Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2c21a0b8daaa882732e24cb84be9032bc6b5006c07f799b98cd7be117494128f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c21a0b8daaa882732e24cb84be9032bc6b5006c07f799b98cd7be117494128f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
34e70cd055a5074dc7a59f831087ca37813b3e5c339f01ae67cb9fcea4d73707.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
34e70cd055a5074dc7a59f831087ca37813b3e5c339f01ae67cb9fcea4d73707.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
b9b8eb24524a3cdc34447b4ee5d56bbbb7a3bc4c9925e1a513cbf79a534d2eb2.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
b9b8eb24524a3cdc34447b4ee5d56bbbb7a3bc4c9925e1a513cbf79a534d2eb2.exe
Resource
win10v2004-20240426-en
Target
3samples.zip
Size
5.4MB
MD5
9c7ed4b003209d4cb87e98b160a6f647
SHA1
5231580b3eaa5c11296252214df8e767cd34ec60
SHA256
3b6e6c089735b515134101b8a3d73a971c75763ce2c7f8d78a9a74b72348cf80
SHA512
ce0ca364ff2c7d02bb9e3558d24a676b68c1580ad032f61b19659fb79e01f73a5f5d910ba5aea753f9b63fc40b1660585a0d7a270b55f348b42a9b45bf585afe
SSDEEP
98304:AqhBQxAbRjn77Tz9OcM6UBr8HQl4Y15phxFus76R9U99g:rjntW5WQz5Lxos76DiS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\T\BuildResults\bin\Release_x64\AcrobatExe.pdb
LoadLibraryA
CreateFileA
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFinalPathNameByHandleW
SetFilePointer
GetSystemInfo
VirtualQueryEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LoadLibraryExA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
SetErrorMode
QueryPerformanceCounter
HeapSetInformation
ReleaseSemaphore
WaitForMultipleObjects
CreateSemaphoreW
CreateProcessW
GetSystemTime
GetSystemTimeAsFileTime
AddAtomW
SystemTimeToFileTime
QueryPerformanceFrequency
IsProcessorFeaturePresent
GetVersionExW
RtlUnwind
UpdateProcThreadAttribute
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
TerminateThread
SetThreadPriority
GetCurrentThread
CreateEventA
lstrcmpW
lstrcmpA
GetSystemDirectoryW
OutputDebugStringW
QueryDosDeviceW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
GetCurrentDirectoryW
WideCharToMultiByte
MultiByteToWideChar
SetDllDirectoryW
LoadLibraryExW
FreeLibrary
GetExitCodeProcess
GetLongPathNameW
SetCurrentDirectoryW
GetCommandLineW
GetTickCount
OpenMutexW
GetVolumeInformationW
GetModuleHandleW
CreateThread
CreateEventW
CreateMutexW
WaitForSingleObject
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WaitNamedPipeW
CreateNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
WriteFile
ReadFile
GetFileType
CreateFileW
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
LoadLibraryW
WriteConsoleW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
GetSystemPowerStatus
GetDateFormatW
GetStdHandle
ExitProcess
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
FreeLibraryAndExitThread
RtlUnwindEx
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeCriticalSectionAndSpinCount
GetLocaleInfoEx
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
TerminateProcess
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
RaiseException
DecodePointer
OutputDebugStringA
GetStartupInfoW
lstrlenW
GetCurrentProcessId
GetCurrentProcess
GetTempPathW
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
VerifyVersionInfoW
lstrcmpiW
LocalFree
LocalAlloc
GetCurrentThreadId
GetLastError
CloseHandle
VerSetConditionMask
GetProcAddress
GetModuleHandleA
GetCPInfo
CompareStringEx
LCMapStringEx
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
FreeLibraryWhenCallbackReturns
RtlPcToFileHeader
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetTimeFormatW
GetModuleFileNameA
GetStringTypeW
WaitForSingleObjectEx
QueryFullProcessImageNameW
GlobalHandle
CreatePipe
MulDiv
GlobalUnlock
GlobalSize
GlobalLock
OpenFileMappingW
OpenEventW
GetComputerNameExW
VirtualProtect
VirtualQuery
ExpandEnvironmentStringsW
ProcessIdToSessionId
GetProcessId
DuplicateHandle
GetProcessTimes
IsWow64Process
GetProductInfo
GetNativeSystemInfo
DeleteFileW
GetFileSizeEx
GetLocalTime
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
RegisterWaitForSingleObject
