Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
7ADPopupSU.dll
windows7-x64
6ADPopupSU.dll
windows10-2004-x64
6SUUninstallJN.exe
windows7-x64
1SUUninstallJN.exe
windows10-2004-x64
1SupportBarJN.dll
windows7-x64
6SupportBarJN.dll
windows10-2004-x64
6SupportBar...JN.exe
windows7-x64
1SupportBar...JN.exe
windows10-2004-x64
1sotab.dll
windows7-x64
7sotab.dll
windows10-2004-x64
7susghelp.exe
windows7-x64
1susghelp.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
ADPopupSU.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ADPopupSU.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
SUUninstallJN.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
SUUninstallJN.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
SupportBarJN.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
SupportBarJN.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
SupportBarUpdateJN.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
SupportBarUpdateJN.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
sotab.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
sotab.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
susghelp.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
susghelp.exe
Resource
win10v2004-20231222-en
Target
9997aebe1489f0c536cb0a2fa423c4c8
Size
2.5MB
MD5
9997aebe1489f0c536cb0a2fa423c4c8
SHA1
8b6af37aa7867626ae03119f763fb8f209e9edb1
SHA256
020d05ca67529ed45cfb8ca8e385442504cf46a0f9a3ebc193529412c2abd468
SHA512
536b87b6a56e7b5e611a2bc5bf525642b66fa8cae91c9f72a5b8f39273757e5161bf8ab7ddee4617a47a48267185b76145900955c476ebd5243cd15dad655158
SSDEEP
49152:URvd1Y5OExXuhW8SDWgIWWtgxzV2oZOaDbltOm+xAV08C9fEUZIS5u:UR/ExTlWrg1Zxam+xAq8CRqmu
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/sotab.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/sotab.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/sotab.dll |
unpack002/out.upx |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFileExistsA
DeleteUrlCacheEntry
ord6394
ord2841
ord5440
ord6383
ord858
ord2107
ord801
ord941
ord6883
ord541
ord6215
ord6199
ord6442
ord2864
ord665
ord1979
ord3318
ord5186
ord354
ord5710
ord551
ord4278
ord922
ord3811
ord798
ord1997
ord4277
ord4129
ord2764
ord5465
ord5194
ord533
ord924
ord2818
ord535
ord6648
ord861
ord6663
ord1601
ord6385
ord6779
ord926
ord4202
ord6877
ord537
ord3337
ord6392
ord6407
ord939
ord2763
ord6055
ord4078
ord1776
ord5450
ord5241
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord3742
ord818
ord567
ord4275
ord6197
ord6379
ord2379
ord6453
ord6876
ord6143
ord5778
ord5448
ord5861
ord1228
ord540
ord2135
ord1949
ord860
ord1105
ord800
ord3663
ord823
ord6467
ord1131
ord2725
ord1134
ord3953
ord825
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord269
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord4274
ord1575
ord1176
ord1116
ord4407
ord3402
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
_mbsrev
_mbsstr
strstr
strtoul
_mbsnbcpy
_strdup
sprintf
malloc
free
strcmp
strcpy
strlen
srand
rand
atoi
_mbscmp
_mbsicmp
strcat
_stricmp
memcmp
memset
__CxxFrameHandler
_purecall
memcpy
_wcsicmp
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
lstrlenW
InterlockedDecrement
EnterCriticalSection
GetCurrentProcessId
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
LocalAlloc
GetTempPathA
CreateDirectoryA
lstrlenA
DeleteFileA
CopyFileA
GetTickCount
MultiByteToWideChar
CreateProcessA
WideCharToMultiByte
WritePrivateProfileStringA
GetPrivateProfileStringA
InterlockedIncrement
DestroyWindow
IsWindow
GetWindowRect
EnableWindow
KillTimer
SetForegroundWindow
WaitForInputIdle
EnumWindows
GetParent
SetTimer
GetWindowThreadProcessId
GetClassNameA
GetSystemMetrics
GetClientRect
SendMessageA
CreateWindowExA
GetWindowLongA
SetWindowLongA
ShowWindow
IsWindowVisible
SetWindowPos
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
SHGetSpecialFolderPathA
CoCreateInstance
SysStringLen
VariantClear
SysFreeString
LoadRegTypeLi
URLDownloadToFileA
URLOpenStreamA
ord15
ord21
ord23
ord18
ord57
ord32
ord58
ord30
ord11
ord10
ord39
ord47
ord16
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetFileAttributesA
GetFileSizeEx
GetFileTime
HeapAlloc
