TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Overview
overview
10Static
static
10323389cde5...f3.exe
windows7-x64
1323389cde5...f3.exe
windows10-2004-x64
1365712147d...a7.exe
windows7-x64
10365712147d...a7.exe
windows10-2004-x64
105474e75872...06.exe
windows7-x64
105474e75872...06.exe
windows10-2004-x64
10out.exe
windows7-x64
3out.exe
windows10-2004-x64
359c59ef90d...4d.exe
windows7-x64
1059c59ef90d...4d.exe
windows10-2004-x64
163fb410fc5...22.exe
windows7-x64
763fb410fc5...22.exe
windows10-2004-x64
79443472de4...e5.exe
windows7-x64
19443472de4...e5.exe
windows10-2004-x64
197a877b999...8d.exe
windows7-x64
1097a877b999...8d.exe
windows10-2004-x64
10a0f5def5aa...93.exe
windows7-x64
1a0f5def5aa...93.exe
windows10-2004-x64
1abfe442282...b1.exe
windows7-x64
1abfe442282...b1.exe
windows10-2004-x64
1b21f34ecfa...73.exe
windows7-x64
9b21f34ecfa...73.exe
windows10-2004-x64
9b4b97aa67e...a9.zip
windows7-x64
1b4b97aa67e...a9.zip
windows10-2004-x64
1svchost.exe
windows7-x64
9svchost.exe
windows10-2004-x64
9b8ce017478...a8.exe
windows7-x64
9b8ce017478...a8.exe
windows10-2004-x64
9bbb4627895...f2.exe
windows7-x64
1bbb4627895...f2.exe
windows10-2004-x64
1bdf06acf03...63.exe
windows7-x64
1bdf06acf03...63.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
323389cde5a3059c6c6e5c6c711d11e434a577b11dc07a9aeb7f8e1fb661ecf3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
323389cde5a3059c6c6e5c6c711d11e434a577b11dc07a9aeb7f8e1fb661ecf3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
365712147d687fb2eb2d5cb612586c7d3d7364277441491a3ab379a4a1128ba7.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
365712147d687fb2eb2d5cb612586c7d3d7364277441491a3ab379a4a1128ba7.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
5474e75872eeb1e34cbe407c73409d4c65da7bd6aa9378b356bb3c12f316c506.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
5474e75872eeb1e34cbe407c73409d4c65da7bd6aa9378b356bb3c12f316c506.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
out.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
out.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
59c59ef90d1370297375d4e3195eabe2a031251bc939fae962a835d8336a8a4d.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
59c59ef90d1370297375d4e3195eabe2a031251bc939fae962a835d8336a8a4d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
9443472de461e9e7a9d7b7d89fa13815521db1ecebea5054643664953ee366e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
9443472de461e9e7a9d7b7d89fa13815521db1ecebea5054643664953ee366e5.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
97a877b999fb2a3c8286548ac4b20f364a862b132a87272fe273c670a654ba8d.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
97a877b999fb2a3c8286548ac4b20f364a862b132a87272fe273c670a654ba8d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
a0f5def5aaaefa3ae538da9c643a5e381ea89cdee3e451ab1d0c52181d758593.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
a0f5def5aaaefa3ae538da9c643a5e381ea89cdee3e451ab1d0c52181d758593.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
abfe4422828c6515e7b53c50a8f07dda0169f4ee34173357b6fa35b06fe144b1.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
abfe4422828c6515e7b53c50a8f07dda0169f4ee34173357b6fa35b06fe144b1.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
b21f34ecfa7135153d506b3fde2a0d0bd23b44eccedc635cbfa474e321040273.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
b21f34ecfa7135153d506b3fde2a0d0bd23b44eccedc635cbfa474e321040273.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
b4b97aa67e2fbfa344053be1c101cbd6560b0a5cfe2de8e2e637ba90c4df2ca9.zip
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
