Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Target
krampus.zip
Size
7.8MB
MD5
83cdbe3b8a2b3482721be972ad3dd6a3
SHA1
1165e2704372c2e99f9d3e59c74511fe537ce077
SHA256
872e7634327043f9a37d890b226a35c2c415353a9c68b60ca7e1049a4d0020e4
SHA512
bf0a6209d4d5dd28d14d4de1994665637095f82fed964ab2423caad6f4ed9e47e5a83fab74a96b4ff532746cb4a4d95097bfd7f8b664580f5430502bb97a02da
SSDEEP
196608:sg2yaHCl833qpPEBA8LHc9zh+j4+/B9vUBPTeruLww:H21QeXw9zck+Z9vUBiKl
Checks for missing Authenticode signature.
resource |
---|
unpack001/krampus/krampus/KBDCZ1.DLL |
unpack001/krampus/krampus/KBDDA.DLL |
unpack001/krampus/krampus/KBDGAE.DLL |
unpack001/krampus/krampus/KBDSL1.DLL |
unpack001/krampus/krampus/KBDUGHR.DLL |
unpack001/krampus/krampus/d2win.dll |
unpack001/krampus/krampus/d32-fw.dll |
unpack001/krampus/krampus/d3d10.dll |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_DLL
DismApi.pdb
feof
fgetws
_wfopen
wcstok_s
fclose
iswctype
toupper
strrchr
??0exception@@QEAA@XZ
_wcslwr_s
towlower
wcsstr
wcsrchr
_vsnwprintf
_wcsnicmp
memset
realloc
_errno
_onexit
__dllonexit
_unlock
_lock
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
_initterm
_amsg_exit
_XcptFilter
_CxxThrowException
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
wcscpy_s
_vscprintf
vsprintf_s
calloc
_vsnprintf
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
iswspace
swscanf_s
_wtoi
wcschr
memmove
memcpy
memcmp
_wcstoui64
wcstoul
_purecall
_wcsicmp
iswalpha
malloc
free
vswprintf_s
_vscwprintf
memmove_s
memcpy_s
__C_specific_handler
__CxxFrameHandler3
wcscmp
GetTokenInformation
RegCreateKeyExW
RegSetValueExW
AddAccessAllowedAce
OpenThreadToken
EqualSid
EventUnregister
EventProviderEnabled
EventRegister
EventWriteTransfer
CheckTokenMembership
FreeSid
OpenProcessToken
AllocateAndInitializeSid
RegDeleteKeyExW
InitializeAcl
SetSecurityDescriptorDacl
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
GetLengthSid
InitializeSecurityDescriptor
TlsFree
FormatMessageA
CreateFileMappingW
MapViewOfFile
VirtualQuery
GetModuleFileNameA
WriteFile
TlsGetValue
GetVersionExW
GetProcAddress
GetModuleHandleW
InitializeCriticalSection
DeleteCriticalSection
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetCurrentProcessId
SizeofResource
LockResource
LoadResource
FindResourceExW
GetSystemInfo
GetLastError
GetCommandLineW
GetFileAttributesW
IsWow64Process
GetCurrentProcess
LoadLibraryExW
FreeLibrary
OutputDebugStringW
WaitForMultipleObjectsEx
WaitForSingleObject
FormatMessageW
LocalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareStringW
HeapFree
GetProcessHeap
GetModuleFileNameW
CreateMutexW
OutputDebugStringA
GetModuleHandleExW
WideCharToMultiByte
HeapSize
HeapReAlloc
HeapAlloc
HeapDestroy
GetEnvironmentVariableW
MultiByteToWideChar
Sleep
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
CreateMutexA
ReleaseMutex
GetVersion
CreateFileA
DeleteFileA
CreateFileMappingA
GetCurrentThread
FlushFileBuffers
CopyFileExW
DeleteFileW
SetFileInformationByHandle
GetFileInformationByHandle
SetFileAttributesW
FindClose
DeviceIoControl
FindNextFileW
FindFirstFileW
GetFileInformationByHandleEx
SetLastError
CloseHandle
CreateFileW
SetFilePointer
GetFullPathNameW
ReadFile
GetSystemWindowsDirectoryW
DebugBreak
LocalAlloc
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetWindowsDirectoryW
IsDebuggerPresent
ExitProcess
GetFileSize
GetLocalTime
TlsAlloc
UnmapViewOfFile
TlsSetValue
MoveFileExW
GetLocaleInfoEx
GetSystemTime
GetTimeFormatEx
SetErrorMode
CreateEventW
ResumeThread
DuplicateHandle
GetTempFileNameW
ResetEvent
CreateThread
SetEvent
CreateDirectoryW
