DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Overview
overview
7Static
static
3TeraCopy/EnterKey.exe
windows7-x64
1TeraCopy/EnterKey.exe
windows10-2004-x64
1TeraCopy/L...28.dll
windows7-x64
1TeraCopy/L...28.dll
windows10-2004-x64
1TeraCopy/L...52.dll
windows7-x64
1TeraCopy/L...52.dll
windows10-2004-x64
1TeraCopy/TeraCopy.dll
windows7-x64
1TeraCopy/TeraCopy.dll
windows10-2004-x64
1TeraCopy/TeraCopy.exe
windows7-x64
3TeraCopy/TeraCopy.exe
windows10-2004-x64
3TeraCopy/T...64.dll
windows7-x64
1TeraCopy/T...64.dll
windows10-2004-x64
1TeraCopy/T...xt.dll
windows7-x64
1TeraCopy/T...xt.dll
windows10-2004-x64
1TeraCopy/T...64.dll
windows7-x64
1TeraCopy/T...64.dll
windows10-2004-x64
1TeraCopy/tclinks.exe
windows7-x64
1TeraCopy/tclinks.exe
windows10-2004-x64
3TeraCopy/tcm.exe
windows7-x64
1TeraCopy/tcm.exe
windows10-2004-x64
1TeraCopy/ws2help.dll
windows7-x64
1TeraCopy/ws2help.dll
windows10-2004-x64
1TeraCopy/卸载.cmd
windows7-x64
6TeraCopy/卸载.cmd
windows10-2004-x64
6TeraCopy/安装.cmd
windows7-x64
7TeraCopy/安装.cmd
windows10-2004-x64
7TeraCopy/�...��.url
windows7-x64
1TeraCopy/�...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
TeraCopy/EnterKey.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
TeraCopy/EnterKey.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
TeraCopy/Lang/1028.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
TeraCopy/Lang/1028.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
TeraCopy/Lang/2052.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
TeraCopy/Lang/2052.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
TeraCopy/TeraCopy.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
TeraCopy/TeraCopy.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
TeraCopy/TeraCopy.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
TeraCopy/TeraCopy.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
TeraCopy/TeraCopy64.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
TeraCopy/TeraCopy64.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
TeraCopy/TeraCopyExt.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
TeraCopy/TeraCopyExt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
TeraCopy/TeraCopyExt64.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
TeraCopy/TeraCopyExt64.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
TeraCopy/tclinks.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
TeraCopy/tclinks.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
TeraCopy/tcm.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
TeraCopy/tcm.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
TeraCopy/ws2help.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
TeraCopy/ws2help.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
TeraCopy/卸载.cmd
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
TeraCopy/卸载.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
TeraCopy/安装.cmd
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
TeraCopy/安装.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
TeraCopy/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
TeraCopy/新云软件.url
Resource
win10v2004-20231215-en
Target
07cbaad1ba53108794e9a7a69fbe87db
Size
1.2MB
MD5
07cbaad1ba53108794e9a7a69fbe87db
SHA1
b120cbd61b8c6cf4ff75d8c425e38121f182569a
SHA256
e903972ad49cb6be91dbb51165073cea072ed47fb1180364b1049dc00d33cc75
SHA512
6ca25e0a124f6c6d43da50aa8a064136d2405d950e99b64e407d51c15184e6d154adca1e4d78d66c1f70702da597e3ab69c83e1a673f5da840652527805afe6f
SSDEEP
24576:rf7bV4ZdBy4nXCoqv1r+Y5B+zBaJAMRxqjjB6BnnhueMoak1Qa6rAXv:rf7bV6rprqN+Y5B+F6AasS4xoh1QzrAf
Checks for missing Authenticode signature.
