DelayButton
Free
Overview
overview
10Static
static
7044c89deee...18.exe
windows7-x64
7044c89deee...18.exe
windows10-2004-x64
7$PLUGINSDIR/delay.dll
windows7-x64
3$PLUGINSDIR/delay.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/nsWeb.dll
windows7-x64
3$PLUGINSDIR/nsWeb.dll
windows10-2004-x64
3$PLUGINSDIR/nsweb.dll
windows7-x64
3$PLUGINSDIR/nsweb.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDIR/time.dll
windows7-x64
3$PLUGINSDIR/time.dll
windows10-2004-x64
3$PROGRAM_F...ta.dll
windows7-x64
7$PROGRAM_F...ta.dll
windows10-2004-x64
7$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...52.exe
windows7-x64
8$PROGRAM_F...52.exe
windows10-2004-x64
8Lang2052.exe
windows7-x64
8Lang2052.exe
windows10-2004-x64
8file,diz.exe
windows7-x64
10file,diz.exe
windows10-2004-x64
10pg2.exe
windows7-x64
1pg2.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
044c89deeeb8702d9e7d6a8c13675a88_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
044c89deeeb8702d9e7d6a8c13675a88_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/delay.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/delay.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/installoptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/installoptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/killprocdll.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/killprocdll.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsweb.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsweb.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/startmenu.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/startmenu.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/system.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/system.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/textreplace.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/textreplace.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/time.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/time.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PROGRAM_FILES/Baidu/bar/TempData.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
$PROGRAM_FILES/Baidu/bar/TempData.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PROGRAM_FILES/Baidu/bar/baidubar.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
$PROGRAM_FILES/Baidu/bar/baidubar.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
Lang2052.exe
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
Lang2052.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
file,diz.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
file,diz.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
pg2.exe
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
pg2.exe
Resource
win10v2004-20240508-en
Target
044c89deeeb8702d9e7d6a8c13675a88_JaffaCakes118
Size
1.5MB
MD5
044c89deeeb8702d9e7d6a8c13675a88
SHA1
66d9f40590ed19af2fac0f2a9dfbe20eaa1db0e4
SHA256
6de5093e6e65d25cd2b810da839168167b46d10e850ff25ccf0768ceb652fca8
SHA512
e02fbaf038391df2eb14d6ef67f68f26a8c07a74b951e9291043983b92c288ffd0fee1cc3568ead006f08113f092f04aedf6061423a2af923f975c17da7667d0
SSDEEP
24576:Mikhaw92oZpMe6tgu54sEzpoiqU/BRhRnLR3tt1e+er4XkLy0Zlq8HHRriUoVV/:MFhauZGeUgu54tqOB7Bj2+er4XS9n6v/
resource | yara_rule |
---|---|
static1/unpack001/pgfix.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
044c89deeeb8702d9e7d6a8c13675a88_JaffaCakes118 |
unpack001/$PLUGINSDIR/delay.dll |
unpack001/$PLUGINSDIR/installoptions.dll |
unpack001/$PLUGINSDIR/killprocdll.dll |
