Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
3f169db9660...18.exe
windows7-x64
7f169db9660...18.exe
windows10-2004-x64
7$0/Resourc...d.html
windows7-x64
1$0/Resourc...d.html
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/eula.html
windows7-x64
1$PLUGINSDIR/eula.html
windows10-2004-x64
1$PLUGINSDI...ew.dll
windows7-x64
1$PLUGINSDI...ew.dll
windows10-2004-x64
1$PROGRAMFI...gs.exe
windows7-x64
1$PROGRAMFI...gs.exe
windows10-2004-x64
1$PROGRAMFI...ot.dll
windows7-x64
1$PROGRAMFI...ot.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
f169db9660dc3d02d980a6ef65200fb2_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f169db9660dc3d02d980a6ef65200fb2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/eula.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/eula.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/htmlview.dll
Resource
win7-20240319-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/htmlview.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win10v2004-20240412-en
Target
f169db9660dc3d02d980a6ef65200fb2_JaffaCakes118
Size
581KB
MD5
f169db9660dc3d02d980a6ef65200fb2
SHA1
8b1c739755bcc5aa5a4b37e972d205c2689c6f5b
SHA256
e30e71571f49f2bdc2e7ba7b9e4471a903e96933412790a45bd9bb9119f9c582
SHA512
6caf281e20e0ae8febcadbf137d7495b533cca78d2bb9ce03536b7a1b8a7de2f8423c9f176ea9519e4efb81f0e1f28eb36e0746741e9787d26a7ce32f00a7a6f
SSDEEP
12288:Rdqoh6zqYsR0+eR9DYjFUKDU4btk6fnYWu0T500R8o:Rdq/rIwYuKDUDenYYNv
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/htmlview.dll |
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
CombineRgn
CreateCompatibleDC
CreateRectRgn
DeleteObject
GetDIBits
GetObjectA
SelectObject
SetTextColor
GetCurrentDirectoryA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
MultiByteToWideChar
SetCurrentDirectoryA
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CoTaskMemFree
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
CallWindowProcA
CharNextA
CloseClipboard
CreateDialogParamA
CreateWindowExA
DestroyIcon
DestroyWindow
DispatchMessageA
DrawFocusRect
DrawTextA
EnableMenuItem
EnableWindow
GetClientRect
GetClipboardData
GetDlgCtrlID
GetDlgItem
GetMessageA
GetSystemMenu
GetWindowLongA
GetWindowRect
GetWindowTextA
IsDialogMessageA
LoadCursorA
LoadIconA
LoadImageA
MapDialogRect
MapWindowPoints
MessageBoxA
OpenClipboard
PostMessageA
PtInRect
SendMessageA
SetCursor
SetWindowLongA
SetWindowPos
SetWindowRgn
SetWindowTextA
ShowWindow
TranslateMessage
wsprintfA
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Projects\testapps\htmlview\Release\htmlview.pdb
DeleteUrlCacheEntry
InitializeCriticalSection
DeleteCriticalSection
HeapFree
GetProcessHeap
lstrlenA
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenW
GetLastError
MulDiv
FlushInstructionCache
GetCurrentProcess
HeapAlloc
lstrcmpA
WideCharToMultiByte
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
IsBadReadPtr
LoadLibraryA
GetStringTypeW
GetStringTypeA
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LeaveCriticalSection
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TerminateProcess
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
LCMapStringW
LCMapStringA
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
EnterCriticalSection
RaiseException
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
IsBadCodePtr
GetStartupInfoA
VirtualAlloc
VirtualProtect
RtlUnwind
ExitProcess
wsprintfA
CreateWindowExA
CreateAcceleratorTableA
CharNextA
SetWindowLongA
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
IsWindow
GetDlgItem
SetFocus
GetParent
IsChild
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
CallWindowProcA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
DefWindowProcA
UnregisterClassA
SendMessageA
GetWindowLongA
GetFocus
GetDeviceCaps
