dialog
initDialog
show
Overview
overview
7Static
static
7Total.Cmd.Power.exe
windows7-x64
7Total.Cmd.Power.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$WINDIR/NoClose.exe
windows7-x64
1$WINDIR/NoClose.exe
windows10-2004-x64
17z.dll
windows7-x64
37z.dll
windows10-2004-x64
37z.exe
windows7-x64
17z.exe
windows10-2004-x64
1Language/Wcmd_rus.chm
windows7-x64
1Language/Wcmd_rus.chm
windows10-2004-x64
1Plugins/wc...7z.dll
windows7-x64
3Plugins/wc...7z.dll
windows10-2004-x64
3Plugins/wc...7z.exe
windows7-x64
1Plugins/wc...7z.exe
windows10-2004-x64
1Setup/7z.dll
windows7-x64
3Setup/7z.dll
windows10-2004-x64
3Setup/7z.exe
windows7-x64
1Setup/7z.exe
windows10-2004-x64
1Setup/INSTALL.exe
windows7-x64
1Setup/INSTALL.exe
windows10-2004-x64
1Utilites/A...er.exe
windows7-x64
6Utilites/A...er.exe
windows10-2004-x64
6Utilites/A...id.pdf
windows7-x64
1Utilites/A...id.pdf
windows10-2004-x64
1Utilites/A...eo.exe
windows7-x64
6Utilites/A...eo.exe
windows10-2004-x64
6Behavioral task
behavioral1
Sample
Total.Cmd.Power.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Total.Cmd.Power.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$WINDIR/NoClose.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$WINDIR/NoClose.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
7z.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
7z.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
7z.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
7z.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Language/Wcmd_rus.chm
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Language/Wcmd_rus.chm
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
Plugins/wcx/Total7zip/7z.dll
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
Plugins/wcx/Total7zip/7z.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
Plugins/wcx/Total7zip/7z.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Plugins/wcx/Total7zip/7z.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
Setup/7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Setup/7z.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Setup/7z.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Setup/7z.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
Setup/INSTALL.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Setup/INSTALL.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
Utilites/AmoK/AmoK_DVD_Burner.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Utilites/AmoK/AmoK_DVD_Burner.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
Utilites/AmoK/langid.pdf
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Utilites/AmoK/langid.pdf
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
Utilites/AmoK/tools/DVDVideo.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Utilites/AmoK/tools/DVDVideo.exe
Resource
win10v2004-20240412-en
Target
Total.Cmd.Power.exe
Size
57.2MB
MD5
bfdd459dbb5dbc516b9fd3acbb8e1f30
SHA1
8cc22702ff2fd1fb30b04426187e720d1eb6f1db
SHA256
3384f004ac5e1f2f5c651040501bfbd9281b204c5940caab197112f68843ebf9
SHA512
dc572107f6aa107484b2012b9bc4ac4c0eb54274f48b7fd4becd5ba901e60b87660f6660137f7d64ffca0382abdd78285d686abe1b372330e4018dc39067f9c5
SSDEEP
1572864:AdPB0SM6Z57rsBcyDm4n3evw0b/h+KrmIzu5oOwkiC:+PB5M6nc2Y3Qj/hm2O9B
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
Total.Cmd.Power.exe |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/nsProcess.dll |
unpack001/$WINDIR/NoClose.pif |
unpack001/7z.dll |
unpack001/7z.exe |
unpack001/Plugins/wcx/Total7zip/7z.dll |
unpack001/Plugins/wcx/Total7zip/7z.exe |
unpack001/Setup/7z.dll |
unpack001/Setup/7z.exe |
unpack001/Utilites/AmoK/AmoK_DVD_Burner.exe |
unpack001/Utilites/AmoK/tools/DVDVideo.exe |
unpack001/Utilites/AutoRuns/Autoruns.exe |
unpack001/Utilites/DWS/DWS_Lite.exe |
unpack001/Utilites/DevEject/DevEject.exe |
unpack001/Utilites/ISOCreator/ISOCreator.exe |
unpack001/Utilites/Moverator/Moverator.exe |
unpack001/Utilites/PasswordCracker/PCHook.dll |
unpack001/Utilites/PasswordCracker/PWDCrack.exe |
unpack001/Utilites/PasswordCracker/pchookU.dll |
unpack001/out.upx |
resource | yara_rule |
---|---|
static1/unpack001/out.upx | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetPrivateProfileIntA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileStringA
SetCurrentDirectoryA
GetModuleHandleA
lstrcmpiA
WritePrivateProfileStringA
lstrcatA
lstrcpynA
GlobalFree
lstrlenA
lstrcpyA
GlobalUnlock
GlobalAlloc
GlobalLock
MapWindowPoints
PtInRect
CloseClipboard
LoadCursorA
GetDlgCtrlID
OpenClipboard
GetClientRect
SetWindowRgn
DrawFocusRect
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
DrawTextA
SetCursor
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
CallWindowProcA
PostMessageA
MessageBoxA
GetSysColor
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetWindowLongA
EnableMenuItem
GetSystemMenu
GetClipboardData
LoadIconA
DeleteObject
CombineRgn
SetTextColor
GetDIBits
SelectObject
CreateRectRgn
GetObjectA
CreateCompatibleDC
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHGetDesktopFolder
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
lstrcpynA
lstrcpyA
GetProcAddress
VirtualFree
FreeLibrary
lstrlenA
LoadLibraryA
GetModuleHandleA
GlobalAlloc
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetLastError
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CloseHandle
