Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
35aec085cb1...4a.exe
windows7-x64
75aec085cb1...4a.exe
windows10-2004-x64
7$0/Resourc...d.html
windows7-x64
1$0/Resourc...d.html
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...n.html
windows7-x64
1$PLUGINSDI...n.html
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PROGRAMFI...gs.exe
windows7-x64
1$PROGRAMFI...gs.exe
windows10-2004-x64
1$PROGRAMFI...ot.dll
windows7-x64
1$PROGRAMFI...ot.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
5aec085cb1e8811235bd63fd7089b94a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5aec085cb1e8811235bd63fd7089b94a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/eula_en.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/eula_en.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/installhelper.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/installhelper.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win10v2004-20231215-en
Target
5aec085cb1e8811235bd63fd7089b94a
Size
664KB
MD5
5aec085cb1e8811235bd63fd7089b94a
SHA1
f379f4e40746bdac2739d5c178842b5fd9fad6df
SHA256
ddac7e4204fa2403ffa3877a1c9b6f66a2c7ee8bb6965f307a5e791b4bcb522f
SHA512
9a5071c79953652673f6d0680679452c9dee5f035cd426303bfb4579fe75538dad1984444f846a4a8cf9aba6d3e431873b8a5ae893efccac7ef7c588ab88f517
SSDEEP
12288:FmJuhrxjASnDv/evzJ3SIXrmmFUxUaLm1z/ytkBvIhvCAqR/O18hkZzl9MWxco94:FmJ6vLeJsxUaLmF/PtIh8/VhgxBED
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
CloseHandle
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
WideCharToMultiByte
MulDiv
lstrlenA
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
lstrcpynA
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
DispatchMessageW
PeekMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
GetClassInfoW
ExitWindowsEx
FindWindowExW
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
IsWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectW
SetBkMode
SetTextColor
SelectObject
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumValueW
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiW
GetModuleHandleW
GlobalLock
GlobalUnlock
GetCurrentDirectoryW
SetCurrentDirectoryW
GetPrivateProfileIntW
GetPrivateProfileStringW
lstrcatW
WritePrivateProfileStringW
lstrcpynW
lstrlenW
lstrcpyW
GlobalFree
GlobalAlloc
OpenClipboard
DestroyIcon
LoadCursorW
DispatchMessageW
TranslateMessage
GetMessageW
IsDialogMessageW
ShowWindow
SetWindowLongW
GetClientRect
SetWindowRgn
LoadIconW
LoadImageW
CreateWindowExW
MapDialogRect
GetClipboardData
GetWindowRect
CreateDialogParamW
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
SetCursor
DrawTextW
GetWindowLongW
DrawFocusRect
CallWindowProcW
PostMessageW
wsprintfW
CharNextW
MessageBoxW
CloseClipboard
GetDlgCtrlID
MapWindowPoints
SetWindowPos
PtInRect
GetWindowTextW
SetWindowTextW
SendMessageW
DestroyWindow
SelectObject
CreateRectRgn
GetObjectW
CombineRgn
DeleteObject
CreateCompatibleDC
GetDIBits
SetTextColor
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
SHGetDesktopFolder
GetOpenFileNameW
CommDlgExtendedError
GetSaveFileNameW
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyW
lstrcpynW
GetProcAddress
WideCharToMultiByte
lstrcatW
LoadLibraryW
GetModuleHandleW
MultiByteToWideChar
VirtualAlloc
VirtualProtect
lstrlenW
FreeLibrary
wsprintfW
CLSIDFromString
StringFromGUID2
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ShellExecuteW
MulDiv
GetModuleFileNameW
GlobalUnlock
GlobalLock
GlobalAlloc
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetVersionExW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
lstrcmpW
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
WriteFile
RtlUnwind
HeapDestroy
HeapCreate
IsValidCodePage
lstrcmpiW
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
GetLastError
DeleteCriticalSection
InitializeCriticalSection
SetLastError
GetCurrentThreadId
LeaveCriticalSection
FlushInstructionCache
EnterCriticalSection
RaiseException
LoadLibraryW
GetProcAddress
FreeLibrary
GetCurrentProcess
OpenProcess
CreateProcessW
CloseHandle
lstrlenW
HeapAlloc
