DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
dllmain
Overview
overview
3Static
static
3BSD/BSD.exe
windows7-x64
1BSD/BSD.exe
windows10-2004-x64
1BSD/BSDShell.exe
windows7-x64
1BSD/BSDShell.exe
windows10-2004-x64
1BSD/BSD_Driver.sys
windows7-x64
1BSD/BSD_Driver.sys
windows10-2004-x64
1BSD/bsdm.dll
windows7-x64
1BSD/bsdm.dll
windows10-2004-x64
1BSD/context.chm
windows7-x64
1BSD/context.chm
windows10-2004-x64
1BSD/heur.dll
windows7-x64
1BSD/heur.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
BSD/BSD.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
BSD/BSD.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
BSD/BSDShell.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
BSD/BSDShell.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
BSD/BSD_Driver.sys
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
BSD/BSD_Driver.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
BSD/bsdm.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
BSD/bsdm.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
BSD/context.chm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
BSD/context.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
BSD/heur.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
BSD/heur.dll
Resource
win10v2004-20231215-en
Target
70ad54b0b95616b9fc51ea7c76502c6c
Size
1.7MB
MD5
70ad54b0b95616b9fc51ea7c76502c6c
SHA1
cd36aa1164524b09b96fe3bc954c1f953e13544f
SHA256
be6bc57019acbf4e3d6a7860837978869fddf550d53a165719cd2e0221a5f6ed
SHA512
54b21908e562f0fd5e6b1b7ea9c6be8ed535260c53660edd6d280249798b213e1753c7d1e5ba1773cb5c71ad4b03ec05b4e21e27e828d967af1bc5e7e7e8dd2d
SSDEEP
49152:Hb/Xjie+danmPE9AlLi71p8iSfTUfIMRBVUIG:HbzHqwOLU8iwoIsBVlG
Checks for missing Authenticode signature.
resource |
---|
unpack001/BSD/BSD.exe |
unpack001/BSD/BSDShell.exe |
unpack001/BSD/BSD_Driver.sys |
unpack001/BSD/bsdm.dll |
unpack001/BSD/heur.dll |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrlenA
WritePrivateProfileStringW
SetErrorMode
GetFileAttributesW
GetFileSizeEx
GetStartupInfoW
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
HeapSize
SetStdHandle
GetFileType
VirtualProtect
VirtualAlloc
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
TlsFree
VirtualFree
QueryPerformanceCounter
GetTimeZoneInformation
GetCurrentDirectoryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
LCMapStringA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GlobalFlags
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
GetModuleHandleA
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
FormatMessageW
LocalFree
lstrlenW
MulDiv
GlobalFree
GlobalAlloc
lstrcmpiW
InterlockedDecrement
CreateFileMappingW
GetCurrentProcessId
GetFileSize
ReadFile
SetFilePointer
WriteFile
LocalAlloc
GlobalLock
GlobalUnlock
GetUserDefaultLangID
GetProcessHeap
HeapAlloc
HeapFree
GetLongPathNameW
GetWindowsDirectoryW
CreateSemaphoreW
ReleaseSemaphore
GetVersionExW
GetSystemInfo
Process32FirstW
Process32NextW
OpenProcess
CreateToolhelp32Snapshot
Module32FirstW
GetSystemDirectoryW
Module32NextW
QueryDosDeviceW
DeviceIoControl
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
CreateDirectoryW
GetVersion
GetLogicalDrives
GetDriveTypeW
CreateFileW
GetFileTime
GetLastError
SetLastError
LoadLibraryW
FileTimeToLocalFileTime
FileTimeToSystemTime
ResumeThread
SuspendThread
ExpandEnvironmentStringsW
GetTickCount
MultiByteToWideChar
InitializeCriticalSection
FreeResource
DeleteCriticalSection
CreateEventW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GetCommandLineW
WideCharToMultiByte
SetFileAttributesW
DeleteFileW
TerminateThread
WaitForSingleObject
ResetEvent
CreateThread
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleHandleW
GetProcAddress
Sleep
EnterCriticalSection
LeaveCriticalSection
OpenEventW
SetEvent
CloseHandle
ExitProcess
HeapCreate
