Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
397ac88ec3e...1N.exe
windows7-x64
797ac88ec3e...1N.exe
windows10-2004-x64
7$0/bomgar-scc.exe
windows7-x64
7$0/bomgar-scc.exe
windows10-2004-x64
7$0/cbhook-x64.dll
windows7-x64
1$0/cbhook-x64.dll
windows10-2004-x64
1$0/cbhook-x86.dll
windows7-x64
3$0/cbhook-x86.dll
windows10-2004-x64
3$0/embedhook-x64.exe
windows7-x64
1$0/embedhook-x64.exe
windows10-2004-x64
1$0/embedhook-x86.exe
windows7-x64
3$0/embedhook-x86.exe
windows10-2004-x64
3$0/nstvhk64.dll
windows7-x64
1$0/nstvhk64.dll
windows10-2004-x64
1$0/nstvhook.dll
windows7-x64
3$0/nstvhook.dll
windows10-2004-x64
3$0/nstvstub.exe
windows7-x64
1$0/nstvstub.exe
windows10-2004-x64
3$0/pinuninstall.bat
windows7-x64
1$0/pinuninstall.bat
windows10-2004-x64
1$0/sas.dll
windows7-x64
1$0/sas.dll
windows10-2004-x64
1$0/spinner.exe
windows7-x64
1$0/spinner.exe
windows10-2004-x64
1$0/start-cb-hook.bat
windows7-x64
7$0/start-cb-hook.bat
windows10-2004-x64
7$0/uninstall.bat
windows7-x64
6$0/uninstall.bat
windows10-2004-x64
6$0/winrtpxy.dll
windows7-x64
1$0/winrtpxy.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
97ac88ec3e2fe911f03d25858cbfdd7db65e270d71b9d6b6629dcf54ec1faea1N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
97ac88ec3e2fe911f03d25858cbfdd7db65e270d71b9d6b6629dcf54ec1faea1N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0/bomgar-scc.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$0/bomgar-scc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$0/cbhook-x64.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$0/cbhook-x64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$0/cbhook-x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$0/cbhook-x86.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$0/embedhook-x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$0/embedhook-x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$0/embedhook-x86.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$0/embedhook-x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$0/nstvhk64.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$0/nstvhk64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$0/nstvhook.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$0/nstvhook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$0/nstvstub.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$0/nstvstub.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$0/pinuninstall.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$0/pinuninstall.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$0/sas.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$0/sas.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$0/spinner.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$0/spinner.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$0/start-cb-hook.bat
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
$0/start-cb-hook.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$0/uninstall.bat
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$0/uninstall.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$0/winrtpxy.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$0/winrtpxy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Target
97ac88ec3e2fe911f03d25858cbfdd7db65e270d71b9d6b6629dcf54ec1faea1N
Size
2.2MB
MD5
89677cc11647817b82977a71a8150870
SHA1
e4be0eed67737ee3617e2f1d4a783230d7f78a99
SHA256
97ac88ec3e2fe911f03d25858cbfdd7db65e270d71b9d6b6629dcf54ec1faea1
SHA512
c4edd1b41f01b20eab598a7b060377b10d3e6ff5f806f3e3f6daedd84fe9503df3be676cefdaa4bdccd3fa2b13acfb50ec244f9daec1292151c9955a9479df11
SSDEEP
49152:a26pOw9WRTkY6d337lzn9EH2JHNMtbkTSaJQ1r7ep:a2lG35JHwAhQ1mp
Checks for missing Authenticode signature.
