Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Overview
overview
7Static
static
7docs/THOR_...LA.pdf
windows7-x64
3docs/THOR_...LA.pdf
windows10-2004-x64
3docs/THOR_...is.url
windows7-x64
6docs/THOR_...is.url
windows10-2004-x64
3docs/THOR_Manual.url
windows7-x64
6docs/THOR_Manual.url
windows10-2004-x64
3docs/THOR_...de.url
windows7-x64
6docs/THOR_...de.url
windows10-2004-x64
3docs/THOR_...al.url
windows7-x64
6docs/THOR_...al.url
windows10-2004-x64
3thor-lite-util.exe
windows7-x64
3thor-lite-util.exe
windows10-2004-x64
3thor-lite.exe
windows7-x64
3thor-lite.exe
windows10-2004-x64
3thor64-lite.exe
windows7-x64
1thor64-lite.exe
windows10-2004-x64
1tools/bifr...ver.py
ubuntu-18.04-amd64
1tools/bifr...ver.py
debian-9-armhf
1tools/bifr...ver.py
debian-9-mips
1tools/bifr...ver.py
debian-9-mipsel
1tools/remo...or.ps1
windows7-x64
3tools/remo...or.ps1
windows10-2004-x64
3tools/remo...re.bat
windows7-x64
1tools/remo...re.bat
windows10-2004-x64
1tools/upx.exe
windows7-x64
7tools/upx.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
docs/THOR_Lite_EULA.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
docs/THOR_Lite_EULA.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
docs/THOR_LogAnalysis.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
docs/THOR_LogAnalysis.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
docs/THOR_Manual.url
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
docs/THOR_Manual.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
docs/THOR_Thunderstorm_Setup_Guide.url
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
docs/THOR_Thunderstorm_Setup_Guide.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
docs/THOR_Util_Manual.url
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
docs/THOR_Util_Manual.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
thor-lite-util.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
thor-lite-util.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
thor-lite.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
thor-lite.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
thor64-lite.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
thor64-lite.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
tools/bifrost-server.py
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral18
Sample
tools/bifrost-server.py
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral19
Sample
tools/bifrost-server.py
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
tools/bifrost-server.py
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral21
Sample
tools/remote-run/Run-Thor.ps1
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
tools/remote-run/Run-Thor.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
tools/remote-run/thor-remote-share.bat
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
tools/remote-run/thor-remote-share.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
tools/upx.exe
Resource
win7-20240705-en
Target
thor10.7lite-win-pack.zip
Size
40.1MB
MD5
a8267d1f96caf61c59e1f21dcedd8f46
SHA1
12e634ad4ebe6cda5e9c9a759c25e76ae8547997
SHA256
5f6f43704a00866bf2de17d955d11db387d17d1899d51f6064b08bd981a7cfb7
SHA512
e3639baaa4cea31955a32045e861db2496c787fc2b3633062f4023ad88382964a414b36ac972fc184583d4d3d1ad41f4596690f4c3a02530b25453419f576b4f
SSDEEP
786432:mPA7ELUVy0MtIl8QL3DRhPbtesrbQbaZXIF10p48DwTQWSRX6J3vk/LuKvcRkYV:mPOEgl3L3dhPbBZlp48DIk/SKYxV
resource | yara_rule |
---|---|
static1/unpack001/tools/upx.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/tools/upx.exe |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateFileA
CreateIoCompletionPort
CreateThread
CreateWaitableTimerA
CreateWaitableTimerExW
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsW
FreeLibrary
GetConsoleMode
GetEnvironmentStringsW
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessAffinityMask
GetQueuedCompletionStatusEx
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetThreadContext
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
PostQueuedCompletionStatus
ResumeThread
SetConsoleCtrlHandler
SetErrorMode
SetEvent
SetProcessPriorityBoost
