用exeScope分析 它使用了以下API
导入, KERNEL32.dll
顺序 (示意) 名字
00000000 GetFileAttributesA
00000000 RaiseException
00000000 GetVersion
00000000 GetModuleHandleA
00000000 SetConsoleCtrlHandler
00000000 GetStdHandle
00000000 InitializeCriticalSection
00000000 UnhandledExceptionFilter
00000000 GetStartupInfoA
00000000 VirtualAlloc
00000000 SetHandleCount
00000000 GetProcAddress
00000000 RtlUnwind
00000000 GetLastError
00000000 ExitProcess
00000000 LeaveCriticalSection
00000000 GetFileType
00000000 GlobalMemoryStatus
00000000 GetCommandLineA
00000000 CloseHandle
00000000 WriteFile
00000000 VirtualFree
00000000 GetCurrentThreadId
00000000 EnterCriticalSection
00000000 GetModuleFileNameA
00000000 SetFilePointer
00000000 GetEnvironmentStrings
00000000 GetLocalTime
00000000 CreateFileA
导入, GDI32.dll
顺序 (示意) 名字
00000000 CreateCompatibleDC
00000000 BitBlt
00000000 SelectObject
00000000 GetStockObject
00000000 GetPixel
00000000 GetNearestColor
00000000 GetDeviceCaps
00000000 DeleteObject
00000000 SetPixel
00000000 DeleteDC
导入, USER32.dll
顺序 (示意) 名字
00000000 UpdateWindow
00000000 ShowWindow
00000000 SetTimer
00000000 ReleaseDC
00000000 PostQuitMessage
00000000 MessageBoxA
00000000 LoadIconA
00000000 LoadCursorA
00000000 LoadBitmapA
00000000 KillTimer
00000000 InvalidateRect
00000000 GetMessageA
00000000 GetDC
00000000 EnumThreadWindows
00000000 RegisterClassA
00000000 EndPaint
00000000 DispatchMessageA
00000000 DefWindowProcA
00000000 TranslateMessage
00000000 CreateWindowExA
00000000 BeginPaint