Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
10Static
static
108888888.exe
windows7-x64
108888888.exe
windows10-2004-x64
10Challenge_1.dll
windows7-x64
1Challenge_1.dll
windows10-2004-x64
1Challenge_2.exe
windows7-x64
3Challenge_2.exe
windows10-2004-x64
3filetype.exe
windows7-x64
1filetype.exe
windows10-2004-x64
3md5-1.exe
windows7-x64
1md5-1.exe
windows10-2004-x64
3md5-2.exe
windows7-x64
1md5-2.exe
windows10-2004-x64
3ssdeep-2.1...zy.dll
windows7-x64
3ssdeep-2.1...zy.dll
windows10-2004-x64
3ssdeep-2.1...ep.exe
windows7-x64
1ssdeep-2.1...ep.exe
windows10-2004-x64
3Behavioral task
behavioral1
Sample
8888888.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8888888.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
Challenge_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Challenge_1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Challenge_2.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Challenge_2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
filetype.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
filetype.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
md5-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
md5-1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
md5-2.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
md5-2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ssdeep-2.14.1/fuzzy.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ssdeep-2.14.1/fuzzy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ssdeep-2.14.1/ssdeep.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ssdeep-2.14.1/ssdeep.exe
Resource
win10v2004-20240910-en
Target
Chapter 2.zip
Size
4.1MB
MD5
0f4a961ef5bfaaff6f1bfbcc55edad56
SHA1
8c601b0717fcf6b5275de0e29630d72821782397
SHA256
d07bdefcabeb6ef9fd8066d5fd79777225bc0725aef6e737f16c643ae9662559
SHA512
9da755d95d9cf6fd22927dcb2e683f8135f973beffd8c428b98a43eb6ac2ea2360de7f337ab1267900c7d4433d48baf52ffa1a5ebf22eb95b33b35f9658281f8
SSDEEP
98304:Glt3iHt3Bk5T0SU5cp6QyC9FlxWKLDXF5vCeGxzCO3jXoltnsWU:Gj3cBqT0rcpDyC2Kn3vCeK2O2tPU
jupyter
MX-2
http://5.254.118.242
resource | yara_rule |
---|---|
static1/unpack001/Challenge_1.dll | family_jupyter |
resource | yara_rule |
---|---|
static1/unpack001/8888888.png | cryptone |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Challenge_1.dll |
unpack001/Challenge_2.bin |
unpack001/filetype.exe |
unpack001/md5-1.exe |
unpack001/md5-2.exe |
unpack002/ssdeep-2.14.1/fuzzy.dll |
unpack002/ssdeep-2.14.1/ssdeep.exe |
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLastError
Sleep
LoadLibraryA
GetProcAddress
GetModuleHandleW
IsValidLocale
GetOverlappedResult
CommConfigDialogW
lstrcmpiA
WriteConsoleOutputA
DeleteTimerQueueTimer
SetHandleCount
GetSystemTimeAsFileTime
GlobalGetAtomNameW
EnumSystemCodePagesA
GetNamedPipeHandleStateA
CompareStringW
GetProcessAffinityMask
ReadConsoleOutputCharacterW
SetMessageWaitingIndicator
GetProfileIntA
Process32FirstW
GetPrivateProfileSectionA
FlushConsoleInputBuffer
GetVersion
GetModuleHandleA
MultiByteToWideChar
GetVersionExW
CreateFileW
WriteFile
GetEnvironmentVariableW
GetSystemTime
GetCurrentProcessId
FindNextFileW
FindClose
GetSystemTimeAdjustment
QueryPerformanceCounter
FindFirstFileW
