Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
10Static
static
7Macrium.Re...64.rar
windows11-21h2-x64
10Macrium.Re...07.rar
windows11-21h2-x64
3Cleaner.exe
windows11-21h2-x64
7out.exe
windows11-21h2-x64
3Readme.txt
windows11-21h2-x64
3Macrium.Re...er.exe
windows11-21h2-x64
7out.exe
windows11-21h2-x64
3Macrium.Re...me.txt
windows11-21h2-x64
3Macrium.Re...ch.zip
windows11-21h2-x64
1Macrium_Re...ch.exe
windows11-21h2-x64
7Macrium.Re...ch.exe
windows11-21h2-x64
7Macrium.Re...up.xml
windows11-21h2-x64
1Macrium.Re...ls.xml
windows11-21h2-x64
1Macrium.Re...ffs_db
windows11-21h2-x64
3Macrium.Re...me.txt
windows11-21h2-x64
3Macrium.Re...64.exe
windows11-21h2-x64
1Macrium.Re..._3.exe
windows11-21h2-x64
1Behavioral task
behavioral1
Sample
Macrium.Reflect.8.1.7847.x64.rar
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
Macrium.Reflect.8.1.7847.x64/Macrium.Reflect-Cleaner-hawk007.rar
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
Cleaner.exe
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
Readme.txt
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
Macrium.Reflect.8.1.7847.x64/Macrium.Reflect-Cleaner-hawk007/Cleaner.exe
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
out.exe
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
Macrium.Reflect.8.1.7847.x64/Macrium.Reflect-Cleaner-hawk007/Readme.txt
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
Macrium.Reflect.8.1.7847.x64/Macrium_Reflect-7.x_8.x-patch.zip
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
Macrium_Reflect-7.x_8.x-patch.exe
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
Macrium.Reflect.8.1.7847.x64/Macrium_Reflect-7.x_8.x-patch/Macrium_Reflect-7.x_8.x-patch.exe
Resource
win11-20240221-en
Behavioral task
behavioral12
Sample
Macrium.Reflect.8.1.7847.x64/XML/KaraPCImageBackup.xml
Resource
win11-20240221-en
Behavioral task
behavioral13
Sample
Macrium.Reflect.8.1.7847.x64/XML/Tails.xml
Resource
win11-20240221-en
Behavioral task
behavioral14
Sample
Macrium.Reflect.8.1.7847.x64/XML/sync.ffs_db
Resource
win11-20240221-en
Behavioral task
behavioral15
Sample
Macrium.Reflect.8.1.7847.x64/readme.txt
Resource
win11-20240221-en
Behavioral task
behavioral16
Sample
Macrium.Reflect.8.1.7847.x64/reflect_server_plus_setup_x64.exe
Resource
win11-20240221-en
Behavioral task
behavioral17
Sample
Macrium.Reflect.8.1.7847.x64/reflect_wkstn_setup_x64_3.exe
Resource
win11-20240221-en
Target
Macrium.Reflect.8.1.7847.x64.rar
Size
396.3MB
MD5
16a519722418432f876497d04dfb9803
SHA1
7e82381293d01038ffc41c6123b48616ebb5d383
SHA256
d081165a2b369387a4161ff1be291cb532797dd16044e4b0994614e97bf9bd4f
SHA512
c843baa2f3611299124edd888860e67433a205b0a06573f4125d15532e4dd7824df09c80e2c0634286fe18389f7b8677db50a8f8ed484b297d6cf815399885f1
SSDEEP
12582912:ctXkytOHasjp0ngZT94PhLeMiRkbDi2Pgw0:YXbOHzj8gELmWD7q
resource | yara_rule |
---|---|
static1/unpack002/Cleaner.exe | upx |
static1/unpack001/Macrium.Reflect.8.1.7847.x64/Macrium.Reflect-Cleaner-hawk007/Cleaner.exe | upx |
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
static1/unpack003/out.upx | autoit_exe |
static1/unpack004/out.upx | autoit_exe |
Checks for missing Authenticode signature.