GetModuleFileNameW
CharNextW
ReleaseCapture
SetCapture
UnregisterClassW
GetSysColorBrush
WindowFromPoint
CharUpperW
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
DestroyMenu
ShowWindow
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
CopyAcceleratorTableW
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcW
EnableWindow
CreatePopupMenu
AppendMenuW
EnableMenuItem
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetWindowLongW
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
InvalidateRgn
MessageBeep
GetDC
ReleaseDC
IsRectEmpty
PostThreadMessageW
GetMessageTime
RegisterClipboardFormatW
GetNextDlgGroupItem
DispatchMessageW
GetClientRect
SendMessageW
LoadIconW
IsWindow
GetCursorPos
CallWindowProcW
DrawIcon
PostMessageW
GetSystemMenu
IsIconic
SetForegroundWindow
CloseWindow
RegisterWindowMessageW
SetWindowLongW
GetSystemMetrics
MessageBoxW
PtInRect
ScreenToClient
SetWindowPos
mouse_event
SetCursorPos
SetWindowTextW
GetDlgItem
FillRect
GetSysColor
TabbedTextOutW
DrawTextW
DrawTextExW
GrayStringW
SetRect
InvalidateRect
DestroyIcon
LoadImageW
RegisterHotKey
UnregisterHotKey
GetWindowRect
SetCursor
CloseClipboard
OpenClipboard
EmptyClipboard
SetClipboardData
wsprintfW
LoadCursorW
MoveWindow
ScaleWindowExtEx
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
SetMapMode
GetStockObject
GetDeviceCaps
SetTextColor
SetBkMode
CreateBitmap
SetBkColor
SaveDC
GetClipBox
CreateRectRgnIndirect
ExtSelectClipRgn
SetStretchBltMode
SetDIBitsToDevice
RestoreDC
GetObjectW
CreateDIBSection
DeleteDC
SelectObject
DeleteObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
CreateFontW
GetFileTitleW
DocumentPropertiesW
OpenPrinterW
ClosePrinter
StartServiceW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegEnumKeyExW
RegEnumValueW
CreateServiceW
SetSecurityDescriptorDacl
OpenSCManagerW
OpenServiceW
CloseServiceHandle
ControlService
DeleteService
RegSetValueExW
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
SHGetSpecialFolderPathW
SHGetFileInfoW
DragQueryFileW
SHBrowseForFolderW
SHGetPathFromIDListW
Shell_NotifyIconW
ShellExecuteW
DragFinish
_TrackMouseEvent
PathIsUNCW
PathStripToRootW
PathRemoveFileSpecW
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
UrlUnescapeW
OleUIBusyW
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
VariantInit
VariantClear
SysAllocString
VariantChangeType
SysAllocStringLen
SysStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysFreeString
GetModuleFileNameExW
GetAdaptersInfo
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
InternetCanonicalizeUrlW
InternetOpenUrlW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetQueryDataAvailable
InternetQueryOptionW
InternetCrackUrlW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
GetCurrentProcess
GetModuleFileNameA
CreateProcessA
CloseHandle
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RtlInitUnicodeString
KeDelayExecutionThread
ObfDereferenceObject
MmIsAddressValid
PsLookupProcessByProcessId
PsGetCurrentProcessId
IofCompleteRequest
IoGetCurrentProcess
ProbeForRead
MmUserProbeAddress
_except_handler3
NtBuildNumber
ZwClose
_wcsicmp
memmove
ZwQueryValueKey
ZwOpenKey
IoCreateSymbolicLink
IoCreateDevice
KeInitializeMutex
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
KeGetCurrentThread
KeInitializeEvent
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
ZwQuerySystemInformation
ExAllocatePoolWithTag
ExFreePoolWithTag
ZwCreateFile
KeUnstackDetachProcess
ZwSetInformationObject
ZwQueryObject
KeStackAttachProcess
PsInitialSystemProcess
IoCreateFile
MmGetSystemRoutineAddress
PsTerminateSystemThread
PsThreadType
IoDeleteSymbolicLink
KeQuerySystemTime
IoFreeMdl
MmUnmapLockedPages
wcsncpy
KeReleaseMutex
MmMapLockedPages
MmBuildMdlForNonPagedPool
IoAllocateMdl
ZwOpenEvent
KeClearEvent
IoCreateNotificationEvent
swprintf
KeInitializeSemaphore