unpack001/$PLUGINSDIR/nsWeb.dll |
unpack001/$PLUGINSDIR/nsweb.dll |
unpack001/$PLUGINSDIR/startmenu.dll |
unpack001/$PLUGINSDIR/system.dll |
unpack001/$PLUGINSDIR/textreplace.dll |
unpack001/$PLUGINSDIR/time.dll |
unpack001/$PROGRAM_FILES/Baidu/bar/TempData.KGB |
unpack001/$PROGRAM_FILES/Baidu/bar/baidubar.dll |
unpack001/$PROGRAM_FILES_COMMON/NSISLog/Lang2052.DAT |
unpack001/Lang2052.DAT |
unpack001/file,diz.thx |
unpack001/pg2.exe |
unpack001/pgfilter.sys |
unpack001/pgfix.exe |
unpack001/uninst.exe |
unpack002/$PLUGINSDIR/killprocdll.dll |
unpack002/$PROGRAM_FILES/Baidu/bar/TempData.KGB |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
Sleep
CloseHandle
GetWindowTextLengthA
EnableWindow
wsprintfA
SetWindowTextA
GetWindowTextA
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xlen@std@@YAXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
atoi
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
_beginthreadex
??2@YAPAXI@Z
__CxxFrameHandler
free
DelayButton
Free
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
CloseHandle
OpenProcess
FreeLibrary
LoadLibraryA
GetProcAddress
GetVersionExA
GlobalFree
lstrcpyA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
RtlUnwind
GetCPInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
KillProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GlobalFree
lstrcpyA
GlobalAlloc
MapWindowPoints
GetWindowRect
SendMessageA
PostMessageA
MoveWindow
GetDlgItem
GetWindowLongA
GetClientRect
SetWindowLongA
ShowWindow
UpdateWindow
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogParamA
CallWindowProcA
OleInitialize
OleUninitialize
OleSetContainedObject
OleCreate
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
VariantInit
SafeArrayAccessData
CreateURLMoniker
InternetAttemptConnect
IsInet
ShowHTMLInPage
ShowWebInPage
ShowWebInPopUp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GlobalFree
lstrcpyA
GlobalAlloc
MapWindowPoints
GetWindowRect
SendMessageA
PostMessageA
MoveWindow
GetDlgItem
GetWindowLongA
GetClientRect
SetWindowLongA
ShowWindow
UpdateWindow
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogParamA
CallWindowProcA
OleInitialize
OleUninitialize
OleSetContainedObject
OleCreate
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
VariantInit
SafeArrayAccessData
CreateURLMoniker
InternetAttemptConnect
IsInet
ShowHTMLInPage
ShowWebInPage
ShowWebInPopUp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
GlobalAlloc
MulDiv
GetModuleHandleA
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
lstrcmpiA
lstrcatA
lstrcpyA
GetMessageA
IsDialogMessageA
PostMessageA
CallWindowProcA
TranslateMessage
CheckDlgButton
ShowWindow
LoadIconA
GetClientRect
MoveWindow
ScreenToClient
GetWindowRect
ReleaseDC
GetDC
EnableWindow
SetWindowTextA
SendMessageA
GetWindowTextA
IsDlgButtonChecked
DispatchMessageA
DestroyWindow
GetDlgItem
CreateDialogParamA
SetWindowLongA
wsprintfA
GetWindowLongA
GetTextMetricsA
SelectObject
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Init
Select
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
lstrcmpiA
lstrcatA
lstrcpynA
lstrcmpA
lstrlenA
GlobalFree
CloseHandle
ReadFile
GlobalAlloc
GetFileSize
CreateFileA
WriteFile
SetFileAttributesA
GetFileAttributesA
CopyFileA
CharUpperA
FILLREADBUFFER
FREEREADBUFFER
FindInFile
ReplaceInFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
lstrcpynA
GlobalFree
lstrcpyA
lstrcmpA
GetSystemTime
GetLocalTime
SetSystemTime
SetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
