Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
7e1435808a0...18.exe
windows7-x64
3e1435808a0...18.exe
windows10-2004-x64
3$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/AnVir.exe
windows7-x64
6$TEMP/AnVir.exe
windows10-2004-x64
6AnVir.exe
windows7-x64
6AnVir.exe
windows10-2004-x64
6AnvirHook8.dll
windows7-x64
3AnvirHook8.dll
windows10-2004-x64
3AnvirHook8_64.dll
windows7-x64
1AnvirHook8_64.dll
windows10-2004-x64
1OpenHardwa...ls.dll
windows7-x64
1OpenHardwa...ls.dll
windows10-2004-x64
1OpenHardwa...ry.dll
windows7-x64
1OpenHardwa...ry.dll
windows10-2004-x64
1OpenHardwa...e.html
windows7-x64
3OpenHardwa...e.html
windows10-2004-x64
3OpenHardwa...or.exe
windows7-x64
6OpenHardwa...or.exe
windows10-2004-x64
6OpenHardwa...ib.dll
windows7-x64
1OpenHardwa...ib.dll
windows10-2004-x64
1OpenHardwa...ms.dll
windows7-x64
1OpenHardwa...ms.dll
windows10-2004-x64
1OpenHardwa...ot.dll
windows7-x64
1OpenHardwa...ot.dll
windows10-2004-x64
1VirusTotalUpload.exe
windows7-x64
3VirusTotalUpload.exe
windows10-2004-x64
3anvir64.exe
windows7-x64
1anvir64.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
e1435808a090ca8bd6c982bdb4e1d37d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1435808a090ca8bd6c982bdb4e1d37d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/AnVir.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/AnVir.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
AnVir.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
AnVir.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
AnvirHook8.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
AnvirHook8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
AnvirHook8_64.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AnvirHook8_64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
OpenHardwareMonitor/Aga.Controls.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
OpenHardwareMonitor/Aga.Controls.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
OpenHardwareMonitor/HidLibrary.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
OpenHardwareMonitor/HidLibrary.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
OpenHardwareMonitor/License.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
OpenHardwareMonitor/License.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
OpenHardwareMonitor/OpenHardwareMonitor.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
OpenHardwareMonitor/OpenHardwareMonitor.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
OpenHardwareMonitor/OpenHardwareMonitorLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
OpenHardwareMonitor/OpenHardwareMonitorLib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
OpenHardwareMonitor/OxyPlot.WindowsForms.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
OpenHardwareMonitor/OxyPlot.WindowsForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
OpenHardwareMonitor/OxyPlot.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
OpenHardwareMonitor/OxyPlot.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
VirusTotalUpload.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
VirusTotalUpload.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
anvir64.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
anvir64.exe
Resource
win10v2004-20240802-en
Target
e1435808a090ca8bd6c982bdb4e1d37d_JaffaCakes118
Size
4.3MB
MD5
e1435808a090ca8bd6c982bdb4e1d37d
SHA1
28db6dd4d685cd9d93ba8d1808725f4e95174ca4
SHA256
e1a4031154ed9aa6132686eeeeb82d6b9136d685003d183f97adc91289a7a0c6
SHA512
06fe562b8880b9729d0971ed2735a284e55fed9680943ca37836bf553ed588f2a3c1ced685db4497ce6256d343d1b6bc47aa964eabec4076071704f048f5ba11
SSDEEP
98304:bnf8eGFIPLSQZTrarXtn70DnCLmUQPtXyRf2MsSbTpY614v8/8j:jf+iPLSaTr0XlQzXXiuMsSbTpY6Ov80j
resource | yara_rule |
---|---|
static1/unpack001/usbhdd.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/INetC.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/OpenHardwareMonitor/Aga.Controls.dll |
unpack001/OpenHardwareMonitor/HidLibrary.dll |