b4b97aa67e2fbfa344053be1c101cbd6560b0a5cfe2de8e2e637ba90c4df2ca9.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
svchost.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
svchost.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
b8ce0174783c9c7ec30f96f8857c356e61365562463457d3ef0d1f62f4d302a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
b8ce0174783c9c7ec30f96f8857c356e61365562463457d3ef0d1f62f4d302a8.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
bbb46278959b4628106319457405a8cc04681c82c2c8afa30475d50ed63417f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
bbb46278959b4628106319457405a8cc04681c82c2c8afa30475d50ed63417f2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
bdf06acf03785275d01d4135b432b56b31c7f352f9be3cf8eca00286251aa163.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
bdf06acf03785275d01d4135b432b56b31c7f352f9be3cf8eca00286251aa163.exe
Resource
win10v2004-20231215-en
Target
Cat Research 2023-07-15.zip
Size
4.5MB
MD5
e56e18b0de08e733d57e92e6d033bf17
SHA1
0e8d037a03a1855b3614174ba7e1a98424314449
SHA256
ee65e9d7a7bc9d17e894e0b775fc0bbfb35e72c65c3d768e34bfe059d521cc16
SHA512
ea9ed41545b843b89d5638c59448d53cf0e20298f2fa09989898ba1771626ce71d1661782980c6a826c2eabe0bb55145df09f5ae87a412474992d7013257c15d
SSDEEP
98304:vampW+t8jmbIlfnE3+2mNntZaXItRbFLbf7jLxPbM0biQaMYQ/j/:vampW+6jmOlbNm4tRFLjLxjpso7
resource | yara_rule |
---|---|
static1/unpack001/fef96e503bb02c85e176305a0a42116eb9595c8c37151d3a740ed4a266694b5d | family_trigona |
resource | yara_rule |
---|---|
static1/unpack001/a0f5def5aaaefa3ae538da9c643a5e381ea89cdee3e451ab1d0c52181d758593 | family_makop |
static1/unpack001/bdf06acf03785275d01d4135b432b56b31c7f352f9be3cf8eca00286251aa163 | family_makop |
resource | yara_rule |
---|---|
static1/unpack001/97a877b999fb2a3c8286548ac4b20f364a862b132a87272fe273c670a654ba8d | family_medusalocker |
resource | yara_rule |
---|---|
static1/unpack001/5474e75872eeb1e34cbe407c73409d4c65da7bd6aa9378b356bb3c12f316c506 | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/323389cde5a3059c6c6e5c6c711d11e434a577b11dc07a9aeb7f8e1fb661ecf3 |
unpack001/365712147d687fb2eb2d5cb612586c7d3d7364277441491a3ab379a4a1128ba7 |
unpack001/5474e75872eeb1e34cbe407c73409d4c65da7bd6aa9378b356bb3c12f316c506 |
unpack002/out.upx |
unpack001/59c59ef90d1370297375d4e3195eabe2a031251bc939fae962a835d8336a8a4d |
unpack001/63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222 |
unpack001/9443472de461e9e7a9d7b7d89fa13815521db1ecebea5054643664953ee366e5 |
unpack001/97a877b999fb2a3c8286548ac4b20f364a862b132a87272fe273c670a654ba8d |
unpack001/a0f5def5aaaefa3ae538da9c643a5e381ea89cdee3e451ab1d0c52181d758593 |
unpack001/abfe4422828c6515e7b53c50a8f07dda0169f4ee34173357b6fa35b06fe144b1 |
unpack001/b21f34ecfa7135153d506b3fde2a0d0bd23b44eccedc635cbfa474e321040273 |
unpack003/svchost.exe |
unpack001/b8ce0174783c9c7ec30f96f8857c356e61365562463457d3ef0d1f62f4d302a8 |
unpack001/bbb46278959b4628106319457405a8cc04681c82c2c8afa30475d50ed63417f2 |
unpack001/bdf06acf03785275d01d4135b432b56b31c7f352f9be3cf8eca00286251aa163 |
unpack001/db3529a2d96f82af48dd8b93615cf89ee5e0c9fe84d70222b30adcb947602881 |
unpack001/e24b84c0201106d00cb293da0216414c8bc60de61d8de5f7ffdcd660e67317db |
unpack001/fef96e503bb02c85e176305a0a42116eb9595c8c37151d3a740ed4a266694b5d |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetProcessAffinityMask
SetVolumeLabelA
WriteConsoleOutputCharacterW
MapViewOfFile
LoadResource
HeapAlloc
ClearCommError
GetNumaAvailableMemoryNode
FlushViewOfFile
SleepEx
ConnectNamedPipe
GetModuleHandleW
GetTickCount
GetWindowsDirectoryA
SetProcessPriorityBoost
GetProcessTimes
GetPriorityClass