CloseHandle
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
CreateFileA
lstrcatA
SendMessageA
wsprintfA
GETFILETIME
GETFILETIMEUTC
GETLOCALTIME
GETLOCALTIMEUTC
MATHTIME
SETFILETIME
SETFILETIMEUTC
SETLOCALTIME
SETLOCALTIMEUTC
TIMESTRING
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileExA
WritePrivateProfileStringA
WritePrivateProfileSectionA
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetVersionExA
DeviceIoControl
GetTickCount
Sleep
GetFileAttributesA
SetFilePointer
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
CopyFileA
GetPrivateProfileSectionNamesA
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
GetVolumeInformationA
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GlobalFree
GlobalAlloc
ResumeThread
CreateFileA
RemoveDirectoryA
CreateDirectoryA
GetTempFileNameA
DeleteFileA
GetTempPathA
LoadLibraryA
lstrcatA
lstrcpyA
lstrcpynA
HeapDestroy
IsDBCSLeadByte
FindResourceA
lstrcmpiA
LoadLibraryExA
FreeLibrary
LoadResource
SizeofResource
GetPrivateProfileSectionA
SetErrorMode
GetModuleFileNameW
SetLastError
DebugBreak
OutputDebugStringA
lstrlenA
InterlockedIncrement
lstrcpyW
MultiByteToWideChar
WriteFile
CloseHandle
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
GetLastError
WideCharToMultiByte
CreateThread
WriteProcessMemory
GetCurrentProcess
lstrlenW
InterlockedDecrement
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
GetVersion
LoadLibraryW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
DisableThreadLibraryCalls
GetShortPathNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetSystemDirectoryA
GetWindowsDirectoryA
InitializeCriticalSection
DeleteCriticalSection
GetSubMenu
DialogBoxParamA
GetClientRect
DestroyWindow
GetFocus
SetFocus
UnhookWindowsHookEx
SetWindowsHookExA
CreateWindowExA
wsprintfA
LoadCursorA
UpdateWindow
GetClassInfoExA
BeginPaint
MessageBoxA
CharUpperA
EnableWindow
SendMessageA
CharNextA
IsWindowVisible
SetRectEmpty
DefWindowProcA
DestroyIcon
GetWindow
GetParent
GetWindowTextA
MoveWindow
ScreenToClient
GetWindowRect
DrawIconEx
CopyRect
SetCursor
LoadIconA
CallWindowProcA
PtInRect
IsRectEmpty
DispatchMessageA
TranslateMessage
GetKeyState
SetWindowPos
GetSysColor
OffsetRect
InflateRect
DrawTextA
FillRect
EndDialog
ShowWindow
SetWindowTextA
IsWindow
GetDlgItem
RegisterClassExA
InvalidateRect
SetWindowLongA
GetWindowLongA
EndPaint
wvsprintfA
SetRect
LoadStringA
CharLowerA
CheckMenuItem
EnableMenuItem
GetAsyncKeyState
CallNextHookEx
GetActiveWindow
PostMessageA
FindWindowExA
ReleaseDC
SetCapture
SystemParametersInfoA
GetDesktopWindow
FindWindowA
AdjustWindowRect
GetCursorPos
MapWindowPoints
CharNextW
LoadImageA
GetMenuStringA
LoadMenuA
GetClassInfoA
ReleaseCapture
SetForegroundWindow
RedrawWindow
SetTimer
GetDC
CreatePopupMenu
InsertMenuA
TrackPopupMenu
DestroyMenu
CheckMenuRadioItem
LoadBitmapA
KillTimer
DeleteDC
LineTo
MoveToEx
DeleteObject
CreatePen
GetStockObject
SelectObject
SetBkMode
CreateSolidBrush
SetBkColor
GetObjectA
IntersectClipRect
CreateFontIndirectA
Rectangle
SetPixelV
SetTextColor
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
TextOutA
CreateBitmap
EnumDependentServicesA
GetUserNameA
RegSetKeySecurity
RegEnumKeyA
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
RegCloseKey
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
QueryServiceStatus
ChangeServiceConfigA
CloseServiceHandle
RegCreateKeyA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderPathA
CoTaskMemRealloc
CoInitialize
OleUninitialize
OleInitialize