ExSemaphoreObjectType
KeReleaseSemaphore
KeResetEvent
ObOpenObjectByPointer
ProbeForWrite
ZwWaitForSingleObject
ZwReadFile
ZwQueryInformationFile
wcslen
RtlFreeUnicodeString
RtlAppendUnicodeStringToString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlAppendUnicodeToString
_stricmp
KeServiceDescriptorTable
_strnicmp
PsProcessType
RtlVolumeDeviceToDosName
ObReferenceObjectByPointer
MmSectionObjectType
ExGetPreviousMode
wcscpy
IoThreadToProcess
PsLookupThreadByThreadId
wcscat
_wcsnicmp
ZwQueryKey
KeTickCount
KeBugCheckEx
PsCreateSystemThread
IoDeleteDevice
KeGetCurrentIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
WritePrivateProfileStringW
GlobalFlags
InterlockedIncrement
GetVersionExA
LoadLibraryA
GlobalFindAtomW
WriteFile
SetFilePointer
GetModuleHandleA
lstrlenA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
HeapAlloc
GetCommandLineA
ExitProcess
HeapReAlloc
HeapSize
HeapCreate
HeapDestroy
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
GetProcessHeap
GlobalFree
GlobalUnlock
FormatMessageW
LocalFree
GetCurrentProcessId
SetLastError
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GetProcAddress
InterlockedDecrement
GetUserDefaultLangID
GetTickCount
lstrcpynW
lstrlenW
lstrcpyW
GetVersionExW
GetVersion
GetSystemDirectoryW
CreateThread
OpenEventW
Sleep
SetEvent
OutputDebugStringW
GetCurrentProcess
UnmapViewOfFile
CloseHandle
CreateFileMappingW
MapViewOfFile
GetModuleHandleW
GetModuleFileNameW
CreateProcessW
GetLastError
DeleteCriticalSection
FlushFileBuffers
InitializeCriticalSection
DestroyMenu
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
LoadCursorW
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
GetWindowTextW
SetWindowTextW
UnregisterClassW
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnhookWindowsHookEx
GetWindowThreadProcessId
GetWindowLongW
LoadBitmapW
wsprintfW
PeekMessageW
SetMenuItemBitmaps
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
GetSysColorBrush
ShowWindow
InsertMenuW
PostQuitMessage
PostMessageW
CheckMenuItem
EnableMenuItem
GetMenuState
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
GetMenuCheckMarkDimensions
GetFocus
GetParent
SendMessageW
ModifyMenuW
PtInRect
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ShellExecuteExW
DragQueryFileW
ReleaseStgMedium
StringFromIID
CoGetMalloc
VariantChangeType
VariantClear
VariantInit
PathFindFileNameW
PathFindExtensionW
LresultFromObject
CreateStdAccessibleObject
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
GetStockObject
DeleteDC
SetMapMode
GetClipBox
DeleteObject
SetTextColor
ScaleWindowExtEx
SetWindowExtEx
CreateBitmap
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DocumentPropertiesW
OpenPrinterW
ClosePrinter
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
dllmain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2554
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord823
ord1243
ord1197
ord1570
ord1253
ord1255
ord6467
ord1578
ord600
ord826
ord269
ord1575
ord1176
ord4486
ord6375
ord4274
ord1116
ord342
ord1182
ord2976
ord1168
ord1577
strspn
memchr
strtok
ceil
_pctype
_isctype
__mb_cur_max
wcsstr
iswctype
ctime
sprintf
sscanf
_except_handler3
wcschr
wcsncat
towlower
towupper
fread
wcsspn
_stricmp
__CxxFrameHandler
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_unlink
wcscat
wcsrchr
wcsncpy
tolower
free
toupper
wcslen
fopen
fseek
memmove
wcscmp
_strnicmp
_strlwr
_splitpath
clock
malloc
_itoa
_ftol
atof
atol
atoi
srand
rand
time
_snwprintf
strstr
ftell
fclose
strncmp
wcscpy
strrchr
strchr
_stat
strncpy
strncat
_snprintf
_strcmpi
_wcsnicmp
_mbctype
_wcsicmp
GetProcAddress
GetModuleHandleA
FreeLibrary
WideCharToMultiByte
LocalFree
LocalAlloc
LoadLibraryA
wsprintfA
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Xlen@std@@YAXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