GetFileSizeEx
SearchPathW
ExpandEnvironmentStringsW
GetThreadUILanguage
CoSetProxyBlanket
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitializeEx
CharLowerBuffW
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SysAllocString
LoadTypeLi
LoadRegTypeLi
VariantClear
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
GetErrorInfo
VarBstrCmp
SysStringLen
SysFreeString
RtlRaiseStatus
NtOpenFile
NtYieldExecution
NtQueryInformationFile
RtlExpandEnvironmentStrings
NtClose
RtlReAllocateHeap
NtReadFile
RtlInitUnicodeString
NtWriteFile
RtlFreeHeap
RtlAllocateHeap
RtlDosPathNameToNtPathName_U_WithStatus
NtSetInformationFile
RtlNtStatusToDosError
RtlGetVersion
NtWaitForSingleObject
GetFileVersionInfoSizeExW
GetFileVersionInfoExW
VerQueryValueW
DismAddCapability
DismAddDriver
DismAddPackage
DismApplyUnattend
DismCheckImageHealth
DismCleanupMountpoints
DismCloseSession
DismCommitImage
DismDelete
DismDisableFeature
DismEnableFeature
DismGetCapabilities
DismGetCapabilityInfo
DismGetDriverInfo
DismGetDrivers
DismGetFeatureInfo
DismGetFeatureParent
DismGetFeatures
DismGetImageInfo
DismGetLastErrorMessage
DismGetMountedImageInfo
DismGetPackageInfo
DismGetPackageInfoEx
DismGetPackages
DismGetReservedStorageState
DismInitialize
DismMountImage
DismOpenSession
DismRemountImage
DismRemoveCapability
DismRemoveDriver
DismRemovePackage
DismRestoreImageHealth
DismSetReservedStorageState
DismShutdown
DismUnmountImage
_DismAddCapabilityEx
_DismAddDriverEx
_DismAddPackage2
_DismAddPackageFamilyToUninstallBlocklist
_DismAddProvisionedAppxPackage
_DismApplyCustomDataImage
_DismApplyFfuImage
_DismApplyProvisioningPackage
_DismCleanImage
_DismEnableDisableFeature
_DismExportDriver
_DismExportSource
_DismExportSourceEx
_DismGetCapabilitiesEx
_DismGetCapabilityInfoEx
_DismGetCurrentEdition
_DismGetDriversEx
_DismGetEffectiveSystemUILanguage
_DismGetFeaturesEx
_DismGetInstallLanguage
_DismGetKCacheBinaryValue
_DismGetKCacheDwordValue
_DismGetKCacheStringValue
_DismGetLastCBSSessionID
_DismGetNonRemovableAppsPolicy
_DismGetOSUninstallWindow
_DismGetOsInfo
_DismGetProductKeyInfo
_DismGetProvisionedAppxPackages
_DismGetProvisioningPackageInfo
_DismGetRegistryMountPoint
_DismGetStateFromCBSSessionID
_DismGetTargetCompositionEditions
_DismGetTargetEditions
_DismGetTargetVirtualEditions
_DismGetUsedSpace
_DismInitiateOSUninstall
_DismOptimizeImage
_DismOptimizeProvisionedAppxPackages
_DismRemoveOSUninstall
_DismRemovePackageFamilyFromUninstallBlocklist
_DismRemoveProvisionedAppxPackage
_DismRemoveProvisionedAppxPackageAllUsers
_DismRevertPendingActions
_DismSetAllIntlSettings
_DismSetAppXProvisionedDataFile
_DismSetEdition
_DismSetEdition2
_DismSetFirstBootCommandLine
_DismSetMachineName
_DismSetOSUninstallWindow
_DismSetProductKey
_DismSetSkuIntlDefaults
_DismSplitFfuImage
_DismStage
_DismSysprepCleanup
_DismSysprepGeneralize
_DismSysprepSpecialize
_DismValidateProductKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
kbdcz1.pdb
KbdLayerDescriptor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
wkbdda.pdb
KbdLayerDescriptor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
kbdgae.pdb
KbdLayerDescriptor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
kbdsl1.pdb
KbdLayerDescriptor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
wkbdughr.pdb
KbdLayerDescriptor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord10040
ord10055
ord10046
ord10039
ord10038
ord10037
ord10036
ord10024
ord10051
ord10032
ord10054
ord10052
ord10053
ord10004
ord10025
ord10046
ord10048
ord10035
ord10028
ord10049
ord10036
ord10038
ord10037
ord10047