GetVolumePathNameW
SetVolumeMountPointA
DeleteVolumeMountPointW
GetConsoleAliasW
SetConsoleCursorPosition
GetAtomNameW
EnumResourceLanguagesA
MultiByteToWideChar
CreateMailslotW
DisconnectNamedPipe
EnumSystemLocalesA
FindFirstFileExA
GetProcAddress
GetPrivateProfileStringA
GetProcessWorkingSetSize
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
SetConsoleOutputCP
SetConsoleWindowInfo
GetDefaultCommConfigA
CreateIoCompletionPort
EnumDateFormatsW
_lopen
FindAtomW
GetVolumeNameForVolumeMountPointW
GetVolumeInformationW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
CloseHandle
EnterCriticalSection
LeaveCriticalSection
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sleep
HeapSize
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteConsoleW
SetFilePointer
HeapReAlloc
LCMapStringW
GetStringTypeW
CreateFileW
GetCaretBlinkTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetVolumeLabelA
SetupComm
GetNumaNodeProcessorMask
SetPriorityClass
WriteConsoleOutputCharacterW
MapViewOfFile
LoadResource
HeapAlloc
SetConsoleScreenBufferSize
ConnectNamedPipe
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
SetProcessPriorityBoost
GetProcessTimes
GetVolumePathNameW
GlobalAlloc
GetVolumeInformationA
Sleep
SetVolumeMountPointA
DeleteVolumeMountPointW
SetProcessAffinityMask
GetMailslotInfo
MultiByteToWideChar
FindFirstFileExA
GetLastError
GetProcAddress
GetAtomNameA
BuildCommDCBAndTimeoutsW
SetConsoleOutputCP
SetProcessWorkingSetSize
SetConsoleWindowInfo
SetNamedPipeHandleState
GetDefaultCommConfigA
FindFirstVolumeMountPointA
CreateIoCompletionPort
CreateMailslotA
_lopen
FindAtomW
GetVolumeNameForVolumeMountPointW
GetConsoleAliasW
GetEnvironmentVariableW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
RtlUnwind
HeapSize
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
GetStringTypeW
CloseHandle
WriteConsoleW
CreateFileW
GetCaretPos
QueryServiceLockStatusA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CryptStringToBinaryW
CryptBinaryToStringW
StrStrIW
PathIsUNCW
PathFindExtensionW
RmShutdown
RmGetList
RmRegisterResources
RmEndSession
RmStartSession
WNetGetConnectionW
WNetAddConnection2W
GetLogicalDrives
FindFirstVolumeW
SetVolumeMountPointW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
DeleteVolumeMountPointW
FindNextVolumeW
GetDriveTypeW
ReadFile
FindFirstFileExW
FindNextFileW
WriteFile
FindClose
CreateFileW
SetFileAttributesW
SubmitThreadpoolWork
SetFilePointerEx
GetConsoleWindow
lstrcmpiW
GetWindowsDirectoryW
SetConsoleTitleW
MoveFileW
CreateThreadpoolWork
SizeofResource
GetCurrentProcess
AssignProcessToJobObject
InitializeProcThreadAttributeList
CreatePipe
PeekNamedPipe
WaitForSingleObject
OpenProcess
MultiByteToWideChar
UpdateProcThreadAttribute
LockResource
LoadResource
FindResourceW
CreateProcessW
GetModuleHandleW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetFileSizeEx
GetFileAttributesExW
GetExitCodeProcess
CloseHandle
GetLastError
CreateJobObjectW
SetInformationJobObject
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
HeapReAlloc
DecodePointer
WriteConsoleW
QueryDosDeviceW
LocalFree
FormatMessageA
GetLocaleInfoEx
RaiseException
WaitForSingleObjectEx
Sleep
GetCurrentThreadId
GetExitCodeThread
IsProcessorFeaturePresent
FreeLibraryWhenCallbackReturns
CloseThreadpoolWork
GetModuleHandleExW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
GetProcAddress
InitializeConditionVariable
WakeConditionVariable
QueryPerformanceCounter
QueryPerformanceFrequency
InitOnceComplete
InitOnceBeginInitialize
ReleaseSRWLockShared
AcquireSRWLockShared
TryAcquireSRWLockExclusive
InitializeSRWLock
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