CoTaskMemFree
RevokeDragDrop
ReleaseStgMedium
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
RegisterDragDrop
CoUninitialize
VariantChangeType
VarUI4FromStr
SysStringByteLen
VariantInit
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
CreateErrorInfo
SysAllocString
VariantClear
SysAllocStringLen
SysFreeString
VariantCopy
GetErrorInfo
SetErrorInfo
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
StrStrIA
CoInternetGetSession
_stricmp
_purecall
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_fullpath
_endthreadex
_mbsnbcmp
_memicmp
_beginthread
_endthread
_local_unwind2
printf
tolower
strncat
fgets
_vsnprintf
_CxxThrowException
atol
fwrite
wcsstr
strcmp
fseek
ftell
toupper
isxdigit
isalnum
abs
_mbsnbcpy
_beginthreadex
localtime
_mbsicmp
fread
_mbsrchr
_mbstok
malloc
_wcsicmp
fopen
fputs
fclose
_except_handler3
_strnicmp
strncpy
_strlwr
strstr
wcscmp
memset
strrchr
strcat
_stat
_snprintf
time
srand
rand
sprintf
strcpy
strchr
strlen
_mbschr
_ismbcspace
_mbsnbicmp
memcmp
free
memmove
_mbscmp
realloc
??2@YAPAXI@Z
memcpy
atoi
_ismbcdigit
wcslen
??3@YAXPAX@Z
__CxxFrameHandler
_mbsstr
_wcsnicmp
_strcmpi
HttpSendRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetSetFilePointer
HttpQueryInfoA
FindNextUrlCacheEntryA
HttpOpenRequestA
InternetConnectA
GetUrlCacheEntryInfoA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheGroup
DeleteUrlCacheGroup
FindFirstUrlCacheGroup
SetupIterateCabinetA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetNetworkParams
gethostname
gethostbyname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileExA
WritePrivateProfileStringA
WritePrivateProfileSectionA
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetVersionExA
DeviceIoControl
GetTickCount
Sleep
GetFileAttributesA
SetFilePointer
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
CopyFileA
GetPrivateProfileSectionNamesA
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
GetVolumeInformationA
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GlobalFree
GlobalAlloc
ResumeThread
CreateFileA
RemoveDirectoryA
CreateDirectoryA
GetTempFileNameA
DeleteFileA
GetTempPathA
LoadLibraryA
lstrcatA
lstrcpyA
lstrcpynA
HeapDestroy
IsDBCSLeadByte
FindResourceA
lstrcmpiA
LoadLibraryExA
FreeLibrary
LoadResource
SizeofResource
GetPrivateProfileSectionA
SetErrorMode
GetModuleFileNameW
SetLastError
DebugBreak
OutputDebugStringA
lstrlenA
InterlockedIncrement
lstrcpyW
MultiByteToWideChar
WriteFile
CloseHandle
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
GetLastError
WideCharToMultiByte
CreateThread
WriteProcessMemory
GetCurrentProcess
lstrlenW
InterlockedDecrement
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
GetVersion
LoadLibraryW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
DisableThreadLibraryCalls
GetShortPathNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetSystemDirectoryA
GetWindowsDirectoryA
InitializeCriticalSection
DeleteCriticalSection
GetSubMenu
DialogBoxParamA
GetClientRect
DestroyWindow
GetFocus
SetFocus
UnhookWindowsHookEx
SetWindowsHookExA
CreateWindowExA
wsprintfA
LoadCursorA
UpdateWindow
GetClassInfoExA
BeginPaint
MessageBoxA
CharUpperA
EnableWindow
SendMessageA
CharNextA
IsWindowVisible
SetRectEmpty
DefWindowProcA
DestroyIcon
GetWindow
GetParent
GetWindowTextA
MoveWindow
ScreenToClient
GetWindowRect
DrawIconEx
CopyRect
SetCursor
LoadIconA
CallWindowProcA
PtInRect
IsRectEmpty
DispatchMessageA
TranslateMessage
GetKeyState
SetWindowPos
GetSysColor
OffsetRect
InflateRect