QueryThreadCycleTime
GetThreadPriority
GetUserDefaultLangID
IsDebuggerPresent
GetThreadId
TlsGetValue
AcquireSRWLockExclusive
MoveFileExW
GetFileAttributesExW
CopyFileW
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
SetEndOfFile
GetFileInformationByHandle
FlushFileBuffers
FindFirstFileExW
GetWindowsDirectoryW
lstrcmpiA
GetLocaleInfoW
GetDriveTypeW
DeviceIoControl
GetVolumeNameForVolumeMountPointW
GetVolumePathNamesForVolumeNameW
GetFileSize
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
GetVolumeInformationByHandleW
GetEnvironmentVariableW
GetProfileStringW
ReadProcessMemory
CreateIoCompletionPort
GetQueuedCompletionStatus
UnregisterWait
TerminateJobObject
PostQueuedCompletionStatus
SetInformationJobObject
IsProcessInJob
QueryInformationJobObject
ResumeThread
DebugBreak
GetUserDefaultLCID
GetUserDefaultLocaleName
SetHandleInformation
AssignProcessToJobObject
SignalObjectAndWait
CreateRemoteThread
CreateJobObjectW
VirtualFree
SearchPathW
ExitThread
FlushInstructionCache
VirtualAlloc
GetModuleHandleExA
GlobalAlloc
GlobalFree
GetTempFileNameW
GetExitCodeThread
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
GetFullPathNameW
GetFileTime
CompareFileTime
CreateDirectoryExW
SetEnvironmentVariableW
GetModuleHandleExW
GetMessageW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
CreateDesktopW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
TranslateMessage
GetParent
MessageBoxW
RemovePropW
GetPropW
SetPropW
GetActiveWindow
GetDlgItem
SendMessageW
GetPropA
GetClassNameW
DispatchMessageW
DdeDisconnect
DdeConnect
DdeAddData
DdeCreateDataHandle
DdeQueryStringA
DdeGetData
EnumThreadWindows
IsWindowVisible
DdeFreeStringHandle
DdeCreateStringHandleW
DdeNameService
DdeUninitialize
DdeInitializeW
SetWindowLongPtrW
SendNotifyMessageW
RegisterWindowMessageA
CloseDesktop
SetThreadDesktop
OpenInputDesktop
CreateWindowExW
RegisterClassExW
DefWindowProcW
RegisterWindowMessageW
LoadIconA
LoadCursorA
FindWindowA
DestroyWindow
CreateWindowExA
RegisterClassExA
UnregisterClassA
GetThreadDesktop
PostThreadMessageW
IsWindowEnabled
MsgWaitForMultipleObjects
PeekMessageW
CloseWindowStation
GetFocus
MonitorFromWindow
GetMonitorInfoW
GetAsyncKeyState
EnumChildWindows
FindWindowExW
EnableWindow
WindowFromPoint
GetAncestor
GetShellWindow
GetRawInputDeviceInfoW
SetActiveWindow
CreateIconFromResourceEx
GetDC
GetWindowTextLengthW
ReleaseDC
RegisterClassW
GetWindowInfo
SetDlgItemTextW
GetRawInputDeviceList
DdeClientTransaction
LoadIconW
SendDlgItemMessageW
RegisterClipboardFormatW
GetClipboardData
IsClipboardFormatAvailable
EnumClipboardFormats
CountClipboardFormats
SetClipboardData
GetClipboardFormatNameW
GetClipboardFormatNameA
GetClipboardSequenceNumber
GetClipboardOwner
GetPriorityClipboardFormat
GetOpenClipboardWindow
GetClipboardViewer
CloseWindow
LoadCursorW
GetWindowDC
SystemParametersInfoW
BeginPaint
EndPaint
GetClientRect
MoveWindow
UpdateWindow
AdjustWindowRectEx
IsChild
SetFocus
SetRect
MonitorFromRect
IsRectEmpty
GetClassInfoExW
GetWindowLongW
SetWindowLongW
GetSysColor
CallWindowProcW
RedrawWindow
CreateAcceleratorTableW
ClientToScreen
ScreenToClient
SetCapture
ReleaseCapture
FillRect
InvalidateRect
InvalidateRgn
DestroyAcceleratorTable
MapWindowPoints
SetCursor
IsDialogMessageW
LoadBitmapW
MapDialogRect
SetWindowContextHelpId
CreateDialogIndirectParamW
PostQuitMessage
DefWindowProcA
DispatchMessageA
GetMessageA
UserHandleGrantAccess
GetWindow
EnumWindows
SetParent
GetWindowLongPtrW
GetWindowTextW
IsWindow
GetDesktopWindow
GetWindowRect
SetForegroundWindow
GetSystemMetrics
BringWindowToTop
SendMessageTimeoutW
EnumDesktopWindows
SetWindowTextW
GetForegroundWindow
CharNextW
EndDialog
DialogBoxParamW
GetGUIThreadInfo
GetWindowThreadProcessId
FindWindowW
AllowSetForegroundWindow
SwitchToThisWindow
KillTimer
SetTimer
EmptyClipboard
CloseClipboard
OpenClipboard
SetWindowPos
ShowWindow
UnregisterClassW
PostMessageW
CryptGenKey
RegGetValueW
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
EqualSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyW
ReportEventW
RegisterEventSourceW