TerminateProcess
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
IsWindowVisible
ShowWindow
GetWindowThreadProcessId
RegisterWindowMessageW
GetShellWindow
GetAsyncKeyState
CryptGenRandom
RegSetValueExW
OpenProcessToken
GetTokenInformation
CryptDestroyKey
CryptGetKeyParam
CryptAcquireContextW
CryptEncrypt
RegGetValueW
CryptExportKey
CryptImportKey
CryptGenKey
CryptReleaseContext
RegCloseKey
RegCreateKeyExW
SHEmptyRecycleBinW
CoGetObjectContext
CoGetApartmentType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
CreateFileW
GetLastError
FindClose
DeviceIoControl
WaitForMultipleObjects
FindNextFileW
GetVolumeInformationW
CreateThread
TryEnterCriticalSection
Sleep
WriteFile
GetStdHandle
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
GlobalAlloc
GlobalFree
GetLogicalDrives
PeekNamedPipe
GetComputerNameW
SetEvent
TerminateThread
GetProcAddress
LoadLibraryA
CreateEventW
OpenProcess
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetModuleHandleW
GetCommandLineW
CreatePipe
GetEnvironmentVariableW
CreateProcessW
GetSystemWindowsDirectoryW
WaitForSingleObject
GetLocaleInfoW
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateDirectoryW
GetFileAttributesW
SetErrorMode
GetDriveTypeW
FindFirstFileW
CloseHandle
DeleteCriticalSection
EnterCriticalSection
TerminateProcess
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
GetVersion
SetHandleInformation
DialogBoxParamW
ShowWindow
MessageBoxW
SetWindowTextA
SendMessageW
EnableWindow
UnregisterHotKey
GetWindowThreadProcessId
RegisterHotKey
GetWindowTextLengthW
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
OpenClipboard
SetClipboardData
wsprintfW
GetShellWindow
SetTimer
PostMessageW
KillTimer
wsprintfA
SetWindowTextW
EndDialog
CryptAcquireContextW
CryptSetKeyParam
CryptReleaseContext
CryptGenRandom
CryptDestroyKey
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CryptImportKey
CryptEncrypt
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
CoInitialize
CoTaskMemFree
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetConsoleOutputCP
WriteConsoleA
HeapSize
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetHandleCount
GetModuleFileNameA
GetProcAddress
WriteFile
ExitProcess
HeapReAlloc
VirtualAlloc
DeleteCriticalSection
VirtualFree
WriteConsoleW
HeapDestroy
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFileTimeToFileTime
lstrcpyA
OpenFileMappingA
GetVersion
CloseHandle
OutputDebugStringA
CreateMutexA
lstrcatW
GetModuleHandleA
lstrcmpiA
GetLastError
lstrlenW
MultiByteToWideChar
GetTimeZoneInformation
TerminateProcess
SetTimeZoneInformation
CreateEventA
Sleep
LoadLibraryW
WideCharToMultiByte
OpenProcess
SetFileTime
GetProcessHeap
WaitForSingleObject
GetCurrentProcess
TlsGetValue
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
RtlUnwind
RaiseException
GetStartupInfoA
GetVersionExA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
CreateDirectoryA
UnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetSystemInfo
GetNumberFormatW
GetFileType
HeapCreate
LoadLibraryA
SystemTimeToFileTime
HeapAlloc
FreeLibrary
MapViewOfFile
lstrlenA
GetStdHandle
CreateFileA
OemKeyScan
GetDlgCtrlID
GetWindow
SetDlgItemTextW
LoadImageA
GetSystemMetrics
MessageBoxW
DispatchMessageA
RegisterRawInputDevices
IsWindow
AppendMenuA
SendMessageA
LoadCursorA
BeginPaint
wsprintfW
GetScrollRange
CreateMenu
WindowFromPoint
DlgDirSelectExA
GetSysColorBrush
LoadStringW
DlgDirListA
TranslateMessage
GetCursorPos
GetSysColor
GetDesktopWindow
DefWindowProcA
EndDialog
CreateWindowExA
GetClipboardData
GetWindowLongA
CharLowerA
LoadIconA
TrackPopupMenuEx
DefMDIChildProcA
EndPaint
GetMessageA
EnumDisplayMonitors