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
RaiseException
VirtualAlloc
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
VirtualFree
HeapCreate
GetStdHandle
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
CompareStringW
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetDriveTypeA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
GetProcessHeap
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetModuleFileNameW
LoadLibraryA
FreeResource
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindActCtxSectionStringA
LoadLibraryExA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
lstrlenA
CreateDirectoryA
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
InterlockedDecrement
MultiByteToWideChar
GetLastError
SetLastError
FindFirstFileA
FindNextFileA
FindClose
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
Sleep
CloseHandle
OpenProcess
TerminateProcess
Process32Next
DeleteFileA
MoveFileExA
RemoveDirectoryA
GetModuleFileNameA
GetTempPathA
CopyFileA
WinExec
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
UnhandledExceptionFilter
SizeofResource
DestroyMenu
UnregisterClassA
LoadCursorA
GetSysColorBrush
CharUpperA
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
UnhookWindowsHookEx
MessageBoxA
DrawIcon
SendMessageA
PostMessageA
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
IsIconic
GetWindowRect
GetClientRect
InvalidateRect
LoadIconA
EnableWindow
GetSystemMetrics
FindWindowA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
CheckMenuItem
EnableMenuItem
ModifyMenuA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
SetMenu
DeleteDC
GetStockObject
ExtTextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetDeviceCaps
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
Escape
GetFileTitleA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
GetUserNameA
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
SHGetSpecialFolderPathA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFileExistsA
PathFindFileNameA
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
SysAllocString
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
VariantChangeType
URLOpenStreamA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFileExistsA
TransparentBlt
HeapFree
RtlUnwind
HeapAlloc
GetCommandLineA
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
CreateThread
ExitThread
ExitProcess
TerminateProcess
HeapSize
HeapReAlloc
SetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalFree
TlsAlloc
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalAlloc
lstrcpynA
GetLastError
GlobalLock
GlobalUnlock
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
LocalFree
WaitForSingleObject
FindResourceA
LoadResource
LockResource
CreateDirectoryA
lstrlenA
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
GetTempPathA
DeleteFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
VirtualFree
DestroyMenu
GetSysColorBrush
PtInRect
GetClassNameA
LoadStringA
UnregisterClassA
CharUpperA
PostQuitMessage
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
GetCursorPos
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
IsWindowEnabled
ShowWindow
SetWindowTextA
GrayStringA
TabbedTextOutA
EndPaint
BeginPaint
ClientToScreen
LoadIconA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
wsprintfA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
GetKeyState
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
KillTimer
DestroyWindow
FillRect
DrawTextA
CreateWindowExA
GetWindowLongA
SetWindowLongA
SendMessageA
FindWindowExA
MoveWindow
SetTimer
GetSystemMetrics
SetWindowPos
SetForegroundWindow
IsWindowVisible
IsWindow
EnableWindow
LoadBitmapA
PostMessageA
LoadCursorA
GetDC
ReleaseDC
GetClientRect
GetWindowRect
GetParent
SetCursor
InvalidateRect
DestroyCursor
GetClassInfoA
CreateBitmap
RectVisible
PtVisible
Escape
GetDeviceCaps
ExtTextOutA
TextOutA
DeleteObject
CreateFontA
GetObjectA
CreateCompatibleDC
SelectObject
StretchBlt
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetStretchBltMode
SetBkMode
GetStockObject
RestoreDC
SaveDC
DeleteDC
SetBkColor
SetTextColor
GetClipBox
CreatePatternBrush
CreateCompatibleBitmap
BitBlt
GetFileTitleA
OpenPrinterA