TerminateProcess
OpenProcess
lstrcmpiA
WideCharToMultiByte
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryA
GetVersionExA
GlobalFree
lstrcpynA
GlobalAlloc
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3401
ord3830
ord3831
ord3346
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord1105
ord926
ord6877
ord1200
ord2764
ord860
ord858
ord924
ord4129
ord537
ord5683
ord5572
ord2915
ord1576
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord540
ord941
ord800
ord3825
ord825
ord1168
_except_handler3
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
__p___argc
__p___argv
strstr
_mbsicmp
__CxxFrameHandler
_setmbcp
_stricmp
__set_app_type
CreateProcessA
ExpandEnvironmentStringsA
GetPrivateProfileStringA
GetPrivateProfileSectionA
Sleep
GetPrivateProfileIntA
GetVersion
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
CloseHandle
WaitForSingleObject
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetAsyncKeyState
GetMessageA
PostThreadMessageA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SysAllocStringByteLen
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
VariantCopy
VariantClear
CharPrevExA
CharUpperW
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
exit
strchr
strcat
strcpy
memset
realloc
free
malloc
strlen
wcscmp
strcmp
strstr
_CxxThrowException
memmove
memcpy
memcmp
_purecall
__CxxFrameHandler
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
ResetEvent
SetEvent
CreateEventW
SetThreadAffinityMask
ResumeThread
WaitForSingleObject
InterlockedIncrement
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetOEMCP
FileTimeToLocalFileTime
DeleteCriticalSection
GetVersionExW
LocalFileTimeToFileTime
WaitForMultipleObjects
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
GlobalMemoryStatus
GetSystemInfo
GetCurrentProcess
GetProcessAffinityMask
CompareFileTime
GetLastError
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetProcAddress
GetModuleHandleW
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
GetModuleHandleA
CreateDecoder
CreateEncoder
CreateObject
GetHandlerProperty
GetHandlerProperty2
GetHashers
GetIsArc
GetMethodProperty
GetNumberOfFormats
GetNumberOfMethods
SetCaseSensitive
SetCodecs
SetLargePageMode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SysStringByteLen
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
VariantCopy
VariantClear
CharUpperW
LookupPrivilegeValueW
GetFileSecurityW
SetFileSecurityW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
AdjustTokenPrivileges
OpenProcessToken
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
_beginthreadex
_ftol
memcmp
_purecall
memset
strlen
wcscmp
wcsstr
strcmp
memmove
fputs
fputc
fflush
fgetc
fclose
_iob
free
_CxxThrowException
malloc
memcpy
__CxxFrameHandler
_isatty
_fileno
SetThreadAffinityMask
CreateEventW
SetEvent
InitializeCriticalSection
WaitForSingleObject
SetFileTime
VirtualFree
VirtualAlloc
SetConsoleMode
GetConsoleMode
GetVersionExW
SetFileApisToOEM
GetCommandLineW
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
GetProcessTimes
OpenEventW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
SetProcessAffinityMask
GetStdHandle
GetSystemTimeAsFileTime
FileTimeToDosDateTime
IsProcessorFeaturePresent
GlobalMemoryStatus
GetSystemInfo
GetProcessAffinityMask
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareFileTime
GetCurrentProcess
GetDiskFreeSpaceW
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
GetLogicalDriveStringsW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryExW
LoadLibraryW
GetModuleFileNameW
LocalFree
FormatMessageW
CloseHandle
CreateFileW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
GetProcAddress
GetModuleHandleW
CreateDirectoryW
DeleteFileW
SetLastError
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathW
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetFileInformationByHandle
ResumeThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SysAllocStringByteLen
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
VariantCopy
VariantClear
CharPrevExA
CharUpperW
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
exit
strchr
strcat
strcpy
memset
realloc
free
malloc
strlen
wcscmp
strcmp
strstr
_CxxThrowException
memmove
memcpy
memcmp
_purecall
__CxxFrameHandler
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
ResetEvent
SetEvent
CreateEventW
SetThreadAffinityMask
ResumeThread
WaitForSingleObject
InterlockedIncrement
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetOEMCP
FileTimeToLocalFileTime
DeleteCriticalSection
GetVersionExW
LocalFileTimeToFileTime
WaitForMultipleObjects
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
GlobalMemoryStatus
GetSystemInfo
GetCurrentProcess
GetProcessAffinityMask
CompareFileTime
GetLastError
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetProcAddress
GetModuleHandleW
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
GetModuleHandleA
CreateDecoder
CreateEncoder
CreateObject
GetHandlerProperty
GetHandlerProperty2
GetHashers
GetIsArc
GetMethodProperty
GetNumberOfFormats
GetNumberOfMethods
SetCaseSensitive
SetCodecs
SetLargePageMode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SysStringByteLen
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
VariantCopy
VariantClear
CharUpperW
LookupPrivilegeValueW