InsertMenuItemA
RegisterClassExA
FillRect
LoadStringA
GetFocus
LoadBitmapA
GetParent
LoadMenuA
SetCursorPos
SetBkColor
CreateSolidBrush
GetObjectA
SetTextJustification
GetTextExtentPoint32A
SetWindowExtEx
SetTextColor
CreateDIBSection
TextOutA
GetRegionData
DeleteObject
SelectObject
CryptAcquireContextW
CryptSetProvParam
CryptGetKeyParam
CryptGetUserKey
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
SHBrowseForFolderA
SHGetFolderPathW
SHGetFileInfoA
SHGetFileInfoW
CoUninitialize
BindMoniker
CoRegisterClassObject
CoInitializeEx
StgOpenStorage
CoCreateGuid
PropVariantClear
StringFromGUID2
CLSIDFromString
CreateFileMoniker
UnRegisterTypeLi
NetShareGetInfo
GetModuleFileNameExA
capGetDriverDescriptionA
SCardGetProviderIdW
SCardConnectA
SCardListCardsW
mmioAscend
waveInOpen
waveInPrepareHeader
waveInReset
CertCreateCertificateContext
CertOpenStore
SHStrDupW
StrCmpNIA
StrCSpnA
ChrCmpIA
StrChrA
StrToIntExA
StrCmpIW
StrTrimA
ImageList_Create
RpcEpResolveBinding
GdipCloneImage
GdipLoadImageFromFile
GdipAlloc
GdipDisposeImage
GdipCreateBitmapFromFile
GdipCreateBitmapFromHBITMAP
GdipCreateFromHDC
GdipSaveImageToFile
GdipFree
GdipCreateBitmapFromFileICM
GdipDeleteGraphics
ImmGetOpenStatus
ImmSetOpenStatus
ImmGetContext
ImmReleaseContext
WinHttpOpen
WinHttpConnect
CoInternetParseUrl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SetPriorityClass
GetSystemTime
GetDiskFreeSpaceExW
OpenProcess
GetTempPathW
LocalFree
DeleteFileW
FindFirstFileW
FindClose
GetVolumeNameForVolumeMountPointW
FindNextFileW
SetThreadPriority
GetCurrentThread
GetFileAttributesW
WaitForMultipleObjects
SetEvent
CreateEventA
ReOpenFile
SetLastError
GlobalSize
GlobalLock
GlobalUnlock
SetFilePointer
GetDriveTypeW
GetProcAddress
LoadLibraryA
GetCurrentProcessId
DeleteFileA
ResetEvent
GetProcessHeap
ExitProcess
lstrcmpiA
HeapFree
GlobalMemoryStatusEx
GetConsoleWindow
SetFilePointerEx
DeviceIoControl
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
CreateFileA
GetDriveTypeA
GetSystemWindowsDirectoryW
GetLogicalDrives
MoveFileW
GetFileSize
SetEndOfFile
GetLastError
SetFileAttributesW
CreateDirectoryW
ReadFile
GetFileSizeEx
Wow64RevertWow64FsRedirection
CreateProcessW
Wow64DisableWow64FsRedirection
GetLocalTime
CloseHandle
FlushFileBuffers
WriteFile
CreateFileW
OutputDebugStringW
WaitForSingleObject
CreateThread
Sleep
GetModuleFileNameW
GetACP
IsValidCodePage
FindFirstFileExW
SetStdHandle
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
HeapQueryInformation
HeapSize
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapAlloc
GetCurrentProcess
GetCommandLineW
GetCommandLineA
GetStdHandle
GetFileType
FreeLibraryAndExitThread
ExitThread
RtlUnwind
GetModuleHandleExW
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
GetCurrentThreadId
WaitForSingleObjectEx
GetExitCodeThread
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
TlsAlloc
ShowWindow
wsprintfA
wsprintfW
ReleaseDC
GetSystemMetrics
GetDC
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
RegCreateKeyExA
CryptGenRandom
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
SetEntriesInAclW
SetNamedSecurityInfoW
ConvertSidToStringSidA
OpenProcessToken
RegCloseKey
RegSetValueExA
CryptAcquireContextW
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
GetTokenInformation
CryptReleaseContext
GetHGlobalFromStream
CLSIDFromString
CreateStreamOnHGlobal
EnumProcesses
GetModuleFileNameExA
GetModuleFileNameExW
ioctlsocket
WSAStartup
closesocket
recv
connect
htons
inet_addr
socket
select
GetAdaptersInfo
NetShareEnum
NetApiBufferFree
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdipBitmapGetPixel
GdipGetImageWidth
GdipGetImageHeight
GdipDisposeImage
GdipFree