unpack001/OpenHardwareMonitor/OpenHardwareMonitor.exe |
unpack001/OpenHardwareMonitor/OpenHardwareMonitorLib.dll |
unpack001/OpenHardwareMonitor/OxyPlot.WindowsForms.dll |
unpack001/OpenHardwareMonitor/OxyPlot.dll |
unpack001/VirusTotalUpload.exe |
unpack002/out.upx |
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
SetFileAttributesW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
SetCurrentDirectoryW
GetFileAttributesW
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
lstrcpynW
CopyFileW
GetShortPathNameW
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
GetTempFileNameW
WriteFile
lstrcpyA
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
lstrcmpiW
MoveFileW
GetFullPathNameW
SetFileTime
SearchPathW
CompareFileTime
lstrcmpW
CloseHandle
ExpandEnvironmentStringsW
GlobalFree
GlobalUnlock
GetDiskFreeSpaceW
GlobalAlloc
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
lstrlenA
MulDiv
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetSystemMenu
SetClassLongW
EnableMenuItem
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
ScreenToClient
GetWindowRect
GetDlgItem
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
GetDC
SetTimer
SetWindowTextW
LoadImageW
SetForegroundWindow
ShowWindow
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
EndPaint
CreateDialogParamW
SendMessageTimeoutW
wsprintfW
PostQuitMessage
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
SHFileOperationW
AdjustTokenPrivileges
RegCreateKeyExW
RegOpenKeyExW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
RegEnumValueW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
ord17
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LocalFree
WideCharToMultiByte
TerminateThread
lstrcpyW
LoadLibraryA
CreateThread
WaitForSingleObject
LocalAlloc
lstrcpynW
SleepEx
MulDiv
GetModuleHandleW
ReadFile
GetLastError
CreateFileW
lstrcmpiW
CreateFileA
lstrcatW
GetFileSize
SetFilePointer
lstrcmpW
MultiByteToWideChar
lstrlenA
WriteFile
lstrlenW
CloseHandle
GlobalAlloc
GlobalFree
GetTickCount
DeleteFileW
GetDlgItem
DestroyWindow
GetClientRect
MessageBoxW
wsprintfA
SystemParametersInfoW
GetWindowTextW
GetWindowLongW
FindWindowExW
IsWindow
CreateDialogParamW
GetParent
ShowWindow
KillTimer
DispatchMessageW
LoadIconW
PostMessageW
IsDialogMessageW
GetMessageW
SetWindowPos
SendDlgItemMessageW
SetWindowTextW
TranslateMessage
GetWindowRect
RedrawWindow
SetTimer
EnableWindow
UpdateWindow
SetWindowLongW
wsprintfW
SendMessageW
SetDlgItemTextW
IsWindowVisible
ord17
InternetConnectW
HttpOpenRequestW
InternetQueryOptionW
InternetErrorDlg
HttpSendRequestExW
InternetWriteFile
HttpSendRequestW
InternetSetFilePointer
HttpAddRequestHeadersA
FtpCreateDirectoryW
InternetCrackUrlW
FtpOpenFileW
InternetSetOptionW
InternetOpenW
InternetGetLastResponseInfoW
HttpEndRequestW
InternetReadFile
HttpAddRequestHeadersW
InternetCloseHandle
HttpQueryInfoW
get
head
post
put
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleW
GlobalFree
GlobalSize
lstrcpynW
lstrcpyW
GetProcAddress
WideCharToMultiByte
VirtualFree
FreeLibrary
lstrlenW
LoadLibraryW
GlobalAlloc
MultiByteToWideChar
VirtualAlloc
VirtualProtect
GetLastError
wsprintfW
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord155
ord18
Shell_NotifyIconA
SHOpenFolderAndSelectItems
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHFileOperationA
DuplicateIcon
ExtractIconExA
SHGetFileInfoA
SHGetSpecialFolderPathA
ShellExecuteExA
ord680
ShellExecuteA
VerQueryValueA
GetFileVersionInfoA
ord9
ord8
StrFormatByteSizeW
PathFindOnPathA
ord10
PathCanonicalizeA
ord172
ord216
WritePrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStructA
GetPrivateProfileStructA
GetPrivateProfileStringA
FormatMessageA
GetFileAttributesA
SetFileAttributesA
GetSystemDirectoryA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetEnvironmentVariableA
GetTempPathA
SetErrorMode
GetDriveTypeA
GetLocaleInfoA
GetDateFormatA
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
CreateProcessA