resource |
---|
unpack002/Cleaner.exe |
unpack003/out.upx |
unpack001/Macrium.Reflect.8.1.7847.x64/Macrium.Reflect-Cleaner-hawk007/Cleaner.exe |
unpack004/out.upx |
unpack005/Macrium_Reflect-7.x_8.x-patch.exe |
unpack001/Macrium.Reflect.8.1.7847.x64/Macrium_Reflect-7.x_8.x-patch/Macrium_Reflect-7.x_8.x-patch.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteFileA
ExitProcess
FindResourceA
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
RtlMoveMemory
SizeofResource
VirtualAlloc
lstrcatA
CloseHandle
CreateFileA
FlushFileBuffers
WriteFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteFileA
ExitProcess
FindResourceA
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
RtlMoveMemory
SizeofResource
VirtualAlloc
lstrcatA
CloseHandle
CreateFileA
FlushFileBuffers
WriteFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\release-reflect-8-1\release\x86\working\setup\pdbs\reflect_server_plus_setup_x64.pdb
ord205
ord173
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
WNetAddConnection3W
WNetGetUserW
WNetGetUniversalNameW
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
WNetGetConnectionW
WNetCancelConnection2W
WSAAddressToStringW
WSACleanup
closesocket
WSAStartup
socket
setsockopt
getnameinfo
WSAStringToAddressW
sendto
inet_ntoa
inet_addr
htons
CreateActCtxW
ActivateActCtx
DeactivateActCtx
FindActCtxSectionStringW
QueryActCtxW
GlobalLock
GlobalUnlock
MulDiv
EncodePointer
GlobalDeleteAtom
lstrcmpW
CompareStringW
SetEvent
CreateEventW
SetThreadPriority
SuspendThread
ResumeThread
lstrcmpA
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetFileSize
GetFullPathNameW
LockFile
SetEndOfFile
UnlockFile
FileTimeToLocalFileTime
GetFileTime
InitializeCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
GlobalFlags
GetSystemDefaultUILanguage
LoadLibraryExW
SetErrorMode
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
SystemTimeToFileTime
SetFilePointer
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetModuleHandleExW
OutputDebugStringW
GetStringTypeW
SwitchToThread
GetExitCodeThread
TryEnterCriticalSection
LCMapStringW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
SetEnvironmentVariableA
SetEnvironmentVariableW
SetVolumeLabelW
SetCurrentDirectoryW
ExitThread
FreeLibraryAndExitThread
GetCommandLineA
GetCommandLineW
SetStdHandle
GetFileType
HeapQueryInformation
GetStdHandle
ExitProcess
IsValidLocale
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FindResourceExW
ExpandEnvironmentStringsW
VirtualFree
VirtualAlloc
OutputDebugStringA
DuplicateHandle
CreateSemaphoreW
WaitForMultipleObjects
ReleaseSemaphore
GetFileAttributesExW
GetTempFileNameW
GlobalAddAtomW
MoveFileExW
GetSystemTime
SetLastError
GetLocalTime
GetACP
DeleteVolumeMountPointW
SetVolumeMountPointW
FindVolumeMountPointClose
FindNextVolumeMountPointW
FindFirstVolumeMountPointW
CopyFileW
CompareFileTime
TerminateThread
CreateThread
GetProcessTimes
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetCurrentThreadId
SetUnhandledExceptionFilter
GetUserDefaultLCID
GetUserDefaultUILanguage
SetThreadLocale
GetThreadLocale
EnumDateFormatsExW
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
ProcessIdToSessionId
GetVolumePathNamesForVolumeNameW
GetVolumeNameForVolumeMountPointW
FindVolumeClose
FindNextVolumeW
FindFirstVolumeW
DnsHostnameToComputerNameW
GetComputerNameExW
SetPriorityClass
GetVolumeInformationW
MoveFileW
QueryDosDeviceW
RemoveDirectoryW
GetSystemDirectoryW
GetDriveTypeW
GetFirmwareEnvironmentVariableA
GetModuleHandleW
LoadLibraryW
CreateMutexW
WriteConsoleW
CreateTimerQueue
SignalObjectAndWait
GetLogicalProcessorInformation
lstrlenW
FormatMessageW
GetTickCount
SetFilePointerEx
FlushFileBuffers
SetThreadExecutionState
GetCurrentThread
GetCurrentProcessId
LocalFree
LocalAlloc
GlobalFree
GlobalAlloc
GetVersion
GetProcAddress
FreeLibrary
GetSystemDefaultLCID
GetLocaleInfoA
FindNextFileW
FindFirstFileW
FindClose
VerifyVersionInfoW
VerSetConditionMask
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
GetVersionExW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
DefineDosDeviceW
CreateDirectoryW
GetCurrentDirectoryW
GetWindowsDirectoryW
GetTempPathW
CreateProcessW
GetModuleFileNameW
DeviceIoControl
ReadFile
GetFileSizeEx
Sleep
WaitForSingleObject
GetLastError