CloseEventLog
ConvertSidToStringSidW
MakeAbsoluteSD
InitiateSystemShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
SetTokenInformation
GetSecurityDescriptorSacl
GetLengthSid
FreeSid
DuplicateTokenEx
CreateWellKnownSid
CopySid
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegNotifyChangeKeyValue
RegEnumValueW
RegDeleteKeyExW
SystemFunction036
GetNamedSecurityInfoW
MapGenericMask
AccessCheck
OpenThreadToken
InitializeSecurityDescriptor
InitializeAcl
SetSecurityDescriptorDacl
GetAce
SetKernelObjectSecurity
GetKernelObjectSecurity
InitializeSid
GetAclInformation
AddAce
RevertToSelf
RegDisablePredefinedCache
CreateRestrictedToken
DuplicateToken
CreateProcessAsUserW
SetThreadToken
CheckTokenMembership
RegDeleteTreeW
SaferiIsExecutableFileType
GetUserNameW
ImpersonateAnonymousToken
CryptAcquireContextA
CryptAcquireContextW
CryptReleaseContext
CryptImportKey
CryptDestroyKey
CryptGetProvParam
CryptSetProvParam
CryptGenRandom
CryptGetUserKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptSignHashA
CryptSignHashW
CryptGetHashParam
CryptSetHashParam
CredReadW
CredFree
CredWriteW
CredDeleteW
CryptSetKeyParam
CryptContextAddRef
UrlIsW
PathCanonicalizeW
PathFileExistsW
PathRemoveBackslashW
PathAppendW
PathRemoveFileSpecW
PathFindExtensionA
PathCombineW
PathIsRelativeW
PathFindExtensionW
AssocQueryStringW
UrlGetPartW
PathIsDirectoryW
PathIsUNCW
PathFindFileNameW
PathAddBackslashW
PathCreateFromUrlW
UrlCanonicalizeW
UrlUnescapeW
PathIsUNCServerShareW
ord219
PathIsURLW
WinHttpSetCredentials
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpSetStatusCallback
WinHttpAddRequestHeaders
??4PreamblePatcher@sidestep@@QEAAAEAV01@$$QEAV01@@Z
??4PreamblePatcher@sidestep@@QEAAAEAV01@AEBV01@@Z
?AcrobatIsNearAbsoluteIndirectJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?AllocPageNear@PreamblePatcher@sidestep@@CAPEAXPEAX@Z
?AllocPreambleBlockNear@PreamblePatcher@sidestep@@SAPEAEPEAX@Z
?FreePreambleBlock@PreamblePatcher@sidestep@@SAXPEAE@Z
?Initialize@PreamblePatcher@sidestep@@CAXXZ
?IsMovWithDisplacement@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearAbsoluteCall@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearConditionalJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearRelativeCall@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearRelativeJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsShortConditionalJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsShortJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?PatchMovWithDisplacement@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchNearJumpOrCall@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchShortConditionalJump@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchShortJump@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?RawPatch@PreamblePatcher@sidestep@@SA?AW4SideStepError@2@PEAX0PEAPEAXPEBD@Z
?RawPatchWithStub@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAX0PEAEKPEAKPEBD@Z
?RawPatchWithStubAndProtections@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAX0PEAEKPEAKPEBD@Z
?ResolveTargetImpl@PreamblePatcher@sidestep@@CAPEAXPEAE0_N@Z
?Unpatch@PreamblePatcher@sidestep@@SA?AW4SideStepError@2@PEAX00@Z
?granularity_@PreamblePatcher@sidestep@@0JA
?initialized_@PreamblePatcher@sidestep@@0_NA
?pagesize_@PreamblePatcher@sidestep@@0JA
?preamble_pages_@PreamblePatcher@sidestep@@0PEAUPreamblePage@12@EA
AcroRd32IsBrokerProcess
GetHandleVerifier
GetWinstaDesktopInfo
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\T\BuildResults\bin\Release_x64\AcrobatExe.pdb
CreateFileA
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFinalPathNameByHandleW
SetFilePointer
GetSystemInfo
VirtualQueryEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LoadLibraryExA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
WideCharToMultiByte
SetErrorMode
QueryPerformanceCounter
HeapSetInformation
ReleaseSemaphore
WaitForMultipleObjects
CreateSemaphoreW
CreateProcessW
GetSystemTime
GetSystemTimeAsFileTime
AddAtomW
SystemTimeToFileTime
QueryPerformanceFrequency
IsProcessorFeaturePresent