CreateSolidBrush
GetStockObject
GetObjectA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
SysAllocStringByteLen
SysStringByteLen
VariantInit
VariantClear
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
PathIsURLA
UrlCreateFromPathA
UrlGetPartA
Create
Destroy
Display
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\projects\alot\broker\Release\support\ALOTSettings.pdb
InitializeCriticalSection
OpenProcess
WideCharToMultiByte
VirtualFreeEx
GetVersionExW
GetACP
lstrlenW
InterlockedExchange
GetLastError
GetThreadLocale
GetProcAddress
VirtualAllocEx
GetModuleHandleA
CreateRemoteThread
CloseHandle
WriteProcessMemory
GetProcessHeap
HeapAlloc
MultiByteToWideChar
HeapFree
HeapReAlloc
lstrcmpW
lstrcmpiW
InterlockedIncrement
InterlockedDecrement
IsBadReadPtr
SetUnhandledExceptionFilter
WaitForSingleObject
DeleteCriticalSection
GetLocaleInfoA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetCPInfo
GetOEMCP
LoadLibraryA
IsBadCodePtr
RegCreateKeyExW
RegSetValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Projects\Alot\build\alot\bin\support\band.pdb
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
GetTickCount
MulDiv
LoadLibraryA
GlobalUnlock
GlobalLock
CopyFileW
DisableThreadLibraryCalls
GlobalAlloc
lstrcmpW
GetTempFileNameW
DeleteFileW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetWindowsDirectoryW
GetSystemDirectoryW
GetTempPathW
FindClose
FindFirstFileW
GetFileSize
SetFilePointer
ReadFile
WriteFile
CreateFileW
SetEndOfFile
SetFileAttributesW
GetVersionExA
GetSystemDefaultLangID
ResumeThread
ResetEvent
TerminateThread
GetExitCodeThread
SetCurrentDirectoryW
GetSystemTimeAsFileTime
LocalFree
FormatMessageW
GetModuleFileNameA
GetFileAttributesExW
GetLongPathNameW
lstrlenA
GetCurrentDirectoryW
FindNextFileW
CreateDirectoryW
TerminateProcess
GetExitCodeProcess
CreateProcessW
HeapReAlloc
SystemTimeToFileTime
GetSystemTime
TryEnterCriticalSection
lstrcpynW
VirtualQuery
Thread32Next
Thread32First
CreateToolhelp32Snapshot
SuspendThread
OpenThread
VirtualAlloc
GetSystemInfo
ExitThread
CreateThread
RtlUnwind
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
ExitProcess
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
UnhandledExceptionFilter
HeapSize
SetUnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetTimeFormatA
GetDateFormatA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
QueryPerformanceCounter
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
LoadLibraryExW
lstrcmpiW
HeapFree
lstrcpyW
CreateMutexW
WaitForMultipleObjects
ReleaseMutex
CreateEventW
GetProcessHeap
HeapAlloc
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
SetEvent
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
CloseHandle
FreeLibrary
GetCurrentThreadId
Sleep
GetCurrentProcessId
InterlockedIncrement
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
LoadLibraryW
InterlockedDecrement
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WideCharToMultiByte
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
VirtualProtect
GetModuleHandleA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegEnumValueW
RegNotifyChangeKeyValue
SetWindowsHookExW
CallNextHookEx
FindWindowExW
EnumWindows
GetAncestor
EnumChildWindows
GetCapture
WaitForInputIdle
CharUpperW
CharLowerW
CreateDialogIndirectParamW
DialogBoxIndirectParamW
SetMenuItemBitmaps
GetSubMenu
LoadMenuW
SendNotifyMessageW
GetSystemMetrics
GetWindowDC
SetWindowRgn
GetMenuItemInfoW
GetMenuItemID
DeleteMenu
GetMenuItemRect
EqualRect
ReplyMessage
InSendMessage
WaitMessage
GetDlgItemTextW
CheckRadioButton
CheckDlgButton
SetDlgItemTextW
GetClassNameW
IsWindowVisible
GetComboBoxInfo
BeginPaint
GetSysColorBrush
UnhookWindowsHookEx
GetWindowTextLengthW
SetFocus
MoveWindow
DrawTextW
SetMenuItemInfoW
ClientToScreen
GetMenuItemCount
