_init@12
_md5@4
Overview
overview
7Static
static
7!wp668.js
windows7-x64
3!wp668.js
windows10-2004-x64
3WP669.exe
windows7-x64
1WP669.exe
windows10-2004-x64
1data/wpmod...d1.exe
windows7-x64
1data/wpmod...d1.exe
windows10-2004-x64
1data/wpmod...d2.dll
windows7-x64
1data/wpmod...d2.dll
windows10-2004-x64
1data/wpmod...d3.dll
windows7-x64
1data/wpmod...d3.dll
windows10-2004-x64
1doc/[!] PP...ex.htm
windows7-x64
1doc/[!] PP...ex.htm
windows10-2004-x64
1doc/[!] PP...ex.htm
windows7-x64
1doc/[!] PP...ex.htm
windows10-2004-x64
1doc/[!] PP...ex.htm
windows7-x64
1doc/[!] PP...ex.htm
windows10-2004-x64
1doc/wsaerrors.htm
windows7-x64
1doc/wsaerrors.htm
windows10-2004-x64
1hist/!wp657f.js
windows7-x64
3hist/!wp657f.js
windows10-2004-x64
3hist/!wp667.js
windows7-x64
3hist/!wp667.js
windows10-2004-x64
3hist/!wp668.js
windows7-x64
3hist/!wp668.js
windows10-2004-x64
3sources/tstdll0.dll
windows7-x64
3sources/tstdll0.dll
windows10-2004-x64
3wpsc/DEMO/...l0.dll
windows7-x64
3wpsc/DEMO/...l0.dll
windows10-2004-x64
3wpsc/DEMO/...t1.dll
windows7-x64
3wpsc/DEMO/...t1.dll
windows10-2004-x64
3wpsc/DEMO/...c-2.js
windows7-x64
3wpsc/DEMO/...c-2.js
windows10-2004-x64
3Behavioral task
behavioral1
Sample
!wp668.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
!wp668.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
WP669.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
WP669.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
data/wpmodule/wpmod1.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
data/wpmodule/wpmod1.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
data/wpmodule/wpmod2.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
data/wpmodule/wpmod2.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
data/wpmodule/wpmod3.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
data/wpmodule/wpmod3.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
doc/[!] PPC User-Manual - 1_files/index.htm
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
doc/[!] PPC User-Manual - 1_files/index.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
doc/[!] PPC User-Manual - 2_files/index.htm
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
doc/[!] PPC User-Manual - 2_files/index.htm
Resource
win10v2004-20240708-en
Behavioral task
behavioral15
Sample
doc/[!] PPC User-Manual - 3_files/index.htm
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
doc/[!] PPC User-Manual - 3_files/index.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
doc/wsaerrors.htm
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
doc/wsaerrors.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
hist/!wp657f.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
hist/!wp657f.js
Resource
win10v2004-20240708-en
Behavioral task
behavioral21
Sample
hist/!wp667.js
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
hist/!wp667.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
hist/!wp668.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
hist/!wp668.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
sources/tstdll0.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
sources/tstdll0.dll
Resource
win10v2004-20240708-en
Behavioral task
behavioral27
Sample
wpsc/DEMO/DLL/tstdll0.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
wpsc/DEMO/DLL/tstdll0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
wpsc/DEMO/DLL_events/DLL_event1.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
wpsc/DEMO/DLL_events/DLL_event1.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
wpsc/DEMO/LA2/demo-LS_dec-2.js
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
wpsc/DEMO/LA2/demo-LS_dec-2.js
Resource
win10v2004-20240704-en
Target
2f2c706b831fe673150bd147ab764254_JaffaCakes118
Size
4.5MB
MD5
2f2c706b831fe673150bd147ab764254
SHA1
09d609a10973243abc99c9f65b8e9fe2dcbfd0ab
SHA256
9586922e85a5917c000f5c453c83d6c0661dfd1bbf5a2df03303e8fa0c84b1e7
SHA512
1d917e8abfdd0feb52a4c74a340cd6b6bbedd9aca8bf6b6f2ea27ef776e06bc3eb904881d9da1c9185c7a2fa8cf2c46d20d4ca6a26072914f44e2c5b8e5c1eec
SSDEEP
98304:xeSlTbeD1MkcuaoVP1w/S3Y9PGC2+fVlzYGNu4mZhIi:xedUSP1w/iY9+C2+HzYGchV
resource | yara_rule |
---|---|
static1/unpack001/data/wpmodule/wpmod3.dat | themida |
Checks for missing Authenticode signature.