GetVersionExW
RtlUnwind
UpdateProcThreadAttribute
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
GetModuleFileNameA
TerminateThread
SetThreadPriority
GetCurrentThread
CreateEventA
lstrcmpW
lstrcmpA
GetSystemDirectoryW
OutputDebugStringW
QueryDosDeviceW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
GetCurrentDirectoryW
MultiByteToWideChar
SetDllDirectoryW
LoadLibraryExW
FreeLibrary
GetExitCodeProcess
GetLongPathNameW
SetCurrentDirectoryW
GetCommandLineW
GetTickCount
OpenMutexW
GetVolumeInformationW
GetModuleHandleW
CreateThread
CreateEventW
CreateMutexW
WaitForSingleObject
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WaitNamedPipeW
CreateNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
WriteFile
ReadFile
GetFileType
CreateFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
WriteConsoleW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
LoadLibraryA
GetDateFormatW
GetStdHandle
ExitProcess
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
FreeLibraryAndExitThread
RtlUnwindEx
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeCriticalSectionAndSpinCount
GetLocaleInfoEx
ActivateActCtx
CreateActCtxW
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
OpenProcess
TerminateProcess
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
RaiseException
DecodePointer
OutputDebugStringA
GetStartupInfoW
lstrlenW
GetCurrentProcessId
GetCurrentProcess
GetTempPathW
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
VerifyVersionInfoW
lstrcmpiW
LocalFree
LocalAlloc
GetCurrentThreadId
GetLastError
CloseHandle
VerSetConditionMask
GetProcAddress
GetSystemPowerStatus
GetCPInfo
CompareStringEx
LCMapStringEx
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
FreeLibraryWhenCallbackReturns
RtlPcToFileHeader
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetTimeFormatW
GetModuleHandleA
GetStringTypeW
WaitForSingleObjectEx
QueryFullProcessImageNameW
GlobalHandle
CreatePipe
MulDiv
GlobalUnlock
GlobalSize
GlobalLock
OpenFileMappingW
OpenEventW
GetComputerNameExW
VirtualProtect
VirtualQuery
ExpandEnvironmentStringsW
ProcessIdToSessionId
GetProcessId
DuplicateHandle
GetProcessTimes
IsWow64Process
GetProductInfo
GetNativeSystemInfo
DeleteFileW
GetFileSizeEx
GetLocalTime
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
RegisterWaitForSingleObject
QueryThreadCycleTime
GetThreadPriority
GetUserDefaultLangID
IsDebuggerPresent
GetThreadId
TlsGetValue
AcquireSRWLockExclusive
MoveFileExW
GetFileAttributesExW
CopyFileW
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
SetEndOfFile
GetFileInformationByHandle
FlushFileBuffers
FindFirstFileExW
GetWindowsDirectoryW
lstrcmpiA
GetLocaleInfoW
GetDriveTypeW
DeviceIoControl
GetVolumeNameForVolumeMountPointW
GetVolumePathNamesForVolumeNameW
GetFileSize
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
GetVolumeInformationByHandleW
GetEnvironmentVariableW
GetProfileStringW
ReadProcessMemory
CreateIoCompletionPort
GetQueuedCompletionStatus
UnregisterWait
TerminateJobObject
PostQueuedCompletionStatus
SetInformationJobObject
IsProcessInJob
QueryInformationJobObject
ResumeThread
DebugBreak
GetUserDefaultLCID
GetUserDefaultLocaleName
SetHandleInformation
AssignProcessToJobObject
SignalObjectAndWait
CreateRemoteThread
CreateJobObjectW
VirtualFree
SearchPathW
ExitThread
FlushInstructionCache
VirtualAlloc
GetModuleHandleExA
GlobalAlloc
GlobalFree
GetTempFileNameW
GetExitCodeThread
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
GetFullPathNameW
GetFileTime
CompareFileTime
CreateDirectoryExW
SetEnvironmentVariableW
GetModuleHandleExW
GetMessageW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
CreateDesktopW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
TranslateMessage
GetParent
MessageBoxW
RemovePropW
GetPropW
SetPropW
GetActiveWindow
GetDlgItem
SendMessageW
GetPropA
GetClassNameW
DispatchMessageW
DdeDisconnect
DdeConnect
DdeAddData
DdeCreateDataHandle
DdeQueryStringA
DdeGetData
EnumThreadWindows
IsWindowVisible
DdeFreeStringHandle
DdeCreateStringHandleW
DdeNameService
DdeUninitialize
DdeInitializeW
SetWindowLongPtrW
