About
IHWCI
MyHook
MyTimerHook
seth
Overview
overview
3Static
static
3Cheat Engi...ok.dll
windows7-x64
3Cheat Engi...ok.dll
windows10-2004-x64
3Cheat Engi...um.exe
windows7-x64
3Cheat Engi...um.exe
windows10-2004-x64
3Cheat Engi...er.exe
windows7-x64
3Cheat Engi...er.exe
windows10-2004-x64
3Cheat Engi...er.exe
windows7-x64
3Cheat Engi...er.exe
windows10-2004-x64
3Cheat Engi...ok.dll
windows7-x64
3Cheat Engi...ok.dll
windows10-2004-x64
3Cheat Engi...ok.dll
windows7-x64
3Cheat Engi...ok.dll
windows10-2004-x64
3Cheat Engi...ll.dll
windows7-x64
3Cheat Engi...ll.dll
windows10-2004-x64
3Cheat Engi...ss.exe
windows7-x64
1Cheat Engi...ss.exe
windows10-2004-x64
3Cheat Engi...st.dll
windows7-x64
3Cheat Engi...st.dll
windows10-2004-x64
3Cheat Engi...st.sys
windows7-x64
1Cheat Engi...st.sys
windows10-2004-x64
1Cheat Engi...32.dll
windows7-x64
3Cheat Engi...32.dll
windows10-2004-x64
3Cheat Engi...32.sys
windows7-x64
1Cheat Engi...32.sys
windows10-2004-x64
1Cheat Engi...64.sys
windows7-x64
1Cheat Engi...64.sys
windows10-2004-x64
1Cheat Engi...ck.dll
windows7-x64
3Cheat Engi...ck.dll
windows10-2004-x64
3Cheat Engi...th.dll
windows7-x64
3Cheat Engi...th.dll
windows10-2004-x64
3Cheat Engi...al.exe
windows7-x64
3Cheat Engi...al.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Cheat Engine Ultimatum/CEHook.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Cheat Engine Ultimatum/CEHook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Cheat Engine Ultimatum/Cheat Engine Ultimatum.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Cheat Engine Ultimatum/Cheat Engine Ultimatum.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Cheat Engine Ultimatum/Kernelmoduleunloader.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Cheat Engine Ultimatum/Kernelmoduleunloader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Cheat Engine Ultimatum/Systemcallretriever.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Cheat Engine Ultimatum/Systemcallretriever.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Cheat Engine Ultimatum/allochook.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Cheat Engine Ultimatum/allochook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Cheat Engine Ultimatum/dxhook.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Cheat Engine Ultimatum/dxhook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Cheat Engine Ultimatum/emptydll.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Cheat Engine Ultimatum/emptydll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Cheat Engine Ultimatum/emptyprocess.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Cheat Engine Ultimatum/emptyprocess.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Cheat Engine Ultimatum/frost.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Cheat Engine Ultimatum/frost.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Cheat Engine Ultimatum/frost.sys
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Cheat Engine Ultimatum/frost.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Cheat Engine Ultimatum/frost32.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Cheat Engine Ultimatum/frost32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Cheat Engine Ultimatum/frost32.sys
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Cheat Engine Ultimatum/frost32.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Cheat Engine Ultimatum/frost64.sys
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
Cheat Engine Ultimatum/frost64.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Cheat Engine Ultimatum/speedhack.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Cheat Engine Ultimatum/speedhack.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Cheat Engine Ultimatum/stealth.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
Cheat Engine Ultimatum/stealth.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Cheat Engine Ultimatum/systemcallsignal.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Cheat Engine Ultimatum/systemcallsignal.exe
Resource
win10v2004-20240802-en
Target
ae49802e20eaf69943408b66aa41542b_JaffaCakes118
Size
1.6MB
MD5
ae49802e20eaf69943408b66aa41542b
SHA1
77b10f4879713a625aecdea8f7ee47d8829ec846
SHA256
df5fe06370334816d64202462895a9cbe80538bf23e248d554d156b4bb432133
SHA512
3ac5b17b136545f9da236b431dd22d367054bf9a0d5563e02d63dcae6ce909e841802e13241eacc1fc9af5e8e491cacbe896e122b8362322af4d87a44cc026bc
SSDEEP
49152:JCdIpkKzvp+M4t2jArHx263Dm3CI7fHSWu:JCupJvp+M48SHxwSI7P7u
Checks for missing Authenticode signature.