GetFileSecurityW
SetFileSecurityW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
AdjustTokenPrivileges
OpenProcessToken
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
_beginthreadex
_ftol
memcmp
_purecall
memset
strlen
wcscmp
wcsstr
strcmp
memmove
fputs
fputc
fflush
fgetc
fclose
_iob
free
_CxxThrowException
malloc
memcpy
__CxxFrameHandler
_isatty
_fileno
SetThreadAffinityMask
CreateEventW
SetEvent
InitializeCriticalSection
WaitForSingleObject
SetFileTime
VirtualFree
VirtualAlloc
SetConsoleMode
GetConsoleMode
GetVersionExW
SetFileApisToOEM
GetCommandLineW
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
GetProcessTimes
OpenEventW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
SetProcessAffinityMask
GetStdHandle
GetSystemTimeAsFileTime
FileTimeToDosDateTime
IsProcessorFeaturePresent
GlobalMemoryStatus
GetSystemInfo
GetProcessAffinityMask
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareFileTime
GetCurrentProcess
GetDiskFreeSpaceW
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
GetLogicalDriveStringsW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryExW
LoadLibraryW
GetModuleFileNameW
LocalFree
FormatMessageW
CloseHandle
CreateFileW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
GetProcAddress
GetModuleHandleW
CreateDirectoryW
DeleteFileW
SetLastError
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathW
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetFileInformationByHandle
ResumeThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SysAllocStringByteLen
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
VariantCopy
VariantClear
CharPrevExA
CharUpperW
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
exit
strchr
strcat
strcpy
memset
realloc
free
malloc
strlen
wcscmp
strcmp
strstr
_CxxThrowException
memmove
memcpy
memcmp
_purecall
__CxxFrameHandler
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
ResetEvent
SetEvent
CreateEventW
SetThreadAffinityMask
ResumeThread
WaitForSingleObject
InterlockedIncrement
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetOEMCP
FileTimeToLocalFileTime
DeleteCriticalSection
GetVersionExW
LocalFileTimeToFileTime
WaitForMultipleObjects
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
GlobalMemoryStatus
GetSystemInfo
GetCurrentProcess
GetProcessAffinityMask
CompareFileTime
GetLastError
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetProcAddress
GetModuleHandleW
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
GetModuleHandleA
CreateDecoder
CreateEncoder
CreateObject
GetHandlerProperty
GetHandlerProperty2
GetHashers
GetIsArc
GetMethodProperty
GetNumberOfFormats
GetNumberOfMethods
SetCaseSensitive
SetCodecs
SetLargePageMode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SysStringByteLen
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
VariantCopy
VariantClear
CharUpperW
LookupPrivilegeValueW
GetFileSecurityW
SetFileSecurityW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
AdjustTokenPrivileges
OpenProcessToken
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
_beginthreadex
_ftol
memcmp
_purecall
memset
strlen
wcscmp
wcsstr
strcmp
memmove
fputs
fputc
fflush
fgetc
fclose
_iob
free
_CxxThrowException
malloc
memcpy
__CxxFrameHandler
_isatty
_fileno
SetThreadAffinityMask
CreateEventW
SetEvent
InitializeCriticalSection
WaitForSingleObject
SetFileTime
VirtualFree
VirtualAlloc
SetConsoleMode
GetConsoleMode
GetVersionExW
SetFileApisToOEM
GetCommandLineW
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
GetProcessTimes
OpenEventW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
SetProcessAffinityMask
GetStdHandle
GetSystemTimeAsFileTime
FileTimeToDosDateTime
IsProcessorFeaturePresent
GlobalMemoryStatus
GetSystemInfo
GetProcessAffinityMask
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareFileTime
GetCurrentProcess
GetDiskFreeSpaceW
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
GetLogicalDriveStringsW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryExW
LoadLibraryW
GetModuleFileNameW
LocalFree
FormatMessageW
CloseHandle
CreateFileW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
GetProcAddress
GetModuleHandleW
CreateDirectoryW
DeleteFileW
SetLastError
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathW
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetFileInformationByHandle
ResumeThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetEnvironmentVariableA
GetWindowsDirectoryA
CopyFileA
GetUserDefaultLCID
GlobalFree
GlobalAlloc
GetModuleFileNameA
GetVersionExA
GetCommandLineA
GetDriveTypeA
SetFilePointer
GetSystemDirectoryA
LocalFileTimeToFileTime
DosDateTimeToFileTime
IsValidCodePage
WideCharToMultiByte
GetStringTypeA
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
CompareStringA
CreateFileA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetStartupInfoA
TerminateProcess
ExitProcess
HeapAlloc
HeapFree
RtlUnwind
GetFileTime
GetFileSize
ReadFile
WriteFile
SetFileTime
DeleteFileA
WritePrivateProfileStringA
CreateDirectoryA
GetTickCount
Sleep
GetCurrentProcess
OpenProcess
GetStringTypeW
GetProcAddress
LoadLibraryA
GetModuleHandleA
CloseHandle
GetLastError
FindFirstFileA
FindNextFileA
FindClose
WinExec
GetPrivateProfileIntA
MultiByteToWideChar
GetPrivateProfileStringA
GetFileAttributesA
GetCPInfo
SetFileAttributesA