ClosePrinter
DocumentPropertiesA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
ShellExecuteA
SHGetSpecialFolderPathA
_TrackMouseEvent
ord17
SysFreeString
VariantClear
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
LoadRegTypeLi
SysStringLen
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
URLDownloadToFileA
ord23
ord58
ord47
ord39
ord30
ord10
ord32
ord16
ord21
ord15
ord18
ord57
ord11
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCrackUrlA
InternetCanonicalizeUrlA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathFileExistsA
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord641
ord540
ord324
ord825
ord4234
ord1105
ord4710
ord668
ord1980
ord5710
ord3181
ord2781
ord2770
ord356
ord3337
ord3811
ord2818
ord922
ord858
ord924
ord2379
ord823
ord939
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3262
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord3738
ord561
ord815
ord818
ord326
ord567
ord4129
ord2621
ord1134
ord926
ord1168
ord1832
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord860
ord537
ord940
ord535
ord800
ord1576
ord3922
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_stricmp
_setmbcp
free
__CxxFrameHandler
strtoul
_mbsnbcpy
_strdup
_mbscmp
atol
atoi
_mbsicmp
malloc
WaitForSingleObject
GetSystemDirectoryA
CreateDirectoryA
CloseHandle
CreateMutexA
Process32First
CreateToolhelp32Snapshot
LocalFree
OpenProcess
GetModuleHandleA
GetStartupInfoA
GetLastError
GetPrivateProfileStringA
GetTempPathA
DeleteFileA
Sleep
Process32Next
CreateProcessA
WinExec
EnableWindow
PostMessageA
GetTokenInformation
ConvertSidToStringSidA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
SHGetSpecialFolderPathA
URLOpenStreamA
URLDownloadToFileA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\진행프로젝트\06_1.플러스라인\ADPopupApp\SupportBar\susghelp.pdb
WriteConsoleA
GetStringTypeW
SetEnvironmentVariableA
GetStringTypeA
GetConsoleMode
GetProcessHeap
WriteConsoleW
CompareStringW
GetConsoleCP
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
VirtualFree
CreateMutexA
HeapCreate
LCMapStringW
LCMapStringA
GetTimeZoneInformation
IsValidCodePage
GetACP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapSize
GetFileType
SetStdHandle
CreateThread
ExitThread
ExitProcess
VirtualQuery
GetSystemInfo
VirtualAlloc
RaiseException
RtlUnwind
HeapReAlloc
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
FindResourceExA
VirtualProtect
GetProfileIntA
SearchPathA
GetSystemDirectoryW
LoadLibraryW
GetTempFileNameA
GetFileTime
GetFileSizeEx
SetErrorMode
GetOEMCP
GetCPInfo
GetFileAttributesA
lstrcpyA
GlobalFlags
GetCurrentDirectoryA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetModuleHandleW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedIncrement
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalGetAtomNameA
GlobalFindAtomA
LoadLibraryA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GlobalAddAtomA
SuspendThread
ResumeThread
SetThreadPriority
CloseHandle
GetPrivateProfileIntA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
SetLastError
GlobalFree
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
FreeResource
GetTempPathA
FindClose
FindFirstFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
lstrlenW
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
SetEvent
Sleep
WaitForSingleObject
WideCharToMultiByte
GetTickCount
CreateDirectoryA
lstrlenA
DeleteFileA
CopyFileA
ResetEvent
CreateEventA
GetLastError
GetConsoleOutputCP
GetMenuDefaultItem
SetMenuDefaultItem
UpdateLayeredWindow
EnableScrollBar
UnionRect
SetCursorPos
DrawIconEx
DrawFocusRect
DrawFrameControl
DrawEdge
UnpackDDElParam
ReuseDDElParam
InsertMenuItemA
TranslateAcceleratorA
GetMenuItemInfoA
UnregisterClassA
GetNextDlgGroupItem
InvalidateRgn
SetRect
EmptyClipboard
CloseClipboard
SetClipboardData
LoadImageA
DestroyIcon
CopyImage
OpenClipboard
DrawStateA
RegisterClipboardFormatA
EnumChildWindows
LockWindowUpdate
BringWindowToTop
IsRectEmpty
InflateRect
IsMenu
GetSystemMenu
SetClassLongA
CreatePopupMenu
NotifyWinEvent
SetWindowRgn
CreateAcceleratorTableA
LoadAcceleratorsA
DestroyAcceleratorTable
GetAsyncKeyState
GetKeyboardState
GetKeyboardLayout
MapVirtualKeyA