GlobalMemoryStatus
GetCurrentThreadId
GetLogicalDriveStringsW
QueryPerformanceFrequency
CloseHandle
CreateProcessW
WaitForSingleObject
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
ReadFile
GetTickCount
GetVersionExA
SleepEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
FormatMessageA
SetLastError
FormatMessageW
LocalFree
OutputDebugStringW
FreeLibrary
LoadLibraryW
GetCurrentThread
SuspendThread
MulDiv
MoveFileExW
GetModuleFileNameW
SetErrorMode
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
CreateMutexW
ReleaseMutex
CreateSemaphoreW
ReleaseSemaphore
TlsSetValue
ExitProcess
SetThreadPriority
ResumeThread
TlsGetValue
TlsFree
TlsAlloc
FindResourceW
GetCPInfo
IsValidCodePage
TerminateProcess
SizeofResource
LockResource
LoadResource
GetFileAttributesW
GetTempPathW
GetFileTime
GetFileSize
GetTempFileNameW
CopyFileW
SetCurrentDirectoryW
GetACP
GetUserDefaultLCID
GetLocaleInfoW
SetThreadLocale
RaiseException
SetEvent
CreateThread
IsBadReadPtr
IsBadStringPtrA
ExpandEnvironmentStringsW
GetCommandLineW
FreeConsole
ReadConsoleOutputCharacterA
GetConsoleScreenBufferInfo
WriteConsoleA
WriteConsoleW
FillConsoleOutputCharacterW
SetConsoleCursorPosition
GlobalUnlock
GlobalAlloc
GlobalSize
GlobalLock
HeapSize
GetProcessHeap
GlobalFree
InterlockedExchange
EncodePointer
DecodePointer
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
ExitThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
SetFilePointer
GetDriveTypeA
FindFirstFileExA
GetTimeZoneInformation
CreateFileA
SetConsoleCtrlHandler
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetTimeFormatW
GetDateFormatW
DeleteFileW
GetConsoleCP
FlushFileBuffers
SetStdHandle
InitializeCriticalSectionAndSpinCount
MoveFileW
RemoveDirectoryW
CreateDirectoryW
GetFullPathNameW
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
IsProcessorFeaturePresent
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetFullPathNameA
GetExitCodeProcess
SetEndOfFile
GetStringTypeW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetDriveTypeW
GetLocaleInfoA
EnumSystemLocalesA
GetModuleFileNameA
GetCurrentProcess
GetCurrentDirectoryW
GetSystemDirectoryW
lstrlenW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileAttributesW
LocalAlloc
lstrcmpW
WriteProcessMemory
WritePrivateProfileStringW
VirtualProtect
VirtualFree
VirtualAlloc
TerminateThread
SystemTimeToFileTime
HeapDestroy
GlobalHandle
GetSystemInfo
GetPrivateProfileStringW
GetLocalTime
GetComputerNameW
InterlockedExchangeAdd
InterlockedCompareExchange
FlushInstructionCache
CreateFileMappingW
GetUserDefaultUILanguage
CreatePopupMenu
CloseClipboard
AnyPopup
CreateMenu
CountClipboardFormats
EndMenu
LoadCursorFromFileW
GetWindowDC
GetWindowTextLengthW
IsCharLowerW
LoadCursorFromFileA
LoadIconW
MessageBoxW
GetScrollInfo
SetScrollInfo
EnableScrollBar
ScrollWindow
GetParent
WindowFromPoint
SetParent
RedrawWindow
ScreenToClient
ClientToScreen
IsWindowVisible
IsWindowEnabled
GetMessageTime
GetActiveWindow
GetWindow
ChildWindowFromPointEx
UnhookWindowsHookEx
CallNextHookEx
TrackPopupMenu
CallWindowProcW
IsDialogMessageW
InvalidateRect
FillRect
IsWindow
SetWindowTextW
GetSysColor
GetClientRect
SetFocus
ReleaseCapture
SetCursorPos
UpdateWindow
MoveWindow