GdipAlloc
GdipCloneImage
GdipSaveImageToStream
RmGetList
RmRegisterResources
RmStartSession
RmEndSession
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
CreateFileW
GetLastError
FindClose
DeviceIoControl
WaitForMultipleObjects
FindNextFileW
GetVolumeInformationW
CreateThread
TryEnterCriticalSection
Sleep
WriteFile
GetStdHandle
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
GlobalAlloc
GlobalFree
GetLogicalDrives
PeekNamedPipe
GetComputerNameW
SetEvent
TerminateThread
GetProcAddress
LoadLibraryA
CreateEventW
OpenProcess
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetModuleHandleW
GetCommandLineW
CreatePipe
GetEnvironmentVariableW
CreateProcessW
GetSystemWindowsDirectoryW
WaitForSingleObject
GetLocaleInfoW
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateDirectoryW
GetFileAttributesW
SetErrorMode
GetDriveTypeW
FindFirstFileW
CloseHandle
DeleteCriticalSection
EnterCriticalSection
TerminateProcess
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
GetVersion
SetHandleInformation
DialogBoxParamW
ShowWindow
MessageBoxW
SetWindowTextA
SendMessageW
EnableWindow
UnregisterHotKey
GetWindowThreadProcessId
RegisterHotKey
GetWindowTextLengthW
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
OpenClipboard
SetClipboardData
wsprintfW
GetShellWindow
SetTimer
PostMessageW
KillTimer
wsprintfA
SetWindowTextW
EndDialog
CryptAcquireContextW
CryptSetKeyParam
CryptReleaseContext
CryptGenRandom
CryptDestroyKey
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CryptImportKey
CryptEncrypt
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
CoInitialize
CoTaskMemFree
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SetFileAttributesW
GetFileTime
GetFileType
SetFileTime
RtlUnwindEx
GetACP
CloseHandle
LocalFree
GetCurrentProcessId
SizeofResource
VirtualProtect
UnlockFile
QueryPerformanceFrequency
IsDebuggerPresent
FindNextFileW
GetFullPathNameW
VirtualFree
ExitProcess
HeapAlloc
GetNumberOfConsoleInputEvents
GetCPInfoExW
RtlUnwind
SetFilePointerEx
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
ReadFile
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
GetFileSizeEx
LoadLibraryA
ResetEvent
GetVolumeInformationW
FreeResource
GetVersion
RaiseException
MoveFileW
FormatMessageW
OpenProcess
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
TerminateProcess
SetPriorityClass
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
GetDiskFreeSpaceExW
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetFileSize
GetStartupInfoW
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
AllocConsole
VirtualAlloc
GetTempPathW
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetWindowsDirectoryW
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
LockFile
GetConsoleCP
PeekConsoleInputW
lstrlenW
SetEndOfFile
QueryPerformanceCounter
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
CreateMutexA
SetEvent
GetLocaleInfoW
CreateFileW
DeleteFileW
IsDBCSLeadByteEx
FreeConsole
GetLocalTime
WaitForSingleObject
WriteFile
FlushConsoleInputBuffer
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
GetThreadLocale
SetThreadLocale
gethostbyaddr
WSAStartup
closesocket
socket
WSAIoctl
ShellExecuteW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CharUpperBuffA
CharUpperBuffW
CharNextW
MsgWaitForMultipleObjects
CharLowerBuffW
LoadStringW
CharUpperW
PeekMessageW
GetSystemMetrics
GetKeyboardLayoutList
MessageBoxW
GetIpNetTable
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
NetWkstaGetInfo
NetApiBufferFree
NetShareEnum
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
GetUserNameW
RegCloseKey
RegOpenKeyExW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