GetOEPNow
ShortFinderName
Overview
overview
7Static
static
7Engine.dll
windows7-x64
1Engine.dll
windows10-2004-x64
1OEPFinders...EP.dll
windows7-x64
1OEPFinders...EP.dll
windows10-2004-x64
1OEPFinders/Force.dll
windows7-x64
1OEPFinders/Force.dll
windows10-2004-x64
3OEPFinders/GenOEP.dll
windows7-x64
1OEPFinders/GenOEP.dll
windows10-2004-x64
1OEPFinders...EP.dll
windows7-x64
1OEPFinders...EP.dll
windows10-2004-x64
1OEPFinders...EP.dll
windows7-x64
1OEPFinders...EP.dll
windows10-2004-x64
1OEPFinders...EP.dll
windows7-x64
1OEPFinders...EP.dll
windows10-2004-x64
1OEPFinders...EP.dll
windows7-x64
1OEPFinders...EP.dll
windows10-2004-x64
1OEPFinders...EP.dll
windows7-x64
1OEPFinders...EP.dll
windows10-2004-x64
1PESniffer.dll
windows7-x64
1PESniffer.dll
windows10-2004-x64
1PEiDLL.dll
windows7-x64
7PEiDLL.dll
windows10-2004-x64
7Plugins/PluginEx.dll
windows7-x64
1Plugins/PluginEx.dll
windows10-2004-x64
3QUnpack.exe
windows7-x64
1QUnpack.exe
windows10-2004-x64
1selfscan.dll
windows7-x64
1selfscan.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Engine.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Engine.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
OEPFinders/EXE32PackOEP.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
OEPFinders/EXE32PackOEP.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
OEPFinders/Force.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
OEPFinders/Force.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
OEPFinders/GenOEP.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
OEPFinders/GenOEP.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
OEPFinders/PEPack10OEP.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
OEPFinders/PEPack10OEP.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
OEPFinders/PackManOEP.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
OEPFinders/PackManOEP.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
OEPFinders/StealthPE21OEP.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
OEPFinders/StealthPE21OEP.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
OEPFinders/UPackOEP.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
OEPFinders/UPackOEP.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
OEPFinders/WWPack32OEP.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
OEPFinders/WWPack32OEP.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
PESniffer.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
PESniffer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
PEiDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
PEiDLL.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
Plugins/PluginEx.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
Plugins/PluginEx.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
QUnpack.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
QUnpack.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
selfscan.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
selfscan.dll
Resource
win10v2004-20231222-en
Target
37184f4a2d3568cb859b5cb518dacf16
Size
710KB
MD5
37184f4a2d3568cb859b5cb518dacf16
SHA1
fdee30f00b9ad38211ea8c5f0f351ffdb6d0b037
SHA256
2046f1330beb67a88b12bf1ea767afc57b38f72525a3268f70141d2c30fffd1e
SHA512
e21ecf583898d3b9a72715deeff1bcd245cff4c86f7da9e9e8e6da55be906c4625d6988759b67a51c2ad694abcef5da972a93126e7a17c8d1d73e77d696d4a3e
SSDEEP
12288:w54kIIxfrVE8Ro3CC5R6TV2+stIGn56ozgGgIdR6O3qkVlHpz7PNu/ksUR6mFuGc:tIVrVXo3CFmzAIRt+/ksizFullKzIp
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/OEPFinders/EXE32PackOEP.dll | acprotect |
static1/unpack001/OEPFinders/PEPack10OEP.dll | acprotect |
static1/unpack001/OEPFinders/PackManOEP.dll | acprotect |
static1/unpack001/OEPFinders/StealthPE21OEP.dll | acprotect |
static1/unpack001/OEPFinders/WWPack32OEP.dll | acprotect |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Engine.sys |
unpack001/OEPFinders/EXE32PackOEP.dll |
unpack001/OEPFinders/Force.dll |
unpack001/OEPFinders/GenOEP.dll |
unpack001/OEPFinders/PEPack10OEP.dll |
unpack001/OEPFinders/PackManOEP.dll |
unpack001/OEPFinders/StealthPE21OEP.dll |
unpack001/OEPFinders/UPackOEP.dll |