resource |
---|
unpack001/Cheat Engine Ultimatum/CEHook.dll |
unpack001/Cheat Engine Ultimatum/Cheat Engine Ultimatum.exe |
unpack001/Cheat Engine Ultimatum/Kernelmoduleunloader.exe |
unpack001/Cheat Engine Ultimatum/Systemcallretriever.exe |
unpack001/Cheat Engine Ultimatum/allochook.dll |
unpack001/Cheat Engine Ultimatum/dxhook.dll |
unpack001/Cheat Engine Ultimatum/emptydll.dll |
unpack001/Cheat Engine Ultimatum/emptyprocess.exe |
unpack001/Cheat Engine Ultimatum/frost.dll |
unpack001/Cheat Engine Ultimatum/frost.sys |
unpack001/Cheat Engine Ultimatum/frost32.dll |
unpack001/Cheat Engine Ultimatum/frost32.sys |
unpack001/Cheat Engine Ultimatum/frost64.sys |
unpack001/Cheat Engine Ultimatum/speedhack.dll |
unpack001/Cheat Engine Ultimatum/stealth.dll |
unpack001/Cheat Engine Ultimatum/systemcallsignal.exe |
unpack001/Cheat Engine Ultimatum/ucc12.dll |
unpack001/Cheat Engine Ultimatum/undercdll.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
About
IHWCI
MyHook
MyTimerHook
seth
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
CEHasHandledItEvent
CEInitializationFinished
CeAllocateVirtualMemory
CeFreeVirtualMemory
CeInitializeAllocHook
CeRtlAllocateHeap
CeRtlDestroyHeap
CeRtlFreeHeap
HasSetupDataEvent
HookEventData
NtAllocateVirtualMemoryOrig
NtFreeVirtualMemoryOrig
RtlAllocateHeapOrig
RtlDestroyHeapOrig
RtlFreeHeapOrig
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
InitializeDirectX_Hook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
AAA
BBB
CCC
CreateRemoteAPC
DBKDebug_ContinueDebugEvent
DBKDebug_GD_SetBreakpoint
DBKDebug_GetDebuggerState
DBKDebug_SetDebuggerState
DBKDebug_SetGlobalDebugState
DBKDebug_StartDebugging
DBKDebug_StopDebugging
DBKDebug_WaitForDebugEvent
DBKResumeProcess
DBKResumeThread
DBKSuspendProcess
DBKSuspendThread
DDD
EEE
FFF
GGG
GetCR0
GetCR3
GetCR4
GetDebugportOffset
GetGDT
GetIDTCurrentThread
GetIDTs
GetKProcAddress
GetKProcAddress64
GetLoadedState
GetPEProcess
GetPEThread
GetPhysicalAddress
GetProcessNameFromID
GetProcessNameFromPEProcess
GetProcessnameOffset
GetSDT
GetSDTEntry
GetSDTShadow
GetSSDTEntry
GetThreadListEntryOffset
GetThreadsProcessOffset
HHH
III
IsValidHandle
KernelAlloc
KernelAlloc64
LaunchDBVM
MakeWritable
ReadPhysicalMemory
StartProcessWatch
UserdefinedInterruptHook
WaitForProcessListData
WritePhysicalMemory
dbvm_block_interrupts
dbvm_changeselectors
dbvm_raise_privilege
dbvm_read_physical_memory
dbvm_redirect_interrupt1
dbvm_restore_interrupts
dbvm_version
dbvm_write_physical_memory
executeKernelCode
isDriverLoaded
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
CreateRemoteAPC
DBKDebug_ContinueDebugEvent
DBKDebug_GD_SetBreakpoint
DBKDebug_GetDebuggerState
DBKDebug_SetDebuggerState
DBKDebug_SetGlobalDebugState
DBKDebug_StartDebugging
DBKDebug_StopDebugging
DBKDebug_WaitForDebugEvent
DBKResumeProcess
DBKResumeThread
DBKSuspendProcess
DBKSuspendThread
GetCR0
GetCR3
GetCR4
GetDebugportOffset
GetGDT
GetIDTCurrentThread
GetIDTs
GetKProcAddress