BeginPaint
CharLowerA
GetUserObjectSecurity
FindWindowA
GetMessageA
UpdateWindow
CreateWindowExA
RegisterClassA
LoadIconA
OemToCharA
IsWindowUnicode
EndPaint
PostQuitMessage
DefWindowProcA
GetSystemMetrics
DrawTextW
BringWindowToTop
SetForegroundWindow
LoadCursorA
SetCursor
CharPrevA
MessageBoxA
CharUpperA
PostMessageA
MessageBoxW
EnumWindows
GetWindowTextA
GetClassLongA
GetWindowThreadProcessId
EnableWindow
CheckRadioButton
IsDlgButtonChecked
CheckDlgButton
SetFocus
DialogBoxParamW
DialogBoxParamA
MessageBeep
SendDlgItemMessageW
EndDialog
SendMessageW
SendMessageA
GetDlgItemTextA
DestroyWindow
CreateDialogParamW
CreateDialogParamA
GetDlgItem
ShowWindow
IsIconic
GetSystemMenu
DeleteMenu
GetDC
GetClientRect
FillRect
wsprintfA
GetSysColor
DrawTextA
ReleaseDC
SendDlgItemMessageA
SetWindowTextA
SetDlgItemTextW
SetDlgItemTextA
GetWindowRect
GetParent
MoveWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetClassNameA
CreateFontA
SelectObject
GetStockObject
DeleteObject
CreateSolidBrush
SetBkColor
SetBkMode
IntersectClipRect
SetTextColor
AdjustTokenPrivileges
GetSecurityDescriptorOwner
GetTokenInformation
AllocateAndInitializeSid
LookupAccountSidA
FreeSid
RegCreateKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
LookupAccountNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\1\s\x64\Release\autoruns64.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ImageList_Add
ImageList_ReplaceIcon
ImageList_Draw
ImageList_Remove
ImageList_GetIcon
ImageList_GetImageCount
ord17
ImageList_Create
CertDuplicateCertificateContext
CertGetNameStringW
CryptSIPLoad
CryptSIPRetrieveSubjectGuidForCatalogFile
CryptCATAdminCalcHashFromFileHandle
RtlVirtualUnwind
RtlUnwindEx
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlCaptureContext
NtDeleteKey
NtOpenKey
NtCreateKey
RtlUnwind
GetProfileStringW
WriteProfileStringW
GetPrivateProfileStringW
WritePrivateProfileStringW
MoveFileW
GetComputerNameW
GetLocaleInfoW
GetNumberFormatW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
MultiByteToWideChar
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
WaitForSingleObject
SetEvent
CreateEventW
WaitForMultipleObjects
GetCurrentThread
SetThreadPriority
CreateThread
GetExitCodeThread
ExpandEnvironmentStringsA
LoadLibraryExA
GetModuleHandleW
TryEnterCriticalSection
LocalAlloc
SetFileAttributesW
InitializeSRWLock
lstrlenW
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetStdHandle
ResumeThread
FreeLibraryAndExitThread
LCMapStringW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetConsoleMode
ReadConsoleInputW
ReadConsoleW
SetFilePointerEx
GetStringTypeW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
GetFileType
ReadFile
FileTimeToLocalFileTime
LoadLibraryW
GetProcAddress
Sleep
GetLastError
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
CreateFileW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CloseHandle
GetFileSizeEx
LoadLibraryExW
GetVersionExW
SetLastError
FreeEnvironmentStringsW
WriteConsoleW
SetEndOfFile
TlsFree
WideCharToMultiByte
OutputDebugStringW
lstrcatW
RemoveDirectoryW
GetTempFileNameW
GetLongPathNameW
GetFullPathNameW
GetFileTime
EncodePointer
GlobalLock
GlobalUnlock
GlobalAlloc
FreeLibrary
GetSystemWow64DirectoryW
IsWow64Process
GetSystemWindowsDirectoryW
GetWindowsDirectoryW
GetTickCount
GetVersion
OpenProcess
CreateProcessW
TlsSetValue
TlsAlloc
ExitThread
TerminateProcess
GetCurrentProcess
CreateSemaphoreW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetErrorMode
GetTempPathW
WriteFile
InitializeSListHead
GetFileSize
DeleteFileW
CreateDirectoryW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
TlsGetValue
GetModuleFileNameW
ReleaseSRWLockExclusive
LocalFree
GetCommandLineW
GetStdHandle
GetTimeFormatW
GetDateFormatW
FileTimeToSystemTime
FormatMessageW
AcquireSRWLockExclusive
MulDiv
ExitProcess
GetModuleHandleExW
GetConsoleCP
GetCursorPos
GetWindowRect
GetClientRect
GetWindowTextW
ClientToScreen
ScreenToClient
ChildWindowFromPoint
GetSysColor
IntersectRect
UnionRect
OffsetRect
PtInRect
GetWindowLongW
GetWindowLongPtrW
GetPropW
SetPropW
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetClassNameW
GetWindowThreadProcessId
LoadBitmapW
LoadIconW
LoadImageW
CopyImage
DrawIconEx
CreateIconIndirect
SetWindowLongPtrW
GetParent
SetParent
EnumChildWindows
FindWindowW
FindWindowExW
GetDC
SetForegroundWindow
GetIconInfo
SetMenuItemInfoW
TrackPopupMenu
DeleteMenu
ModifyMenuW
InsertMenuW
GetSubMenu
EnableMenuItem
CheckMenuItem
DrawMenuBar
GetMenu
GetSystemMetrics
TranslateAcceleratorW
LoadAcceleratorsW
EnableWindow
KillTimer
SetTimer
ReleaseCapture
GetFocus
SetFocus
CharUpperW
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
IsDlgButtonChecked
CheckDlgButton
GetDlgItemTextW
SetDlgItemTextW
DialogBoxParamW
CreateDialogParamW
IsZoomed
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
CallWindowProcW
PostQuitMessage
DefWindowProcW
WaitForInputIdle
PostMessageW
DispatchMessageW
TranslateMessage
GetMessageW
DrawFrameControl
RegisterWindowMessageW
LoadStringW
LoadCursorW
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxIndirectParamW
SendMessageW
MessageBoxW
IsDialogMessageW
EnumDisplaySettingsW
DrawTextW
MapWindowPoints
DestroyIcon
CreateDIBSection
GetDIBits
ExtTextOutW
GetObjectW
GetTextMetricsW
SetTextColor
SetBkMode
SetBkColor
SelectObject