unpack001/OEPFinders/WWPack32OEP.dll |
unpack001/PESniffer.dll |
unpack001/PEiDLL.DLL |
unpack001/Plugins/PluginEx.dll |
unpack001/QUnpack.exe |
unpack001/selfscan.dll |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IofCompleteRequest
ZwSetInformationThread
memmove
ZwYieldExecution
ZwQueryInformationProcess
KeNumberProcessors
RtlAppendUnicodeStringToString
IoDeleteDevice
IoCreateSymbolicLink
IoDeleteSymbolicLink
IoRegisterShutdownNotification
IoUnregisterShutdownNotification
IoCreateDevice
RtlIntegerToUnicodeString
ZwOpenKey
ZwCreateKey
RtlCopyUnicodeString
ZwQueryValueKey
memcpy
IoAcquireCancelSpinLock
IoReleaseCancelSpinLock
ExQueueWorkItem
KeInitializeSpinLock
KeBugCheckEx
RtlInitUnicodeString
ZwClose
ExFreePoolWithTag
ExAllocatePoolWithTag
KeGetCurrentIrql
KfReleaseSpinLock
KfAcquireSpinLock
KfLowerIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
WaitForInputIdle
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
CharToOemA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WriteFile
VirtualQuery
TerminateProcess
SuspendThread
SetFilePointer
ReadProcessMemory
ReadFile
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalFree
GlobalAlloc
GetVersionExA
GetThreadLocale
GetStdHandle
GetStartupInfoA
GetShortPathNameA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetFileSize
GetDiskFreeSpaceA
GetDateFormatA
GetCPInfo
FreeLibrary
FormatMessageA
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateProcessA
CreateFileA
CompareStringA
CloseHandle
GetDllOEPNow
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DoMyJob
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetFileSize
lstrlenA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
HeapAlloc
HeapFree
FlushViewOfFile
GetProcessHeap
ReadFile
lstrcatA
DisableThreadLibraryCalls
CreateFileMappingA
GetModuleFileNameA
CloseHandle
lstrcpyA
HeapReAlloc
IsBadReadPtr
LCMapStringW
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
RaiseException
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapSize
WriteFile
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
RtlUnwind
MultiByteToWideChar
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
CharUpperA
ImageNtHeader
AnalyzeFile
GetTotalSignatures
IsDataBaseLoaded
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
FileEntropy
GetInternalDatabase
GetPEiDScanMode
MultiScanDir
PEiDLLVersion
PEiDVersion
ScanWithPEiD
Scan_Deep
Scan_Hard
Scan_Norm
SetPluginOptions
SetScanOptions
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
MessageBoxA
GetPluginName
StartPlugin
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImageNtHeader
ImageRvaToVa
GetTickCount
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
LCMapStringA
LCMapStringW
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetCurrentThreadId
CompareStringW
CompareStringA
InterlockedExchange
GetVersion
MultiByteToWideChar
lstrcpynA
GetPrivateProfileStructA
WritePrivateProfileStructA
lstrcpyA
HeapReAlloc
HeapAlloc
HeapFree
IsBadReadPtr
GetProcessHeap
MulDiv
FreeLibrary
FindClose
FindNextFileA
FindFirstFileA
TerminateThread
SetThreadPriority
ExitProcess
GlobalUnlock
GlobalLock
GlobalAlloc
SetCurrentDirectoryA
GetCurrentDirectoryA
SetThreadAffinityMask
SetProcessAffinityMask
SwitchToThread
ResumeThread
OpenThread
WriteProcessMemory
VirtualProtectEx
WriteFile
GetExitCodeProcess
VirtualFreeEx
VirtualAllocEx
UnmapViewOfFile
FlushViewOfFile
SetFilePointer
MapViewOfFile
CreateFileMappingA
GetFileSize
DeviceIoControl
GetCurrentThread
WaitForSingleObject
DeleteFileA
LoadLibraryA
LockResource
GetProcAddress
TerminateProcess
ReadProcessMemory
WideCharToMultiByte
SuspendThread
CreateProcessA
lstrcmpA
CloseHandle
CreateFileA
GetModuleHandleA
CreateThread
GetLastError
ReadFile
SetLastError
GetFileAttributesA
lstrcatA
GetModuleFileNameA
Sleep
GetThreadContext
lstrlenA
lstrcmpiA
GetVersionExA
FreeResource
LoadResource
SizeofResource
FindResourceA
GetEnvironmentStringsW
SetHandleCount
GetFileTime
SetEnvironmentVariableA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FileTimeToLocalFileTime
SetErrorMode
SetStdHandle
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
LocalFree
_lopen
_lclose