DeferWindowPos
GetWindowRect
GetUpdateRgn
MapWindowPoints
BeginDeferWindowPos
EndDeferWindowPos
SystemParametersInfoW
GetMenuItemInfoW
GetMenuItemCount
SetWindowsHookExW
RegisterHotKey
UnregisterHotKey
PtInRect
InflateRect
SetMenu
CreateIconIndirect
BringWindowToTop
IsIconic
SetForegroundWindow
IsZoomed
FlashWindow
CreateDialogIndirectParamW
GetWindowPlacement
DrawMenuBar
EnableMenuItem
GetSystemMenu
CreateDialogParamW
GetDlgItem
SetWindowRgn
LoadImageW
MessageBeep
GetClassNameW
GetWindowTextW
DestroyCursor
BeginPaint
EndPaint
ChangeDisplaySettingsW
EnumDisplaySettingsW
GetDoubleClickTime
DrawFrameControl
OffsetRect
DrawIconEx
SetCapture
DrawTextW
CopyRect
DrawStateW
SetRectEmpty
DrawFocusRect
GetMenuState
GetSysColorBrush
CheckMenuItem
CheckMenuRadioItem
ShowWindow
SetRect
DrawEdge
GetClipboardFormatNameW
RegisterClipboardFormatW
DestroyMenu
GetSubMenu
InsertMenuW
InsertMenuItemW
RemoveMenu
ModifyMenuW
AppendMenuW
HideCaret
keybd_event
FindWindowExW
DestroyAcceleratorTable
CreateAcceleratorTableW
TranslateAcceleratorW
UnionRect
IsRectEmpty
ValidateRgn
ChildWindowFromPoint
IsClipboardFormatAvailable
GetDialogBaseUnits
wsprintfW
ShowCursor
AdjustWindowRectEx
DdeCreateStringHandleW
DdeClientTransaction
DdeDisconnect
DdeInitializeW
DdeGetLastError
DdeCreateDataHandle
DdeGetData
DdeFreeDataHandle
DdeQueryStringW
DdeUninitialize
DdeFreeStringHandle
LoadCursorW
SetCursor
MsgWaitForMultipleObjects
GetMessageW
DispatchMessageW
SetTimer
KillTimer
PeekMessageW
DestroyWindow
DefWindowProcW
UnregisterClassW
RegisterClassW
PostMessageW
CreateWindowExW
PostThreadMessageW
ValidateRect
SetWindowPos
GetFocus
EnableWindow
SetWindowLongW
GetWindowLongW
GetAsyncKeyState
SetActiveWindow
VkKeyScanW
MapVirtualKeyW
TranslateMessage
PostQuitMessage
GetMessagePos
GetIconInfo
LoadBitmapW
GetKeyState
DestroyIcon
DdePostAdvise
MessageBoxA
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
GetCapture
GetCursorPos
SendMessageA
FindWindowA
GetSystemMetrics
ReleaseDC
GetDC
RegisterWindowMessageW
SendMessageTimeoutW
SendMessageW
FindWindowW
DdeConnect
SetMenuItemInfoW
DdeNameService
GetBkColor
DeleteObject
GetTextColor
AbortPath
CreateMetaFileA
GetFontLanguageInfo
GetBkMode
CreateMetaFileW
CancelDC
GetEnhMetaFileA
GetGraphicsMode
GetLayout
RealizePalette
CreateCompatibleDC
GetObjectType
CreateHalftonePalette
CreatePatternBrush
GetStockObject
SaveDC
DeleteDC
GetSystemPaletteUse
GetDCPenColor
GetEnhMetaFileW
BeginPath
WidenPath
GetStretchBltMode
CloseMetaFile
EndPath
FillPath
GdiGetBatchLimit
PathToRegion
SwapBuffers
AddFontResourceW
FlattenPath
AddFontResourceA
GetPixelFormat
GetTextCharset
GdiFlush
AbortDoc
GetTextAlign
GetMapMode
EndPage
DeleteColorSpace
EndDoc
DeleteMetaFile
CreateSolidBrush
UpdateColors
UnrealizeObject
GetPolyFillMode
DeleteEnhMetaFile
GetTextCharacterExtra
CloseEnhMetaFile
CloseFigure
GetDCBrushColor
GetColorSpace
GetROP2
SetMetaRgn
StrokePath
QueryFontAssocStatus
SetDIBColorTable
GdiEntry8
FontIsLinked
EngCreateSemaphore
OffsetViewportOrgEx
SetTextColor
GdiGetSpoolFileHandle
GetEnhMetaFilePixelFormat
EngStretchBltROP
GdiEndPageEMF
OffsetRgn
EngLockSurface
SetLayoutWidth
GdiPlayScript
Rectangle
XLATEOBJ_hGetColorTransform
FONTOBJ_pvTrueTypeFontFile
GetCharWidthA