RedrawWindow
InvalidateRect
InsertMenuW
AppendMenuW
FillRect
CopyImage
GetDC
ReleaseDC
TrackPopupMenu
DestroyMenu
CreatePopupMenu
GetDlgItem
SendMessageW
PostMessageW
CharNextW
GetWindowPlacement
SetForegroundWindow
CallWindowProcW
DefWindowProcW
CreateWindowExW
BroadcastSystemMessageW
LoadImageW
KillTimer
SetTimer
EndDialog
GetSystemMenu
ModifyMenuW
RegisterClipboardFormatW
IsDlgButtonChecked
SetCursorPos
GetActiveWindow
GetClassInfoExW
RegisterClassExW
LoadStringW
wsprintfW
UnregisterClassW
IsIconic
GetCursorPos
GetCursor
PtInRect
DestroyCursor
DispatchMessageW
TranslateMessage
GetMessageW
DestroyIcon
SetCursor
OffsetRect
MessageBoxW
ScreenToClient
SendMessageTimeoutW
CreateAcceleratorTableW
DestroyAcceleratorTable
IsChild
GetDesktopWindow
InvalidateRgn
SetCapture
ReleaseCapture
GetSysColor
RegisterWindowMessageW
DrawTextExW
SendDlgItemMessageW
EndPaint
PeekMessageW
GetWindowThreadProcessId
IsWindow
GetFocus
SetWindowTextW
GetWindowTextW
GetKeyState
PostThreadMessageW
DestroyWindow
DispatchMessageA
GetMessageA
IsWindowUnicode
MsgWaitForMultipleObjects
SetWindowLongW
GetWindowLongW
ShowWindow
SetWindowPos
MapWindowPoints
GetClientRect
SystemParametersInfoW
GetWindowRect
EnableWindow
SetActiveWindow
LoadCursorW
GetParent
GetWindow
CopyRect
CreateDIBSection
SetDIBColorTable
GetStockObject
GetTextMetricsW
GetDeviceCaps
SetBkMode
SetTextColor
GetDIBColorTable
GetTextExtentPoint32W
CreateFontIndirectW
CreateSolidBrush
SetDIBitsToDevice
CreateCompatibleDC
SelectObject
GetObjectW
DPtoLP
CreateBitmap
CreateCompatibleBitmap
GetMapMode
SetMapMode
BitBlt
SetBkColor
DeleteObject
DeleteDC
CreateDIBitmap
StretchBlt
StretchDIBits
PatBlt
CreatePatternBrush
ExtTextOutW
CombineRgn
CreateRectRgnIndirect
Ellipse
GetPixel
CreateFontW
CreateRectRgn
ord92
SHGetSpecialFolderPathW
SHFileOperationA
ShellExecuteW
SHFileOperationW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteExW
ord165
SHGetMalloc
ObjectFromLresult
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
getpeername
gethostbyname
WSACleanup
closesocket
inet_ntoa
gethostname
WSAStartup
ntohl
htons
WSAIoctl
bind
inet_addr
socket
recvfrom
ntohs
getsockname
WSAGetLastError
CoUninitialize
CoTaskMemAlloc
DoDragDrop
CoTaskMemFree
CoTaskMemRealloc
ReleaseStgMedium
RegisterDragDrop
CoCreateInstance
StringFromCLSID
CLSIDFromString
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
StringFromGUID2
OleLockRunning
CoGetClassObject
CLSIDFromProgID
OleDuplicateData
OleSetContainedObject
OleCreate
CoInitializeEx
VariantChangeType
VariantCopyInd
VarUI4FromStr
SysStringLen
SysAllocString
SysAllocStringLen
SysStringByteLen
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VariantCopy
SysFreeString
SafeArrayUnaccessData
SafeArrayAccessData
SysAllocStringByteLen
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreateVector
SafeArrayGetVartype
SafeArrayCopy
VarBstrCmp
DispCallFunc
VariantClear
VariantInit
GetErrorInfo
UrlIsW
SHDeleteValueW
PathFileExistsW
PathAppendW
SHRegCreateUSKeyW
SHRegWriteUSValueW
SHGetValueW
PathCreateFromUrlW
PathIsRelativeW
PathFindFileNameW
UrlCanonicalizeW
SHDeleteKeyW
UrlUnescapeW
StrRetToStrW
SHCopyKeyW
UrlGetPartW
PathIsURLW
TransparentBlt
AlphaBlend
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HttpSendRequestHook
InternetReadFileHook
MyHttpSendRequestA
MyHttpSendRequestW
MyInternetReadFile
_GetSystemOptionsDirectory@8
_GetUserOptionsDirectory@8
_LaunchIEInProtectedMode@4
_createActionButton@4
_createBrowserSearch@4
_createCommunicator@4
_createConfigurator@4
_createContextMenu@4
_createErrorSearch@4
_createRssTicker@4
_createSiteMetrics@4
_createTimerManager@4
_createToolbarContextMenu@4
_createToolbarSearch@4
_createUpdater@4
_createWidget@4
myrecv
mysend
recvHook
sendHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