GlobalAlloc
GlobalLock
GlobalUnlock
GetUserDefaultUILanguage
GetVolumeInformationA
LocalFree
GetCurrentProcess
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
GetFileSize
SetFilePointer
MulDiv
IsBadStringPtrA
GlobalMemoryStatusEx
SetProcessAffinityMask
GetProcessAffinityMask
GlobalFree
lstrlenW
GlobalReAlloc
FindFirstFileA
FindNextFileA
FindClose
CopyFileA
MoveFileA
SystemTimeToFileTime
GetSystemPowerStatus
GetPriorityClass
SetPriorityClass
SuspendThread
SetProcessWorkingSetSize
VirtualAlloc
VirtualFree
DuplicateHandle
GetFileType
VirtualAllocEx
VirtualFreeEx
RemoveDirectoryA
GetLogicalDrives
GetDiskFreeSpaceExA
DeviceIoControl
GetExitCodeProcess
CompareStringA
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
GetACP
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
VirtualProtect
GetSystemInfo
LoadLibraryExW
TlsFree
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
GetSystemTime
IsBadWritePtr
VirtualQuery
ReadFile
SetEndOfFile
GetFileTime
ExpandEnvironmentStringsA
lstrcatA
GetLocalTime
GetVersionExA
lstrcpyA
MapViewOfFile
CreateFileMappingA
TerminateThread
SetEvent
GetLongPathNameA
lstrcpynA
QueryDosDeviceA
GetLogicalDriveStringsA
GetProcessTimes
GetCurrentProcessId
OpenProcess
lstrcmpA
CreateFileA
WriteFile
ResumeThread
SetThreadPriority
GetExitCodeThread
DeleteFileA
SetLastError
DecodePointer
GetCurrentThreadId
SetUnhandledExceptionFilter
Sleep
WaitForSingleObject
PulseEvent
OpenEventA
CreateEventA
OpenMutexA
CloseHandle
CreateMutexA
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
LoadLibraryExA
FindResourceA
GetLastError
RaiseException
IsDBCSLeadByte
MultiByteToWideChar
lstrcmpiA
GetModuleHandleA
GetProcAddress
FreeLibrary
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetTickCount
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateDirectoryA
SetStdHandle
CreateFileW
SetFilePointerEx
WriteConsoleW
ReadConsoleW
SetFileTime
DrawAnimatedRects
DialogBoxIndirectParamA
GetDialogBaseUnits
ChildWindowFromPoint
SendDlgItemMessageA
CreateIconIndirect
GetGuiResources
FindWindowExA
EnumThreadWindows
SetScrollPos
SetScrollInfo
SetClassLongA
GetScrollRange
ScrollWindowEx
FlashWindow
WaitForInputIdle
GetMenuStringA
GetNextDlgTabItem
GetScrollPos
IntersectRect
GetAsyncKeyState
DragDetect
AdjustWindowRectEx
EqualRect
GetDesktopWindow
LockWindowUpdate
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
ClientToScreen
SetParent
IsChild
SetRect
IsRectEmpty
LoadBitmapA
DrawStateA
AppendMenuA
CharLowerA
FrameRect
WindowFromPoint
GetMessagePos
DestroyIcon
DrawFrameControl
TranslateAcceleratorA
PostQuitMessage
LoadStringW
DrawEdge
LockWorkStation
ExitWindowsEx
GetForegroundWindow
GetLayeredWindowAttributes
UnregisterHotKey
IsZoomed
IsIconic
SetWindowsHookExA
CallNextHookEx
MonitorFromPoint
UnhookWindowsHookEx
ModifyMenuA
GetMenuItemID
MonitorFromRect
CopyRect
SetMenu
GetMenu
SetMenuDefaultItem
CheckMenuRadioItem
RegisterWindowMessageA
DrawIconEx
GetWindowDC
GetDCEx
GetSysColorBrush
IsCharAlphaNumericA
CharUpperBuffA
InflateRect
SetMenuItemInfoA
GetMenuItemInfoA
IsMenu
MoveWindow
GetKeyState
RedrawWindow
InsertMenuA
RemoveMenu
InsertMenuItemA
GetSubMenu
CreateDialogParamA
GetMenuItemCount
BringWindowToTop
IsDialogMessageA
GetKeyboardLayoutList
GetWindowThreadProcessId
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DestroyMenu
TrackPopupMenu
TrackPopupMenuEx
CreatePopupMenu
GetClassLongA
SendMessageTimeoutA
SetLayeredWindowAttributes
CharLowerBuffA
GetTopWindow
GetWindowPlacement
GetMenuState
DeleteMenu
RegisterHotKey
GetDlgItemTextA
LoadIconA
CharUpperA
SetDlgItemInt
GetDlgItemInt
MessageBeep
EnableWindow
IsWindowEnabled
GetFocus
DrawFocusRect
TrackMouseEvent
SetCapture
GetCapture
ReleaseCapture
GetDlgCtrlID
GetCursorPos
ScreenToClient
PtInRect
UpdateWindow
InvalidateRect
EndPaint
BeginPaint
SetRectEmpty
SystemParametersInfoA
GetWindowTextLengthA
CallWindowProcA
DefWindowProcA
SetFocus
CharNextA
PostMessageA
SetCursor
EndDialog
OffsetRect
GetSysColor
FillRect
GetShellWindow