resource |
---|
unpack001/$0/cbhook-x64.dll |
unpack001/$0/cbhook-x86.dll |
unpack001/$0/embedhook-x64.exe |
unpack001/$0/embedhook-x86.exe |
unpack001/$0/nstvhk64.dll |
unpack001/$0/nstvhook.dll |
unpack001/$0/nstvstub.exe |
unpack001/$0/winrtpxy.dll |
unpack001/$PLUGINSDIR/System.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
bomgar-scc-x64.pdb
GetDiskFreeSpaceExA
UnmapViewOfFile
GetSystemDirectoryA
LoadLibraryA
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualQuery
VirtualAlloc
VirtualProtect
HeapReAlloc
GetTimeFormatA
GetDateFormatA
ExitProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
GetLocaleInfoA
RtlPcToFileHeader
GetFullPathNameW
FileTimeToSystemTime
FileTimeToLocalFileTime
FlushFileBuffers
GetFileInformationByHandle
ExitThread
RtlUnwindEx
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeW
GetLogicalDriveStringsA
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
GetModuleFileNameA
HeapSetInformation
HeapCreate
HeapDestroy
GetACP
GetOEMCP
IsValidCodePage
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
SetHandleCount
GetStartupInfoA
GetCurrentDirectoryA
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CreateIoCompletionPort
PostQueuedCompletionStatus
GetQueuedCompletionStatus
DisconnectNamedPipe
GetOverlappedResult
CreateNamedPipeW
ConnectNamedPipe
lstrlenA
WriteConsoleW
InterlockedPushEntrySList
VirtualFree
InterlockedPopEntrySList
GetComputerNameW
SystemTimeToFileTime
GetSystemInfo
GetTempPathW
GetTempFileNameW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
ReleaseMutex
CreateMutexW
GetCurrentThread
TlsAlloc
TlsSetValue
TlsGetValue
OpenEventW
SetStdHandle
GetSystemTimeAsFileTime
LocalAlloc
LockFileEx
MoveFileW
UnlockFileEx
SetEndOfFile
SetFilePointer
OutputDebugStringW
FormatMessageA
GetModuleFileNameW
FindNextFileW
FindClose
GetDriveTypeA
SetFileTime
GetLogicalDrives
WaitForMultipleObjects
SetNamedPipeHandleState
CreateThread
CreateSemaphoreW
ReleaseSemaphore
TerminateThread
VirtualQueryEx
SetUnhandledExceptionFilter
DeleteFileW
FindFirstFileW
CreateFileMappingW
lstrcmpW
CreateEventW
GetCommandLineW
lstrcmpiW
lstrlenW
GetVersionExW
ResumeThread
GetExitCodeThread
WriteFileEx
CancelIo
SleepEx
ReadFileEx
QueueUserAPC
PeekNamedPipe
SetConsoleWindowInfo
SetConsoleCtrlHandler
GetConsoleScreenBufferInfo
GetStdHandle
ReadConsoleOutputW
FreeConsole
GenerateConsoleCtrlEvent
SetConsoleScreenBufferSize
AllocConsole
WriteConsoleInputW
DuplicateHandle
CreatePipe
CreateProcessW
SetFileAttributesW
GetCurrentThreadId
FlushInstructionCache
CopyFileW
GetTickCount
GetExitCodeProcess
GetWindowsDirectoryW
GetTimeZoneInformation
GetStartupInfoW
GetTimeFormatW
GetDriveTypeW
GetDateFormatW
SetLastError
ReadFile
WriteFile
WaitNamedPipeW
OpenProcess
GetProcessHeap
HeapFree
HeapAlloc
GlobalUnlock
GlobalLock
GetShortPathNameW
GetFileAttributesW
lstrcpyW
lstrcpynW
ExpandEnvironmentStringsW
GlobalFree
FormatMessageW
GlobalAlloc
LoadLibraryExW
GetLastError
CreateFileW
RaiseException
CompareStringW
MulDiv
GetModuleHandleW
WideCharToMultiByte
LocalFree
lstrcatW
GetProcAddress
MultiByteToWideChar
TerminateProcess
Sleep
GetCurrentProcess