GetTextExtentPoint32W
GetStockObject
DeleteObject
CreateSolidBrush
CreateFontIndirectW
CreateBitmap
BitBlt
EndPage
StartPage
EndDoc
StartDocW
SetMapMode
GetDeviceCaps
DeleteDC
CreateCompatibleDC
GdiFlush
CommDlgExtendedError
ChooseFontW
FindTextW
GetSaveFileNameW
GetOpenFileNameW
PrintDlgW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyW
RegOpenKeyW
OpenProcessToken
AdjustTokenPrivileges
AllocateAndInitializeSid
DuplicateTokenEx
EqualSid
FreeSid
GetTokenInformation
ImpersonateLoggedOnUser
RevertToSelf
LookupAccountSidW
LookupAccountNameW
LookupPrivilegeValueW
RegDeleteKeyW
RegEnumKeyW
RegEnumValueW
RegGetKeySecurity
RegLoadKeyW
RegQueryInfoKeyW
RegSetKeySecurity
RegUnLoadKeyW
RegQueryValueW
DeleteService
GetServiceDisplayNameW
QueryServiceConfig2W
RegQueryValueExA
RegOpenKeyExA
ShellExecuteExW
SHGetMalloc
SHGetPathFromIDListW
CommandLineToArgvW
SHBrowseForFolderW
SHChangeNotify
SHGetFolderPathW
SHGetFileInfoW
ShellExecuteW
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantChangeType
VariantInit
SysAllocStringByteLen
SysStringLen
VariantClear
SysFreeString
SysAllocString
SHCreateStreamOnFileW
SHAutoComplete
UrlUnescapeW
ord176
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpGetProxyForUrl
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\1\s\x64\Release Console\autorunsc64.pdb
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ImageList_ReplaceIcon
ImageList_Add
CertGetNameStringW
CryptSIPLoad
CryptSIPRetrieveSubjectGuidForCatalogFile
CertDuplicateCertificateContext
CryptCATAdminCalcHashFromFileHandle
RtlVirtualUnwind
RtlUnwindEx
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlCaptureContext
NtOpenKey
NtCreateKey
RtlUnwind
GetSystemWow64DirectoryW
FormatMessageA
lstrlenW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetPrivateProfileStringW
FreeLibrary
MultiByteToWideChar
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
WaitForMultipleObjects
GetCurrentThread
SetThreadPriority
CreateThread
GetExitCodeThread
GetConsoleCP
GetModuleHandleExW
ExitProcess
TlsFree
EncodePointer
OutputDebugStringW
WideCharToMultiByte
GetSystemWindowsDirectoryW
GetVersion
OpenProcess
TlsSetValue
TlsAlloc
ExitThread
GetCurrentProcess
InitializeCriticalSection
SetErrorMode
WriteFile
GetLongPathNameW
IsWow64Process
GetFullPathNameW
GetFileTime
GetFileSize
ExpandEnvironmentStringsW
SetEnvironmentVariableW
TlsGetValue
GetModuleFileNameW
LocalFree
LocalAlloc
GetFileType
GetCommandLineW
GetStdHandle
GetTimeFormatW
GetDateFormatW
FileTimeToSystemTime
FormatMessageW
MulDiv
GetModuleHandleW
ReadFile
FileTimeToLocalFileTime
LoadLibraryW
GetProcAddress
Sleep
GetLastError
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
CreateFileW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CloseHandle
GetFileSizeEx
LoadLibraryExW
GetVersionExW
SetLastError
WriteConsoleW
SetEndOfFile
TryEnterCriticalSection
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSRWLock
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeLibraryAndExitThread
GetStringTypeW
SetFilePointerEx
ReadConsoleW
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
LCMapStringW
CompareStringW
GetCommandLineA
SetStdHandle
GetSubMenu
MessageBoxW
GetParent
SetDlgItemTextW
PostMessageW
LoadStringW
SendMessageW
DestroyIcon
LoadIconW
DeleteMenu
InsertMenuW
CheckMenuItem
GetMenu
LoadCursorW
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxIndirectParamW
DeleteObject
EndPage
StartPage
EndDoc
StartDocW
SetMapMode
GetDeviceCaps
DeleteDC
CreateCompatibleDC
PrintDlgW
CryptAcquireContextW
QueryServiceConfig2W
GetServiceDisplayNameW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
CloseServiceHandle
OpenSCManagerW
RegQueryValueW
RegUnLoadKeyW
RegQueryInfoKeyW
RegLoadKeyW
RegEnumValueW
RegEnumKeyW
RegDeleteKeyW
LookupPrivilegeValueW
LookupAccountNameW
LookupAccountSidW
RevertToSelf
ImpersonateLoggedOnUser
GetTokenInformation
FreeSid
EqualSid
DuplicateTokenEx
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyW
RegCreateKeyW
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
OpenServiceW
ShellExecuteW
SHGetFolderPathW
SHGetFileInfoW
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitializeEx
VariantChangeType
VariantInit
SysAllocStringByteLen
SysStringLen
VariantClear
SysFreeString
SysAllocString
UrlUnescapeW
ord176
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpGetProxyForUrl
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Nummer\Documents\GitHub\Destroy-Windows-10-Spying\DWS\obj\Release\DWS.pdb
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetProcAddress
GetLastError
LoadLibraryA
GetModuleHandleA
GetVersion
FreeLibrary
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
VirtualQuery
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
RtlUnwind
InterlockedExchange
FlushFileBuffers
SetFilePointer
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
CloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
u:\1Source\VC\RemoveDrive2800\Release\RemoveDrive.pdb
CM_Get_DevNode_Registry_PropertyA
SetupDiEnumDeviceInfo
CM_Query_And_Remove_SubTreeW
CM_Request_Device_EjectW
CM_Get_DevNode_Status
SetupDiDestroyDeviceInfoList
CM_Get_Device_IDA
CM_Get_Parent
SetupDiGetDeviceRegistryPropertyA
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
PathUnquoteSpacesW
StrStrIW
StrStrW
StrTrimA
PathFindFileNameA