ReleaseDC
GetDC
GetClassNameA
GetWindow
MonitorFromWindow
GetMonitorInfoA
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
EnumChildWindows
GetWindowTextA
DialogBoxParamA
GetActiveWindow
DrawTextA
EnumWindows
ShowWindowAsync
wsprintfA
IsWindowVisible
MessageBoxA
KillTimer
SetDlgItemTextA
SetTimer
IsDlgButtonChecked
CheckDlgButton
SetWindowTextA
SetWindowPos
GetWindowLongA
SendMessageA
GetDlgItem
SetWindowLongA
CreateWindowExA
UnregisterClassA
GetClassInfoExA
LoadImageA
GetSystemMetrics
RegisterClassExA
LoadAcceleratorsA
LoadMenuA
LoadStringA
DestroyWindow
SetForegroundWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
FindWindowA
ShowWindow
IsWindow
LoadCursorA
RoundRect
CreateDCA
SetViewportOrgEx
ExcludeClipRect
ExtTextOutA
CreateDIBSection
SetBrushOrgEx
PatBlt
TextOutW
CreatePatternBrush
CreateBitmap
GetClipBox
SetWindowOrgEx
DPtoLP
LPtoDP
RectVisible
LineTo
MoveToEx
CreatePen
RestoreDC
SaveDC
BitBlt
CreateCompatibleBitmap
GetStockObject
CreateFontIndirectA
GetObjectA
SetTextColor
SetBkColor
SetBkMode
CreateSolidBrush
GetDeviceCaps
Polygon
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
GetTextMetricsA
Rectangle
GetTextExtentPoint32A
GetCurrentObject
FindTextA
GetSaveFileNameA
GetOpenFileNameA
DuplicateTokenEx
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
QueryServiceStatusEx
ControlService
StartServiceA
DeleteService
ChangeServiceConfig2A
CreateServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
LookupAccountSidA
GetSecurityInfo
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
QueryServiceConfigA
SetSecurityInfo
GetSecurityDescriptorSacl
RegEnumValueA
RegQueryInfoKeyA
QueryServiceConfig2A
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExA
GetServiceDisplayNameA
CoTaskMemAlloc
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemRealloc
VarUI4FromStr
VariantInit
VariantClear
VariantChangeType
SysAllocString
SysFreeString
SysAllocStringLen
ord17
CreatePropertySheetPageA
ImageList_AddMasked
_TrackMouseEvent
InitCommonControlsEx
ImageList_Remove
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
ImageList_LoadImageA
ImageList_GetIconSize
ImageList_Draw
ImageList_DrawEx
PropertySheetA
DestroyPropertySheetPage
ImageList_GetImageCount
ImageList_GetIcon
ImageList_DrawIndirect
IsAppThemed
SetWindowTheme
GetModuleFileNameExA
CertFindRDNAttr
CertFreeCertificateContext
CryptDecodeObjectEx
UuidFromStringA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord155
ord18
Shell_NotifyIconA
SHOpenFolderAndSelectItems
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHFileOperationA
DuplicateIcon
ExtractIconExA
SHGetFileInfoA
SHGetSpecialFolderPathA
ShellExecuteExA
ord680
ShellExecuteA
VerQueryValueA
GetFileVersionInfoA
ord9
ord8
StrFormatByteSizeW
PathFindOnPathA
ord10
PathCanonicalizeA
ord172
ord216
WritePrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStructA
GetPrivateProfileStructA
GetPrivateProfileStringA
FormatMessageA
GetFileAttributesA
SetFileAttributesA
GetSystemDirectoryA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetEnvironmentVariableA
GetTempPathA
SetErrorMode
GetDriveTypeA
GetLocaleInfoA
GetDateFormatA
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
CreateProcessA
GlobalAlloc
GlobalLock
GlobalUnlock
GetUserDefaultUILanguage
GetVolumeInformationA
LocalFree
GetCurrentProcess
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
GetFileSize
SetFilePointer
MulDiv
IsBadStringPtrA
GlobalMemoryStatusEx
SetProcessAffinityMask
GetProcessAffinityMask
GlobalFree
lstrlenW
GlobalReAlloc
FindFirstFileA
FindNextFileA
FindClose
CopyFileA
MoveFileA
SystemTimeToFileTime
GetSystemPowerStatus
GetPriorityClass
SetPriorityClass
SuspendThread
SetProcessWorkingSetSize
VirtualAlloc
VirtualFree
DuplicateHandle
GetFileType
VirtualAllocEx
VirtualFreeEx
RemoveDirectoryA
GetLogicalDrives
GetDiskFreeSpaceExA
DeviceIoControl
GetExitCodeProcess
CompareStringA
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
GetACP
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