resource |
---|
unpack001/WP669.exe |
unpack001/data/wpmodule/wpmod1.dat |
unpack001/data/wpmodule/wpmod2.dat |
unpack001/data/wpmodule/wpmod3.dat |
unpack002/sources/tstdll0.dll |
unpack001/wpsc/DEMO/DLL/tstdll0.dll |
unpack001/wpsc/DEMO/DLL_events/DLL_event1.dll |
unpack003/source5/tstdll5.dll |
unpack001/wpsc/DEMO/LA2/tstdll5.dll |
unpack001/wpsc/DEMO/_demoPrDLL_1/demoPrDLL_1.dll |
unpack001/wpsc/LIB/libgmp-3.dll |
unpack001/wpsc/LIB/memDisp.dll |
unpack001/wpsc/LIB/zlib125.dll |
unpack001/wpsc/RF01/dummy.exe |
unpack001/wpsc/RF01/rfsld.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
SetCurrentDirectoryA
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
SetLastError
GetLastError
GetCurrentDirectoryA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
ExitThread
CreateThread
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
lstrcpyA
lstrcmpiA
lstrcmpA
WriteProcessMemory
WritePrivateProfileStringA
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualProtect
VirtualFree
VirtualAllocEx
VirtualAlloc
UnmapViewOfFile
SuspendThread
SleepEx
Sleep
SizeofResource
SetThreadPriority
SetThreadLocale
SetThreadContext
SetLastError
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResumeThread
ResetEvent
RemoveDirectoryA
ReadProcessMemory
ReadFile
OpenProcess
OpenFileMappingA
OpenFile
MultiByteToWideChar
MulDiv
MoveFileA
MapViewOfFile
LockResource
LoadResource
LoadLibraryExA
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetVersionExA
GetVersion
GetTickCount
GetThreadLocale
GetThreadContext
GetSystemInfo
GetSystemDirectoryA
GetStringTypeExA
GetStdHandle
GetProfileStringA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLogicalDriveStringsA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCPInfo
GetACP
FreeResource
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
EnterCriticalSection
DuplicateHandle
DeleteFileA
DeleteCriticalSection
CreateThread
CreateRemoteThread
CreateProcessA
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
Beep
Sleep
OpenThread
Process32Next
Process32First
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
CreateWindowExA
WindowFromPoint
WinHelpA
WaitMessage
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
ShowCursor
ShowCaret
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetParent
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetClipboardData
SetClassLongA
SetCaretPos
SetCapture
SetActiveWindow
SendMessageTimeoutA
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassExA
RegisterClassA
RedrawWindow
PtInRect
PostQuitMessage
PostMessageA
PeekMessageA
OpenClipboard
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBoxA
MessageBeep
MapWindowPoints
MapVirtualKeyA
LoadStringA
LoadKeyboardLayoutA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsRectEmpty
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
HideCaret
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetUpdateRect
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetWindow
GetMessagePos
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItem
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursor
GetClipboardData
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
GetAsyncKeyState
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EnumClipboardFormats
EndPaint
EndDeferWindowPos
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawIcon
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DestroyCaret
DeleteMenu
DeferWindowPos
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreatePopupMenu
CreateMenu
CreateIcon
CreateCaret
CloseClipboard
ClientToScreen
ChildWindowFromPoint
CheckMenuItem
CallWindowProcA
CallNextHookEx
BeginPaint
BeginDeferWindowPos
CharNextA
CharLowerBuffA
CharLowerA
CharUpperBuffA
CharToOemA
AdjustWindowRectEx
ActivateKeyboardLayout
MessageBoxW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
InitializeSecurityDescriptor
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
AdjustTokenPrivileges
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayRedim
SafeArrayCreate
VariantChangeType
VariantCopyInd
VariantCopy
VariantClear
VariantInit
GetErrorInfo
SysFreeString
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
UnrealizeObject
StretchBlt
StartPage
StartDocA
SetWindowOrgEx
SetWinMetaFileBits
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetROP2
SetPixel
SetMapMode
SetEnhMetaFileBits
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SetAbortProc
SelectPalette
SelectObject
SelectClipRgn
SaveDC
RestoreDC
Rectangle
RectVisible
RealizePalette
Polyline
PlayEnhMetaFile
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetWinMetaFileBits
GetTextMetricsA
GetTextExtentPointA
GetTextExtentPoint32A
GetSystemPaletteEntries
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetNearestColor
GetMapMode
GetEnhMetaFilePaletteEntries
GetEnhMetaFileHeader
GetEnhMetaFileBits
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
ExtTextOutA
ExcludeClipRect
EndPage
EndDoc
Ellipse
DeleteObject
DeleteEnhMetaFile
DeleteDC
CreateSolidBrush
CreatePenIndirect
CreatePalette
CreateICA
CreateHalftonePalette
CreateFontIndirectA
CreateDIBitmap
CreateDIBSection
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
CopyEnhMetaFileA
BitBlt
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_GetIcon
ImageList_Remove
ImageList_DrawEx
ImageList_Replace
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
InitCommonControls
OpenPrinterA
EnumPrintersA
DocumentPropertiesA
ClosePrinter
Shell_NotifyIconA
ShellExecuteA
SHGetFileInfoA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetDesktopFolder
GetSaveFileNameA
GetOpenFileNameA
__WSAFDIsSet
WSACleanup
WSAStartup
WSASetLastError
WSAGetLastError
gethostbyname
gethostbyaddr
socket
shutdown
send
select
recv
listen
ioctlsocket
inet_ntoa
inet_addr
getsockname
getpeername
connect
closesocket
bind
accept
ZwQuerySystemInformation
ZwQueryInformationProcess
timeEndPeriod
timeBeginPeriod