PathFindExtensionA
PathRenameExtensionA
StrStrIA
StrChrA
StrToIntA
StrChrIA
StrNCatA
StrStrA
PathCompactPathExA
GetModuleFileNameExA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
FindVolumeMountPointClose
FindNextVolumeA
FindVolumeClose
GetVersionExA
GetDiskFreeSpaceExA
FormatMessageA
LocalFree
SetFileAttributesA
CreateProcessA
WideCharToMultiByte
lstrlenW
FindNextVolumeMountPointA
LoadLibraryA
ReadFile
DefineDosDeviceA
FindFirstVolumeMountPointA
FindFirstVolumeA
QueryDosDeviceW
GetFileAttributesW
MultiByteToWideChar
GetOverlappedResult
GetModuleHandleA
GetProcAddress
GetTickCount
GetCurrentProcessId
lstrcpyA
OpenProcess
DuplicateHandle
GetCurrentProcess
CloseHandle
WaitForSingleObject
CreateThread
Sleep
GetExitCodeThread
lstrcatA
lstrlenA
lstrcmpiA
FindFirstFileA
GetFileAttributesA
CreateFileA
FindNextFileA
FindClose
GetModuleFileNameA
SetConsoleCtrlHandler
GetStdHandle
SetConsoleMode
GetConsoleScreenBufferInfo
GetNumberOfConsoleInputEvents
PeekConsoleInputA
FlushConsoleInputBuffer
GetConsoleWindow
ReadConsoleInputA
SetConsoleTextAttribute
SetConsoleCursorPosition
ReadConsoleOutputA
lstrcmpA
WriteConsoleOutputAttribute
OutputDebugStringA
GetCommandLineA
GetProcessHeap
SetUnhandledExceptionFilter
ExitProcess
HeapAlloc
HeapFree
WriteFile
GetTempPathA
SetLastError
GetCurrentThreadId
GetLastError
FreeLibrary
lstrcpynA
DeviceIoControl
GetDriveTypeA
QueryDosDeviceA
GetVolumePathNameA
GetVolumeNameForVolumeMountPointA
SetErrorMode
GetFullPathNameA
GetCurrentDirectoryA
GetWindowsDirectoryA
SetCurrentDirectoryA
CopyFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetPrivateProfileStringA
WritePrivateProfileStringA
FlushFileBuffers
lstrcpyW
GetVolumeInformationA
CreateEventA
SetForegroundWindow
FlashWindowEx
SendMessageTimeoutA
ShowWindow
wvsprintfA
CharToOemA
GetKeyState
GetAsyncKeyState
CharUpperA
GetWindowThreadProcessId
IsWindowVisible
GetDesktopWindow
GetWindow
wsprintfA
CharLowerA
OpenProcessToken
AdjustTokenPrivileges
GetTokenInformation
ConvertSidToStringSidA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
ControlService
LookupPrivilegeValueA
SHChangeNotify
ord680
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
G:\Projects\uninstall-tool\Ready\geek.pdb
GetFileSizeEx
GlobalFlags
GetSystemDefaultUILanguage
SetErrorMode
GetUserDefaultLCID
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindFirstFileExW
GetDriveTypeW
LocalReAlloc
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
GetTimeZoneInformation
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
IsValidLocale
LCMapStringW
GetStdHandle
GetFileType
SetStdHandle
HeapQueryInformation
VirtualQuery
GetSystemInfo
GetCommandLineA
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
RtlUnwind
GetCPInfo
LCMapStringEx
GetStringTypeW
OutputDebugStringW
GlobalHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GlobalReAlloc
DuplicateHandle
UnlockFile
SetEndOfFile
LockFile
GetVolumeInformationW
FlushFileBuffers
GetThreadLocale
GetPrivateProfileIntW
SuspendThread
GlobalFindAtomW
GlobalAddAtomW
GlobalDeleteAtom
LoadLibraryExW
GetSystemDirectoryW
EncodePointer
OutputDebugStringA
GetACP
InitializeCriticalSectionEx
OpenEventW
OpenMutexW
CreateMutexW
GlobalFree
lstrlenA
ExitProcess
CompareStringW
EnumResourceLanguagesW
EnumResourceTypesW
EnumResourceNamesW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
GetPrivateProfileStringW
GlobalGetAtomNameW
lstrcmpA
ResumeThread
SetThreadPriority
CreateThread
CreateDirectoryW
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
GetModuleHandleA
LocalUnlock
LocalLock
GetVersionExW
VirtualFree
VirtualAlloc
GetWindowsDirectoryW
ExpandEnvironmentStringsW
GlobalLock
GlobalUnlock
GlobalAlloc
SetFilePointer
lstrcatW
lstrcpyW
VirtualProtect
GetNativeSystemInfo
GetVersion
SetUnhandledExceptionFilter
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LocalAlloc
GetModuleFileNameW
GetCurrentThread
GetProcessTimes
FileTimeToLocalFileTime
CompareFileTime
LocalFree
GetTempFileNameW
GetFullPathNameW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
FormatMessageW
SetFileAttributesW
RemoveDirectoryW
IsBadWritePtr
IsBadReadPtr
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
MoveFileExW
SystemTimeToFileTime
GetSystemTime
CreateProcessW
GetExitCodeProcess
GetComputerNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileTime
GetFileAttributesExW
LoadLibraryW
GetLongPathNameW
GetExitCodeThread
GetTickCount
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
RaiseException
DecodePointer
lstrcmpW
SearchPathW
ReadFile
GetFileSize
GetCommandLineW
GetLocalTime
Sleep
GetCurrentDirectoryW
VerifyVersionInfoW
lstrcpynW
MulDiv
VerSetConditionMask
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenW
OpenProcess
TerminateProcess
GetLastError
WideCharToMultiByte
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetUserDefaultUILanguage
GetModuleHandleW
GetCurrentProcess
GetTempPathW
WriteFile
DeleteFileW
MultiByteToWideChar
GetCurrentProcessId
FindResourceW
SizeofResource
LockResource
LoadResource
CreateFileW
TerminateThread
WaitForMultipleObjects
CreateEventW
WaitForSingleObject
ResetEvent
SetEvent
SetLastError
CloseHandle
ReadConsoleW
CopyAcceleratorTableW
LoadAcceleratorsW
IsWindowEnabled
MapVirtualKeyExW
GetKeyNameTextW
GetKeyboardState
IsCharLowerW
CharUpperW
IsIconic