VirtualProtect
GetSystemInfo
LoadLibraryExW
TlsFree
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
GetSystemTime
IsBadWritePtr
VirtualQuery
ReadFile
SetEndOfFile
GetFileTime
ExpandEnvironmentStringsA
lstrcatA
GetLocalTime
GetVersionExA
lstrcpyA
MapViewOfFile
CreateFileMappingA
TerminateThread
SetEvent
GetLongPathNameA
lstrcpynA
QueryDosDeviceA
GetLogicalDriveStringsA
GetProcessTimes
GetCurrentProcessId
OpenProcess
lstrcmpA
CreateFileA
WriteFile
ResumeThread
SetThreadPriority
GetExitCodeThread
DeleteFileA
SetLastError
DecodePointer
GetCurrentThreadId
SetUnhandledExceptionFilter
Sleep
WaitForSingleObject
PulseEvent
OpenEventA
CreateEventA
OpenMutexA
CloseHandle
CreateMutexA
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
LoadLibraryExA
FindResourceA
GetLastError
RaiseException
IsDBCSLeadByte
MultiByteToWideChar
lstrcmpiA
GetModuleHandleA
GetProcAddress
FreeLibrary
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetTickCount
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateDirectoryA
SetStdHandle
CreateFileW
SetFilePointerEx
WriteConsoleW
ReadConsoleW
SetFileTime
DrawAnimatedRects
DialogBoxIndirectParamA
GetDialogBaseUnits
ChildWindowFromPoint
SendDlgItemMessageA
CreateIconIndirect
GetGuiResources
FindWindowExA
EnumThreadWindows
SetScrollPos
SetScrollInfo
SetClassLongA
GetScrollRange
ScrollWindowEx
FlashWindow
WaitForInputIdle
GetMenuStringA
GetNextDlgTabItem
GetScrollPos
IntersectRect
GetAsyncKeyState
DragDetect
AdjustWindowRectEx
EqualRect
GetDesktopWindow
LockWindowUpdate
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
ClientToScreen
SetParent
IsChild
SetRect
IsRectEmpty
LoadBitmapA
DrawStateA
AppendMenuA
CharLowerA
FrameRect
WindowFromPoint
GetMessagePos
DestroyIcon
DrawFrameControl
TranslateAcceleratorA
PostQuitMessage
LoadStringW
DrawEdge
LockWorkStation
ExitWindowsEx
GetForegroundWindow
GetLayeredWindowAttributes
UnregisterHotKey
IsZoomed
IsIconic
SetWindowsHookExA
CallNextHookEx
MonitorFromPoint
UnhookWindowsHookEx
ModifyMenuA
GetMenuItemID
MonitorFromRect
CopyRect
SetMenu
GetMenu
SetMenuDefaultItem
CheckMenuRadioItem
RegisterWindowMessageA
DrawIconEx
GetWindowDC
GetDCEx
GetSysColorBrush
IsCharAlphaNumericA
CharUpperBuffA
InflateRect
SetMenuItemInfoA
GetMenuItemInfoA
IsMenu
MoveWindow
GetKeyState
RedrawWindow
InsertMenuA
RemoveMenu
InsertMenuItemA
GetSubMenu
CreateDialogParamA
GetMenuItemCount
BringWindowToTop
IsDialogMessageA
GetKeyboardLayoutList
GetWindowThreadProcessId
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DestroyMenu
TrackPopupMenu
TrackPopupMenuEx
CreatePopupMenu
GetClassLongA
SendMessageTimeoutA
SetLayeredWindowAttributes
CharLowerBuffA
GetTopWindow
GetWindowPlacement
GetMenuState
DeleteMenu
RegisterHotKey
GetDlgItemTextA
LoadIconA
CharUpperA
SetDlgItemInt
GetDlgItemInt
MessageBeep
EnableWindow
IsWindowEnabled
GetFocus
DrawFocusRect
TrackMouseEvent
SetCapture
GetCapture
ReleaseCapture
GetDlgCtrlID
GetCursorPos
ScreenToClient
PtInRect
UpdateWindow
InvalidateRect
EndPaint
BeginPaint
SetRectEmpty
SystemParametersInfoA
GetWindowTextLengthA
CallWindowProcA
DefWindowProcA
SetFocus
CharNextA
PostMessageA
SetCursor
EndDialog
OffsetRect
GetSysColor
FillRect
GetShellWindow
ReleaseDC
GetDC
GetClassNameA
GetWindow
MonitorFromWindow
GetMonitorInfoA
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
EnumChildWindows
GetWindowTextA
DialogBoxParamA
GetActiveWindow
DrawTextA
EnumWindows
ShowWindowAsync
wsprintfA
IsWindowVisible
MessageBoxA
KillTimer
SetDlgItemTextA
SetTimer
IsDlgButtonChecked
CheckDlgButton
SetWindowTextA
SetWindowPos
GetWindowLongA
SendMessageA
GetDlgItem
SetWindowLongA
CreateWindowExA
UnregisterClassA
GetClassInfoExA
LoadImageA
GetSystemMetrics
RegisterClassExA
LoadAcceleratorsA
LoadMenuA
LoadStringA
DestroyWindow
SetForegroundWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
FindWindowA
ShowWindow
IsWindow
LoadCursorA
RoundRect
CreateDCA
SetViewportOrgEx
ExcludeClipRect
ExtTextOutA
CreateDIBSection