_lread
_llseek
LocalAlloc
GlobalFree
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
FormatMessageA
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GlobalFlags
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
FileTimeToSystemTime
GetFileType
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetDesktopWindow
CheckDlgButton
SendDlgItemMessageA
IsDlgButtonChecked
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
SetFocus
GetWindowTextA
GetWindowTextLengthA
GetWindowPlacement
DefWindowProcA
DeferWindowPos
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
GetMenuItemID
TrackPopupMenu
MapWindowPoints
PeekMessageA
GetMessagePos
GetMessageTime
GetTopWindow
EndDeferWindowPos
BeginDeferWindowPos
GetLastActivePopup
GetClassLongA
IsChild
WinHelpA
RegisterWindowMessageA
CheckMenuItem
GetMenuState
DestroyWindow
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowDC
BeginPaint
EndPaint
TranslateMessage
SetCursor
ShowOwnedPopups
GetWindowThreadProcessId
UnregisterClassA
MapDialogRect
SetWindowContextHelpId
DestroyMenu
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
BringWindowToTop
TranslateMDISysAccel
TranslateAcceleratorA
RedrawWindow
SetMenu
InsertMenuItemA
LoadAcceleratorsA
LoadMenuA
ReuseDDElParam
UnpackDDElParam
SetRect
UnregisterHotKey
GetSysColorBrush
LoadCursorA
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetDC
FillRect
EnableWindow
LoadImageA
IsWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
ModifyMenuA
EndDialog
UpdateWindow
CreatePopupMenu
KillTimer
AppendMenuA
LoadBitmapA
MessageBoxExA
RegisterHotKey
RemoveMenu
SetWindowPos
IntersectRect
GetMenuItemRect
DrawStateA
GetClassNameA
DestroyIcon
CallWindowProcA
SetMenuItemInfoA
CallNextHookEx
GetWindowLongA
SystemParametersInfoA
GetForegroundWindow
SetRectEmpty
EqualRect
GetSystemMenu
GetMenuItemInfoA
GetMenuItemCount
IsMenu
OffsetRect
GetPropA
IsWindowVisible
RemovePropA
SetPropA
SetWindowLongA
UnhookWindowsHookEx
SetWindowsHookExA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
IsRectEmpty
PostMessageA
ReleaseDC
GetCursorPos
ReleaseCapture
ClientToScreen
DispatchMessageA
ScreenToClient
GetMessageA
PtInRect
SetCapture
GetCapture
GetDlgCtrlID
InvalidateRect
ValidateRect
GetFocus
GetMenu
IsIconic
SetTimer
GetSubMenu
GetSystemMetrics
EnableMenuItem
GetClientRect
GetKeyState
GetWindow
CopyRect
InflateRect
GetParent
CharUpperA
DrawIcon
SendMessageA
GetWindowRect
LoadIconA
WaitForInputIdle
wsprintfA
SetForegroundWindow
PostQuitMessage
MessageBoxA
CloseClipboard
OpenClipboard
EmptyClipboard
SetClipboardData
GetSysColor
LineTo
ExcludeClipRect
SetMapMode
MoveToEx
Ellipse
GetTextMetricsA
GetTextColor
GetClipBox
ExtTextOutA
GetCurrentObject
RectVisible
PtVisible
CreatePen
Escape
GetStockObject
Rectangle
GetDeviceCaps
DeleteObject
DeleteDC
BitBlt
TextOutA
CreateSolidBrush
GetTextExtentPoint32A
SetBkMode
SetBkColor
SetTextColor
CreateFontIndirectA
SelectObject
CreateCompatibleBitmap
GetPixel
CreateFontA
GetObjectA
GetViewportExtEx
GetWindowExtEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetRgnBox
RestoreDC
SetPixel
SaveDC
CreateBitmap
CreateCompatibleDC
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CreateServiceA
StartServiceA
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
RegCreateKeyA
RegSetValueA
RegDeleteKeyA
DragFinish
ShellExecuteA
DragQueryFileA
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
OleInitialize
SysFreeString
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantCopy
ImageList_GetIcon
ord17
ImageList_Draw
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
ord8
AnalyzeFile
Scan_Norm
Scan_Hard
Scan_Deep
LresultFromObject
CreateStdAccessibleObject
waveOutClose
waveOutGetPosition
waveOutOpen
waveOutPrepareHeader
waveOutReset
waveOutUnprepareHeader
waveOutWrite
ClosePrinter
DocumentPropertiesA
OpenPrinterA
GetFileTitleA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
MessageBoxA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
GetStartupInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
SetFilePointer
ReadFile
FreeLibrary
CreateFileA
CloseHandle
DetectPacker
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