LoadLibraryW
GetSystemDirectoryW
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
WaitForSingleObject
GetCurrentProcessId
ResetEvent
CloseHandle
CreateEventA
OpenEventA
CompareStringA
InitializeCriticalSection
IsWindowEnabled
GetMenuItemInfoW
PtInRect
GetClassInfoExW
TrackPopupMenuEx
MonitorFromWindow
LoadStringW
IsWindow
RemoveMenu
MapWindowPoints
GetMonitorInfoW
GetWindow
SetProcessWindowStation
CloseWindowStation
GetProcessWindowStation
OpenDesktopW
GetUserObjectSecurity
CloseDesktop
SetUserObjectSecurity
OpenWindowStationW
PeekMessageW
VkKeyScanW
MapVirtualKeyW
GetActiveWindow
TrackPopupMenu
RegisterWindowMessageW
GetSubMenu
DeleteMenu
GetMenuStringW
LoadMenuW
AppendMenuW
GetCursorPos
GetMenuItemCount
SetMenuItemInfoW
GetMessageW
WaitForInputIdle
ExitWindowsEx
TranslateMessage
GetForegroundWindow
BlockInput
CreateDialogParamW
MonitorFromRect
DispatchMessageW
SetWindowRgn
LoadBitmapW
RedrawWindow
GetScrollPos
EndPaint
CloseClipboard
SetCapture
MessageBeep
GetAsyncKeyState
EmptyClipboard
ShowScrollBar
OpenClipboard
ReleaseCapture
SetClipboardData
GetTopWindow
ScreenToClient
PostThreadMessageW
SetThreadDesktop
SetClassLongPtrW
DrawIcon
TrackMouseEvent
UpdateLayeredWindow
GetShellWindow
GetWindowThreadProcessId
GetAncestor
EnumWindows
GetUserObjectInformationW
OpenInputDesktop
GetThreadDesktop
GetClipboardOwner
SetClipboardViewer
ChangeClipboardChain
UnregisterClassA
CreatePopupMenu
DestroyMenu
SystemParametersInfoW
GetClipboardData
IsClipboardFormatAvailable
mouse_event
ToUnicodeEx
ToUnicode
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyboardLayout
GetKeyboardState
CallNextHookEx
SendInput
VkKeyScanExW
keybd_event
SendMessageTimeoutW
GetDCEx
GetClassLongPtrW
GetLastActivePopup
GetUpdateRect
IsWindowVisible
AdjustWindowRect
DialogBoxParamW
LoadStringA
GetKeyState
IsIconic
PostQuitMessage
SetCursor
EnableMenuItem
DialogBoxIndirectParamW
HideCaret
GetSystemMenu
IsDialogMessageW
BeginPaint
EnumDesktopsW
DestroyWindow
GetWindowInfo
GetScrollBarInfo
GetScrollInfo
ScrollWindow
UpdateWindow
UnregisterClassW
MapDialogRect
EnumDisplaySettingsW
GetCursor
GetIconInfo
EnumDisplayMonitors
ChangeDisplaySettingsExW
EnumDisplayDevicesW
SetLayeredWindowAttributes
WaitMessage
GetDoubleClickTime
SetScrollInfo
GetNextDlgTabItem
SetWindowPlacement
SetForegroundWindow
SetFocus
GetWindowPlacement
BringWindowToTop
GetClassNameW
SendDlgItemMessageW
GetDlgItemTextW
SetDlgItemTextW
SetTimer
LockWorkStation
MessageBoxW
KillTimer
GetMenu
SetWindowLongW
EndDialog
SetWindowPos
ShowWindow
AdjustWindowRectEx
SetWindowTextW
LoadImageW
FindWindowW
CopyIcon
DestroyIcon
GetDlgItem
CopyImage
CreateIconIndirect
GetDC
ReleaseDC
DrawStateW
GetDesktopWindow
GetSystemMetrics
GetWindowRect
GetClientRect
DrawFocusRect
GetWindowLongW
MoveWindow
GetWindowTextLengthW
FillRect
PostMessageW
DrawTextW
GetParent
LoadCursorW
GetWindowLongPtrW
InflateRect
RegisterClassExW
LoadIconW
OffsetRect
GetWindowTextW
GetSysColor
GetSysColorBrush
FrameRect
CreateWindowExW
SetWindowLongPtrW
SendMessageW
EnableWindow
GetDlgCtrlID
DrawFrameControl
CallWindowProcW
DefWindowProcW
CopyRect
InvalidateRect