SetBrushOrgEx
PatBlt
TextOutW
CreatePatternBrush
CreateBitmap
GetClipBox
SetWindowOrgEx
DPtoLP
LPtoDP
RectVisible
LineTo
MoveToEx
CreatePen
RestoreDC
SaveDC
BitBlt
CreateCompatibleBitmap
GetStockObject
CreateFontIndirectA
GetObjectA
SetTextColor
SetBkColor
SetBkMode
CreateSolidBrush
GetDeviceCaps
Polygon
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
GetTextMetricsA
Rectangle
GetTextExtentPoint32A
GetCurrentObject
FindTextA
GetSaveFileNameA
GetOpenFileNameA
DuplicateTokenEx
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
QueryServiceStatusEx
ControlService
StartServiceA
DeleteService
ChangeServiceConfig2A
CreateServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
LookupAccountSidA
GetSecurityInfo
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
QueryServiceConfigA
SetSecurityInfo
GetSecurityDescriptorSacl
RegEnumValueA
RegQueryInfoKeyA
QueryServiceConfig2A
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExA
GetServiceDisplayNameA
CoTaskMemAlloc
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemRealloc
VarUI4FromStr
VariantInit
VariantClear
VariantChangeType
SysAllocString
SysFreeString
SysAllocStringLen
ord17
CreatePropertySheetPageA
ImageList_AddMasked
_TrackMouseEvent
InitCommonControlsEx
ImageList_Remove
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
ImageList_LoadImageA
ImageList_GetIconSize
ImageList_Draw
ImageList_DrawEx
PropertySheetA
DestroyPropertySheetPage
ImageList_GetImageCount
ImageList_GetIcon
ImageList_DrawIndirect
IsAppThemed
SetWindowTheme
GetModuleFileNameExA
CertFindRDNAttr
CertFreeCertificateContext
CryptDecodeObjectEx
UuidFromStringA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageList_ReplaceIcon
SHGetMalloc
SHGetPathFromIDListA
SHGetDesktopFolder
TransparentBlt
GetVersionExA
RaiseException
lstrcmpA
GetCurrentDirectoryA
MultiByteToWideChar
GetProcAddress
lstrlenW
WideCharToMultiByte
OpenProcess
SetPriorityClass
GetPriorityClass
GetFileAttributesA
LoadLibraryW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
SetLastError
TlsFree
TlsSetValue
GetTickCount
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapSize
IsProcessorFeaturePresent
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCommandLineA
GetCurrentThreadId
HeapReAlloc
DecodePointer
EncodePointer
HeapFree
HeapAlloc
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
lstrcatA
Sleep
GetCurrentProcessId
LoadLibraryA
GetModuleFileNameA
UnmapViewOfFile
CloseHandle
MapViewOfFile
lstrlenA
lstrcpyA
OpenFileMappingA
RtlUnwind
LCMapStringW
GetStringTypeW
TlsGetValue
GetMenuItemInfoA
SetMenuItemInfoA
RemoveMenu
GetMenuState
IsMenu
DeleteMenu
GetMenuItemID
CheckMenuItem
GetKeyState
SendInput
GetSystemMetrics
InsertMenuA
InsertMenuItemA
CheckMenuRadioItem
AppendMenuA
TrackPopupMenuEx
SetActiveWindow
RedrawWindow
GetWindowTextA
GetWindowPlacement
GetLayeredWindowAttributes
InflateRect
DrawFrameControl
DrawIconEx
GetSystemMenu
LoadBitmapA
PostMessageA
SendMessageTimeoutA
IsWindow
RegisterClassA
GetWindowDC
ReleaseDC
ClientToScreen
SetWindowTextA
LoadImageA
LoadIconA
wsprintfA
GetWindowTextLengthA
GetDlgCtrlID
FindWindowExA
GetClassNameA
GetDlgItem
SendMessageA
EnumWindows
SetTimer
KillTimer
DefWindowProcA
FillRect
GetClientRect
EndPaint
BeginPaint
ShowWindowAsync
SetWindowPos
SetCapture
IsWindowVisible
SetLayeredWindowAttributes
ShowWindow
CreateWindowExA
GetCursorPos
UpdateWindow
InvalidateRect
CallWindowProcA
CallWindowProcW
SetWindowLongA
SetWindowLongW
IsWindowUnicode
DestroyMenu
TrackPopupMenu
CreatePopupMenu
DestroyWindow
GetParent
ScreenToClient
OffsetRect
ReleaseCapture
PtInRect
GetWindowLongA
GetWindowRect
GetDC
SetWindowOrgEx
DPtoLP
SelectObject
DeleteObject
CreateCompatibleBitmap
LPtoDP
CreateCompatibleDC
GetClipBox
BitBlt
CreateSolidBrush
GetStockObject
GetObjectA
StretchBlt
GetPixel
Polyline
CreatePen
DeleteDC
CoTaskMemFree
IsAppThemed
GetThemeEnumValue
GetThemeInt
IsThemeBackgroundPartiallyTransparent
GetCurrentThemeName
GetThemeFilename