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
WideCharToMultiByte
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
lstrcpyA
lstrcmpiA
WriteFile
VirtualQuery
ReadFile
OpenFile
LoadLibraryA
GetVersionExA
GetThreadLocale
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetFileSize
GetDiskFreeSpaceA
GetCPInfo
GetACP
FreeLibrary
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
Sleep
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
CharToOemA
MessageBoxA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SysFreeString
SysReAllocStringLen
SysAllocStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThread
GetThreadContext
VirtualQuery
GetCurrentProcess
GetModuleHandleW
VirtualFree
InitializeCriticalSection
Sleep
LeaveCriticalSection
SetThreadPriority
FlushInstructionCache
GetProcAddress
VirtualAlloc
EnterCriticalSection
VirtualProtectEx
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
SuspendThread
ResumeThread
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
LoadLibraryW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapCreate
HeapDestroy
HeapReAlloc
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
SetStdHandle
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CreateFileA
_init@12
_md5@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
FuncTst1
FuncTst2
FuncTst3
FuncTst4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
FuncTst1
FuncTst2
FuncTst3
FuncTst4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DLLInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeXorGS
EnXorGS
Trafic_Detector
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeXorGS
EnXorGS
Trafic_Detector
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
AddThreadInfo
CreateWin
DelThreadInfo
DestroyWin
ThreadsCount
isCreated
isOpened
isterminated
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
AddAtomA
DeleteCriticalSection
EnterCriticalSection
FindAtomA
GetAtomNameA
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
Sleep
WideCharToMultiByte
__dllonexit
__lc_codepage
__mb_cur_max
_assert
_errno
_filbuf
_flsbuf
_iob
_isctype
_pctype
abort
fflush
fgetc
fprintf
fputc
fread
free
fscanf
fwrite
getenv
localeconv
malloc
memcpy
memset
printf
putchar
puts
raise
realloc
sscanf
strchr
strcpy
strlen
strtol
ungetc
vfprintf
vsprintf
wcslen
__gmp_0
__gmp_allocate_func
__gmp_asprintf
__gmp_asprintf_final
__gmp_asprintf_funs
__gmp_asprintf_memory
__gmp_asprintf_reps
__gmp_assert_fail
__gmp_assert_header
__gmp_binvert_limb_table
__gmp_bits_per_limb
__gmp_default_allocate
__gmp_default_fp_limb_precision
__gmp_default_free
__gmp_default_reallocate
__gmp_digit_value_tab
__gmp_divide_by_zero
__gmp_doprnt
__gmp_doprnt_integer
__gmp_doprnt_mpf2
__gmp_doscan
__gmp_errno
__gmp_exception
__gmp_extract_double
__gmp_fib_table
__gmp_fprintf
__gmp_fprintf_funs
__gmp_free_func
__gmp_fscanf
__gmp_fscanf_funs
__gmp_get_memory_functions
__gmp_invalid_operation
__gmp_junk
__gmp_mt_recalc_buffer
__gmp_printf
__gmp_randclear