GetThreadPriority
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
GlobalFindAtomW
GetDiskFreeSpaceExW
CreateFileW
FindResourceW
CloseHandle
WriteFile
SizeofResource
LoadResource
LockResource
FreeResource
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
GetModuleHandleA
CreateTimerQueueTimer
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
GetDiskFreeSpaceW
VirtualProtect
RtlUnwind
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
RemovePropW
GetPropW
SetPropW
GetScrollPos
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
SetMenu
GetMenu
GetCapture
GetKeyState
SetFocus
GetDlgCtrlID
GetDlgItem
IsWindowVisible
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
DestroyWindow
IsChild
IsMenu
IsWindow
GetMonitorInfoW
ShowWindow
IsWindowEnabled
GetWindowLongW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
SetWindowLongW
GetWindowLongPtrW
SetWindowLongPtrW
GetClassLongPtrW
GetClassNameW
GetTopWindow
GetLastActivePopup
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
PtInRect
GetMessagePos
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
WinHelpW
GetMenuItemID
GetSubMenu
GetParent
OffsetRect
SetRectEmpty
SendDlgItemMessageA
OemToCharBuffA
CharToOemBuffA
MessageBoxW
SystemParametersInfoW
EnumDisplaySettingsW
LoadStringW
MsgWaitForMultipleObjectsEx
GetActiveWindow
SendMessageTimeoutW
PeekMessageW
DispatchMessageW
TranslateMessage
SetMenuItemInfoW
GetMenuItemInfoW
GetMenuItemCount
CopyRect
SetWindowTextW
CreateDialogIndirectParamW
EndDialog
GetNextDlgTabItem
GetDesktopWindow
GetDC
ReleaseDC
GetMessageW
GetCursorPos
PostQuitMessage
SetCursor
GetWindowThreadProcessId
CharUpperW
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
ClientToScreen
GetSysColorBrush
LoadCursorW
RealChildWindowFromPoint
DestroyMenu
SetTimer
KillTimer
InvalidateRect
GetSysColor
LoadImageW
UnregisterClassW
RegisterWindowMessageW
LoadIconW
GetClientRect
DrawIcon
GetSystemMetrics
IsIconic
PostMessageW
GetWindow
EnableWindow
SendMessageW
GetFocus
MonitorFromWindow
IsDialogMessageW
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
StretchBlt
SetStretchBltMode
SetMapMode
SetBkMode
SaveDC
RestoreDC
RectVisible
PtVisible
GetStockObject
GetClipBox
Escape
CreateSolidBrush
DeleteObject
GetObjectW
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
PatBlt
CreateCompatibleDC
DeleteDC
SelectObject
OpenPrinterW
DocumentPropertiesW
ClosePrinter
CryptHashData
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumValueW
RegQueryValueW
RegEnumKeyW
ImpersonateAnonymousToken
ImpersonateLoggedOnUser
SetThreadToken
RevertToSelf
ConvertStringSidToSidW
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
ReportEventW
RegisterEventSourceW
DeregisterEventSource
LogonUserW
RegQueryInfoKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetNamedSecurityInfoW
SetEntriesInAclW
OpenProcessToken
CryptCreateHash
CryptAcquireContextW
StartServiceW
RegUnLoadKeyW
RegOpenKeyExW
RegLoadKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountSidW
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
RegOpenKeyW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
ControlService
CloseServiceHandle
ChangeServiceConfigW
RegSetValueExW
RegQueryValueExW
SHGetFolderPathW
SHFileOperationW
SHChangeNotify
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
SHCreateDirectoryExW
ord328
ord329
ord334
ord332
ord338
ord17
UrlUnescapeW
PathStripToRootW
PathIsUNCW
PathStripPathW
PathMatchSpecW
PathFindExtensionW
PathIsNetworkPathW
PathFileExistsW
PathAppendW
PathFindFileNameW
CoTaskMemFree
CoInitializeEx
CoCreateGuid
CoInitializeSecurity
StringFromGUID2
CLSIDFromString
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitialize
SysStringLen
SysAllocString
SysFreeString
VariantInit
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
GetErrorInfo
VariantTimeToSystemTime
VariantChangeType
VariantClear
EnumProcesses
GetProcessImageFileNameW
NtClose
RtlInitUnicodeString
RtlNtStatusToDosError
NtQuerySystemInformation
NtCreateFile
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
CM_Get_Parent
CM_Get_Device_IDW
SetupDiGetDeviceInterfaceDetailW
WinHttpGetIEProxyConfigForCurrentUser
CreateStdAccessibleObject
LresultFromObject
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpSendRequestExW