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SuspendThread
SwitchToThread
TlsGetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WriteConsoleW
WriteFile
__getmainargs
__initenv
__lconv_init
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_initterm
_iob
_onexit
abort
calloc
exit
fprintf
free
fwrite
malloc
memcpy
signal
strlen
strncmp
vfprintf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AdjustTokenPrivileges
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
DeregisterEventSource
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
ImpersonateSelf
LookupPrivilegeValueA
OpenProcessToken
RegisterEventSourceW
ReportEventW
StackWalk
SymCleanup
SymFunctionTableAccess
SymGetModuleBase
SymInitialize
AddVectoredExceptionHandler
AreFileApisANSI
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreateIoCompletionPort
CreateMutexA
CreateMutexW
CreateSemaphoreW
CreateThread
CreateToolhelp32Snapshot
CreateWaitableTimerA
CreateWaitableTimerExW
DeleteCriticalSection
DeleteFileA
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileW
FindNextFileW
FlushConsoleInputBuffer
FlushFileBuffers
FlushViewOfFile
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesA
GetFileAttributesExW
GetFileAttributesW
GetFileSize
GetFileSizeEx
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLogicalDrives
GetLongPathNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetProcessId
GetQueuedCompletionStatusEx
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathA
GetTempPathW
GetThreadContext
GetTickCount64
GetTickCount
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
HeapAlloc
HeapCompact
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
IsBadWritePtr
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
LockFile
LockFileEx
MapViewOfFile
MultiByteToWideChar
OpenProcess
OpenThread
OpenThreadToken
OutputDebugStringA
OutputDebugStringW
PostQueuedCompletionStatus
QueryDosDeviceA
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResumeThread
SetConsoleCtrlHandler
SetConsoleTextAttribute
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetProcessPriorityBoost
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SuspendThread
SwitchToThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
Thread32First
Thread32Next
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnlockFile
UnlockFileEx
UnmapViewOfFile
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualLock
VirtualProtect
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WaitForMultipleObjects
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_assert
_beginthread
_beginthreadex
_cexit
_endthreadex
_errno
_exit
_filelengthi64
_fileno
_fstat64
_initterm
_iob
_lock
_lseeki64
_onexit
_setjmp3
_setmode
_snprintf
_time64
_unlock
_vsnprintf
_wfopen
abort
atof
atoi
calloc
clearerr
exit
fclose
feof
ferror
fflush
fgetpos
fgets
fopen
fprintf
fputc
fputs
fread
free
fseek
fsetpos
ftell
fwrite
getc
getenv
getwc
isalpha
islower
isprint
isspace
isupper
iswctype
isxdigit
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
localtime
gmtime
_mkgmtime64
putc
putwc
qsort
raise
rand
realloc
setlocale
setvbuf
signal
srand
strcat
strchr
strcmp
strcoll
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strrchr
strspn
strstr
strtok_s
strtol
strtoul
strxfrm
tolower
towlower
towupper
ungetc
ungetwc
vfprintf
time
_strdup
_stricmp
_strnicmp
_strtoi64
wcscoll
wcscpy
wcsftime
wcslen
wcsstr
wcsxfrm
_vsnwprintf
_stat
longjmp
_write
_strdup
_read
_open
_fileno
_fdopen
_close
NtCreateFile
NtQuerySystemInformation
RtlInitUnicodeString
VerSetConditionMask
ZwQueryInformationFile
EnumProcessModules
GetMappedFileNameA
GetModuleFileNameExA
GetProcessImageFileNameA
QueryWorkingSet
PathCanonicalizeA
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
MessageBoxW
_cgo_dummy_export
authorizerTrampoline
callbackTrampoline
commitHookTrampoline
compareTrampoline
compilerCallback
doneTrampoline
freeCallback
includeCallback
memoryBlockFetch
memoryBlockFetchNull
memoryBlockIteratorFilesize
memoryBlockIteratorFirst
memoryBlockIteratorNext
preUpdateHookTrampoline
rollbackHookTrampoline
scanCallbackFunc