__gmp_randclear_mt
__gmp_randget_mt
__gmp_randinit
__gmp_randinit_default
__gmp_randinit_lc_2exp
__gmp_randinit_lc_2exp_size
__gmp_randinit_mt
__gmp_randinit_mt_noseed
__gmp_randinit_set
__gmp_randiset_mt
__gmp_rands
__gmp_rands_initialized
__gmp_randseed
__gmp_randseed_ui
__gmp_reallocate_func
__gmp_scanf
__gmp_set_memory_functions
__gmp_snprintf
__gmp_snprintf_funs
__gmp_sprintf
__gmp_sprintf_funs
__gmp_sqrt_of_negative
__gmp_sscanf
__gmp_sscanf_funs
__gmp_tmp_reentrant_alloc
__gmp_tmp_reentrant_free
__gmp_urandomb_ui
__gmp_urandomm_ui
__gmp_vasprintf
__gmp_version
__gmp_vfprintf
__gmp_vfscanf
__gmp_vprintf
__gmp_vscanf
__gmp_vsnprintf
__gmp_vsprintf
__gmp_vsscanf
__gmpf_abs
__gmpf_add
__gmpf_add_ui
__gmpf_ceil
__gmpf_clear
__gmpf_cmp
__gmpf_cmp_d
__gmpf_cmp_si
__gmpf_cmp_ui
__gmpf_div
__gmpf_div_2exp
__gmpf_div_ui
__gmpf_dump
__gmpf_eq
__gmpf_fits_sint_p
__gmpf_fits_slong_p
__gmpf_fits_sshort_p
__gmpf_fits_uint_p
__gmpf_fits_ulong_p
__gmpf_fits_ushort_p
__gmpf_floor
__gmpf_get_d
__gmpf_get_d_2exp
__gmpf_get_default_prec
__gmpf_get_prec
__gmpf_get_si
__gmpf_get_str
__gmpf_get_ui
__gmpf_init
__gmpf_init2
__gmpf_init_set
__gmpf_init_set_d
__gmpf_init_set_si
__gmpf_init_set_str
__gmpf_init_set_ui
__gmpf_inp_str
__gmpf_integer_p
__gmpf_mul
__gmpf_mul_2exp
__gmpf_mul_ui
__gmpf_neg
__gmpf_out_str
__gmpf_pow_ui
__gmpf_random2
__gmpf_reldiff
__gmpf_set
__gmpf_set_d
__gmpf_set_default_prec
__gmpf_set_prec
__gmpf_set_prec_raw
__gmpf_set_q
__gmpf_set_si
__gmpf_set_str
__gmpf_set_ui
__gmpf_set_z
__gmpf_size
__gmpf_sqrt
__gmpf_sqrt_ui
__gmpf_sub
__gmpf_sub_ui
__gmpf_swap
__gmpf_trunc
__gmpf_ui_div
__gmpf_ui_sub
__gmpf_urandomb
__gmpn_add
__gmpn_add_1
__gmpn_add_n
__gmpn_add_nc
__gmpn_addmul_1
__gmpn_addmul_1c
__gmpn_addmul_2
__gmpn_addsub_n
__gmpn_bases
__gmpn_bc_set_str
__gmpn_bdiv_dbm1c
__gmpn_bdivmod
__gmpn_binvert
__gmpn_binvert_itch
__gmpn_cmp
__gmpn_copyd
__gmpn_copyi
__gmpn_dc_bdiv_q
__gmpn_dc_bdiv_q_n
__gmpn_dc_bdiv_q_n_itch
__gmpn_dc_bdiv_qr
__gmpn_dc_bdiv_qr_n
__gmpn_dc_bdiv_qr_n_itch
__gmpn_dc_div_q
__gmpn_dc_div_qr
__gmpn_dc_div_qr_n
__gmpn_dc_divappr_q
__gmpn_dc_divappr_q_n
__gmpn_dc_divrem_n
__gmpn_dc_set_str
__gmpn_divexact
__gmpn_divexact_1
__gmpn_divexact_by3
__gmpn_divexact_by3c
__gmpn_divexact_itch
__gmpn_divisible_p
__gmpn_divmod_1
__gmpn_divrem
__gmpn_divrem_1
__gmpn_divrem_1c
__gmpn_divrem_2
__gmpn_dump
__gmpn_fft_best_k
__gmpn_fft_next_size
__gmpn_fib2_ui
__gmpn_gcd
__gmpn_gcd_1
__gmpn_gcd_lehmer_n
__gmpn_gcd_subdiv_step
__gmpn_gcdext
__gmpn_gcdext_1
__gmpn_gcdext_lehmer_n
__gmpn_gcdext_subdiv_step
__gmpn_get_d
__gmpn_get_str
__gmpn_hamdist
__gmpn_hgcd
__gmpn_hgcd2
__gmpn_hgcd_itch
__gmpn_hgcd_lehmer
__gmpn_hgcd_matrix_adjust
__gmpn_hgcd_matrix_init
__gmpn_hgcd_matrix_mul
__gmpn_hgcd_mul_matrix1_inverse_vector
__gmpn_hgcd_mul_matrix1_vector
__gmpn_invert
__gmpn_invert_itch
__gmpn_jacobi_base
__gmpn_kara_mul_n
__gmpn_kara_sqr_n
__gmpn_lshift
__gmpn_matrix22_mul
__gmpn_matrix22_mul_itch
