalled
DuplicateHandleForProcess
GetActiveSessionId
GetCurrentUserTokenFromActiveSession
GetFullHandleName
GetLoggedOnUserSid
GetOwnParentProcessId
GetParentProcessId
GetProcessIntegrityLevel
GetProcessUserSid
GetSessions
GetUserSidBySessionId
GetUserTokenFromUserSid
HandleDebugEvents
IsAviraSignedFile
MakeTrayIconVisible
ProtectCurrentProcess
RunProcessAsCurrentUser
RunProcessInUserSession
RunProcessInUserSessionInDebugMode
UnprotectCurrentProcess
VerifyFileSignature
VerifyProcessByHandle
VerifyProcessById