GetKeyboardLayout
GetKeyboardLayoutList
ToUnicodeEx
GetMenuItemCount
GetMenuItemInfoW
GetMenuItemID
SetParent
GetTopWindow
UpdateWindow
LoadMenuW
MapVirtualKeyW
wsprintfW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetDesktopWindow
IntersectRect
InvertRect
LockWindowUpdate
GetDCEx
GetSubMenu
GetCapture
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetCapture
CreateIconIndirect
CreateIconFromResourceEx
LoadBitmapW
TabbedTextOutW
DrawStateW
GrayStringW
DrawTextExW
RegisterClipboardFormatW
ReleaseCapture
GetNextDlgTabItem
GetSysColorBrush
AdjustWindowRectEx
WinHelpW
IsDialogMessageW
LoadIconW
GetWindow
GetLastActivePopup
MessageBeep
RedrawWindow
EndPaint
BeginPaint
DrawIcon
EnableMenuItem
GetSystemMenu
GetAsyncKeyState
GetDialogBaseUnits
CheckDlgButton
CreateDialogIndirectParamW
MoveWindow
DestroyWindow
PostQuitMessage
WaitMessage
PeekMessageW
DispatchMessageW
TranslateMessage
LoadStringW
EnumDisplaySettingsW
FindWindowExW
FindWindowW
DrawFocusRect
IsClipboardFormatAvailable
SetPropW
EnableWindow
GetWindowTextW
WaitForInputIdle
SetWindowLongW
GetWindowLongW
SetFocus
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
BringWindowToTop
SetWindowPos
ShowWindow
CreateWindowExW
DefWindowProcW
GetMessageW
CharLowerBuffW
CharLowerBuffA
FillRect
InsertMenuW
SetWindowTextW
GetDlgItem
CharLowerW
CopyIcon
GetClassNameW
ClientToScreen
KillTimer
MapWindowPoints
IsMenu
IsChild
GetDlgCtrlID
GetWindowRgn
HideCaret
ShowCaret
SetActiveWindow
SetWindowRgn
UnionRect
GetMenuStringW
LookupIconIdFromDirectoryEx
GetCursor
WindowFromPoint
DrawEdge
GetDoubleClickTime
SetTimer
SetForegroundWindow
GetMenuDefaultItem
TrackPopupMenu
IsWindowVisible
UnregisterClassW
GetActiveWindow
EqualRect
IsRectEmpty
SetRectEmpty
GetForegroundWindow
SystemParametersInfoW
SetClassLongW
InflateRect
GetMenu
SetMenu
GetMenuState
GetClassLongW
SetCursorPos
CallWindowProcW
IsWindowUnicode
GetWindowLongA
SetWindowLongA
GetTabbedTextExtentA
MapDialogRect
GetWindowPlacement
SetWindowPlacement
TranslateAcceleratorW
SendDlgItemMessageA
IsZoomed
MessageBoxW
EnumWindows
RegisterWindowMessageW
SendMessageW
PostMessageW
IsWindow
GetFocus
GetKeyState
DrawTextW
InvalidateRect
GetClientRect
SetCursor
GetCursorPos
ScreenToClient
GetSysColor
SetRect
OffsetRect
PtInRect
GetParent
LoadCursorW
DestroyIcon
LoadImageW
DrawIconEx
GetIconInfo
GetSystemMetrics
GetWindowRect
SendMessageTimeoutW
GetWindowThreadProcessId
DrawFrameControl
GetMessagePos
CreatePopupMenu
AppendMenuW
GetDC
ReleaseDC
CopyRect
GetPropW
RemovePropW
GetWindowTextLengthW
MonitorFromWindow
GetMonitorInfoW
SetScrollRange
EndDialog
ShowOwnedPopups
GetWindowDC
CharNextW
DestroyMenu
SetWindowContextHelpId
DrawMenuBar
DefFrameProcW
TranslateMDISysAccel
InsertMenuItemW
UnpackDDElParam
ReuseDDElParam
DeleteMenu
RealChildWindowFromPoint
InvalidateRgn
GetNextDlgGroupItem
PostThreadMessageW
GetScrollPos
ValidateRect
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetMessageTime
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
CheckMenuItem
CombineRgn
CreatePatternBrush
StretchDIBits
Ellipse
GetCharWidthW
GetClipBox
GetClipRgn
GetCurrentPositionEx
GetTextAlign
GetTextExtentPoint32A
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
LineTo
ExtSelectClipRgn
BeginPath
CloseFigure
EndPath
FillPath
StrokeAndFillPath
StrokePath
MoveToEx
PolyBezierTo
OffsetViewportOrgEx
GetRgnBox
GetBkColor
RestoreDC
RealizePalette
SaveDC
SetDIBitsToDevice
ExcludeClipRect
SelectClipRgn
Polyline
SetMapMode
SetTextAlign
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
ScaleViewportExtEx
ScaleWindowExtEx
GetMapMode
SetRectRgn
DPtoLP
CreateFontW
GetViewportOrgEx
GetBitmapBits
ExtCreateRegion
SetBkMode
PtInRegion
CreateRectRgn
GetTextMetricsW
GetTextColor
GetCurrentObject
Polygon
PatBlt
EnumFontFamiliesExW
CreateRectRgnIndirect
ExtTextOutW
TextOutW
CreateDIBSection
SetStretchBltMode
StretchBlt
SetPixel
RectVisible
PtVisible
GetPixel
GetDIBits
Escape
CreateBitmap
BitBlt
SetTextColor
SetBkColor
DeleteDC
CreateDCW
RoundRect
Rectangle
GetStockObject
GetDeviceCaps
CreatePen
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
SelectObject
DeleteObject
GetTextExtentPoint32W
CreateSolidBrush
GradientFill
ClosePrinter
DocumentPropertiesW
OpenPrinterW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueW
RegEnumKeyW
RegEnumValueW
RegEnumKeyExW
RegCloseKey
ConvertSidToStringSidW
IsValidSid
GetTokenInformation
ExtractIconExW
SHGetFileInfoW
CommandLineToArgvW
SHFileOperationW
SHGetPathFromIDListW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
SHGetMalloc
SHGetSpecialFolderLocation
DragQueryFileW
DragFinish
ImageList_Draw
ImageList_AddMasked
_TrackMouseEvent
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_GetImageCount
ImageList_Add
ImageList_DrawEx
ImageList_GetIcon
ImageList_GetIconSize
ImageList_GetImageInfo
InitCommonControlsEx
PathRemoveArgsW
PathUnquoteSpacesW
PathFileExistsW
PathParseIconLocationW
PathIsDirectoryW
StrFormatByteSizeW
PathAddBackslashW
PathRemoveFileSpecW
PathMatchSpecW
PathStripPathW
ord487
PathFindExtensionW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
UrlUnescapeW
IsAppThemed
DrawThemeParentBackground
OpenThemeData
DrawThemeBackground
GetThemePartSize
CloseThemeData
IsThemeBackgroundPartiallyTransparent
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
