Extended Key Usages
ExtKeyUsageTimeStamping
Overview
overview
7Static
static
3daemon4091-x86.exe
windows7-x64
7daemon4091-x86.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$TEMP/SPTD...86.exe
windows7-x64
1$TEMP/SPTD...86.exe
windows10-2004-x64
1Lang/1033.dll
windows7-x64
1Lang/1033.dll
windows10-2004-x64
1Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
3Plugins/Im...nt.dll
windows10-2004-x64
3Plugins/Im...nt.dll
windows7-x64
1Plugins/Im...nt.dll
windows10-2004-x64
1SetupDTSB.exe
windows7-x64
7SetupDTSB.exe
windows10-2004-x64
7chkupd.exe
windows7-x64
1chkupd.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
daemon4091-x86.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
daemon4091-x86.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$TEMP/SPTDinst-x86.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$TEMP/SPTDinst-x86.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Lang/1033.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Lang/1033.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Plugins/Images/bw5mount.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Plugins/Images/bw5mount.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Plugins/Images/bwtmount.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
Plugins/Images/bwtmount.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
Plugins/Images/ccdmount.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Plugins/Images/ccdmount.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Plugins/Images/cuemount.dll
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
Plugins/Images/cuemount.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Plugins/Images/iszmount.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Plugins/Images/iszmount.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
Plugins/Images/mdsmount.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Plugins/Images/mdsmount.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
Plugins/Images/nrgmount.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
Plugins/Images/nrgmount.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
Plugins/Images/pdimount.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Plugins/Images/pdimount.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Plugins/Images/pfcmount.dll
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
Plugins/Images/pfcmount.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
SetupDTSB.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
SetupDTSB.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
chkupd.exe
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
chkupd.exe
Resource
win10v2004-20240508-en
Target
04bedf3153e7b623ffcad57341bdde17_JaffaCakes118
Size
1.7MB
MD5
04bedf3153e7b623ffcad57341bdde17
SHA1
22a2f22b1443034112945bbf747cf4fccdb22b37
SHA256
09ba812cd5bed18112c7e4d309ed4c4cf954a3cb2f9b320cd2c434d993e48473
SHA512
b9521c95e8a7b5884bbe29d1690f9beac0724393c02f376d15e8c4a53254d69761ac2d13cb9f12a3c681107f439875afbd0f6da0162a3e20c8d256a75ca0dbcb
SSDEEP
49152:BGO4lMYQlMB+jWAIrNtuJJjAKyrauTmzF4UtXry:oOLlMB+LG8JJ7LXBO
Checks for missing Authenticode signature.
resource |
---|
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/setuphlp.dll |
unpack002/Lang/1033.dll |
unpack002/Plugins/Images/bw5mount.dll |
unpack002/Plugins/Images/bwtmount.dll |
unpack002/Plugins/Images/ccdmount.dll |
unpack002/Plugins/Images/cuemount.dll |
unpack002/Plugins/Images/iszmount.dll |
unpack002/Plugins/Images/mdsmount.dll |
unpack002/Plugins/Images/nrgmount.dll |
unpack002/Plugins/Images/pdimount.dll |
unpack002/Plugins/Images/pfcmount.dll |
unpack002/chkupd.exe |
unpack002/cryptapi.dll |
unpack002/pfctoc.dll |
resource | yara_rule |
---|---|
static1/unpack001/daemon4091-x86.exe | nsis_installer_1 |
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetModuleHandleA
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
LoadLibraryA
ExitProcess
GetCurrentProcess
CopyFileA
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
GetTempFileNameA
lstrcpyA
lstrlenA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
RemoveDirectoryA
GlobalFree
MulDiv
GetProcAddress
FreeLibrary
MultiByteToWideChar
DeleteFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
SetWindowTextA
SetTimer
DestroyWindow
CreateDialogParamA
ExitWindowsEx
CharNextA
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
DefWindowProcA
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
OleUninitialize
OleInitialize
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetModuleHandleA
GetPrivateProfileIntA
GlobalAlloc
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
lstrcmpiA
GetDlgCtrlID
GetClientRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
MapWindowPoints
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
SendMessageA
SetWindowTextA
GetWindowTextA
wsprintfA
CharNextA
CreateWindowExA
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CreateEventA
LocalAlloc
lstrcatA
lstrcpyA
GlobalAlloc
GlobalFree
GetLastError
GetCurrentThread
FreeLibrary
GetModuleFileNameA
CreateMutexA
MultiByteToWideChar
LoadLibraryA
GlobalReAlloc
IsDBCSLeadByte
WideCharToMultiByte
GetExitCodeProcess
CreateProcessA
ReleaseMutex
Sleep
SetCurrentDirectoryA
lstrcmpiA
GetCurrentDirectoryA
WaitForSingleObject
CloseHandle
LocalFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetSystemDirectoryA
lstrcmpA
lstrlenA
SetEvent
MessageBoxA
wsprintfA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
EqualSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
FreeSid
OpenProcessToken
OpenThreadToken
RegCloseKey
GetTokenInformation
A0DB34FC6FE35D429A28ADDE5467D4D7
Hlp1
Hlp2
Hlp3
Hlp4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\SPTDinst.pdb
OpenSCManagerA
FreeSid
EqualSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegSetKeySecurity
RegGetKeySecurity
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
CreateServiceA
CloseServiceHandle
OpenServiceA
RegOpenKeyA
GetProcAddress
GetModuleHandleA
LocalFree
CreateMutexA
LocalAlloc
HeapFree
HeapAlloc
GetSystemDirectoryA
CloseHandle
CreateThread
ReleaseMutex
GetTickCount
WaitForSingleObject
GetCommandLineA
VirtualFree
VirtualAlloc
GetProcessHeap
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
LoadLibraryA
GetCurrentThread
GetLastError
GetCurrentProcess
Sleep
HeapReAlloc
UnhandledExceptionFilter
MessageBoxA
EnableWindow
GetDlgItem
SendDlgItemMessageA
SendMessageA
DialogBoxParamA
EndDialog
memmove
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
rand
_fsopen
fwrite
fclose
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_mbsnbicmp
_mbsicmp
_except_handler3
srand
_unlink
memset
CertSetCertificateContextProperty
CertAddEncodedCertificateToStore
CertOpenStore
CertCloseStore
CertFreeCertificateContext
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadReadPtr
MultiByteToWideChar
ImagePluginClose
ImagePluginCreate
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
ImagePluginReadSectors
ImagePluginSetInfo
ImagePluginWriteSectors
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PfcGetToc
PfcFreeToc
WideCharToMultiByte
IsBadReadPtr
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Projects.NET\UInstall\UInstall\Release\UInstall.pdb
LockResource
GetVersionExA
LoadLibraryA
FreeLibrary
GetTempPathA
GetFileAttributesA
GetWindowsDirectoryA
lstrcpyA
CreateDirectoryA
GetLastError
GetCurrentProcessId
DeleteFileA
GetProcAddress
WaitForSingleObject
CloseHandle
CreateFileA
WriteFile
GetModuleFileNameA
lstrlenA
GetTempFileNameA
GetShortPathNameA
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
ResumeThread
GetProcessHeap
RaiseException
lstrcmpiA
GetStringTypeExA
GetThreadLocale
lstrcmpA
FindResourceExA
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
DeleteCriticalSection
InitializeCriticalSection
GetFileSize
LoadResource
MapViewOfFile
CompareStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
lstrcatA
MultiByteToWideChar
OpenProcess
TerminateProcess
lstrlenW
RemoveDirectoryA
lstrcpynA
FileTimeToSystemTime
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
VirtualQuery
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
SizeofResource
FindResourceA
SystemTimeToFileTime
GetLocalTime
GetCommandLineA
CreateFileMappingA
HeapFree
DestroyWindow
PostQuitMessage
CharNextA
wsprintfA
UnregisterClassA
RegisterClassExA
GetClassInfoExA
LoadCursorA
CreateWindowExA
GetSystemMetrics
SendMessageTimeoutA
IsWindow
GetWindowThreadProcessId
FindWindowA
CallWindowProcA
DefWindowProcA
GetWindowLongA
SetWindowLongA
wvsprintfA
CharUpperA
MessageBoxA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
SHGetPathFromIDListA
SHFileOperationA
SHGetMalloc
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderLocation
CoUninitialize
CoInitialize
CoCreateInstance
VarR8FromStr
PathGetArgsA
PathFindFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathFindFileNameA
PathFileExistsA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpSendRequestExA
InternetOpenA
InternetWriteFile
InternetCloseHandle
HttpEndRequestA
InternetReadFile
InternetConnectA
timeGetTime
ord3
ord1
ord2
GetCommandLineA
lstrcmpiA
lstrcpyA
DeleteAtom
GlobalAddAtomA
CreateFileA
DeviceIoControl
GlobalMemoryStatus
GetUserDefaultLCID
GetLocaleInfoA
ExitProcess
GetModuleFileNameA
GetCurrentProcess
GetVersionExA
GetModuleHandleA
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
GetLastError
lstrcmpA
CloseHandle
lstrlenA
lstrcpynA
lstrcatA
GetSystemInfo
GetDesktopWindow
DialogBoxParamA
EndDialog
SetDlgItemTextA
SetWindowPos
GetDlgItem
GetWindowLongA
SetPropA
SetCursor
wsprintfA
IsCharAlphaNumericA
GetSystemMetrics
RemovePropA
SetWindowLongA
CallWindowProcA
GetPropA
ReleaseDC
DrawFocusRect
GetDC
ScreenToClient
GetWindowRect
GetParent
LoadCursorA
SetCapture
SendMessageA
GetClientRect
InvalidateRect
ReleaseCapture
CreateFontIndirectA
SetTextColor
DeleteObject
GetObjectA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ShellExecuteExA
CoUninitialize
CoInitialize
CoCreateGuid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatus
GetProcessHeap
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
VirtualLock
GetProcAddress
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
RtlUnwind
EnterCriticalSection
FreeLibrary
VirtualUnlock
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetLastError
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
InitializeCriticalSection
RaiseException
SetWindowsHookExA
GetActiveWindow
GetCapture
GetClipboardOwner
GetClipboardViewer
GetDesktopWindow
GetFocus
GetInputState
GetMessagePos
GetMessageTime
GetOpenClipboardWindow
GetProcessWindowStation
GetQueueStatus
GetCaretPos
GetCursorPos
CallNextHookEx
UnhookWindowsHookEx
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
f:\PHANTOM\DAEMON\DLLNew\Release\daemon.pdb
CM_Get_Sibling
CM_Get_Device_IDW
CM_Locate_DevNodeW
CM_Get_DevNode_Status
CM_Get_Child
CMP_WaitNoPendingInstallEvents
SetupDiRemoveDevice
SetupDiDeleteDevRegKey
SetupDiGetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoList
SetupDiOpenDeviceInfoW
SetupDiDestroyDeviceInfoList
SetupDiSetClassInstallParamsA
SetupDiSetSelectedDevice
LeaveCriticalSection
CloseHandle
LocalFree
CreateMutexA
LocalAlloc
LoadLibraryW
FormatMessageW
FreeLibrary
GetProcAddress
GetModuleFileNameW
GetModuleFileNameA
EnterCriticalSection
GetPrivateProfileIntW
GetPrivateProfileStringW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetModuleHandleA
LoadLibraryExW
SetCurrentDirectoryW
GetCurrentDirectoryW
ReleaseMutex
WaitForSingleObject
MultiByteToWideChar
GetLastError
GetLocaleInfoA
WideCharToMultiByte
GetCurrentThreadId
OutputDebugStringA
Sleep
GetTimeZoneInformation
FlushFileBuffers
SetEndOfFile
HeapSize
CompareStringA
IsBadReadPtr
InterlockedExchange
LoadLibraryA
RaiseException
GetFullPathNameW
RemoveDirectoryW
CreateDirectoryW
SetEnvironmentVariableW
FindFirstFileW
FindNextFileW
MoveFileW
GetFullPathNameA
RemoveDirectoryA
CreateDirectoryA
GetDriveTypeA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFilePointer
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
MoveFileA
DeleteFileA
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
HeapFree
HeapAlloc
RtlUnwind
GetCommandLineA
GetVersionExA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
CreateFileA
CreateFileW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
CompareStringW
BroadcastSystemMessageA
RegisterWindowMessageA
MessageBoxA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
CheckTokenMembership
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
RegDeleteKeyW
FreeSid
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetCurrentProcess
SetLastError
OutputDebugStringA
WaitForMultipleObjects
FreeLibrary
InitializeCriticalSectionAndSpinCount
ReleaseMutex
WaitForSingleObject
CreateThread
GetCommandLineW
InterlockedExchange
CompareStringA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetLogicalDrives
CreateFileA
GetTimeZoneInformation
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
GetExitCodeProcess
GetLocaleInfoA
GetStringTypeA
LCMapStringA
GetConsoleMode
SetEvent
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
GetLastError
LocalFree
Sleep
GetVersion
GetModuleHandleA
FlushFileBuffers
LoadLibraryA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
RtlUnwind
VirtualQuery
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
SetFilePointer
GetConsoleCP
SetEnvironmentVariableA
TranslateMessage
DestroyIcon
CreatePopupMenu
GetCursorPos
TrackPopupMenu
DestroyMenu
GetParent
GetWindowRect
GetSystemMetrics
MoveWindow
PostQuitMessage
ExitWindowsEx
GetDlgItem
ShowWindow
DestroyWindow
SetForegroundWindow
EndDialog
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
CheckTokenMembership
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegCloseKey
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RaiseException
GetModuleHandleA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetCommandLineA
HeapAlloc
WritePrivateProfileStringA
ExitProcess
TerminateProcess
HeapSize
GetTimeZoneInformation
GetACP
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapFree
GlobalFlags
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
DuplicateHandle
GlobalFree
GlobalAlloc
GlobalReAlloc
FindFirstFileA
FindClose
UnlockFile
LockFile
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVersion
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GetEnvironmentStrings
GlobalLock
SetFilePointer
SetEndOfFile
GetCurrentThread
GlobalDeleteAtom
GetLastError
LocalFree
GetCurrentThreadId
lstrcmpA
GetFileTime
InterlockedDecrement
GetFileAttributesA
WideCharToMultiByte
InterlockedIncrement
GetModuleFileNameA
lstrcmpiA
GetVolumeInformationA
GetFullPathNameA
lstrcpynA
MultiByteToWideChar
lstrcpyA
lstrlenA
LoadLibraryA
GetProcAddress
FlushFileBuffers
CloseHandle
CreateFileA
WriteFile
ReadFile
GetEnvironmentStringsW
GetCurrentProcess
GetEnvironmentVariableA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetFileSize
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsIconic
SystemParametersInfoA
GetWindowPlacement
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetSystemMetrics
CharUpperA
wsprintfA
LoadBitmapA
GetMenuCheckMarkDimensions
LoadStringA
DeleteObject
SaveDC
RestoreDC
GetStockObject
SelectObject
SetBkColor
SetTextColor
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
CreateBitmap
DeleteDC
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
ord17
PfcFreeToc
PfcGetToc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