HttpEndRequestW
HttpQueryInfoW
InternetQueryDataAvailable
InternetSetFilePointer
InternetReadFile
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetWriteFile
InternetSetOptionW
InternetGetLastResponseInfoW
InternetSetStatusCallbackW
NetServerGetInfo
NetShareGetInfo
NetApiBufferFree
GetTcpTable
GetAdaptersInfo
GetIpAddrTable
GetAdaptersAddresses
GetBestInterfaceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\release-reflect-8-1\release\x86\working\setup\pdbs\reflect_wkstn_setup_x64.pdb
ord205
ord173
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
WNetAddConnection3W
WNetGetUserW
WNetGetUniversalNameW
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
WNetGetConnectionW
WNetCancelConnection2W
WSAAddressToStringW
WSACleanup
closesocket
WSAStartup
socket
setsockopt
getnameinfo
WSAStringToAddressW
sendto
inet_ntoa
inet_addr
htons
CreateActCtxW
ActivateActCtx
DeactivateActCtx
FindActCtxSectionStringW
QueryActCtxW
GlobalLock
GlobalUnlock
MulDiv
EncodePointer
GlobalDeleteAtom
lstrcmpW
CompareStringW
SetEvent
CreateEventW
SetThreadPriority
SuspendThread
ResumeThread
lstrcmpA
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetFileSize
GetFullPathNameW
LockFile
SetEndOfFile
UnlockFile
FileTimeToLocalFileTime
GetFileTime
InitializeCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
GlobalFlags
GetSystemDefaultUILanguage
LoadLibraryExW
SetErrorMode
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
SystemTimeToFileTime
SetFilePointer
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetModuleHandleExW
OutputDebugStringW
GetStringTypeW
SwitchToThread
GetExitCodeThread
TryEnterCriticalSection
LCMapStringW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
SetEnvironmentVariableA
SetEnvironmentVariableW
SetVolumeLabelW
SetCurrentDirectoryW
ExitThread
FreeLibraryAndExitThread
GetCommandLineA
GetCommandLineW
SetStdHandle
GetFileType
HeapQueryInformation
GetStdHandle
ExitProcess
IsValidLocale
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FindResourceExW
ExpandEnvironmentStringsW
VirtualFree
VirtualAlloc
OutputDebugStringA
DuplicateHandle
CreateSemaphoreW
WaitForMultipleObjects
ReleaseSemaphore
GetFileAttributesExW
GetTempFileNameW
GlobalAddAtomW
MoveFileExW
GetSystemTime
SetLastError
GetLocalTime
GetACP
DeleteVolumeMountPointW
SetVolumeMountPointW
FindVolumeMountPointClose
FindNextVolumeMountPointW
FindFirstVolumeMountPointW
CopyFileW
CompareFileTime
TerminateThread
CreateThread
GetProcessTimes
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetCurrentThreadId
SetUnhandledExceptionFilter
GetUserDefaultLCID
GetUserDefaultUILanguage
SetThreadLocale
GetThreadLocale
EnumDateFormatsExW
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
ProcessIdToSessionId
GetVolumePathNamesForVolumeNameW
GetVolumeNameForVolumeMountPointW
FindVolumeClose
FindNextVolumeW
FindFirstVolumeW
DnsHostnameToComputerNameW
GetComputerNameExW
SetPriorityClass
GetVolumeInformationW
MoveFileW
QueryDosDeviceW
RemoveDirectoryW
GetSystemDirectoryW
GetDriveTypeW
GetFirmwareEnvironmentVariableA
GetModuleHandleW
LoadLibraryW
CreateMutexW
WriteConsoleW
CreateTimerQueue
SignalObjectAndWait
GetLogicalProcessorInformation
lstrlenW
FormatMessageW
GetTickCount
SetFilePointerEx
FlushFileBuffers
SetThreadExecutionState
GetCurrentThread
GetCurrentProcessId
LocalFree
LocalAlloc
GlobalFree
GlobalAlloc
GetVersion
GetProcAddress
FreeLibrary
GetSystemDefaultLCID
GetLocaleInfoA
FindNextFileW
FindFirstFileW
FindClose
VerifyVersionInfoW
VerSetConditionMask
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
GetVersionExW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
DefineDosDeviceW
CreateDirectoryW
GetCurrentDirectoryW
GetWindowsDirectoryW
GetTempPathW
CreateProcessW
GetModuleFileNameW
DeviceIoControl
ReadFile
GetFileSizeEx
Sleep
WaitForSingleObject
GetLastError
GetThreadPriority
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
GlobalFindAtomW
GetDiskFreeSpaceExW
CreateFileW
FindResourceW
CloseHandle
WriteFile
SizeofResource
LoadResource
LockResource
FreeResource
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
GetModuleHandleA
CreateTimerQueueTimer
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
GetDiskFreeSpaceW
VirtualProtect
RtlUnwind