CoGetClassObject
StgCreateDocfileOnILockBytes
CoFreeUnusedLibraries
OleInitialize
OleUninitialize
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CLSIDFromProgID
CLSIDFromString
CoDisconnectObject
CoInitialize
CoCreateGuid
CoTaskMemAlloc
PropVariantClear
CoTaskMemFree
CoCreateInstance
CoInitializeEx
CoUninitialize
SysAllocString
SysAllocStringLen
SysFreeString
LoadTypeLi
SafeArrayGetElemsize
SafeArrayGetDim
OleCreateFontIndirect
VariantChangeType
VarUdateFromDate
VarBstrFromDate
VarDateFromStr
VariantChangeTypeEx
VariantTimeToSystemTime
SystemTimeToVariantTime
OleLoadPicturePath
SysAllocStringByteLen
SysStringByteLen
SysStringLen
VariantCopy
VariantClear
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayDestroy
OleUIBusyW
OleUIAddVerbMenuW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
GetModuleFileNameExW
EnumProcessModules
GdipGetImageWidth
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipAlloc
GdipFree
GdiplusStartup
GdipCreateBitmapFromHICON
GdipCloneImage
GdipDisposeImage
GdiplusShutdown
GdipGetImageHeight
GdipImageRotateFlip
PlaySoundW
LresultFromObject
CreateStdAccessibleObject
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetSetOptionW
InternetQueryOptionW
InternetQueryDataAvailable
InternetWriteFile
InternetSetFilePointer
InternetReadFile
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
InternetCanonicalizeUrlW
InternetCrackUrlW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Projects\FreeISOCreator\FreeISOCreator\obj\x86\Release\FreeISOCreator.pdb
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\programming\moverator\obj\Release\moverator.pdb
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
GetModuleHandleA
FreeLibrary
RedrawWindow
SetWindowLongA
GetWindowLongA
SendMessageA
GetClientRect
CallNextHookEx
IsWindow
SendMessageTimeoutA
SetWindowsHookExA
GetWindowThreadProcessId
UnhookWindowsHookEx
_DllMain@12
_Install
_UnInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateFileW
GetLocaleInfoW
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
GetCurrentThreadId
FormatMessageW
LocalFree
LocalAlloc
SetLastError
GetLocalTime
InterlockedExchange
InterlockedCompareExchange
WriteFile
EnterCriticalSection
LeaveCriticalSection
GetVersionExW
GetCurrentProcessId
FindNextFileW
GetStartupInfoW
IsBadCodePtr
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetModuleFileNameW
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
IsBadReadPtr
Sleep
CreateEventW
CreateThread
ResumeThread
SetEvent
MultiByteToWideChar
SetErrorMode
GetFileAttributesW
GetLastError
GetModuleHandleW
IsBadStringPtrW
WaitForSingleObject
CloseHandle
FindFirstFileW
FindClose
GetCurrentProcess
FlushInstructionCache
OutputDebugStringW
DebugBreak
lstrlenA
InterlockedIncrement
InterlockedDecrement
CompareStringW
lstrcmpiW
lstrcpyW
lstrlenW
LoadLibraryW
GetProcAddress
FreeLibrary
SetWindowPos
LoadIconW
SetForegroundWindow
GetSubMenu
EnableMenuItem
GetMenuItemID
TrackPopupMenuEx
PostMessageW
DestroyMenu
TrackPopupMenu
DrawFrameControl
CopyRect
InflateRect
LoadBitmapW
LoadMenuW
MessageBoxW
GetActiveWindow
DialogBoxParamW
DeleteMenu
SetCursorPos
GetSystemMetrics
SystemParametersInfoW
GetMenuItemCount
SetMenuItemInfoW
GetSystemMenu
CharUpperW
ShowWindow
FlashWindow
CreatePopupMenu
AppendMenuW
CheckMenuItem
SetMenuDefaultItem
InsertMenuW
CreateDialogParamW
GetWindow
DestroyWindow
GetWindowThreadProcessId
GetSysColorBrush
GetIconInfo
SetWindowTextW
ClientToScreen
GetWindowRect
GetKeyboardLayout
MapWindowPoints
KillTimer
GetMenuStringW
DestroyIcon
RedrawWindow
CallWindowProcW
LoadStringW
wvsprintfW
IsWindowEnabled
GetSysColor
GetFocus
DrawFocusRect
FillRect
CharNextW
GetDlgCtrlID
CreateWindowExW
ReleaseDC
GetDC
GetClientRect
DrawTextW
OffsetRect
GetClassNameW
GetWindowLongW
SetWindowLongW
LoadCursorW
GetWindowTextLengthW
GetWindowTextW
GetCursorPos
ScreenToClient
SetCursor
EndPaint
BeginPaint
GetParent
InvalidateRect
PtInRect
SetFocus
SetCapture
GetCapture
ReleaseCapture
UpdateWindow
IsWindow
DefWindowProcW
SendMessageW
EndDialog
GetKeyboardLayoutList
IsWindowVisible
WindowFromPoint
MessageBeep
SetRectEmpty
DrawIconEx
GetDlgItem
LoadImageW
SetTimer
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
PlaySoundW
GetObjectType
SetBkMode
SetTextColor
DeleteDC
SelectObject
GetStockObject
GetObjectW
CreateFontIndirectW
DeleteObject
CheckTokenMembership
RegQueryValueExW
RegOpenKeyExW
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
OpenProcessToken
RegCloseKey
ImageList_Draw
ImageList_Add
ImageList_Create
ImageList_Destroy
_TrackMouseEvent
UuidFromStringA
??3@YAXPAX@Z
free
malloc
memset
_wtoi
memcpy
??2@YAPAXI@Z
wcslen
iswdigit
_wsplitpath
wcscmp
wcsncpy
wcschr
wcsstr
memmove
_ftol
_wcsicmp
swprintf
_wcsicoll
wcsrchr
_except_handler3
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__set_app_type
__dllonexit
_onexit
_controlfp
__p__fmode
CoInitialize
CoCreateInstance
ShellExecuteW
Shell_NotifyIconW
SysFreeString
SysAllocStringLen
VariantClear
_Install
_UnInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryW
FreeLibrary
RedrawWindow
SetWindowLongW
GetWindowLongW
SendMessageW
GetClientRect
CallNextHookEx
IsWindow
SendMessageTimeoutW
SetWindowsHookExW
GetWindowThreadProcessId
UnhookWindowsHookEx
_DllMain@12
_Install
_UnInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