GdiSwapBuffers
SetWorldTransform
GetPixel
GdiCleanCacheDC
ExtCreatePen
GetWorldTransform
ResetDCW
STROBJ_bEnumPositionsOnly
GetTextExtentPointI
GdiEntry14
CreateEllipticRgn
EngCheckAbort
CreateBitmapIndirect
CreateICA
SetBitmapBits
GdiQueryFonts
GetSystemPaletteEntries
CreateICW
SetTextAlign
CreateRectRgnIndirect
GetTextExtentExPointW
GetPaletteEntries
GetNearestPaletteIndex
CreatePalette
CreatePen
CreateHatchBrush
EnumFontFamiliesExW
Polyline
SetROP2
SetViewportOrgEx
SetPixel
PolyBezier
SetWindowOrgEx
PlayEnhMetaFile
SetAbortProc
StartDocW
StartPage
CreateDCW
GetEnhMetaFileHeader
CreateEnhMetaFileW
GetClipBox
CreateFontIndirectW
SetBkMode
StretchBlt
MoveToEx
SetWindowExtEx
SetViewportExtEx
SetMapMode
SelectClipRgn
SetStretchBltMode
ExtSelectClipRgn
ExtFloodFill
Arc
Pie
Polygon
LineTo
GetRegionData
ExtCreateRegion
SetBkColor
CreateBitmap
GetObjectW
ExcludeClipRect
SetBrushOrgEx
CreateRectRgn
SelectPalette
GetTextMetricsW
GetOutlineTextMetricsW
GetCharABCWidthsW
CombineRgn
RectInRegion
PtInRegion
EqualRgn
GetRgnBox
GetDIBColorTable
CreateDIBitmap
GetDIBits
CreateDIBSection
GetTextExtentPoint32W
StretchDIBits
ExtTextOutW
MaskBlt
Ellipse
RoundRect
PolyPolygon
SetPolyFillMode
GetDeviceCaps
BitBlt
SelectObject
CreateCompatibleBitmap
PageSetupDlgW
PrintDlgW
ChooseFontW
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
GetUserNameA
RegOpenKeyA
RegQueryValueExA
FreeSid
RegOpenKeyExW
RegCloseKey
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegDeleteValueW
RegEnumKeyW
RegDeleteKeyW
GetUserNameW
DeregisterEventSource
ReportEventA
RegisterEventSourceA
SHFileOperation
SHGetDesktopFolder
SHFileOperationW
SHPathPrepareForWriteW
SHBrowseForFolderA
WOWShellExecute
FindExecutableW
SHFormatDrive
ShellAboutW
SHLoadNonloadedIconOverlayIdentifiers
ExtractIconW
SHGetFileInfoW
DragFinish
SHGetMalloc
DragQueryFileW
ExtractIconExW
ShellExecuteExW
SHGetPathFromIDListW
DragAcceptFiles
DragQueryPoint
SHGetSpecialFolderLocation
OleGetClipboard
OleFlushClipboard
OleIsCurrentClipboard
OleSetClipboard
CoLockObjectExternal
RegisterDragDrop
RevokeDragDrop
CoTaskMemAlloc
ReleaseStgMedium
OleInitialize
OleUninitialize
CoCreateInstance
CoCreateGuid
OleLockRunning
OleRun
OleSetContainedObject
StrChrIA
ImageList_GetImageCount
ImageList_GetIconSize
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
ImageList_Replace
ImageList_Remove
ImageList_Draw
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragMove
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_Destroy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WaitForSingleObject
InterlockedIncrement
GetCurrentThreadId
GetCurrentThread
ReadFile
GetFileSize
CreateFileA
MoveFileExA
SizeofResource
TerminateThread
LoadResource
FindResourceA
GetProcAddress
GetModuleHandleW
ExitProcess
GetModuleFileNameA
LocalFree
LocalAlloc
CloseHandle
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GlobalAlloc
GlobalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetTickCount
LockResource
Sleep
GetStartupInfoA
GetModuleHandleA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
ChangeServiceConfig2A
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceA
CryptGenRandom
CryptAcquireContextA
OpenServiceA
closesocket
recv