__gmpn_matrix22_mul_strassen
__gmpn_mod_1
__gmpn_mod_1c
__gmpn_mod_1s_1p
__gmpn_mod_1s_1p_cps
__gmpn_mod_1s_2p
__gmpn_mod_1s_2p_cps
__gmpn_mod_1s_3p
__gmpn_mod_1s_3p_cps
__gmpn_mod_1s_4p
__gmpn_mod_1s_4p_cps
__gmpn_mod_34lsub1
__gmpn_modexact_1_odd
__gmpn_modexact_1c_odd
__gmpn_mu_bdiv_q
__gmpn_mu_bdiv_q_itch
__gmpn_mu_bdiv_qr
__gmpn_mu_div_q
__gmpn_mu_div_qr
__gmpn_mu_div_qr_choose_in
__gmpn_mu_div_qr_itch
__gmpn_mu_divappr_q
__gmpn_mu_divappr_q_choose_in
__gmpn_mu_divappr_q_itch
__gmpn_mul
__gmpn_mul_1
__gmpn_mul_1c
__gmpn_mul_basecase
__gmpn_mul_fft
__gmpn_mul_fft_full
__gmpn_mul_n
__gmpn_mullow_basecase
__gmpn_mullow_n
__gmpn_neg_n
__gmpn_perfect_square_p
__gmpn_popcount
__gmpn_pow_1
__gmpn_powlo
__gmpn_powm
__gmpn_powm_sec
__gmpn_preinv_dc_div_qr
__gmpn_preinv_dc_divappr_q
__gmpn_preinv_divrem_1
__gmpn_preinv_mod_1
__gmpn_preinv_mu_div_qr
__gmpn_preinv_mu_divappr_q
__gmpn_random
__gmpn_random2
__gmpn_redc_1
__gmpn_redc_2
__gmpn_rootrem
__gmpn_rshift
__gmpn_sb_bdiv_q
__gmpn_sb_bdiv_qr
__gmpn_sb_div_q
__gmpn_sb_div_qr
__gmpn_sb_divappr_q
__gmpn_sb_divrem_mn
__gmpn_scan0
__gmpn_scan1
__gmpn_set_str
__gmpn_set_str_compute_powtab
__gmpn_sqr_basecase
__gmpn_sqr_n
__gmpn_sqrtrem
__gmpn_sub
__gmpn_sub_1
__gmpn_sub_n
__gmpn_sub_nc
__gmpn_subcnd_n
__gmpn_submul_1
__gmpn_submul_1c
__gmpn_tabselect
__gmpn_tdiv_qr
__gmpn_toom22_mul
__gmpn_toom2_sqr
__gmpn_toom32_mul
__gmpn_toom33_mul
__gmpn_toom3_mul_n
__gmpn_toom3_sqr
__gmpn_toom3_sqr_n
__gmpn_toom42_mul
__gmpn_toom44_mul
__gmpn_toom4_sqr
__gmpn_toom53_mul
__gmpn_toom62_mul
__gmpn_toom_interpolate_5pts
__gmpn_toom_interpolate_7pts
__gmpn_udiv_qrnnd
__gmpn_umul_ppmm
__gmpq_abs
__gmpq_add
__gmpq_canonicalize
__gmpq_clear
__gmpq_cmp
__gmpq_cmp_si
__gmpq_cmp_ui
__gmpq_div
__gmpq_div_2exp
__gmpq_equal
__gmpq_get_d
__gmpq_get_den
__gmpq_get_num
__gmpq_get_str
__gmpq_init
__gmpq_inp_str
__gmpq_inv
__gmpq_mul
__gmpq_mul_2exp
__gmpq_neg
__gmpq_out_str
__gmpq_set
__gmpq_set_d
__gmpq_set_den
__gmpq_set_f
__gmpq_set_num
__gmpq_set_si
__gmpq_set_str
__gmpq_set_ui
__gmpq_set_z
__gmpq_sub
__gmpq_swap
__gmpz_abs
__gmpz_add
__gmpz_add_ui
__gmpz_addmul
__gmpz_addmul_ui
__gmpz_and
__gmpz_aorsmul_1
__gmpz_array_init
__gmpz_bin_ui
__gmpz_bin_uiui
__gmpz_cdiv_q
__gmpz_cdiv_q_2exp
__gmpz_cdiv_q_ui
__gmpz_cdiv_qr
__gmpz_cdiv_qr_ui
__gmpz_cdiv_r
__gmpz_cdiv_r_2exp
__gmpz_cdiv_r_ui
__gmpz_cdiv_ui
__gmpz_clear
__gmpz_clrbit
__gmpz_cmp
__gmpz_cmp_d
__gmpz_cmp_si
__gmpz_cmp_ui
__gmpz_cmpabs
__gmpz_cmpabs_d
__gmpz_cmpabs_ui
__gmpz_com
__gmpz_combit
__gmpz_congruent_2exp_p
__gmpz_congruent_p
__gmpz_congruent_ui_p
__gmpz_divexact
__gmpz_divexact_gcd
__gmpz_divexact_ui
__gmpz_divisible_2exp_p
__gmpz_divisible_p
__gmpz_divisible_ui_p
__gmpz_dump
__gmpz_export
__gmpz_fac_ui
__gmpz_fdiv_q
__gmpz_fdiv_q_2exp
__gmpz_fdiv_q_ui
__gmpz_fdiv_qr
__gmpz_fdiv_qr_ui
__gmpz_fdiv_r
__gmpz_fdiv_r_2exp
__gmpz_fdiv_r_ui
__gmpz_fdiv_ui
__gmpz_fib2_ui
__gmpz_fib_ui
__gmpz_fits_sint_p
__gmpz_fits_slong_p