ord10044
ord10026
ord10033
ord10032
ord10024
ord10023
ord10000
ord10041
ord10075
ord10055
ord10073
ord10003
ord10074
ord10027
ord10058
ord10056
ord10045
ord10031
ord10030
ord10052
ord10072
?strncpy@Unicode@@SIPAU1@PAU1@PBU1@H@Z
ord10003
?sprintf@Unicode@@SAXHPAU1@PBU1@ZZ
?isLineBreak@Unicode@@SIHPBU1@I@Z
?strnicmp@Unicode@@SIHPBU1@0I@Z
ord10007
ord10004
?unicode2Win@Unicode@@SIPADPADPBU1@H@Z
??_FUnicode@@QAEXXZ
?strcpy@Unicode@@SIPAU1@PAU1@PBU1@@Z
?strcat@Unicode@@SIPAU1@PAU1@PBU1@@Z
?win2Unicode@Unicode@@SIPAU1@PAU1@PBDH@Z
?strlen@Unicode@@SIHPBU1@@Z
?toUnicode@Unicode@@SIPAU1@PAU1@PBDH@Z
ord10039
ord10209
ord10207
ord10045
ord10210
ord10208
ord10215
ord10211
ord10025
ord10227
ord10117
ord10116
gdwInvBitMasks
ord10029
ord10109
ord10107
ord10026
ord10105
ord10104
ord10043
gdwBitMasks
ord10102
ord10103
ord10042
ord10023
ord10024
ord403
ord416
ord513
ord414
ord503
ord401
ord501
ord415
ord276
ord252
ord266
ord514
ord515
ord512
ord511
ord412
ord417
ord5
ord3
ord2
QueryPerformanceFrequency
GetLocalTime
GetCommandLineA
GetCPInfo
HeapAlloc
HeapFree
VirtualFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
CloseHandle
GetTickCount
GetFileAttributesA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
ExitProcess
QueryPerformanceCounter
DeleteFileA
GetLastError
Sleep
GetModuleFileNameA
lstrcpyA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
FlushFileBuffers
SetStdHandle
RtlUnwind
LoadLibraryA
HeapReAlloc
VirtualAlloc
GetOEMCP
GetACP
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetProcAddress
InterlockedIncrement
WriteFile
HeapCreate
GetModuleHandleA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetVersionExA
TerminateProcess
GetCurrentProcess
GetTimeZoneInformation
GetSystemTime
TlsSetValue
TlsAlloc
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
HeapDestroy
SetHandleCount
GetCurrentThreadId
GetStdHandle
WideCharToMultiByte
TlsFree
SetLastError
TlsGetValue
FreeEnvironmentStringsW
GetEnvironmentStrings
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
SetClipboardData
PostQuitMessage
DefWindowProcA
SetCursorPos
PtInRect
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
EmptyClipboard
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
MessageBoxA
SetRect
wsprintfA
ord10069
ord10065
ord10034
ord10070
ord10039
ord10066
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetWindowLongA
PostMessageA
DefWindowProcA
DispatchMessageA
TranslateMessage
DestroyWindow
PeekMessageA
GetMessageA
CreateWindowExA
LoadCursorA
RegisterClassA
UnregisterClassA
GetWindowLongA
PostQuitMessage
GetStockObject
WSAAsyncGetHostByName
WSACleanup
bind
inet_ntoa
setsockopt
send
select
recv
ntohl
ioctlsocket
gethostbyname
WSAAsyncSelect
htons
connect
WSAGetLastError
WSAStartup
socket
closesocket
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetEvent
lstrcatA
HeapFree
EnterCriticalSection
WaitForSingleObject
SetHandleCount
RtlUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetFilePointer
SetStdHandle
FlushFileBuffers
LoadLibraryA
WriteFile
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
HeapAlloc
TlsFree
TlsAlloc
SetLastError
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
LeaveCriticalSection
TlsGetValue
CreateThread
lstrcpyA
lstrlenA
CloseHandle
CreateEventA
GetCommandLineA
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
GetModuleHandleA
VirtualAlloc
GetLastError
ResumeThread
GetCurrentThreadId
TlsSetValue
ExitThread
VirtualFree
GetVersion
HeapDestroy
HeapCreate
ExitProcess
fw_abort
fw_async_connect
fw_bind
fw_close
fw_connect
fw_get_info
fw_get_skt
fw_listen
fw_open
fw_select
fw_upcall