DrawTextA
FillRect
EndDialog
ShowWindow
SetWindowTextA
IsWindow
GetDlgItem
RegisterClassExA
InvalidateRect
SetWindowLongA
GetWindowLongA
EndPaint
wvsprintfA
SetRect
LoadStringA
CharLowerA
CheckMenuItem
EnableMenuItem
GetAsyncKeyState
CallNextHookEx
GetActiveWindow
PostMessageA
FindWindowExA
ReleaseDC
SetCapture
SystemParametersInfoA
GetDesktopWindow
FindWindowA
AdjustWindowRect
GetCursorPos
MapWindowPoints
CharNextW
LoadImageA
GetMenuStringA
LoadMenuA
GetClassInfoA
ReleaseCapture
SetForegroundWindow
RedrawWindow
SetTimer
GetDC
CreatePopupMenu
InsertMenuA
TrackPopupMenu
DestroyMenu
CheckMenuRadioItem
LoadBitmapA
KillTimer
DeleteDC
LineTo
MoveToEx
DeleteObject
CreatePen
GetStockObject
SelectObject
SetBkMode
CreateSolidBrush
SetBkColor
GetObjectA
IntersectClipRect
CreateFontIndirectA
Rectangle
SetPixelV
SetTextColor
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
TextOutA
CreateBitmap
EnumDependentServicesA
GetUserNameA
RegSetKeySecurity
RegEnumKeyA
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
RegCloseKey
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
QueryServiceStatus
ChangeServiceConfigA
CloseServiceHandle
RegCreateKeyA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderPathA
CoTaskMemRealloc
CoInitialize
OleUninitialize
OleInitialize
CoTaskMemFree
RevokeDragDrop
ReleaseStgMedium
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
RegisterDragDrop
CoUninitialize
VariantChangeType
VarUI4FromStr
SysStringByteLen
VariantInit
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
CreateErrorInfo
SysAllocString
VariantClear
SysAllocStringLen
SysFreeString
VariantCopy
GetErrorInfo
SetErrorInfo
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
StrStrIA
CoInternetGetSession
_stricmp
_purecall
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_fullpath
_endthreadex
_mbsnbcmp
_memicmp
_beginthread
_endthread
_local_unwind2
printf
tolower
strncat
fgets
_vsnprintf
_CxxThrowException
atol
fwrite
wcsstr
strcmp
fseek
ftell
toupper
isxdigit
isalnum
abs
_mbsnbcpy
_beginthreadex
localtime
_mbsicmp
fread
_mbsrchr
_mbstok
malloc
_wcsicmp
fopen
fputs
fclose
_except_handler3
_strnicmp
strncpy
_strlwr
strstr
wcscmp
memset
strrchr
strcat
_stat
_snprintf
time
srand
rand
sprintf
strcpy
strchr
strlen
_mbschr
_ismbcspace
_mbsnbicmp
memcmp
free
memmove
_mbscmp
realloc
??2@YAPAXI@Z
memcpy
atoi
_ismbcdigit
wcslen
??3@YAXPAX@Z
__CxxFrameHandler
_mbsstr
_wcsnicmp
_strcmpi
HttpSendRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetSetFilePointer
HttpQueryInfoA
FindNextUrlCacheEntryA
HttpOpenRequestA
InternetConnectA
GetUrlCacheEntryInfoA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheGroup
DeleteUrlCacheGroup
FindFirstUrlCacheGroup
SetupIterateCabinetA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetNetworkParams
gethostname
gethostbyname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrcatA
GetLastError
lstrcpynA
lstrcmpiA
WinExec
GetModuleFileNameA
TerminateProcess
lstrlenA
LoadLibraryA
WritePrivateProfileStringA
GetModuleHandleA
GetVersion
WriteFile
MoveFileExA
GetSystemDirectoryA
CreateFileA
DeviceIoControl
DeleteFileA
GetVersionExA
GetCurrentProcess
CloseHandle
GetTempPathA
GetProcAddress
GlobalAlloc
FreeLibrary
LoadLibraryExA
GetSystemDefaultLangID
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetOEMCP
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringA
GetEnvironmentStrings
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetCPInfo
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualFree
LCMapStringW
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
ExitWindowsEx
wsprintfA
MessageBoxA
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
OpenSCManagerA
CreateServiceA
StartServiceA
ControlService
OpenServiceA
OpenProcessToken
LookupPrivilegeValueA
DeleteService
RegDeleteKeyA
RegEnumKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrcatA
GetLastError
lstrcpynA
lstrcmpiA
WinExec
GetModuleFileNameA
TerminateProcess
lstrlenA
LoadLibraryA
WritePrivateProfileStringA
GetModuleHandleA
GetVersion
WriteFile
MoveFileExA
GetSystemDirectoryA
CreateFileA
DeviceIoControl
DeleteFileA
GetVersionExA
GetCurrentProcess
CloseHandle
GetTempPathA
GetProcAddress
GlobalAlloc
FreeLibrary
LoadLibraryExA
GetSystemDefaultLangID
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetOEMCP
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringA
GetEnvironmentStrings
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetCPInfo
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualFree
LCMapStringW
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
ExitWindowsEx
wsprintfA
MessageBoxA
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
OpenSCManagerA
CreateServiceA
StartServiceA
ControlService
OpenServiceA
OpenProcessToken
LookupPrivilegeValueA
DeleteService
RegDeleteKeyA
RegEnumKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
MessageBoxA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
GetStringTypeW
DefWindowProcA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExFreePoolWithTag
RtlInitUnicodeString
IoDeleteDevice
KeInitializeEvent
IoGetDeviceObjectPointer
IofCompleteRequest
IoDeleteSymbolicLink
IoCreateSymbolicLink
ObfDereferenceObject
IoCreateDevice
KeInitializeSpinLock
IofCallDriver
IoBuildDeviceIoControlRequest
KeWaitForSingleObject
ExAllocatePoolWithTag
memcpy
KfAcquireSpinLock
KfReleaseSpinLock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
CloseHandle
OpenProcess
FreeLibrary
LoadLibraryA
GetProcAddress
GetVersionExA
GlobalFree
lstrcpyA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
RtlUnwind
GetCPInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
KillProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileExA
WritePrivateProfileStringA
WritePrivateProfileSectionA
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetVersionExA
DeviceIoControl
GetTickCount
Sleep
GetFileAttributesA
SetFilePointer
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
CopyFileA
GetPrivateProfileSectionNamesA
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
GetVolumeInformationA
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GlobalFree
GlobalAlloc
ResumeThread
CreateFileA
RemoveDirectoryA
CreateDirectoryA
GetTempFileNameA
DeleteFileA
GetTempPathA
LoadLibraryA
lstrcatA
lstrcpyA
lstrcpynA
HeapDestroy
IsDBCSLeadByte
FindResourceA
lstrcmpiA
LoadLibraryExA
FreeLibrary
LoadResource
SizeofResource
GetPrivateProfileSectionA
SetErrorMode
GetModuleFileNameW
SetLastError
DebugBreak
OutputDebugStringA
lstrlenA
InterlockedIncrement
lstrcpyW
MultiByteToWideChar
WriteFile
CloseHandle
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
GetLastError
WideCharToMultiByte
CreateThread
WriteProcessMemory
GetCurrentProcess
lstrlenW
InterlockedDecrement
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
GetVersion
LoadLibraryW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
DisableThreadLibraryCalls
GetShortPathNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetSystemDirectoryA
GetWindowsDirectoryA
InitializeCriticalSection
DeleteCriticalSection
GetSubMenu
DialogBoxParamA
GetClientRect
DestroyWindow
GetFocus
SetFocus
UnhookWindowsHookEx
SetWindowsHookExA
CreateWindowExA
wsprintfA
LoadCursorA
UpdateWindow
GetClassInfoExA
BeginPaint
MessageBoxA
CharUpperA
EnableWindow
SendMessageA
CharNextA
IsWindowVisible
SetRectEmpty
DefWindowProcA
DestroyIcon
GetWindow
GetParent
GetWindowTextA
MoveWindow
ScreenToClient
GetWindowRect
DrawIconEx
CopyRect
SetCursor
LoadIconA
CallWindowProcA
PtInRect
IsRectEmpty
DispatchMessageA
TranslateMessage
GetKeyState
SetWindowPos
GetSysColor
OffsetRect
InflateRect
DrawTextA
FillRect
EndDialog
ShowWindow
SetWindowTextA
IsWindow
GetDlgItem
RegisterClassExA
InvalidateRect
SetWindowLongA
GetWindowLongA
EndPaint
wvsprintfA
SetRect
LoadStringA
CharLowerA
CheckMenuItem
EnableMenuItem
GetAsyncKeyState
CallNextHookEx
GetActiveWindow
PostMessageA
FindWindowExA
ReleaseDC
SetCapture
SystemParametersInfoA
GetDesktopWindow
FindWindowA
AdjustWindowRect
GetCursorPos
MapWindowPoints
CharNextW
LoadImageA
GetMenuStringA
LoadMenuA
GetClassInfoA
ReleaseCapture
SetForegroundWindow
RedrawWindow
SetTimer
GetDC
CreatePopupMenu
InsertMenuA
TrackPopupMenu
DestroyMenu
CheckMenuRadioItem
LoadBitmapA
KillTimer
DeleteDC
LineTo
MoveToEx
DeleteObject
CreatePen
GetStockObject
SelectObject
SetBkMode
CreateSolidBrush
SetBkColor
GetObjectA
IntersectClipRect
CreateFontIndirectA
Rectangle
SetPixelV
SetTextColor
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
TextOutA
CreateBitmap
EnumDependentServicesA
GetUserNameA
RegSetKeySecurity
RegEnumKeyA
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
RegCloseKey
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
QueryServiceStatus
ChangeServiceConfigA
CloseServiceHandle
RegCreateKeyA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderPathA
CoTaskMemRealloc
CoInitialize
OleUninitialize
OleInitialize
CoTaskMemFree
RevokeDragDrop
ReleaseStgMedium
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
RegisterDragDrop
CoUninitialize
VariantChangeType
VarUI4FromStr
SysStringByteLen
VariantInit
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
CreateErrorInfo
SysAllocString
VariantClear
SysAllocStringLen
SysFreeString
VariantCopy
GetErrorInfo
SetErrorInfo
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
StrStrIA
CoInternetGetSession
_stricmp
_purecall
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_fullpath
_endthreadex
_mbsnbcmp
_memicmp
_beginthread
_endthread
_local_unwind2
printf
tolower
strncat
fgets
_vsnprintf
_CxxThrowException
atol
fwrite
wcsstr
strcmp
fseek
ftell
toupper
isxdigit
isalnum
abs
_mbsnbcpy
_beginthreadex
localtime
_mbsicmp
fread
_mbsrchr
_mbstok
malloc
_wcsicmp
fopen
fputs
fclose
_except_handler3
_strnicmp
strncpy
_strlwr
strstr
wcscmp
memset
strrchr
strcat
_stat
_snprintf
time
srand
rand
sprintf
strcpy
strchr
strlen
_mbschr
_ismbcspace
_mbsnbicmp
memcmp
free
memmove
_mbscmp
realloc
??2@YAPAXI@Z
memcpy
atoi
_ismbcdigit
wcslen
??3@YAXPAX@Z
__CxxFrameHandler
_mbsstr
_wcsnicmp
_strcmpi
HttpSendRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetSetFilePointer
HttpQueryInfoA
FindNextUrlCacheEntryA
HttpOpenRequestA
InternetConnectA
GetUrlCacheEntryInfoA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheGroup
DeleteUrlCacheGroup
FindFirstUrlCacheGroup
SetupIterateCabinetA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetNetworkParams
gethostname
gethostbyname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