WindowFromPoint
GetRegionData
GetRandomRgn
MoveToEx
LineTo
Rectangle
Ellipse
CreatePen
CreateDCW
GetDeviceCaps
GetTextExtentPoint32W
ExtTextOutW
CreateFontW
SetTextAlign
GetTextMetricsW
GetBitmapBits
GetStockObject
BitBlt
DeleteDC
CreateDIBSection
StretchBlt
SetBrushOrgEx
GetDIBits
CreateBitmap
SelectObject
CreateCompatibleDC
DPtoLP
CreateSolidBrush
DeleteObject
SetBkMode
SetBkColor
SetTextColor
GetObjectW
GetPixel
ExtEscape
CreateFontIndirectW
CreateRectRgn
SetStretchBltMode
GetMapMode
CreateCompatibleBitmap
CombineRgn
SetMapMode
CommDlgExtendedError
GetSaveFileNameW
GetOpenFileNameW
ImpersonateLoggedOnUser
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
AccessCheck
SetSecurityDescriptorGroup
OpenThreadToken
CryptGenRandom
CryptAcquireContextA
CryptReleaseContext
RegCreateKeyW
GetSecurityDescriptorGroup
MakeSelfRelativeSD
GetSecurityDescriptorSacl
InitializeSid
GetSidLengthRequired
GetSecurityDescriptorOwner
MakeAbsoluteSD
GetSecurityDescriptorLength
GetSecurityDescriptorControl
GetSidSubAuthority
CreateWellKnownSid
CheckTokenMembership
RegSetValueExW
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegConnectRegistryW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumKeyW
RegQueryValueExW
ControlService
RegisterServiceCtrlHandlerW
SetServiceStatus
QueryServiceStatus
StartServiceA
OpenServiceW
StartServiceCtrlDispatcherW
DeleteService
LookupAccountSidW
OpenEventLogW
GetOldestEventLogRecord
GetNumberOfEventLogRecords
ReadEventLogW
CloseEventLog
RegQueryValueW
RegCloseKey
OpenServiceA
CloseServiceHandle
OpenSCManagerW
QueryServiceConfig2W
CreateProcessWithLogonW
LogonUserW
GetTokenInformation
CopySid
DuplicateTokenEx
IsValidSid
GetLengthSid
GetAclInformation
EqualSid
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetAce
DuplicateToken
InitializeAcl
AddAccessAllowedAce
RevertToSelf
AddAce
GetSecurityDescriptorDacl
GetUserNameW
AllocateAndInitializeSid
FreeSid
RegisterEventSourceW
DeregisterEventSource
ReportEventW
OpenProcessToken
CreateServiceW
SHChangeNotify
CommandLineToArgvW
DragFinish
DragQueryFileW
ShellExecuteExW
SHGetPathFromIDListW
SHGetFolderLocation
ShellExecuteW
SHGetSpecialFolderLocation
SHGetFolderPathW
SHGetDesktopFolder
Shell_NotifyIconW
ExtractIconExW
SHBrowseForFolderW
CoTaskMemFree
CoSetProxyBlanket
CoCreateGuid
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateInstance
SysFreeString
SysAllocString
SysStringLen
VariantClear
SysAllocStringByteLen
VariantInit
SafeArrayGetLBound
SafeArrayDestroy
SafeArrayUnlock
SysStringByteLen
VariantCopy
SafeArrayCopy
SafeArrayGetUBound
SafeArrayGetVartype
SafeArrayLock
VariantChangeType
SafeArrayGetDim
CryptHashPublicKeyInfo
CertNameToStrW
AssocQueryStringByKeyW
AssocQueryStringW
SHDeleteKeyW
SHCopyKeyW
StrCmpIW
StrStrIW
StrRetToBufW
StrRetToStrW
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
_TrackMouseEvent
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiClassNameFromGuidW
SetupDiClassGuidsFromNameW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
CM_Enumerate_Classes
UuidToStringW
RpcStringFreeW
CreateEnvironmentBlock
LoadUserProfileW
UnloadUserProfile
DestroyEnvironmentBlock
timeGetTime
PlaySoundW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
WNetGetUniversalNameW
SendARP
htonl
htons
getservbyport
getservbyname
WSASetLastError
gethostbyaddr
gethostbyname
select
bind
listen
sendto
inet_addr
closesocket
ntohs
getpeername
connect
WSASocketW
getsockname
setsockopt
recv
send
getsockopt
shutdown
inet_ntoa
WSACleanup
WSAStartup
ioctlsocket
socket
__WSAFDIsSet
recvfrom
accept
WSAGetLastError
URLDownloadToFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
c:\Source\maintenance-ingredi-14.3\networkstreaming\trymax\sdcust\client\Win32\embedded_cb\cbhook\cbhook-x64.pdb
GetModuleFileNameExW
CloseHandle
GlobalAddAtomW
InitializeCriticalSection
DeleteCriticalSection
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
LoadLibraryA
lstrcmpiW
GlobalDeleteAtom
CreateFileMappingW
MapViewOfFile
GetCurrentProcessId
LocalAlloc
GetCurrentProcess
GetLastError
lstrlenW
LocalFree
LeaveCriticalSection
EnterCriticalSection
lstrcpynW
OutputDebugStringW
lstrcpynA
OutputDebugStringA
DisableThreadLibraryCalls
RaiseException
GetPropW
wsprintfW
PtInRect
GetParent
DefWindowProcW
RegisterClassW
LoadCursorW
EnumWindows
SendMessageTimeoutW
SetWindowsHookExW
LoadImageW
FindWindowExW
GetClassNameW
GetMonitorInfoW
MonitorFromWindow
OffsetRect
GetWindowRgn
GetCursorPos
GetForegroundWindow
DrawIconEx
SetPropW
MoveWindow
ShowWindow
CreateWindowExW
SetLayeredWindowAttributes
GetSystemMetrics
GetWindowLongW
IsZoomed
UnregisterClassW
FindWindowW
GetWindowThreadProcessId
PostMessageW
BeginPaint
GetWindowRect
EndPaint
IsWindow
SendMessageW
RemovePropW
CharLowerBuffW
wvsprintfW
CallNextHookEx
IsIconic
PostThreadMessageW
InvalidateRect
DrawFrameControl
IsWindowVisible
wvsprintfA
UnhookWindowsHookEx
GetObjectW
BitBlt
DeleteDC
CreateDIBSection
CreateCompatibleDC
CreateRectRgn
GetRgnBox
DeleteObject
SetBkMode
SelectObject
SetViewportOrgEx
CreateSolidBrush
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
StrToIntW
StrRChrW
StrCpyNW
StrNCatW
StrStrW
InstallMessageHook
Kill
UnInstallMessageHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Source\maintenance-ingredi-14.3\networkstreaming\trymax\sdcust\client\Win32\embedded_cb\cbhook\cbhook-x86.pdb
GetModuleFileNameExW
CloseHandle
GlobalAddAtomW
InitializeCriticalSection
DeleteCriticalSection
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
LoadLibraryA
InterlockedExchange
lstrcmpiW
GlobalDeleteAtom
CreateFileMappingW
MapViewOfFile
GetCurrentProcessId
LocalAlloc
GetCurrentProcess
GetLastError
lstrlenW
LocalFree
LeaveCriticalSection
EnterCriticalSection
lstrcpynW
OutputDebugStringW
lstrcpynA
OutputDebugStringA
DisableThreadLibraryCalls
RaiseException
wsprintfW
PtInRect
GetParent
DefWindowProcW
RegisterClassW
LoadCursorW
EnumWindows
SendMessageTimeoutW
SetWindowsHookExW
LoadImageW
FindWindowExW
GetClassNameW
GetMonitorInfoW
MonitorFromWindow
OffsetRect
GetWindowRgn
GetCursorPos
GetForegroundWindow
DrawIconEx
GetPropW
IsIconic
MoveWindow
ShowWindow
CreateWindowExW
SetLayeredWindowAttributes
GetSystemMetrics
GetWindowLongW
IsZoomed
UnregisterClassW
FindWindowW
GetWindowThreadProcessId
PostMessageW
BeginPaint
GetWindowRect
EndPaint
IsWindow
SendMessageW
RemovePropW
CharLowerBuffW
SetPropW
CallNextHookEx
IsWindowVisible
PostThreadMessageW
DrawFrameControl
InvalidateRect
wvsprintfW
wvsprintfA
UnhookWindowsHookEx
GetObjectW
BitBlt
DeleteDC
CreateDIBSection
CreateCompatibleDC
CreateRectRgn
GetRgnBox
DeleteObject
SetBkMode
SelectObject
SetViewportOrgEx
CreateSolidBrush
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
StrToIntW
StrRChrW
StrCpyNW
StrNCatW
StrStrW
InstallMessageHook
Kill
UnInstallMessageHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
embedhook-x64.pdb
OutputDebugStringA
lstrcpynA
OutputDebugStringW
lstrcpynW
LocalFree
lstrcatW
GetSystemTimeAsFileTime
LocalReAlloc
GetModuleFileNameW
LocalAlloc
lstrlenW
GetLastError
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcmpiW
GetCurrentThreadId
GetCommandLineW
DispatchMessageW
TranslateMessage
GetMessageW
CharPrevW
wvsprintfW
wvsprintfA
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
embedhook-x86.pdb
OutputDebugStringA
lstrcpynA
OutputDebugStringW
lstrcpynW
LocalFree
lstrcatW
GetSystemTimeAsFileTime
LocalReAlloc
GetModuleFileNameW
LocalAlloc
lstrlenW
GetLastError
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcmpiW
GetCurrentThreadId
GetCommandLineW
DispatchMessageW
TranslateMessage
GetMessageW
CharPrevW
wvsprintfW
wvsprintfA
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetModuleFileNameExA
GetLastError
GetCurrentProcess
lstrlenA
LocalAlloc
MapViewOfFile
OpenFileMappingA
lstrcpynA
UnmapViewOfFile
CreateFileMappingA
GlobalDeleteAtom
GlobalAddAtomA
LocalFree
OutputDebugStringA
CloseHandle
ClientToScreen
GetCursor
SubtractRect
GetClientRect
IsRectEmpty
GetWindowRect
IsIconic
IsWindowVisible
IsWindow
CallNextHookEx
RegisterWindowMessageA
SetWindowsHookExA
PostMessageA
GetPropA
UnhookWindowsHookEx
wvsprintfA
SetPropA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
FreeSid
InstallMessageHook
UnInstallMessageHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameExA
GetLastError
GetCurrentProcess
lstrlenA
LocalAlloc
MapViewOfFile
OpenFileMappingA
LocalFree
UnmapViewOfFile
CreateFileMappingA
GlobalDeleteAtom
GlobalAddAtomA
lstrcpynA
OutputDebugStringA
CloseHandle
PostMessageA
ClientToScreen
SubtractRect
GetClientRect
IsRectEmpty
GetWindowRect
IsIconic
IsWindowVisible
IsWindow
CallNextHookEx
RegisterWindowMessageA
SetWindowsHookExA
GetPropA
SetPropA
UnhookWindowsHookEx
wvsprintfA
GetCursor
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
FreeSid
InstallMessageHook
UnInstallMessageHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
nstvstub-Win32.pdb
FreeLibrary
LoadLibraryW
GetLastError
GetProcAddress
lstrcmpiW
LocalFree
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
PostQuitMessage
KillTimer
TranslateMessage
IsWindow
DispatchMessageW
GetMessageW
SetTimer
CommandLineToArgvW
StrToIntExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
SAS.pdb
malloc
_initterm
free
_amsg_exit
__C_specific_handler
_XcptFilter
_vsnwprintf
memset
RtlLookupFunctionEntry
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryA
GetProcAddress
FreeLibrary
RtlCaptureContext
RtlVirtualUnwind
DisableThreadLibraryCalls
Sleep
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RpcStringFreeW
RpcBindingFree
RpcBindingSetAuthInfoExW
RpcStringBindingComposeW
RpcBindingFromStringBindingW
NdrClientCall3
I_RpcExceptionFilter
SendSAS
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Source\maintenance-ingredi-14.3\networkstreaming\user_interface\ProgressFeedback\Win32\spinner\spinner-x64.pdb
GetCurrentThreadId
OutputDebugStringW
GetModuleHandleW
lstrlenW
GetModuleFileNameW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
WaitForSingleObject
SetEvent
GetExitCodeThread
DeleteCriticalSection
SetLastError
CreateEventW
LocalAlloc
lstrcpyW
GetCommandLineW
lstrcmpW
CreateThread
GetLastError
LocalFree
CloseHandle
GetStartupInfoW
LoadCursorW
LoadImageW
CharPrevW
UnregisterClassW
DefWindowProcW
SetWindowLongPtrW
GetWindowLongPtrW
SetTimer
SetWindowPos
EndPaint
BeginPaint
PostMessageW
InvalidateRect
MoveWindow
GetSystemMetrics
DestroyWindow
PostQuitMessage
ShowWindow
GetClassLongPtrW
CreateWindowExW
GetSysColorBrush
wsprintfW
wvsprintfW
wsprintfA
wvsprintfA
GetMessageW
TranslateMessage
DispatchMessageW
RegisterClassExW
DeleteObject
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
BitBlt
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
winrtpxy.pdb
WindowsCreateStringReference
WindowsDeleteString
RoGetActivationFactory
FreeEnvironmentStringsW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
RaiseException
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapSize
EncodePointer
DecodePointer
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwindEx
GetStdHandle
WriteFile
GetModuleFileNameW
GetLastError
HeapFree
HeapAlloc
RtlPcToFileHeader
RtlLookupFunctionEntry
SetLastError
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitOnceExecuteOnce
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
CreateFileW
WideCharToMultiByte
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetCurrentProcess
TerminateProcess
GetModuleHandleW
Sleep
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
LCMapStringEx
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
GetStringTypeW
CoUninitialize
CoInitializeEx
CoCreateInstance
??0WinRT_AppVisibility@@QEAA@AEBV0@@Z
??0WinRT_AppVisibility@@QEAA@XZ
??0WinRT_ToastNotification@@QEAA@AEBV0@@Z
??0WinRT_ToastNotification@@QEAA@PEBG000@Z
??1WinRT_AppVisibility@@UEAA@XZ
??1WinRT_ToastNotification@@UEAA@XZ
??4WinRT_AppVisibility@@QEAAAEAV0@AEBV0@@Z
??4WinRT_ToastNotification@@QEAAAEAV0@AEBV0@@Z
??_7WinRT_AppVisibility@@6B@
??_7WinRT_ToastNotification@@6B@
?__autoclassinit@WinRT_AppVisibility@@QEAAXI@Z
?__autoclassinit@WinRT_ToastNotification@@QEAAXI@Z
?getAppVisibilityOnMonitor@WinRT_AppVisibility@@QEAA_NPEAUHMONITOR__@@@Z
?isLauncherVisible@WinRT_AppVisibility@@QEAA_NXZ
?onActivated@WinRT_ToastNotification@@UEAAXXZ
?onAppVisibilityOnMonitorChanged@WinRT_AppVisibility@@UEAAXPEAUHMONITOR__@@H@Z
?onDismissed@WinRT_ToastNotification@@UEAAXH@Z
?onFailed@WinRT_ToastNotification@@UEAAXXZ
?onLauncherVisibilityChanged@WinRT_AppVisibility@@UEAAXH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