GetStringTypeW
GetProcessHeap
GetOEMCP
GetACP
GetCPInfo
ExitProcess
Sleep
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapSize
HeapReAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapFree
InterlockedCompareExchange
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetCommandLineA
TerminateProcess
LoadLibraryA
GetWindowThreadProcessId
FindWindowW
DestroyWindow
SetWindowLongW
SetWindowPos
GetClassInfoExW
LoadCursorW
RegisterClassExW
CreateWindowExW
GetClientRect
wsprintfW
GetWindowLongW
UnregisterClassW
CharNextW
DefWindowProcW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateAcceleratorTableW
IsWindow
SendMessageW
GetFocus
GetWindow
SetFocus
DestroyAcceleratorTable
GetDesktopWindow
BeginPaint
EndPaint
CallWindowProcW
FillRect
ReleaseCapture
GetClassNameW
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
MoveWindow
GetSysColor
UnregisterClassA
GetObjectW
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
GetStockObject
RegQueryInfoKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetTokenInformation
OpenProcessToken
DuplicateTokenEx
RegEnumKeyExW
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoUninitialize
CoInitialize
CoCreateInstance
LoadRegTypeLi
LoadTypeLi
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysAllocStringLen
SysStringLen
SysAllocString
VariantClear
VariantInit
SysFreeString
OleCreateFontIndirect
UrlEscapeW
SHDeleteKeyW
PathIsURLW
UrlCreateFromPathW
HtmlCreate
HtmlDestroy
HtmlDisplay
IEAddSearchProvider
IEGetDefaultSearchProvider
IEGetMajorVersion
IELaunch
IERemoveSearchProvider
IESetDefaultSearchProvider
IEShowToolbar
IEShowToolbarExW
IEUnblockExtension
WinGetKnownFolderPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSection
OpenProcess
WideCharToMultiByte
VirtualFreeEx
GetVersionExW
GetACP
lstrlenW
InterlockedExchange
GetLastError
GetThreadLocale
GetProcAddress
VirtualAllocEx
GetModuleHandleA
CreateRemoteThread
CloseHandle
WriteProcessMemory
GetProcessHeap
HeapAlloc
MultiByteToWideChar
HeapFree
HeapReAlloc
lstrcmpW
lstrcmpiW
InterlockedIncrement
InterlockedDecrement
IsBadReadPtr
SetUnhandledExceptionFilter
WaitForSingleObject
DeleteCriticalSection
GetLocaleInfoA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetCPInfo
GetOEMCP
LoadLibraryA
IsBadCodePtr
RegCreateKeyExW
RegSetValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SizeofResource
LoadResource
FindResourceW
GetTickCount
MulDiv
LoadLibraryA
GlobalUnlock
GlobalLock
CreateFileMappingW
CopyFileW
DisableThreadLibraryCalls
DeleteFileW
GlobalAlloc
lstrcmpW
GetTempFileNameW
UnmapViewOfFile
MapViewOfFile
GetWindowsDirectoryW
GetSystemDirectoryW
GetTempPathW
FindClose
FindFirstFileW
GetFileSize
SetFilePointer
ReadFile
WriteFile
CreateFileW
SetEndOfFile
SetFileAttributesW
GetVersionExA
GetSystemDefaultLangID
ResumeThread
ResetEvent
TerminateThread
SetCurrentDirectoryW
GetSystemTimeAsFileTime
LocalFree
FormatMessageW
GetModuleFileNameA
GetFileAttributesExW
GetLongPathNameW
CreateProcessW
lstrlenA
GetCurrentDirectoryW
FindNextFileW
CreateDirectoryW
TerminateProcess
GetExitCodeProcess
HeapReAlloc
SystemTimeToFileTime
GetSystemTime
TryEnterCriticalSection
GetExitCodeThread
MultiByteToWideChar
LockResource
FindResourceExW
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
RtlUnwind
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
ExitProcess
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
UnhandledExceptionFilter
HeapSize
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetCPInfo
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsBadReadPtr
IsBadCodePtr
QueryPerformanceCounter
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
lstrcpynW
LoadLibraryExW
lstrcmpiW
HeapFree
lstrcpyW
CreateMutexW
WaitForMultipleObjects
ReleaseMutex
CreateEventW
GetProcessHeap
HeapAlloc
GetCurrentProcess
FlushInstructionCache
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
SetEvent
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
CloseHandle
FreeLibrary
GetCurrentThreadId
Sleep
InterlockedIncrement
lstrlenW
InterlockedDecrement