GetKProcAddress64
GetLoadedState
GetPEProcess
GetPEThread
GetPhysicalAddress
GetProcessNameFromID
GetProcessNameFromPEProcess
GetProcessnameOffset
GetSDT
GetSDTEntry
GetSDTShadow
GetSSDTEntry
GetThreadListEntryOffset
GetThreadsProcessOffset
IsValidHandle
KernelAlloc
KernelAlloc64
LaunchDBVM
MakeWritable
ReadPhysicalMemory
StartProcessWatch
UserdefinedInterruptHook
WaitForProcessListData
WritePhysicalMemory
dbvm_block_interrupts
dbvm_changeselectors
dbvm_raise_privilege
dbvm_read_physical_memory
dbvm_redirect_interrupt1
dbvm_restore_interrupts
dbvm_version
dbvm_write_physical_memory
executeKernelCode
frostnop
frostop
frostot
frostrpm
frostrpm64
frostvae
frostvqe
frostwpm
frostwpm64
isDriverLoaded
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\cheate~1\dbkker~1\objfre_win7_x86\i386\frost32.pdb
PsSetCreateProcessNotifyRoutine
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
IoAllocateWorkItem
IoCreateSymbolicLink
IoCreateDevice
ZwQueryValueKey
ExAllocatePool
ZwOpenKey
RtlAppendUnicodeToString
KeQueryActiveProcessors
KeGetCurrentThread
KeDelayExecutionThread
KeInsertQueueApc
KeInitializeApc
ZwOpenThread
KeDetachProcess
ZwAllocateVirtualMemory
KeAttachProcess
PsSetCreateThreadNotifyRoutine
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwOpenSection
MmGetPhysicalAddress
KeUnstackDetachProcess
KeStackAttachProcess
IoDeleteDevice
ObOpenObjectByPointer
PsProcessType
ObfDereferenceObject
PsLookupProcessByProcessId
memset
memcpy
PsLookupThreadByThreadId
KeWaitForSingleObject
KeReleaseSemaphore
KeClearEvent
KeSetEvent
KeInitializeEvent
_allmul
PsGetCurrentThreadId
PsGetCurrentProcessId
MmAllocateContiguousMemory
ZwWaitForSingleObject
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
KeTickCount
KeBugCheckEx
RtlUnwind
IoDeleteSymbolicLink
ExFreePoolWithTag
IofCompleteRequest
ObReferenceObjectByHandle
DbgPrint
KeGetCurrentIrql
KfAcquireSpinLock
KfReleaseSpinLock
KfRaiseIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\cheate~1\dbkker~1\objfre_win7_amd64\amd64\frost64.pdb
IoDeleteSymbolicLink
ExFreePoolWithTag
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
RtlAppendUnicodeToString
PsSetCreateProcessNotifyRoutine
ZwQueryValueKey
ExAllocatePool
IoAllocateWorkItem
ZwClose
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
ZwOpenKey
KeQueryActiveProcessors
PsProcessType
PsLookupProcessByProcessId
KeInitializeApc
ZwMapViewOfSection
KeInsertQueueApc
PsSetCreateThreadNotifyRoutine
KeReleaseSpinLock
ZwOpenThread
KeUnstackDetachProcess
KeDetachProcess
KeDelayExecutionThread
MmGetPhysicalAddress
ZwUnmapViewOfSection
ObReferenceObjectByHandle
KeAttachProcess
ObfDereferenceObject
ZwOpenSection
ObOpenObjectByPointer
KeStackAttachProcess
ZwAllocateVirtualMemory
KeAcquireSpinLockRaiseToDpc
PsLookupThreadByThreadId
KeWaitForSingleObject
KeReleaseSemaphore
KeClearEvent
KeSetEvent
KeInitializeEvent
PsGetCurrentThreadId
PsGetCurrentProcessId
ZwReadFile
ZwWaitForSingleObject
ZwCreateFile
ZwQueryInformationFile