stepTrampoline
streamRead
streamWrite
updateHookTrampoline
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
AdjustTokenPrivileges
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
DeregisterEventSource
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
ImpersonateSelf
LookupPrivilegeValueA
OpenProcessToken
OpenThreadToken
RegisterEventSourceW
ReportEventW
StackWalk64
SymCleanup
SymFunctionTableAccess64
SymGetModuleBase64
SymInitialize
AddVectoredExceptionHandler
AreFileApisANSI
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreateIoCompletionPort
CreateMutexA
CreateMutexW
CreateSemaphoreW
CreateThread
CreateToolhelp32Snapshot
CreateWaitableTimerA
CreateWaitableTimerExW
DeleteCriticalSection
DeleteFileA
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileW
FindNextFileW
FlushConsoleInputBuffer
FlushFileBuffers
FlushViewOfFile
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesA
GetFileAttributesExW
GetFileAttributesW
GetFileSize
GetFileSizeEx
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLogicalDrives
GetLongPathNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetProcessId
GetQueuedCompletionStatusEx
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathA
GetTempPathW
GetThreadContext
GetTickCount
GetTickCount64
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
HeapAlloc
HeapCompact
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
IsBadWritePtr
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
LockFile
LockFileEx
MapViewOfFile
MultiByteToWideChar
OpenProcess
OpenThread
OutputDebugStringA
OutputDebugStringW
PostQueuedCompletionStatus
QueryDosDeviceA
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResumeThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
SetConsoleCtrlHandler
SetConsoleTextAttribute
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetProcessPriorityBoost
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SuspendThread
SwitchToThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
Thread32First
Thread32Next
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnlockFile
UnlockFileEx
UnmapViewOfFile
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualLock
VirtualProtect
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WaitForMultipleObjects
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
Wow64GetThreadContext
WriteConsoleW
WriteFile
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_assert
_beginthread
_beginthreadex
_cexit
_commode
_endthreadex
_errno
_exit
_filelengthi64
_fileno
_fmode
_fstat64
_gmtime64
_initterm
_localtime64
_lock
_lseeki64
_mkgmtime64
_onexit
_setjmp
_setmode
_snprintf
_stat64
_strdup
_stricmp
_strnicmp
_strtoi64
_time64
_unlock
_vsnprintf
_vsnwprintf
_wfopen
abort
atof
atoi
calloc
clearerr
exit
fclose
feof
ferror
fflush
fgetpos
fgets
fopen
fprintf
fputc
fputs
fread
free
fseek
fsetpos
ftell
fwrite
getc
getenv
getwc
isalpha
islower
isprint
isspace
isupper
iswctype
isxdigit
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
putc
putwc
qsort
raise
rand
realloc
setlocale
setvbuf
signal
srand
strcat
strchr
strcmp
strcoll
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strrchr
strspn
strstr
strtok_s
strtol
strtoul
strxfrm
tolower
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcscpy
wcsftime
wcslen
wcsstr
wcsxfrm
longjmp
_write
_strdup
_read
_open
_fileno
_fdopen
_close
NtCreateFile
NtQuerySystemInformation
RtlInitUnicodeString
RtlVirtualUnwind
VerSetConditionMask
ZwQueryInformationFile
EnumProcessModulesEx
GetMappedFileNameA
GetModuleFileNameExA
GetProcessImageFileNameA
QueryWorkingSet
PathCanonicalizeA
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
MessageBoxW
_cgo_dummy_export
authorizerTrampoline
callbackTrampoline
commitHookTrampoline
compareTrampoline
compilerCallback
doneTrampoline
freeCallback
includeCallback
memoryBlockFetch
memoryBlockFetchNull
memoryBlockIteratorFilesize
memoryBlockIteratorFirst
memoryBlockIteratorNext
preUpdateHookTrampoline
rollbackHookTrampoline
scanCallbackFunc
stepTrampoline
streamRead
streamWrite
updateHookTrampoline
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE