Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Overview
overview
10Static
static
10e6184d3b9f...72.exe
windows7-x64
3e6184d3b9f...72.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3CCleaner.exe
windows7-x64
7CCleaner.exe
windows10-2004-x64
1CCleaner64.exe
windows7-x64
CCleaner64.exe
windows10-2004-x64
Static task
static1
Behavioral task
behavioral1
Sample
e6184d3b9f9a0732967e9c5f74be9250ddf68f3a9ce3ce25f00a772b755abd72.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e6184d3b9f9a0732967e9c5f74be9250ddf68f3a9ce3ce25f00a772b755abd72.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
CCleaner.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
CCleaner.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
CCleaner64.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
CCleaner64.exe
Resource
win10v2004-20240419-en
Target
e6184d3b9f9a0732967e9c5f74be9250ddf68f3a9ce3ce25f00a772b755abd72
Size
3.0MB
MD5
960d065556f31be6ddb6d59532eef657
SHA1
a2589b9d44d02bb9d7aa7da50999bc8520bc25b4
SHA256
e6184d3b9f9a0732967e9c5f74be9250ddf68f3a9ce3ce25f00a772b755abd72
SHA512
b708ebff5f22bdddc8713bf7c18f1a87049b4a381b45e6ff225ae5fe238d4322671b531813a75b53f1e91dd0ebc8b65cb0c979c3b33183bbb97e12b9bb9216b3
SSDEEP
49152:768PEzK93vtfyt5iQ2hteZH3yVksQpLa1wSEQaRBuvW7T/lMdPf6aeiDSNmFfNiw:76XqftfiEDjcH3oks6eWgoLlMdPfNei7
resource | yara_rule |
---|---|
static1/unpack001/CCleaner.exe | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
resource | yara_rule |
---|---|
static1/unpack001/CCleaner.exe | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
Checks for missing Authenticode signature.
resource |
---|
e6184d3b9f9a0732967e9c5f74be9250ddf68f3a9ce3ce25f00a772b755abd72 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/inetc.dll |
unpack001/$PLUGINSDIR/nsDialogs.dll |
unpack001/$PLUGINSDIR/nsProcess.dll |
unpack001/CCleaner64.exe |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
ExitProcess
CopyFileW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetFileTime
lstrcpynA
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
CreateProcessW
lstrcmpiA
GetTempFileNameW
lstrcatW
LoadLibraryW
GetSystemDirectoryW
GetProcAddress
OpenProcess
lstrcpyW
LoadLibraryA
GetVersionExW
lstrcpyA
RemoveDirectoryW
lstrcmpA
CloseHandle
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
WideCharToMultiByte
lstrlenA
MulDiv
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
SetErrorMode
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
GetAsyncKeyState
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
DispatchMessageW
PeekMessageW
wvsprintfW
wsprintfA
ExitWindowsEx
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
CheckDlgButton
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
GetClassInfoW
CharNextW
FindWindowExW
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
SendMessageTimeoutW
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectW
SetBkMode
SetTextColor
SelectObject
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
RegOpenKeyExW
RegEnumValueW
RegEnumKeyW
RegCloseKey
SetFileSecurityW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegQueryValueExW
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyW
lstrcpynW
GetProcAddress
WideCharToMultiByte
lstrcatW
lstrlenW
lstrcmpiW
LoadLibraryW
GetModuleHandleW
MultiByteToWideChar
VirtualAlloc
VirtualProtect
FreeLibrary
wsprintfW
CLSIDFromString
StringFromGUID2
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
wcschr
_adjust_fdiv
malloc
_initterm
free
strlen
strchr
strrchr
wcsrchr
wcstoul
memset
wcsstr
wcstol
DeleteFileW
WideCharToMultiByte
CreateFileA
CreateThread
WaitForSingleObject
TerminateThread
GetModuleHandleW
MulDiv
lstrcpyW
GlobalAlloc
LoadLibraryW
GetProcAddress
lstrcmpiW
lstrlenW
WriteFile
ReadFile
lstrcmpW
lstrcpynW
GetLastError
CreateFileW
GlobalFree
CloseHandle