MmAllocateContiguousMemory
KeBugCheckEx
__C_specific_handler
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
InitializeSpeedhack
realGetTickCount
realQueryPerformanceCounter
speedhackversion_GetTickCount
speedhackversion_QueryPerformanceCounter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
hook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileTime
OpenFile
LoadLibraryA
FreeLibrary
GetProcAddress
GetModuleHandleA
WaitForSingleObject
Sleep
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
EnterCriticalSection
InterlockedExchange
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
MoveFileA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetFileAttributesA
GetCommandLineA
GetVersion
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
CloseHandle
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
FlushFileBuffers
WriteFile
ReadFile
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
GetCPInfo
MultiByteToWideChar
LCMapStringA
LCMapStringW
SetStdHandle
CreateFileA
GetStringTypeA
GetStringTypeW
GetExitCodeProcess
CreateProcessA
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
SetEndOfFile
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
SetCurrentDirectoryA
??0FBlock@@QAE@PAUInstruction@@H@Z
??0XClass@@QAE@ABV0@@Z
??0XClass@@QAE@PAVNamedTable@@@Z
??0XEntry@@QAE@PAUEntry@@@Z
??0XFunction@@QAE@PAVFunction@@@Z
??0XModule@@QAE@PAVModule@@@Z
??0XNTable@@QAE@ABV0@@Z
??0XNTable@@QAE@PAVNamedTable@@@Z
??0XTemplateFun@@QAE@PAVTemplateEntry@@@Z
??0XTrace@@QAE@ABV0@@Z
??0XTrace@@QAE@_N@Z
??0XType@@QAE@PAVType@@@Z
??4FBlock@@QAEAAU0@ABU0@@Z
??4XClass@@QAEAAV0@ABV0@@Z
??4XEntry@@QAEAAV0@ABV0@@Z
??4XFunction@@QAEAAV0@ABV0@@Z
??4XModule@@QAEAAV0@ABV0@@Z
??4XNTable@@QAEAAV0@ABV0@@Z
??4XTemplateFun@@QAEAAV0@ABV0@@Z
??4XTrace@@QAEAAV0@ABV0@@Z
??4XType@@QAEAAV0@ABV0@@Z
??_7XClass@@6B@
??_7XNTable@@6B@
??_7XTrace@@6B@
??_FFBlock@@QAEXXZ
??_FXEntry@@QAEXXZ
??_FXFunction@@QAEXXZ
??_FXTrace@@QAEXXZ
?addr_mode@XEntry@@QAEHXZ
?args@XFunction@@QAEAAV?$listx@PAVXType@@@@XZ
?as_class@XType@@QBEPAVXClass@@XZ
?as_str@XFunction@@QAEXAAVstring@@@Z
?as_str@XType@@QBEPADXZ
?base_class@XClass@@QAEPAV1@XZ
?base_entry@XEntry@@QAEPAV1@XZ
?class_obj@XClass@@QAEPAVClass@@XZ
?classes@XModule@@QAEAAV?$listx@PAVXClass@@@@XZ
?clone@XEntry@@QAEPAV1@XZ
?create@FBlock@@SAPAU1@PAUEntry@@PAVClass@@@Z
?create@XClass@@QAEPAXXZ
?create@XNTable@@QAEPAVXEntry@@PADPAVXType@@@Z
?data@XEntry@@QAEHXZ
?dispose_of_entries@XNTable@@SAXAAV?$listx@PAVXEntry@@@@@Z
?do_enter@XTrace@@QAE_NXZ
?do_leave@XTrace@@QAE_NXZ
?enter@XTrace@@UAEXPAUXExecState@@@Z
?entry@XEntry@@QAEPAXXZ
?eval@XFunction@@QAEHPAX00@Z
?fblock@XFunction@@QAEPAXXZ
?filename@XModule@@QAEPADXZ
?finalize@FBlock@@QAEXH@Z
?from_fb@XFunction@@SAPAV1@PAX@Z
?from_id@XModule@@SAPAV1@H@Z
?from_name@XModule@@SAPAV1@PAD@Z
?from_str@XType@@SAPAV1@PAD@Z
?fun@XFunction@@QAEPAXXZ
?function@XEntry@@QAEPAVXFunction@@H@Z
?functions@XModule@@QAEAAV?$listx@PAVXFunction@@@@XZ