GetCurrentProcessId
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
LoadLibraryW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WideCharToMultiByte
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
SuspendThread
GetModuleHandleA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegNotifyChangeKeyValue
SetWindowsHookExW
CallNextHookEx
EnumWindows
GetAncestor
EnumChildWindows
MessageBoxW
GetCapture
CharUpperW
CharLowerW
CreateDialogIndirectParamW
DialogBoxIndirectParamW
SendNotifyMessageW
GetSystemMetrics
GetMenuItemInfoW
GetSubMenu
GetMenuItemID
DeleteMenu
GetMenuItemRect
EqualRect
SendDlgItemMessageW
IsDlgButtonChecked
GetDlgItemTextW
CheckRadioButton
CheckDlgButton
SetDlgItemTextW
GetClassNameW
IsWindowVisible
GetComboBoxInfo
BeginPaint
GetSysColorBrush
EndPaint
GetWindowTextLengthW
SetFocus
UnhookWindowsHookEx
DrawTextW
SetMenuItemInfoW
ClientToScreen
GetMenuItemCount
CopyRect
RedrawWindow
InvalidateRect
InsertMenuW
AppendMenuW
FillRect
GetDC
ReleaseDC
TrackPopupMenu
DestroyMenu
CreatePopupMenu
GetDlgItem
SendMessageW
PostMessageW
CharNextW
GetWindowPlacement
SetForegroundWindow
CallWindowProcW
DefWindowProcW
CreateWindowExW
BroadcastSystemMessageW
LoadImageW
SetWindowRgn
TrackMouseEvent
OffsetRect
KillTimer
SetTimer
GetSystemMenu
ModifyMenuW
RegisterClipboardFormatW
IsIconic
GetClassInfoExW
RegisterClassExW
wsprintfW
UnregisterClassW
IsWindow
SetCursorPos
GetActiveWindow
GetCursorPos
GetCursor
PtInRect
GetFocus
SetWindowTextW
GetWindowTextW
DialogBoxParamW
DestroyCursor
DestroyIcon
SetCursor
UpdateWindow
ScreenToClient
SendMessageTimeoutW
CreateAcceleratorTableW
DestroyAcceleratorTable
IsChild
InvalidateRgn
SetCapture
ReleaseCapture
GetSysColor
RegisterWindowMessageW
DrawTextExW
GetWindowDC
EndDialog
GetDesktopWindow
MoveWindow
GetKeyState
DispatchMessageW
TranslateMessage
GetMessageW
EnableWindow
SetActiveWindow
LoadCursorW
GetParent
GetWindow
GetWindowRect
SystemParametersInfoW
GetClientRect
MapWindowPoints
SetWindowPos
ShowWindow
GetWindowLongW
SetWindowLongW
MsgWaitForMultipleObjects
IsWindowUnicode
GetMessageA
DispatchMessageA
DestroyWindow
PostThreadMessageW
LoadStringW
GetWindowThreadProcessId
PeekMessageW
CopyImage
SetDIBColorTable
CreateRoundRectRgn
CreatePolygonRgn
CreateRectRgn
CombineRgn
GetStockObject
GetTextMetricsW
GetDeviceCaps
SetBkMode
SetTextColor
GetDIBColorTable
GetTextExtentPoint32W
CreateFontIndirectW
FrameRgn
GetPixel
CreateCompatibleDC
SelectObject
GetObjectW
DPtoLP
CreateBitmap
CreateCompatibleBitmap
GetMapMode
SetMapMode
BitBlt
SetBkColor
DeleteObject
DeleteDC
CreateDIBSection
StretchBlt
StretchDIBits
PatBlt
CreatePatternBrush
Ellipse
SetDIBitsToDevice
CreateRectRgnIndirect
CreateSolidBrush
CreateFontW
ExtTextOutW
SHGetSpecialFolderPathW
ShellExecuteExW
ord92
SHFileOperationW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ord165
SHFileOperationA
SHGetMalloc
ObjectFromLresult
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
WSAGetLastError
inet_ntoa
gethostname
gethostbyname
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
StringFromCLSID
CoCreateInstance
OleUninitialize
ReleaseStgMedium
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitializeEx
StringFromGUID2
OleLockRunning
CoGetClassObject
OleDuplicateData
CLSIDFromProgID
DoDragDrop
RegisterDragDrop
VariantChangeType
VariantCopyInd
VarUI4FromStr
SysAllocString
SysAllocStringLen
SysStringLen
SysStringByteLen
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysFreeString
SafeArrayUnaccessData
SafeArrayAccessData
SysAllocStringByteLen
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreateVector
SafeArrayGetVartype
SafeArrayCopy
VarBstrCmp
VariantInit
DispCallFunc
VariantClear
GetErrorInfo
VariantCopy
UrlGetPartW
UrlIsW
StrCmpIW
SHDeleteValueW
PathFileExistsW
PathAppendW
SHRegCreateUSKeyW
SHRegWriteUSValueW
SHDeleteKeyW
SHGetValueW
PathCreateFromUrlW
PathIsRelativeW
PathFindFileNameW
UrlCanonicalizeW
UrlUnescapeW
StrRetToStrW
SHCopyKeyW
PathFindExtensionW
PathIsURLW
TransparentBlt
AlphaBlend
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