resource |
---|
unpack001/TeraCopy/EnterKey.exe |
unpack001/TeraCopy/Lang/1028.dll |
unpack001/TeraCopy/Lang/2052.dll |
unpack001/TeraCopy/TeraCopy.dll |
unpack001/TeraCopy/TeraCopy.exe |
unpack001/TeraCopy/TeraCopy64.dll |
unpack001/TeraCopy/TeraCopyExt.dll |
unpack001/TeraCopy/TeraCopyExt64.dll |
unpack001/TeraCopy/tclinks.exe |
unpack001/TeraCopy/tcm.exe |
unpack001/TeraCopy/ws2help.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
MessageBoxA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
MessageBoxA
InitCommonControls
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
LeaveCriticalSection
__C_specific_handler
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiW
DisableThreadLibraryCalls
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
EnterCriticalSection
GetModuleFileNameW
GetProcAddress
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetTempPathW
RaiseException
lstrcatW
CreateFileW
WriteFile
CloseHandle
lstrcpyW
lstrcpynW
GlobalLock
GlobalUnlock
GetModuleHandleW
lstrlenW
LoadLibraryA
GetOEMCP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetVersionExA
GetACP
GetLocaleInfoA
GetThreadLocale
lstrlenA
WideCharToMultiByte
LocalFree
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapAlloc
HeapFree
HeapReAlloc
GetCurrentThreadId
FlsSetValue
GetCommandLineA
GetProcessHeap
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
RtlVirtualUnwind
GetModuleHandleA
FlsGetValue
TlsFree
FlsFree
SetLastError
TlsSetValue
FlsAlloc
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapSetInformation
HeapCreate
HeapDestroy
Sleep
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
CharNextW
GetKeyboardState
GetMenuDefaultItem
SetMenuDefaultItem
GetDesktopWindow
UnregisterClassA
LoadStringW
InsertMenuW
MessageBoxA
DeleteObject
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
SHGetSpecialFolderLocation
ShellExecuteW
SHGetPathFromIDListW
DragQueryFileW
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
ReleaseStgMedium
VarUI4FromStr
SysAllocStringByteLen
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantClear
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetLastError
lstrcmpiW
DisableThreadLibraryCalls
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
__C_specific_handler
GetModuleHandleW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
FlushFileBuffers
CreateFileA
GetModuleFileNameW
InitializeCriticalSection
lstrcatW
CreateFileW
WriteFile
CloseHandle
lstrcpyW
lstrcpynW
GlobalLock
GlobalUnlock
LoadLibraryExW
lstrlenW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetEvent
OpenEventA
OutputDebugStringA
OutputDebugStringW
lstrlenA
GetCurrentProcessId
GetVersionExA
GetACP
GetLocaleInfoA
GetThreadLocale
WaitForSingleObject
GetCurrentThreadId
GetModuleFileNameA
GetVersion
VirtualAlloc
UnmapViewOfFile
GetSystemInfo
MapViewOfFile
CreateFileMappingA
GetCurrentThread
OpenFileMappingA
WideCharToMultiByte
LocalFree
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapSize
HeapValidate
IsBadReadPtr
FlsSetValue
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
RtlVirtualUnwind
GetProcAddress
GetModuleHandleA
FlsGetValue
FlsAlloc
TlsFree
FlsFree
SetLastError
TlsSetValue
HeapSetInformation
HeapCreate
HeapDestroy
HeapReAlloc
ExitProcess
GetOEMCP
GetCPInfo
DebugBreak
GetStdHandle
WriteConsoleW
GetFileType
LoadLibraryW
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LoadLibraryA
UnregisterClassW
CharNextW
GetDesktopWindow
LoadBitmapW
LoadStringW
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
PeekMessageA
MsgWaitForMultipleObjects
SetMenuItemBitmaps
InsertMenuW
DeleteObject
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SetThreadToken
RevertToSelf
OpenThreadToken
RegEnumKeyExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
DragQueryFileW
CoReleaseMarshalData
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
ReleaseStgMedium
VarUI4FromStr
SysAllocStringByteLen
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantClear
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
WahCloseApcHelper
WahCloseHandleHelper
WahCloseNotificationHandleHelper
WahCloseSocketHandle
WahCloseThread
WahCompleteRequest
WahCreateHandleContextTable
WahCreateNotificationHandle
WahCreateSocketHandle
WahDestroyHandleContextTable
WahDisableNonIFSHandleSupport
WahEnableNonIFSHandleSupport
WahEnumerateHandleContexts
WahInsertHandleContext
WahNotifyAllProcesses
WahOpenApcHelper
WahOpenCurrentThread
WahOpenHandleHelper
WahOpenNotificationHandleHelper
WahQueueUserApc
WahReferenceContextByHandle
WahRemoveHandleContext
WahWaitForNotification
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