__gmpz_fits_sshort_p
__gmpz_fits_uint_p
__gmpz_fits_ulong_p
__gmpz_fits_ushort_p
__gmpz_gcd
__gmpz_gcd_ui
__gmpz_gcdext
__gmpz_get_d
__gmpz_get_d_2exp
__gmpz_get_si
__gmpz_get_str
__gmpz_get_ui
__gmpz_getlimbn
__gmpz_hamdist
__gmpz_import
__gmpz_init
__gmpz_init2
__gmpz_init_set
__gmpz_init_set_d
__gmpz_init_set_si
__gmpz_init_set_str
__gmpz_init_set_ui
__gmpz_inp_raw
__gmpz_inp_str
__gmpz_inp_str_nowhite
__gmpz_invert
__gmpz_ior
__gmpz_jacobi
__gmpz_kronecker_si
__gmpz_kronecker_ui
__gmpz_lcm
__gmpz_lcm_ui
__gmpz_legendre
__gmpz_lucnum2_ui
__gmpz_lucnum_ui
__gmpz_millerrabin
__gmpz_mod
__gmpz_mul
__gmpz_mul_2exp
__gmpz_mul_si
__gmpz_mul_ui
__gmpz_n_pow_ui
__gmpz_neg
__gmpz_nextprime
__gmpz_out_raw
__gmpz_out_str
__gmpz_perfect_power_p
__gmpz_perfect_square_p
__gmpz_popcount
__gmpz_pow_ui
__gmpz_powm
__gmpz_powm_ui
__gmpz_probab_prime_p
__gmpz_random
__gmpz_random2
__gmpz_realloc
__gmpz_realloc2
__gmpz_remove
__gmpz_root
__gmpz_rootrem
__gmpz_rrandomb
__gmpz_scan0
__gmpz_scan1
__gmpz_set
__gmpz_set_d
__gmpz_set_f
__gmpz_set_q
__gmpz_set_si
__gmpz_set_str
__gmpz_set_ui
__gmpz_setbit
__gmpz_si_kronecker
__gmpz_size
__gmpz_sizeinbase
__gmpz_sqrt
__gmpz_sqrtrem
__gmpz_sub
__gmpz_sub_ui
__gmpz_submul
__gmpz_submul_ui
__gmpz_swap
__gmpz_tdiv_q
__gmpz_tdiv_q_2exp
__gmpz_tdiv_q_ui
__gmpz_tdiv_qr
__gmpz_tdiv_qr_ui
__gmpz_tdiv_r
__gmpz_tdiv_r_2exp
__gmpz_tdiv_r_ui
__gmpz_tdiv_ui
__gmpz_tstbit
__gmpz_ui_kronecker
__gmpz_ui_pow_ui
__gmpz_ui_sub
__gmpz_urandomb
__gmpz_urandomm
__gmpz_xor
_get_output_format
isascii
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
AllocMem_cdecl
AllocMem_stdcall
FreeMem_cdecl
FreeMem_stdcall
GetMem_cdecl
GetMem_stdcall
ReAllocMem_cdecl
ReAllocMem_stdcall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
DeleteCriticalSection
EnterCriticalSection
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
Sleep
VirtualProtect
VirtualQuery
WideCharToMultiByte
_close
_lseek
_open
_read
_write
__dllonexit
__lc_codepage
__mb_cur_max
_errno
_iob
abort
fflush
fputc
free
fwrite
getenv
localeconv
malloc
memchr
memcpy
sprintf
strcat
strcpy
strerror
strlen
vfprintf
wcslen
adler32
adler32_combine
compress
compress2
compressBound
crc32
crc32_combine
deflate
deflateBound
deflateCopy
deflateEnd
deflateInit2_
deflateInit_
deflateParams
deflatePrime
deflateReset
deflateSetDictionary
deflateSetHeader
deflateTune
get_crc_table
gzbuffer
gzclearerr
gzclose
gzclose_r
gzclose_w
gzdirect
gzdopen
gzeof
gzerror
gzflush
gzgetc
gzgets
gzoffset
gzopen
gzprintf
gzputc
gzputs
gzread
gzrewind
gzseek
gzsetparams
gztell
gzungetc
gzwrite
inflate
inflateBack
inflateBackEnd
inflateBackInit_
inflateCopy
inflateEnd
inflateGetHeader
inflateInit2_
inflateInit_
inflateMark
inflatePrime
inflateReset
inflateReset2
inflateSetDictionary
inflateSync
inflateSyncPoint
inflateUndermine
uncompress
zError
zlibCompileFlags
zlibVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
checks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