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemeMargins
AddTitleIcons
ExtendSaveDialogs
ExtendSystemMenu
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
ImageList_ReplaceIcon
SHGetMalloc
SHGetPathFromIDListA
SHGetDesktopFolder
TransparentBlt
GetVersionExA
RaiseException
lstrcmpA
GetCurrentDirectoryA
MultiByteToWideChar
GetProcAddress
lstrlenW
WideCharToMultiByte
OpenProcess
SetPriorityClass
GetPriorityClass
GetFileAttributesA
LoadLibraryW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
FlsAlloc
SetLastError
FlsFree
FlsGetValue
IsValidCodePage
GetTickCount
GetACP
GetCPInfo
RtlUnwindEx
HeapSize
HeapDestroy
HeapCreate
GetVersion
HeapSetInformation
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCommandLineA
FlsSetValue
GetCurrentThreadId
HeapReAlloc
DecodePointer
EncodePointer
HeapFree
HeapAlloc
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
lstrcatA
Sleep
GetCurrentProcessId
LoadLibraryA
GetModuleFileNameA
UnmapViewOfFile
CloseHandle
MapViewOfFile
lstrlenA
lstrcpyA
OpenFileMappingA
LCMapStringW
GetStringTypeW
GetOEMCP
RtlPcToFileHeader
GetMenuItemInfoA
SetMenuItemInfoA
GetDC
RemoveMenu
GetMenuState
IsMenu
DeleteMenu
GetMenuItemID
GetSystemMenu
GetKeyState
SendInput
GetSystemMetrics
InsertMenuA
InsertMenuItemA
CheckMenuRadioItem
AppendMenuA
TrackPopupMenuEx
SetActiveWindow
RedrawWindow
GetWindowPlacement
GetLayeredWindowAttributes
SetWindowLongA
InflateRect
DrawFrameControl
CheckMenuItem
DrawIconEx
PostMessageA
SendMessageTimeoutA
IsWindow
RegisterClassA
GetWindowDC
ReleaseDC
ClientToScreen
GetWindowTextA
SetWindowTextA
LoadImageA
LoadIconA
wsprintfA
GetWindowTextLengthA
GetDlgCtrlID
FindWindowExA
GetClassNameA
GetDlgItem
SendMessageA
EnumWindows
SetTimer
KillTimer
DefWindowProcA
FillRect
GetClientRect
EndPaint
BeginPaint
GetWindowLongPtrA
ShowWindowAsync
SetWindowPos
SetCapture
IsWindowVisible
SetLayeredWindowAttributes
ShowWindow
CreateWindowExA
GetCursorPos
UpdateWindow
InvalidateRect
CallWindowProcA
CallWindowProcW
SetWindowLongPtrA
SetWindowLongPtrW
IsWindowUnicode
DestroyMenu
TrackPopupMenu
CreatePopupMenu
DestroyWindow
GetParent
ScreenToClient
OffsetRect
ReleaseCapture
PtInRect
GetWindowLongA
GetWindowRect
LoadBitmapA
SetWindowOrgEx
DPtoLP
SelectObject
DeleteObject
CreateCompatibleBitmap
LPtoDP
CreateCompatibleDC
GetClipBox
BitBlt
CreateSolidBrush
GetStockObject
GetObjectA
StretchBlt
GetPixel
Polyline
CreatePen
DeleteDC
CoTaskMemFree
IsAppThemed
GetThemeEnumValue
GetThemeInt
IsThemeBackgroundPartiallyTransparent
GetCurrentThemeName
GetThemeFilename
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemeMargins
AddTitleIcons
ExtendSaveDialogs
ExtendSystemMenu
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\projects\librehardwaremonitor\External\Aga.Controls\obj\Release\Aga.Controls.pdb
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\TeamCity\BuildAgent\work\a0af0e5ded848229\src\HidLibrary\obj\Release\HidLibrary.pdb
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\projects\librehardwaremonitor\obj\Release\net452\OpenHardwareMonitorLib.pdb
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\projects\librehardwaremonitor\External\OxyPlot\OxyPlot.WindowsForms\obj\Release\NET40\OxyPlot.WindowsForms.pdb
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\projects\librehardwaremonitor\External\OxyPlot\OxyPlot\obj\Release\OxyPlot.pdb
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetReadFile
InternetCrackUrlW
InternetConnectW
InternetOpenW
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
InternetCloseHandle
HttpOpenRequestW
HttpQueryInfoW
HttpSendRequestW
InitCommonControlsEx
GetProcessImageFileNameW
LocalAlloc
QueryDosDeviceW
OpenProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateThread
GetFullPathNameW
GetTickCount
Sleep
GetFileAttributesW
ReadFile
GetFileSizeEx
GetCurrentProcess
GetModuleFileNameW
GetSystemDirectoryW
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
HeapCreate
WideCharToMultiByte
ExitProcess
GetCurrentThread
LocalFree
GetProcAddress
CloseHandle
GetLastError
GetTempPathW
CreateFileW
WriteFile
GetTempFileNameW
HeapReAlloc
GetStringTypeW
GetModuleHandleW
LoadLibraryW
SetStdHandle
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
FlushFileBuffers
SetEnvironmentVariableA
WriteConsoleW
CompareStringW
GetCurrentDirectoryW
GetFileType
PeekNamedPipe
GetFileInformationByHandle
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
HeapSize
LCMapStringW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
MultiByteToWideChar
HeapFree
HeapAlloc
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SendMessageW
MessageBoxW
SendDlgItemMessageW
SetWindowTextW
CheckDlgButton
IsDlgButtonChecked
EnableWindow
SetTimer
SetForegroundWindow
DialogBoxParamW
GetDlgItem
EndDialog
wsprintfW
ShowWindow
GetDlgItemTextW
SetDlgItemTextW
LoadImageW
GetSysColor
SetBkMode
CreateSolidBrush
SetTextColor
GetOpenFileNameW
CommDlgExtendedError
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptAcquireContextW
CryptGetHashParam
AdjustTokenPrivileges
GetLengthSid
IsValidSecurityDescriptor
FreeSid
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
InitializeAcl
LookupPrivilegeValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
DuplicateToken
AccessCheck
SetSecurityDescriptorGroup
OpenThreadToken
OpenProcessToken
ShellExecuteW
DragQueryFileW
SHGetPathFromIDListW
SHBrowseForFolderW
DragFinish
CommandLineToArgvW
CoInitialize
CoTaskMemFree
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
DeleteCriticalSection
SetThreadPriority
ResumeThread
LoadLibraryExA
FreeLibrary
GetWindowsDirectoryA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetVersionExA
GetVolumeInformationA
GetModuleHandleA
GetCurrentProcess
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
WriteFile
lstrcmpiA
IsDBCSLeadByte
RaiseException
SizeofResource
LoadResource
FindResourceA
CreateMutexA
DecodePointer
SetLastError
OpenFileMappingA
MapViewOfFile
InitializeCriticalSectionAndSpinCount
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
LCMapStringW
CloseHandle
LeaveCriticalSection
EnterCriticalSection
GetLastError
Sleep
GetProcAddress
GetCurrentThreadId
lstrcpynA
GetModuleFileNameA
VirtualQuery
GetSystemTime
GetTickCount
lstrcpyA
lstrcatA
GetACP
ExitProcess
VirtualProtect
GetSystemInfo
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
RtlPcToFileHeader
RtlUnwindEx
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
lstrlenA
OpenMutexA
IsDebuggerPresent
OutputDebugStringW
EncodePointer
HeapAlloc
HeapFree
GetProcessHeap
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
VirtualFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
SetEvent
CreateFileW
wsprintfA
LoadStringA
PostQuitMessage
SetTimer
SetWindowTextA
IsDialogMessageA
CharNextA
CreateDialogParamA
UnregisterClassA
DestroyWindow
DefWindowProcA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowLongPtrA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyA
ord680
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
VarUI4FromStr
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesA
ReadFile
WriteFile
CloseHandle
SetHandleInformation
CreatePipe
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
CreateProcessA
GetVersionExA
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
CreateMutexA
CreateEventA
OpenEventA
PulseEvent
WaitForMultipleObjects
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
CreateFileW
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
FindNextFileA
FindFirstFileExA
FindClose
GetCommandLineW
GetCommandLineA
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetStdHandle
lstrlenA
lstrcpyA
IsValidCodePage
GetLastError
LCMapStringW
HeapReAlloc
HeapSize
GetFileType
GetStringTypeW
HeapAlloc
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsFree
LoadLibraryExW
GetModuleFileNameW
SetLastError
EncodePointer
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
CharToOemA
wsprintfA
LoadStringA
SystemFunction036
ord680
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