SendNotifyMessageW
RegisterWindowMessageA
CloseDesktop
SetThreadDesktop
OpenInputDesktop
CreateWindowExW
RegisterClassExW
DefWindowProcW
RegisterWindowMessageW
LoadIconA
LoadCursorA
FindWindowA
DestroyWindow
CreateWindowExA
RegisterClassExA
UnregisterClassA
GetThreadDesktop
PostThreadMessageW
IsWindowEnabled
MsgWaitForMultipleObjects
PeekMessageW
CloseWindowStation
GetFocus
MonitorFromWindow
GetMonitorInfoW
GetAsyncKeyState
EnumChildWindows
FindWindowExW
EnableWindow
WindowFromPoint
GetAncestor
GetShellWindow
GetRawInputDeviceInfoW
SetActiveWindow
CreateIconFromResourceEx
GetDC
GetWindowTextLengthW
ReleaseDC
RegisterClassW
GetWindowInfo
SetDlgItemTextW
GetRawInputDeviceList
DdeClientTransaction
LoadIconW
SendDlgItemMessageW
RegisterClipboardFormatW
GetClipboardData
IsClipboardFormatAvailable
EnumClipboardFormats
CountClipboardFormats
SetClipboardData
GetClipboardFormatNameW
GetClipboardFormatNameA
GetClipboardSequenceNumber
GetClipboardOwner
GetPriorityClipboardFormat
GetOpenClipboardWindow
GetClipboardViewer
CloseWindow
LoadCursorW
GetWindowDC
SystemParametersInfoW
BeginPaint
EndPaint
GetClientRect
MoveWindow
UpdateWindow
AdjustWindowRectEx
IsChild
SetFocus
SetRect
MonitorFromRect
IsRectEmpty
GetClassInfoExW
GetWindowLongW
SetWindowLongW
GetSysColor
CallWindowProcW
RedrawWindow
CreateAcceleratorTableW
ClientToScreen
ScreenToClient
SetCapture
ReleaseCapture
FillRect
InvalidateRect
InvalidateRgn
DestroyAcceleratorTable
MapWindowPoints
SetCursor
IsDialogMessageW
LoadBitmapW
MapDialogRect
SetWindowContextHelpId
CreateDialogIndirectParamW
PostQuitMessage
DefWindowProcA
DispatchMessageA
GetMessageA
UserHandleGrantAccess
GetWindow
EnumWindows
SetParent
GetWindowLongPtrW
GetWindowTextW
IsWindow
GetDesktopWindow
GetWindowRect
SetForegroundWindow
GetSystemMetrics
BringWindowToTop
SendMessageTimeoutW
EnumDesktopWindows
SetWindowTextW
GetForegroundWindow
CharNextW
EndDialog
DialogBoxParamW
GetGUIThreadInfo
GetWindowThreadProcessId
FindWindowW
AllowSetForegroundWindow
SwitchToThisWindow
KillTimer
SetTimer
EmptyClipboard
CloseClipboard
OpenClipboard
SetWindowPos
ShowWindow
UnregisterClassW
PostMessageW
CryptGenKey
RegGetValueW
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
EqualSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyW
ReportEventW
RegisterEventSourceW
CloseEventLog
ConvertSidToStringSidW
MakeAbsoluteSD
InitiateSystemShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
SetTokenInformation
GetSecurityDescriptorSacl
GetLengthSid
FreeSid
DuplicateTokenEx
CreateWellKnownSid
CopySid
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegNotifyChangeKeyValue
RegEnumValueW
RegDeleteKeyExW
SystemFunction036
GetNamedSecurityInfoW
MapGenericMask
AccessCheck
OpenThreadToken
InitializeSecurityDescriptor
InitializeAcl
SetSecurityDescriptorDacl
GetAce
SetKernelObjectSecurity
GetKernelObjectSecurity
InitializeSid
GetAclInformation
AddAce
RevertToSelf
RegDisablePredefinedCache
CreateRestrictedToken
DuplicateToken
CreateProcessAsUserW
SetThreadToken
CheckTokenMembership
RegDeleteTreeW
SaferiIsExecutableFileType
GetUserNameW
ImpersonateAnonymousToken
CryptAcquireContextA
CryptAcquireContextW
CryptReleaseContext
CryptImportKey
CryptDestroyKey
CryptGetProvParam
CryptSetProvParam
CryptGenRandom
CryptGetUserKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptSignHashA
CryptSignHashW
CryptGetHashParam
CryptSetHashParam
CredReadW
CredFree
CredWriteW
CredDeleteW
CryptSetKeyParam
CryptContextAddRef
UrlIsW
PathCanonicalizeW
PathFileExistsW
PathRemoveBackslashW
PathAppendW
PathRemoveFileSpecW
PathFindExtensionA
PathCombineW
PathIsRelativeW
PathFindExtensionW
AssocQueryStringW
UrlGetPartW
PathIsDirectoryW
PathIsUNCW
PathFindFileNameW
PathAddBackslashW
PathCreateFromUrlW
UrlCanonicalizeW
UrlUnescapeW
PathIsUNCServerShareW
ord219
PathIsURLW
WinHttpSetCredentials
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpSetStatusCallback
WinHttpAddRequestHeaders
??4PreamblePatcher@sidestep@@QEAAAEAV01@$$QEAV01@@Z
??4PreamblePatcher@sidestep@@QEAAAEAV01@AEBV01@@Z
?AcrobatIsNearAbsoluteIndirectJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?AllocPageNear@PreamblePatcher@sidestep@@CAPEAXPEAX@Z
?AllocPreambleBlockNear@PreamblePatcher@sidestep@@SAPEAEPEAX@Z
?FreePreambleBlock@PreamblePatcher@sidestep@@SAXPEAE@Z
?Initialize@PreamblePatcher@sidestep@@CAXXZ
?IsMovWithDisplacement@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearAbsoluteCall@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearConditionalJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearRelativeCall@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearRelativeJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsShortConditionalJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsShortJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?PatchMovWithDisplacement@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchNearJumpOrCall@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchShortConditionalJump@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchShortJump@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?RawPatch@PreamblePatcher@sidestep@@SA?AW4SideStepError@2@PEAX0PEAPEAXPEBD@Z
?RawPatchWithStub@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAX0PEAEKPEAKPEBD@Z
?RawPatchWithStubAndProtections@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAX0PEAEKPEAKPEBD@Z
?ResolveTargetImpl@PreamblePatcher@sidestep@@CAPEAXPEAE0_N@Z
?Unpatch@PreamblePatcher@sidestep@@SA?AW4SideStepError@2@PEAX00@Z
?granularity_@PreamblePatcher@sidestep@@0JA
?initialized_@PreamblePatcher@sidestep@@0_NA
?pagesize_@PreamblePatcher@sidestep@@0JA
?preamble_pages_@PreamblePatcher@sidestep@@0PEAUPreamblePage@12@EA
AcroRd32IsBrokerProcess
GetHandleVerifier
GetWinstaDesktopInfo
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\T\BuildResults\bin\Release_x64\AcrobatExe.pdb
CreateFileA
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFinalPathNameByHandleW
SetFilePointer
GetSystemInfo
VirtualQueryEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LoadLibraryExA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
WideCharToMultiByte
SetErrorMode
QueryPerformanceCounter
HeapSetInformation
ReleaseSemaphore
WaitForMultipleObjects
CreateSemaphoreW
CreateProcessW
GetSystemTime
GetSystemTimeAsFileTime
AddAtomW
SystemTimeToFileTime
QueryPerformanceFrequency
IsProcessorFeaturePresent
GetVersionExW
RtlUnwind
UpdateProcThreadAttribute
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
GetModuleFileNameA
TerminateThread
SetThreadPriority
GetCurrentThread
CreateEventA
lstrcmpW
lstrcmpA
GetSystemDirectoryW
OutputDebugStringW
QueryDosDeviceW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
GetCurrentDirectoryW
MultiByteToWideChar
SetDllDirectoryW
LoadLibraryExW
FreeLibrary
GetExitCodeProcess
GetLongPathNameW
SetCurrentDirectoryW
GetCommandLineW
GetTickCount
OpenMutexW
GetVolumeInformationW
GetModuleHandleW
CreateThread
CreateEventW
CreateMutexW
WaitForSingleObject
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WaitNamedPipeW
CreateNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
WriteFile
ReadFile
GetFileType
CreateFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
WriteConsoleW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
LoadLibraryA
GetDateFormatW
GetStdHandle
ExitProcess
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
FreeLibraryAndExitThread
RtlUnwindEx
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeCriticalSectionAndSpinCount
GetLocaleInfoEx
ActivateActCtx
CreateActCtxW
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
OpenProcess
TerminateProcess
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
RaiseException
DecodePointer
OutputDebugStringA
GetStartupInfoW
lstrlenW
GetCurrentProcessId
GetCurrentProcess
GetTempPathW
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
VerifyVersionInfoW
lstrcmpiW
LocalFree
LocalAlloc
GetCurrentThreadId
GetLastError
CloseHandle
VerSetConditionMask
GetProcAddress
GetSystemPowerStatus
GetCPInfo
CompareStringEx
LCMapStringEx
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
FreeLibraryWhenCallbackReturns
RtlPcToFileHeader