fw_yield
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d3d10.pdb
D3D10CoreGetVersion
D3D10CoreRegisterLayers
_except_handler4_common
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_initterm
_amsg_exit
_XcptFilter
_callnewh
strstr
__CxxFrameHandler3
malloc
modf
_purecall
isalnum
isxdigit
atof
free
setlocale
_strdup
_strnicmp
_fpclass
_isnan
_stricmp
isalpha
atoi
memset
tolower
_finite
strchr
_clearfp
_controlfp
_vsnprintf
isdigit
_CIacos
_CIasin
_CIatan
_CIatan2
_CIcos
_CIcosh
_CIexp
_CIfmod
_CIlog
_CIpow
_CIsin
_CIsinh
_CIsqrt
_CItan
_CItanh
_CxxThrowException
_ftol2
_ftol2_sse
ceil
floor
memcmp
memcpy
memmove
GetModuleFileNameA
LoadLibraryExW
GetModuleHandleExW
FreeLibrary
DisableThreadLibraryCalls
GetProcAddress
OutputDebugStringA
RegOpenKeyExW
RegEnumKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegGetValueW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
OpenSemaphoreW
CloseHandle
Sleep
GetFullPathNameA
GetFileSize
CreateFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcessId
GetCurrentProcess
GetCurrentThreadId
TerminateProcess
QueryPerformanceCounter
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
D3D11CreateDeviceAndSwapChain
UnmapViewOfFile
VirtualFree
VirtualAlloc
DeleteObject
D3D10CompileEffectFromMemory
D3D10CompileShader
D3D10CreateBlob
D3D10CreateDevice
D3D10CreateDeviceAndSwapChain
D3D10CreateEffectFromMemory
D3D10CreateEffectPoolFromMemory
D3D10CreateStateBlock
D3D10DisassembleEffect
D3D10DisassembleShader
D3D10GetGeometryShaderProfile
D3D10GetInputAndOutputSignatureBlob
D3D10GetInputSignatureBlob
D3D10GetOutputSignatureBlob
D3D10GetPixelShaderProfile
D3D10GetShaderDebugInfo
D3D10GetVersion
D3D10GetVertexShaderProfile
D3D10PreprocessShader
D3D10ReflectShader
D3D10RegisterLayers
D3D10StateBlockMaskDifference
D3D10StateBlockMaskDisableAll
D3D10StateBlockMaskDisableCapture
D3D10StateBlockMaskEnableAll
D3D10StateBlockMaskEnableCapture
D3D10StateBlockMaskGetSetting
D3D10StateBlockMaskIntersect
D3D10StateBlockMaskUnion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateWindowExW
MessageBoxW
MessageBoxA
SystemParametersInfoW
DestroyIcon
SetWindowLongPtrW
GetWindowLongPtrW
GetClientRect
InvalidateRect
ReleaseDC
GetDC
DrawTextW
GetDialogBaseUnits
EndDialog
DialogBoxIndirectParamW
MoveWindow
SendMessageW
ord380
GetStringTypeW
GetFileAttributesExW
HeapReAlloc
FlushFileBuffers
GetCurrentDirectoryW
IsValidCodePage
GetACP
GetModuleHandleW
MulDiv
GetLastError
SetDllDirectoryW
GetModuleFileNameW
GetProcAddress
GetCommandLineW
GetEnvironmentVariableW
GetOEMCP
ExpandEnvironmentStringsW
CreateDirectoryW
GetTempPathW
WaitForSingleObject
Sleep
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
FreeLibrary
LoadLibraryExW
SetConsoleCtrlHandler
FindClose
FindFirstFileExW
CloseHandle
GetCurrentProcess
LocalFree
FormatMessageW
MultiByteToWideChar
WideCharToMultiByte
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetTimeZoneInformation
HeapSize
WriteConsoleW
SetEnvironmentVariableW
RtlUnwindEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
SetEndOfFile
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RaiseException
RtlPcToFileHeader
GetCommandLineA
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameW
RemoveDirectoryW
FindNextFileW
SetStdHandle
DeleteFileW
ReadFile
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
HeapFree
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleOutputCP
GetFileSizeEx
HeapAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
SelectObject
DeleteObject
CreateFontIndirectW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