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
RemovePropW
GetPropW
SetPropW
GetScrollPos
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
SetMenu
GetMenu
GetCapture
GetKeyState
SetFocus
GetDlgCtrlID
GetDlgItem
IsWindowVisible
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
DestroyWindow
IsChild
IsMenu
IsWindow
GetMonitorInfoW
ShowWindow
IsWindowEnabled
GetWindowLongW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
SetWindowLongW
GetWindowLongPtrW
SetWindowLongPtrW
GetClassLongPtrW
GetClassNameW
GetTopWindow
GetLastActivePopup
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
PtInRect
GetMessagePos
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
WinHelpW
GetMenuItemID
GetSubMenu
GetParent
OffsetRect
SetRectEmpty
SendDlgItemMessageA
OemToCharBuffA
CharToOemBuffA
MessageBoxW
SystemParametersInfoW
EnumDisplaySettingsW
LoadStringW
MsgWaitForMultipleObjectsEx
GetActiveWindow
SendMessageTimeoutW
PeekMessageW
DispatchMessageW
TranslateMessage
SetMenuItemInfoW
GetMenuItemInfoW
GetMenuItemCount
CopyRect
SetWindowTextW
CreateDialogIndirectParamW
EndDialog
GetNextDlgTabItem
GetDesktopWindow
GetDC
ReleaseDC
GetMessageW
GetCursorPos
PostQuitMessage
SetCursor
GetWindowThreadProcessId
CharUpperW
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
ClientToScreen
GetSysColorBrush
LoadCursorW
RealChildWindowFromPoint
DestroyMenu
SetTimer
KillTimer
InvalidateRect
GetSysColor
LoadImageW
UnregisterClassW
RegisterWindowMessageW
LoadIconW
GetClientRect
DrawIcon
GetSystemMetrics
IsIconic
PostMessageW
GetWindow
EnableWindow
SendMessageW
GetFocus
MonitorFromWindow
IsDialogMessageW
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
StretchBlt
SetStretchBltMode
SetMapMode
SetBkMode
SaveDC
RestoreDC
RectVisible
PtVisible
GetStockObject
GetClipBox
Escape
CreateSolidBrush
DeleteObject
GetObjectW
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
PatBlt
CreateCompatibleDC
DeleteDC
SelectObject
OpenPrinterW
DocumentPropertiesW
ClosePrinter
CryptHashData
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumValueW
RegQueryValueW
RegEnumKeyW
ImpersonateAnonymousToken
ImpersonateLoggedOnUser
SetThreadToken
RevertToSelf
ConvertStringSidToSidW
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
ReportEventW
RegisterEventSourceW
DeregisterEventSource
LogonUserW
RegQueryInfoKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetNamedSecurityInfoW
SetEntriesInAclW
OpenProcessToken
CryptCreateHash
CryptAcquireContextW
StartServiceW
RegUnLoadKeyW
RegOpenKeyExW
RegLoadKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountSidW
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
RegOpenKeyW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
ControlService
CloseServiceHandle
ChangeServiceConfigW
RegSetValueExW
RegQueryValueExW
SHGetFolderPathW
SHFileOperationW
SHChangeNotify
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
SHCreateDirectoryExW
ord328
ord329
ord334
ord332
ord338
ord17
UrlUnescapeW
PathStripToRootW
PathIsUNCW
PathStripPathW
PathMatchSpecW
PathFindExtensionW
PathIsNetworkPathW
PathFileExistsW
PathAppendW
PathFindFileNameW
CoTaskMemFree
CoInitializeEx
CoCreateGuid
CoInitializeSecurity
StringFromGUID2
CLSIDFromString
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitialize
SysStringLen
SysAllocString
SysFreeString
VariantInit
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
GetErrorInfo
VariantTimeToSystemTime
VariantChangeType
VariantClear
EnumProcesses
GetProcessImageFileNameW
NtClose
RtlInitUnicodeString
RtlNtStatusToDosError
NtQuerySystemInformation
NtCreateFile
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
CM_Get_Parent
CM_Get_Device_IDW
SetupDiGetDeviceInterfaceDetailW
WinHttpGetIEProxyConfigForCurrentUser
CreateStdAccessibleObject
LresultFromObject
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpSendRequestExW
HttpEndRequestW
HttpQueryInfoW
InternetQueryDataAvailable
InternetSetFilePointer
InternetReadFile
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetWriteFile
InternetSetOptionW
InternetGetLastResponseInfoW
InternetSetStatusCallbackW
NetServerGetInfo
NetShareGetInfo
NetApiBufferFree
GetTcpTable
GetAdaptersInfo
GetIpAddrTable
GetAdaptersAddresses
GetBestInterfaceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