?functions@XNTable@@QAEAAV?$listx@PAVXFunction@@@@H@Z
?get_args@XFunction@@QAEXPAV?$listx@PAVXType@@@@PAV?$listx@Vstring@@@@@Z
?get_class_of@XClass@@SAPAV1@PAX@Z
?get_functions@XNTable@@QAEXAAV?$listx@PAVXFunction@@@@HPAD@Z
?get_template@XClass@@QAEPAVXTemplateFun@@XZ
?get_trace@XFunction@@QAEPAVXTrace@@XZ
?get_variables@XNTable@@QAEXAAV?$listx@PAVXEntry@@@@HPAD@Z
?has_VMT@XClass@@QAE_NXZ
?inherits_from@XClass@@QAEHPAV1@@Z
?instantiate@XTemplateFun@@QAEPAXABV?$listx@PAVXType@@@@@Z
?ip_to_line@XFunction@@QAEHPAX@Z
?is_array@XType@@QBE_NXZ
?is_bool@XType@@QBE_NXZ
?is_char@XType@@QBE_NXZ
?is_class@XType@@QBE_NXZ
?is_const@XType@@QBE_NXZ
?is_double@XType@@QBE_NXZ
?is_float@XType@@QBE_NXZ
?is_function@XType@@QBE_NXZ
?is_int@XType@@QBE_NXZ
?is_long@XType@@QBE_NXZ
?is_namespace@XType@@QBE_NXZ
?is_number@XType@@QBE_NXZ
?is_object@XType@@QBE_NXZ
?is_pointer@XType@@QBE_NXZ
?is_reference@XType@@QBE_NXZ
?is_short@XType@@QBE_NXZ
?is_signature@XType@@QBE_NXZ
?is_single@XType@@QBE_NXZ
?is_unsigned@XType@@QBE_NXZ
?is_void@XType@@QBE_NXZ
?leave@XTrace@@UAEXPAUXExecState@@@Z
?lists@XModule@@SAAAV?$listx@PAVXModule@@@@XZ
?lookup@XNTable@@UAEPAVXEntry@@PAD_N@Z
?lookup_class@XNTable@@QAEPAVXClass@@PAD_N@Z
?lookup_local@XFunction@@QAEPAVXEntry@@PAD@Z
?lookup_template@XNTable@@QAEPAVXTemplateFun@@PAD_N@Z
?match_instantiate@XTemplateFun@@QAEPAXABV?$listx@PAVXType@@@@@Z
?module@XFunction@@QAEHXZ
?name@XEntry@@QAEPADXZ
?name@XFunction@@QAEPADXZ
?name@XNTable@@QAEPADXZ
?name@XTemplateFun@@QAEPADXZ
?native_addr@FBlock@@QAEPAXXZ
?nfun@XEntry@@QAEHXZ
?no_template_parms@XClass@@QAEHXZ
?offset@XNTable@@QAEHPAX@Z
?pcode@XFunction@@QAEPAUXInstruction@@XZ
?pointer_depth@XType@@QBEHXZ
?ptr@XEntry@@QAEPAXPAX@Z
?ret_type@XFunction@@QAEPAVXType@@XZ
?set_class_of@XClass@@QAEXPAX@Z
?set_data@XEntry@@QAEXH@Z
?set_on_entry@XTrace@@QAEX_N@Z
?set_on_exit@XTrace@@QAEX_N@Z
?set_ptr@XEntry@@QAEXPAX0@Z
?set_trace@XFunction@@QAEXPAVXTrace@@@Z
?set_tracing@XFunction@@SAX_N@Z
?size@XEntry@@QAEHXZ
?size@XType@@QBEHXZ
?str_to_val@XEntry@@QAEXPADPAX@Z
?str_to_val@XType@@QAEXPADPAX@Z
?table@XNTable@@QAEPAVNamedTable@@XZ
?template_parm@XClass@@QAEPAVXType@@H@Z
?type@XEntry@@QAEPAVXType@@XZ
?type@XType@@QAEPAVType@@XZ
?typelist@XType@@SAAAV?$listx@PAVXType@@@@PAV1@ZZ
?uc_global@@YAPAVXNTable@@XZ
?uc_std@@YAPAVXNTable@@XZ
?uc_ucri_init@@YAXXZ
?ucri_instruction_counter@@YAPAK_N@Z
?val_as_str@XEntry@@QAEXAAVstring@@PAX@Z
?val_as_str@XType@@QBEXAAVstring@@PAX@Z
?variables@XNTable@@QAEAAV?$listx@PAVXEntry@@@@H@Z
?where@XFunction@@QAEHAAVstring@@@Z
_uc_compile@8
_uc_compile_fn@8
_uc_error@8
_uc_error_pos@4
_uc_eval@12
_uc_eval_exp@12
_uc_eval_method@16
_uc_exec@4
_uc_finis@0
_uc_import@8
_uc_include@4
_uc_init@8
_uc_init_ref@12
_uc_interactive_loop@0
_uc_load@4
_uc_main@8
_uc_main_window@0
_uc_result@8
_uc_run@0
_uc_set_quote@8
uc_eval_args
uc_eval_method_args
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
underc_executescript
underc_geterror
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