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetTimeFormatW
GetModuleHandleA
GetStringTypeW
WaitForSingleObjectEx
QueryFullProcessImageNameW
GlobalHandle
CreatePipe
MulDiv
GlobalUnlock
GlobalSize
GlobalLock
OpenFileMappingW
OpenEventW
GetComputerNameExW
VirtualProtect
VirtualQuery
ExpandEnvironmentStringsW
ProcessIdToSessionId
GetProcessId
DuplicateHandle
GetProcessTimes
IsWow64Process
GetProductInfo
GetNativeSystemInfo
DeleteFileW
GetFileSizeEx
GetLocalTime
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
RegisterWaitForSingleObject
QueryThreadCycleTime
GetThreadPriority
GetUserDefaultLangID
IsDebuggerPresent
GetThreadId
TlsGetValue
AcquireSRWLockExclusive
MoveFileExW
GetFileAttributesExW
CopyFileW
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
SetEndOfFile
GetFileInformationByHandle
FlushFileBuffers
FindFirstFileExW
GetWindowsDirectoryW
lstrcmpiA
GetLocaleInfoW
GetDriveTypeW
DeviceIoControl
GetVolumeNameForVolumeMountPointW
GetVolumePathNamesForVolumeNameW
GetFileSize
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
GetVolumeInformationByHandleW
GetEnvironmentVariableW
GetProfileStringW
ReadProcessMemory
CreateIoCompletionPort
GetQueuedCompletionStatus
UnregisterWait
TerminateJobObject
PostQueuedCompletionStatus
SetInformationJobObject
IsProcessInJob
QueryInformationJobObject
ResumeThread
DebugBreak
GetUserDefaultLCID
GetUserDefaultLocaleName
SetHandleInformation
AssignProcessToJobObject
SignalObjectAndWait
CreateRemoteThread
CreateJobObjectW
VirtualFree
SearchPathW
ExitThread
FlushInstructionCache
VirtualAlloc
GetModuleHandleExA
GlobalAlloc
GlobalFree
GetTempFileNameW
GetExitCodeThread
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
GetFullPathNameW
GetFileTime
CompareFileTime
CreateDirectoryExW
SetEnvironmentVariableW
GetModuleHandleExW
GetMessageW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
CreateDesktopW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
TranslateMessage
GetParent
MessageBoxW
RemovePropW
GetPropW
SetPropW
GetActiveWindow
GetDlgItem
SendMessageW
GetPropA
GetClassNameW
DispatchMessageW
DdeDisconnect
DdeConnect
DdeAddData
DdeCreateDataHandle
DdeQueryStringA
DdeGetData
EnumThreadWindows
IsWindowVisible
DdeFreeStringHandle
DdeCreateStringHandleW
DdeNameService
DdeUninitialize
DdeInitializeW
SetWindowLongPtrW
SendNotifyMessageW
RegisterWindowMessageA
CloseDesktop
SetThreadDesktop
OpenInputDesktop
CreateWindowExW
RegisterClassExW
DefWindowProcW
RegisterWindowMessageW
LoadIconA
LoadCursorA
FindWindowA
DestroyWindow
CreateWindowExA
RegisterClassExA
UnregisterClassA
GetThreadDesktop
PostThreadMessageW
IsWindowEnabled
MsgWaitForMultipleObjects
PeekMessageW
CloseWindowStation
GetFocus
MonitorFromWindow
GetMonitorInfoW
GetAsyncKeyState
EnumChildWindows
FindWindowExW
EnableWindow
WindowFromPoint
GetAncestor
GetShellWindow
GetRawInputDeviceInfoW
SetActiveWindow
CreateIconFromResourceEx
GetDC
GetWindowTextLengthW
ReleaseDC
RegisterClassW
GetWindowInfo
SetDlgItemTextW
GetRawInputDeviceList
DdeClientTransaction
LoadIconW
SendDlgItemMessageW
RegisterClipboardFormatW
GetClipboardData
IsClipboardFormatAvailable
EnumClipboardFormats
CountClipboardFormats
SetClipboardData
GetClipboardFormatNameW
GetClipboardFormatNameA
GetClipboardSequenceNumber
GetClipboardOwner
GetPriorityClipboardFormat
GetOpenClipboardWindow
GetClipboardViewer
CloseWindow
LoadCursorW
GetWindowDC
SystemParametersInfoW
BeginPaint
EndPaint
GetClientRect
MoveWindow
UpdateWindow
AdjustWindowRectEx
IsChild
SetFocus
SetRect
MonitorFromRect
IsRectEmpty
GetClassInfoExW
GetWindowLongW
SetWindowLongW
GetSysColor
CallWindowProcW
RedrawWindow
CreateAcceleratorTableW
ClientToScreen
ScreenToClient
SetCapture
ReleaseCapture
FillRect
InvalidateRect
InvalidateRgn
DestroyAcceleratorTable
MapWindowPoints
SetCursor
IsDialogMessageW
LoadBitmapW
MapDialogRect
SetWindowContextHelpId
CreateDialogIndirectParamW
PostQuitMessage
DefWindowProcA
DispatchMessageA
GetMessageA
UserHandleGrantAccess
GetWindow
EnumWindows
SetParent
GetWindowLongPtrW
GetWindowTextW
IsWindow
GetDesktopWindow
GetWindowRect
SetForegroundWindow
GetSystemMetrics
BringWindowToTop
SendMessageTimeoutW
EnumDesktopWindows
SetWindowTextW
GetForegroundWindow
CharNextW
EndDialog
DialogBoxParamW
GetGUIThreadInfo
GetWindowThreadProcessId
FindWindowW
AllowSetForegroundWindow
SwitchToThisWindow
KillTimer
SetTimer
EmptyClipboard
CloseClipboard
OpenClipboard
SetWindowPos
ShowWindow
UnregisterClassW
PostMessageW
CryptGenKey
RegGetValueW
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
EqualSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyW
ReportEventW
RegisterEventSourceW
CloseEventLog
ConvertSidToStringSidW
MakeAbsoluteSD
InitiateSystemShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
SetTokenInformation
GetSecurityDescriptorSacl
GetLengthSid
FreeSid
DuplicateTokenEx
CreateWellKnownSid
CopySid
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegNotifyChangeKeyValue
RegEnumValueW
RegDeleteKeyExW
SystemFunction036
GetNamedSecurityInfoW
MapGenericMask
AccessCheck
OpenThreadToken
InitializeSecurityDescriptor
InitializeAcl
SetSecurityDescriptorDacl
GetAce
SetKernelObjectSecurity
GetKernelObjectSecurity
InitializeSid
GetAclInformation
AddAce
RevertToSelf
RegDisablePredefinedCache
CreateRestrictedToken
DuplicateToken
CreateProcessAsUserW
SetThreadToken
CheckTokenMembership
RegDeleteTreeW
SaferiIsExecutableFileType
GetUserNameW
ImpersonateAnonymousToken
CryptAcquireContextA
CryptAcquireContextW
CryptReleaseContext
CryptImportKey
CryptDestroyKey
CryptGetProvParam
CryptSetProvParam
CryptGenRandom
CryptGetUserKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptSignHashA
CryptSignHashW
CryptGetHashParam
CryptSetHashParam
CredReadW
CredFree
CredWriteW
CredDeleteW
CryptSetKeyParam
CryptContextAddRef
UrlIsW
PathCanonicalizeW
PathFileExistsW
PathRemoveBackslashW
PathAppendW
PathRemoveFileSpecW
PathFindExtensionA
PathCombineW
PathIsRelativeW
PathFindExtensionW
AssocQueryStringW
UrlGetPartW
PathIsDirectoryW
PathIsUNCW
PathFindFileNameW
PathAddBackslashW
PathCreateFromUrlW
UrlCanonicalizeW
UrlUnescapeW
PathIsUNCServerShareW
ord219
PathIsURLW
WinHttpSetCredentials
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpSetStatusCallback
WinHttpAddRequestHeaders
??4PreamblePatcher@sidestep@@QEAAAEAV01@$$QEAV01@@Z
??4PreamblePatcher@sidestep@@QEAAAEAV01@AEBV01@@Z
?AcrobatIsNearAbsoluteIndirectJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?AllocPageNear@PreamblePatcher@sidestep@@CAPEAXPEAX@Z
?AllocPreambleBlockNear@PreamblePatcher@sidestep@@SAPEAEPEAX@Z
?FreePreambleBlock@PreamblePatcher@sidestep@@SAXPEAE@Z
?Initialize@PreamblePatcher@sidestep@@CAXXZ
?IsMovWithDisplacement@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearAbsoluteCall@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearConditionalJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearRelativeCall@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsNearRelativeJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsShortConditionalJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?IsShortJump@PreamblePatcher@sidestep@@CA_NPEAEI@Z
?PatchMovWithDisplacement@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchNearJumpOrCall@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchShortConditionalJump@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?PatchShortJump@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAEI0PEAII@Z
?RawPatch@PreamblePatcher@sidestep@@SA?AW4SideStepError@2@PEAX0PEAPEAXPEBD@Z
?RawPatchWithStub@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAX0PEAEKPEAKPEBD@Z
?RawPatchWithStubAndProtections@PreamblePatcher@sidestep@@CA?AW4SideStepError@2@PEAX0PEAEKPEAKPEBD@Z
?ResolveTargetImpl@PreamblePatcher@sidestep@@CAPEAXPEAE0_N@Z
?Unpatch@PreamblePatcher@sidestep@@SA?AW4SideStepError@2@PEAX00@Z
?granularity_@PreamblePatcher@sidestep@@0JA
?initialized_@PreamblePatcher@sidestep@@0_NA
?pagesize_@PreamblePatcher@sidestep@@0JA
?preamble_pages_@PreamblePatcher@sidestep@@0PEAUPreamblePage@12@EA
AcroRd32IsBrokerProcess
GetHandleVerifier
GetWinstaDesktopInfo
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