ToAsciiEx
CopyAcceleratorTableA
DestroyMenu
PostThreadMessageA
LoadMenuA
SetRectEmpty
DeleteMenu
WaitMessage
ReleaseCapture
WindowFromPoint
SetCapture
GetSysColorBrush
CharNextA
CharUpperA
RegisterWindowMessageA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
IsCharLowerA
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
CopyRect
SetWindowPlacement
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
GetWindowTextLengthA
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
LoadIconA
SendMessageA
SetTimer
IsIconic
GetSystemMetrics
SendDlgItemMessageA
CheckDlgButton
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxA
ShowOwnedPopups
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
GetKeyNameTextA
MapVirtualKeyExA
IsClipboardFormatAvailable
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
TranslateMDISysAccel
FrameRect
GetUpdateRect
CharUpperBuffA
CopyIcon
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SubtractRect
GetDoubleClickTime
CreateMenu
GetWindowRgn
SetScrollRange
GetClientRect
DrawIcon
IsWindow
GetForegroundWindow
GetWindowRect
KillTimer
SetParent
EnableWindow
InvalidateRect
DestroyCursor
SetCursor
GetParent
GetDC
ReleaseDC
LoadBitmapA
LoadCursorA
PostMessageA
SetLayeredWindowAttributes
IsWindowVisible
RemoveMenu
GetSubMenu
GetMenuItemCount
InsertMenuA
GetMenuItemID
AppendMenuA
GetMenuStringA
GetMenuState
PostQuitMessage
IsZoomed
RedrawWindow
MessageBeep
OffsetRect
SystemParametersInfoA
WinHelpA
SetWindowPos
MapDialogRect
SetWindowContextHelpId
GetWindow
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongA
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetIconInfo
CreateRectRgnIndirect
OffsetRgn
GetRgnBox
CreateDIBitmap
CreateFontIndirectA
CreateCompatibleBitmap
GetTextMetricsA
EnumFontFamiliesA
GetTextCharsetInfo
CreateRoundRectRgn
GetTextExtentPoint32A
SetDIBColorTable
PatBlt
GetDIBits
RealizePalette
CombineRgn
SetPixel
CreateDIBSection
SetRectRgn
GetMapMode
DPtoLP
CreateEllipticRgn
CreatePolygonRgn
Polyline
Ellipse
Polygon
Rectangle
RoundRect
CreatePalette
GetPaletteEntries
GetTextColor
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
GetViewportOrgEx
LPtoDP
ExtFloodFill
SetPaletteEntries
GetNearestPaletteIndex
GetSystemPaletteEntries
EnumFontFamiliesExA
GetTextFaceA
SetPixelV
SetViewportOrgEx
Escape
ExtTextOutA
GetDCOrgEx
GetBkColor
CreateHatchBrush
CreateSolidBrush
CreatePen
GetObjectType
SelectPalette
GetStockObject
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
GetWindowOrgEx
CreateCompatibleDC
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
DeleteObject
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
CopyMetaFileA
GetDeviceCaps
GetObjectA
CreateFontA
SelectObject
StretchBlt
OffsetViewportOrgEx
AlphaBlend
TransparentBlt
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegCloseKey
RegQueryValueA
DragQueryFileA
SHAppBarMessage
SHGetFileInfoA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHGetSpecialFolderPathA
DragFinish
InitCommonControlsEx
ImageList_GetIconSize
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecW
UrlUnescapeA
PathFileExistsA
ord8
CoTaskMemFree
CoUninitialize
CoInitialize
IsAccelerator
ReleaseStgMedium
CoTaskMemAlloc
OleDuplicateData
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleLockRunning
OleIsCurrentClipboard
OleFlushClipboard
DoDragDrop
OleGetClipboard
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoInitializeEx
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
CoRegisterMessageFilter
CoRevokeClassObject
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
CoCreateInstance
VariantClear
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantChangeType
VariantInit
OleCreateFontIndirect
VariantCopy
SystemTimeToVariantTime
SysAllocString
VariantTimeToSystemTime
URLOpenStreamA
URLDownloadToFileA
GdipDrawImageI
GdipGetImageGraphicsContext
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCloneImage
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipCreateBitmapFromStream
InternetCanonicalizeUrlA
InternetCrackUrlA
DeleteUrlCacheEntry
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
PlaySoundA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