SleepEx
SetFilePointer
GetTickCount
lstrcatW
GetFileSize
MessageBoxW
GetParent
ShowWindow
SetWindowLongW
IsWindow
SetWindowTextW
SendDlgItemMessageW
GetDlgItem
PostMessageW
GetWindowTextW
SendMessageW
SetDlgItemTextW
SetWindowPos
SystemParametersInfoW
GetClientRect
GetWindowRect
SetTimer
LoadIconW
UpdateWindow
DestroyWindow
KillTimer
RedrawWindow
DispatchMessageW
TranslateMessage
GetMessageW
IsDialogMessageW
IsWindowVisible
EnableWindow
CreateDialogParamW
FindWindowExW
wsprintfA
wsprintfW
GetWindowLongW
HttpSendRequestW
HttpSendRequestExW
HttpQueryInfoW
FtpCreateDirectoryW
FtpOpenFileW
InternetGetLastResponseInfoW
InternetSetFilePointer
InternetSetOptionW
InternetQueryOptionW
HttpAddRequestHeadersA
InternetCloseHandle
InternetErrorDlg
HttpOpenRequestW
HttpAddRequestHeadersW
HttpEndRequestW
InternetConnectW
InternetCrackUrlW
InternetOpenW
InternetReadFile
InternetWriteFile
ord17
get
head
post
put
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
MulDiv
lstrlenW
HeapFree
GetProcessHeap
lstrcmpiW
HeapReAlloc
lstrcpynW
GetFileAttributesW
lstrcpyW
GetCurrentDirectoryW
SetCurrentDirectoryW
HeapAlloc
GlobalFree
LoadCursorW
RemovePropW
DrawFocusRect
GetPropW
DrawTextW
GetWindowTextW
GetDlgItem
SetWindowLongW
SetWindowPos
CreateDialogParamW
MapWindowPoints
GetWindowRect
SetCursor
CreateWindowExW
IsWindow
SetTimer
KillTimer
DispatchMessageW
TranslateMessage
GetMessageW
IsDialogMessageW
ShowWindow
wsprintfW
GetClientRect
CharPrevW
CallWindowProcW
SetPropW
DestroyWindow
MapDialogRect
CharNextW
SendMessageW
GetWindowLongW
SetTextColor
SHGetPathFromIDListW
SHBrowseForFolderW
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
CoTaskMemFree
Create
CreateControl
CreateItem
CreateTimer
GetUserData
KillTimer
OnBack
OnChange
OnClick
OnNotify
SelectFileDialog
SelectFolderDialog
SetRTL
SetUserData
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
OpenProcess
MultiByteToWideChar
lstrlenA
lstrlenW
LoadLibraryA
lstrcmpiW
lstrcpynW
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetVersionExW
GlobalFree
GlobalAlloc
GetWindowThreadProcessId
EnumWindows
wsprintfW
PostMessageW
_CloseProcess
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
H:\Piriform\CCleaner\branches\v5.22\bin\CCleaner\Release\CCleaner.pdb
UuidFromStringA
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetLocalTime
OutputDebugStringA
GetSystemTimeAsFileTime
DeviceIoControl
FindFirstFileW
FindClose
MoveFileW
GetDiskFreeSpaceW
GetVolumeInformationW
SetFilePointerEx
SetEndOfFile
GetFileAttributesExW
SetFileTime
RemoveDirectoryW
CreateDirectoryW
GetDriveTypeW
GetCompressedFileSizeW
BackupRead
BackupSeek
lstrcmpA
GetFullPathNameW
FindNextFileW
WritePrivateProfileStringW
GetShortPathNameW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetUserDefaultLangID
ExpandEnvironmentStringsW
GetEnvironmentVariableW
SetFileAttributesW
GetTempPathW
GetTempFileNameW
CopyFileW
IsBadStringPtrW
GetTickCount
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
LoadLibraryA
SystemTimeToFileTime
MoveFileExW
SetProcessWorkingSetSize
GetComputerNameW
CompareFileTime
LocalAlloc
LocalLock
LocalUnlock
GetDateFormatA
GetTimeFormatA
GetTimeFormatW
GetDateFormatW
GetNumberFormatW
DeleteFileA
GetTempPathA
GetDiskFreeSpaceA
CreateFileMappingA
LockFileEx
HeapValidate
GetFileAttributesA
UnlockFileEx
OutputDebugStringW
LockFile
UnlockFile
GetFullPathNameA
GetThreadTimes
SetEnvironmentVariableA
CreateFileA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
RtlUnwind
GetLogicalDrives
IsDebuggerPresent
UnhandledExceptionFilter
GetStdHandle
GetFileType
WriteConsoleW
HeapSetInformation
ExitProcess
ExitThread
VirtualProtect
AreFileApisANSI
FormatMessageA
CreateWaitableTimerA
WaitForMultipleObjectsEx
TlsSetValue
OpenEventA
WaitForSingleObjectEx
SetWaitableTimer
TlsGetValue
TlsFree
TlsAlloc
GetModuleHandleA
InterlockedPopEntrySList
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetLocaleInfoW
VerifyVersionInfoW
VerSetConditionMask
GlobalMemoryStatus
GetVersionExA
WaitForMultipleObjects
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
CreateThread
CreateSemaphoreW
ReleaseSemaphore
TerminateThread
VirtualQueryEx
SetUnhandledExceptionFilter
RtlCaptureContext
GetSystemTime
ResumeThread
SuspendThread
GetCurrentProcessId
GetThreadPriority
GetSystemInfo
OpenThread
VirtualProtectEx
VirtualAlloc
SetThreadPriority
InitializeCriticalSection
VirtualFree
GetCurrentThread
VirtualQuery
GetThreadContext
lstrlenA
GlobalHandle
lstrcmpW
GetDiskFreeSpaceExW
GetWindowsDirectoryW
GetProcessTimes
GetLongPathNameW
SetFilePointer
GetFileSize
ReadFile
GetVersion
CompareStringW
lstrcpyW
GetPrivateProfileStringW
DeleteFileW
LocalFree
FormatMessageW
lstrcpynW
GetVersionExW
MulDiv
SetCurrentDirectoryW
GetCurrentDirectoryW
QueryPerformanceCounter
QueryPerformanceFrequency
GetCommandLineW
CreateProcessW
GetStartupInfoW
LoadLibraryW
GetSystemDirectoryW
SetErrorMode
InterlockedIncrement
InterlockedDecrement
LoadLibraryExW
lstrcmpiW
FreeLibrary
WriteFile
FlushFileBuffers
GetFileAttributesW
WideCharToMultiByte
CreateMutexW
lstrlenW
GetProcAddress
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetLastError
RaiseException
GetCurrentThreadId
GetModuleFileNameW
GetModuleHandleW
CreateEventA
CloseHandle
HeapAlloc
HeapFree
GetProcessHeap
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
InterlockedExchange
ResetEvent
SetEvent
CreateEventW
CreateFileW
Sleep
GetLastError
OpenProcess
TerminateProcess
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
FlushInstructionCache
GetCurrentProcess
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateFileMappingW
MapDialogRect
SetWindowContextHelpId
SendDlgItemMessageW
DestroyAcceleratorTable
wsprintfW
GetForegroundWindow
GetDlgItemInt
GetNextDlgTabItem
SetDlgItemTextW
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
GetShellWindow
GetWindowInfo
SetMenuDefaultItem
LockWindowUpdate
PostQuitMessage
IsDialogMessageW
FindWindowExW
LoadIconW
GetComboBoxInfo
AdjustWindowRectEx
GetMenu
DrawEdge
SetLayeredWindowAttributes
DeleteMenu
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
SetPropW
GetWindowTextLengthW
SetScrollPos
GetScrollInfo
ScrollWindowEx
SetScrollInfo
AppendMenuW
GetScrollPos
InvalidateRgn
CreateAcceleratorTableW
EnableScrollBar
GetPropW
ShowScrollBar
GetScrollRange
SetScrollRange
RemovePropW
DrawFrameControl
GetSystemMetrics
GetMonitorInfoW
MonitorFromWindow
LoadBitmapW
GetWindowPlacement
GetWindowRect
SetWindowPos
GetWindowLongW
GetParent
GetWindow
GetDesktopWindow
GetClientRect
MapWindowPoints
UnregisterClassA
SetWindowLongW
SendMessageW
GetDlgItem
ScreenToClient
MoveWindow
GetDC
ReleaseDC
GetWindowTextW
SetWindowTextW
IsWindow
DefWindowProcW
InvalidateRect
BeginPaint
EndPaint
DrawTextW
OffsetRect
GetClassLongW
DrawFocusRect
DestroyIcon
DrawStateW
GetKeyState
GetMessagePos
CreateDialogParamW
FrameRect
DialogBoxParamW
IsChild
ChildWindowFromPoint
GetSysColor
SetRectEmpty
SetCursorPos
InsertMenuW
SystemParametersInfoA
DrawTextExW
GetMenuItemID
UnregisterClassW
CharLowerW
CharLowerA
GetDlgItemTextW
EmptyClipboard
SetClipboardData
WaitForInputIdle
EnumDisplaySettingsW
ExitWindowsEx
GetLastInputInfo
SendMessageTimeoutW
GetAsyncKeyState
GetNextDlgGroupItem
DestroyCursor
GetLastActivePopup
MessageBeep
DrawIcon
GetDialogBaseUnits
LoadStringW
WinHelpW
WaitMessage
CreateDialogIndirectParamW
GetCursorPos
CreatePopupMenu
MsgWaitForMultipleObjects
IsWindowUnicode
GetMessageA
DispatchMessageA
EnableMenuItem
EnableWindow
BringWindowToTop
UpdateWindow
GetFocus
GetWindowDC
MessageBoxW
PeekMessageW
GetMessageW
GetActiveWindow
PostMessageW
EndDialog
GetDlgCtrlID
PtInRect
RedrawWindow
TrackMouseEvent
GetSystemMenu
TrackPopupMenu
SetForegroundWindow
IsZoomed
SystemParametersInfoW
InflateRect
LoadImageW
CallWindowProcW
ShowWindow
KillTimer
SetTimer
DestroyWindow
FillRect
GetSysColorBrush
ClientToScreen
RegisterWindowMessageW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
DestroyMenu
CopyRect
IsWindowEnabled
CheckDlgButton
IsDlgButtonChecked
GetClassNameW
IsWindowVisible
OpenIcon
FindWindowW
EnumWindows
IsIconic
SetFocus
SetRect
GetCapture
SetCapture
WindowFromPoint
ReleaseCapture
SetCursor
CharNextW
TranslateMessage
DispatchMessageW
RegisterClassW
GetClassInfoW
GetWindowThreadProcessId
SelectClipRgn
GetBkColor
GetTextColor
CreateRectRgnIndirect
CombineRgn
ExcludeClipRect
GetTextMetricsW
GetTextExtentPoint32W
GetClipBox
CreatePatternBrush
CreateBitmap
PatBlt
GetStockObject
SaveDC
SetDIBColorTable
Rectangle
SelectObject
SetViewportOrgEx
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
BitBlt
GetDeviceCaps
SetBkMode
GetObjectW
CreateSolidBrush
SetBkColor
ExtTextOutW
SetTextColor
RestoreDC
CreatePen
MoveToEx
LineTo
Ellipse
PolylineTo
UnrealizeObject
GetClipRgn
BeginPath
EndPath
StrokeAndFillPath
CreateRectRgn
CreateDCW
CreateFontIndirectW
StretchBlt
CreateDIBSection
GetDIBColorTable
DeleteDC
TextOutW
GetSaveFileNameW
GetOpenFileNameW
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
ConvertSidToStringSidW
CloseEventLog
ClearEventLogW
OpenEventLogW
LookupPrivilegeNameW
RegUnLoadKeyW
RegLoadKeyW
RegNotifyChangeKeyValue
GetUserNameW
LookupAccountNameW
CopySid
GetLengthSid
LookupAccountSidW
EqualSid
OpenThreadToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
RegEnumValueW
AccessCheck
MapGenericMask
DuplicateToken
GetFileSecurityW
SetNamedSecurityInfoW
SetEntriesInAclW
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
FreeSid
CryptGenRandom
SHGetPathFromIDListW
SHBrowseForFolderW
DragQueryFileW
DragFinish
ShellExecuteExW
Shell_NotifyIconW
SHGetSpecialFolderLocation
ExtractIconExW
SHGetFileInfoW
SHEmptyRecycleBinW
SHAddToRecentDocs
ShellExecuteW
CoInitializeEx
PropVariantClear
CoSetProxyBlanket
OleLockRunning
StringFromGUID2
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoInitializeSecurity
DoDragDrop
RegisterDragDrop
RevokeDragDrop
OleDuplicateData
ReleaseStgMedium
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
SysFreeString
VarUI4FromStr
SysAllocString
VariantClear
VariantInit
SysStringLen
SysAllocStringLen
LoadRegTypeLi
LoadTypeLi
DispCallFunc
OleCreateFontIndirect
VarBstrFromR8
VarBstrFromI4
VariantChangeType
VariantTimeToSystemTime
PathIsDirectoryEmptyW
PathRemoveExtensionA
PathRemoveExtensionW
PathAddExtensionW
PathStripToRootW
PathSkipRootW
PathRemoveBackslashW
PathCombineW
PathCompactPathW
PathRemoveFileSpecW
PathIsDirectoryW
PathAppendW
PathFileExistsW
PathMatchSpecW
PathFindExtensionW
PathUnquoteSpacesW
PathStripPathW
SHStrDupW
PathIsURLW
PathCreateFromUrlW
PathStripPathA
PathIsUNCW
PathIsRelativeW
PathFindFileNameW
ord487
StrRetToStrW
PathRemoveArgsW
PathGetDriveNumberW
ImageList_Destroy
ImageList_Draw
ImageList_LoadImageW
ImageList_Add
ImageList_Create
_TrackMouseEvent
ImageList_Remove
ImageList_SetIconSize
ImageList_Duplicate
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_GetIconSize
InitCommonControlsEx
GdipCreateBitmapFromFile
GdipDrawPieI
GdipFillPieI
GdipCreateHatchBrush
GdipDrawRectangleI
GdipDeletePen
GdipCreatePen1
GdipIsVisiblePathPointI
GdipAddPathPieI
GdipSetSmoothingMode
GdipCreateFromHDC
GdipFillRectangleI
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipDeletePath
GdipCreatePath
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImagePaletteSize
GdipGetImagePalette
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipCloneImage
GdipAlloc
GdipFree
GdipDisposeImage
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipDrawImageI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