send
htonl
ntohl
WSAStartup
inet_ntoa
ioctlsocket
select
htons
socket
connect
inet_addr
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
GetAdaptersInfo
GetPerAdapterInfo
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
__set_app_type
_stricmp
__p__fmode
__p__commode
_except_handler3
__setusermatherr
_initterm
__getmainargs
_acmdln
_adjust_fdiv
_controlfp
exit
_XcptFilter
_exit
_onexit
__dllonexit
free
??2@YAPAXI@Z
_ftol
sprintf
_endthreadex
strncpy
rand
_beginthreadex
__CxxFrameHandler
srand
time
__p___argc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\src\vc\filetype\Release\filetype.pdb
CopyFileA
MoveFileA
CreateDirectoryA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapAlloc
GetCommandLineA
GetVersionExA
HeapFree
GetLastError
CloseHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
ReadFile
SetStdHandle
FlushFileBuffers
SetFilePointer
CreateFileA
HeapSize
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
GetCPInfo
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
SetEndOfFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
printf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
printf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameW
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
__dllonexit
__doserrno
__pioinfo
_amsg_exit
_errno
_exit
_filelengthi64
_fileno
_initterm
_iob
_lock
_lseeki64
_onexit
_snwprintf
fclose
ferror
fflush
fgetpos
fopen
fread
free
fsetpos
fwprintf
fwrite
malloc
memcmp
memcpy
raise
sscanf
strchr
strlen
strncmp
_unlock
_write
abort
vfprintf
wcscpy
calloc
_vsnprintf
MessageBoxW
edit_distn
find_file_size
fuzzy_clone
fuzzy_compare
fuzzy_digest
fuzzy_free
fuzzy_hash_buf
fuzzy_hash_file
fuzzy_hash_filename
fuzzy_hash_stream
fuzzy_new
fuzzy_set_total_input_length
fuzzy_update
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateSemaphoreA
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
FindClose
FindFirstFileW
FindNextFileW
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetHandleInformation
GetLastError
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SetEvent
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
__argv
__dllonexit
__doserrno
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__pioinfo
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_beginthreadex
_cexit
_endthreadex
_errno
_exit
_filelengthi64
_fileno
_fmode
_fstat64
_initterm
_iob
_lock
_lseeki64
_onexit
_setjmp3
_snwprintf
_strnicmp
exit
fclose
feof
ferror
fflush
fgetpos
fgets
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwprintf
fwrite
getc
getenv
getwc
isalpha
islower
isspace
isupper
iswctype
isxdigit
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
perror
printf
putc
putchar
puts
putwc
raise
realloc
setlocale
setvbuf
signal
sprintf
sscanf
strchr
strcmp
strcoll
strerror
strftime
strlen
strncmp
strtol
strtoul
strxfrm
_ultoa
_unlock
_wcsdup
_wcsnicmp
_wfopen
_wfullpath
_wgetcwd
_write
abort
atoi
tolower
towlower
towupper
ungetc
ungetwc
vfprintf
vprintf
wcscoll
wcscpy
wcsftime
wcslen
wcsncmp
wcsncpy
wcsrchr
wcsstr
wcsxfrm
atol
calloc
_vsnprintf
longjmp
_write
_strdup
_read
_fileno
_fdopen
CommandLineToArgvW
MessageBoxW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE