Decrypt
Encrypt
Overview
overview
3Static
static
315c85a04fe...18.exe
windows7-x64
315c85a04fe...18.exe
windows10-2004-x64
3$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3A-one PSP ...or.exe
windows7-x64
1A-one PSP ...or.exe
windows10-2004-x64
1SkinCrafter.dll
windows7-x64
1SkinCrafter.dll
windows10-2004-x64
1VideoEdit.dll
windows7-x64
1VideoEdit.dll
windows10-2004-x64
1app/cygwin1.dll
windows7-x64
1app/cygwin1.dll
windows10-2004-x64
3help.chm
windows7-x64
1help.chm
windows10-2004-x64
1mpgfiltr.dll
windows7-x64
1mpgfiltr.dll
windows10-2004-x64
1s2csplash.dll
windows7-x64
1s2csplash.dll
windows10-2004-x64
1viscomqtde.dll
windows7-x64
1viscomqtde.dll
windows10-2004-x64
1viscomwave.dll
windows7-x64
1viscomwave.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
15c85a04fe14dcbfff88231429c642de_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
15c85a04fe14dcbfff88231429c642de_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
A-one PSP Convertor.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
A-one PSP Convertor.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
SkinCrafter.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
SkinCrafter.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
VideoEdit.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
VideoEdit.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
app/cygwin1.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
app/cygwin1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
help.chm
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
help.chm
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
mpgfiltr.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
mpgfiltr.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
s2csplash.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
s2csplash.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
viscomqtde.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
viscomqtde.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
viscomwave.dll
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
viscomwave.dll
Resource
win10v2004-20240508-en
Target
15c85a04fe14dcbfff88231429c642de_JaffaCakes118
Size
1.2MB
MD5
15c85a04fe14dcbfff88231429c642de
SHA1
1828111f0cc7d95789d34554aad18e72bdcd9409
SHA256
45dcc66b0d71c2495851339b0abe6848cf9caf56c5f8942cde0d025ec4673501
SHA512
6c912d4df463cf55dbbcc995703084ca595aae23e8e0e2bf1e889b06c0ba39f800e77cd0c9f55b4b422cc74bfecb8288ab5aa41a6d2886bc4fee772c0eb7d0be
SSDEEP
24576:poN+IxadSNSa2EwDkWM9ImEViNG8rCsA8TWFqr9gdH/n9:WpSA4UzWX/9
Checks for missing Authenticode signature.
resource |
---|
15c85a04fe14dcbfff88231429c642de_JaffaCakes118 |
unpack001/$PLUGINSDIR/Base64.dll |
unpack001/$PLUGINSDIR/BrandingURL.dll |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/blowfish.dll |
unpack001/$PLUGINSDIR/inetc.dll |
unpack001/A-one PSP Convertor.exe |
unpack001/SkinCrafter.dll |
unpack001/VideoEdit.ocx |
unpack001/app/cygwin1.dll |
unpack001/mpgfiltr.ax |
unpack001/s2csplash.dll |
unpack001/viscomqtde.dll |
unpack001/viscomwave.dll |
unpack001/ÍÆ¼öwww.soft2cn.comÏÂÔØA-one PSP Convertor_rfshdktp.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
TerminateProcess
memset
atoi
_crt_debugger_hook
Decrypt
Encrypt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
GlobalFree
GetWindowRect
SetCapture
InvalidateRect
SendMessageA
GetCapture
ClientToScreen
EnableWindow
LoadImageA
SetPropA
SetWindowLongA
GetWindowLongA
GetDlgItem
PtInRect
ReleaseCapture
SetCursor
GetPropA
CallWindowProcA
RedrawWindow
GetObjectA
SetTextColor
CreateFontIndirectA
ShellExecuteA
Set
Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Decrypt
Encrypt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_mbschr
_adjust_fdiv
malloc
_initterm
free
_mbsrchr
strtoul
memset
_mbsstr
strtol
CloseHandle
CreateThread
WaitForSingleObject
TerminateThread
GetModuleHandleA
MulDiv
lstrcpyA
GlobalAlloc
LoadLibraryA
GetProcAddress
lstrlenA
WriteFile
ReadFile
lstrcmpA
lstrcpynA
GetLastError
GlobalFree
lstrcmpiA
DeleteFileA
SleepEx
SetFilePointer
GetTickCount
lstrcatA
GetFileSize
CreateFileA
MessageBoxA
GetParent
ShowWindow
PostMessageA
SetWindowTextA
GetWindowTextA
IsWindow
GetDlgItem
SetDlgItemTextA
SendDlgItemMessageA
SetWindowPos
SystemParametersInfoA
GetClientRect
GetWindowRect
SetTimer
LoadIconA
SetWindowLongA
GetWindowLongA
UpdateWindow
DestroyWindow
KillTimer
RedrawWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
IsWindowVisible
EnableWindow
CreateDialogParamA
FindWindowExA
wsprintfA
SendMessageA
HttpSendRequestA
HttpSendRequestExA
HttpQueryInfoA
FtpCreateDirectoryA
FtpOpenFileA
InternetGetLastResponseInfoA
InternetSetFilePointer
InternetSetOptionA
InternetQueryOptionA
InternetCloseHandle
InternetErrorDlg
HttpOpenRequestA
HttpAddRequestHeadersA
HttpEndRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetReadFile
InternetWriteFile
ord17
get
head
post
put
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord5571
ord6061
ord5864
ord3596
ord772
ord559
ord500
ord3701
ord812
ord5862
ord6144
ord6142
ord816
ord562
ord3986
ord5981
ord3619
ord2405
ord2859
ord2754
ord4133
ord4297
ord5787
ord5788
ord283
ord2753
ord932
ord6759
ord5933
ord3880
ord3425
ord3054
ord6716
ord6692
ord3797
ord3055
ord3056
ord3296
ord2862
ord3754
ord3914
ord3297
ord4125
ord3803
ord4124
ord3920
ord6675
ord3293
ord6762
ord6678
ord6696
ord6734
ord3546
ord3766
ord861
ord273
ord603
ord3693
ord2713
ord6157
ord6605
ord4023
ord5785
ord2841
ord2107
ord5450
ord6394
ord3566
ord2975
ord3757
ord3481
ord1176
ord3752
ord1949
ord860
ord1116
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord800
ord537
ord823
ord858
ord540
ord539
ord6467
ord1168
ord909
ord394
ord4185
ord5628
ord5572
ord2915
ord922
ord535
ord4274
ord3953
ord2725
ord4191
ord3435
ord3441
ord1131
ord5860
ord5606
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord5579
ord5736
ord5678
ord5794
ord5873
ord6021
ord6189
ord4330
ord6186
ord5756
ord6192
ord5759
ord2971
ord289
ord613
ord3571
ord5781
ord696
ord3643
ord472
ord2380
ord1641
ord2414
ord3663
ord3626
ord3706
ord323
ord1640
ord2714
ord2450
ord640
ord6880
ord702
ord912
ord5593
ord5596
ord400
ord3649
ord5634
ord915
ord4188
ord5773
ord5442
ord879
ord4204
ord4129
ord5710
ord6662
ord2740
ord2846
ord5440
ord924
ord353
ord882
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord4275
ord2379
ord939
ord755
ord825
ord5875
ord6172
ord5789
ord470
ord2860
ord2864
ord3646
ord397
ord699
ord665
ord1969
ord3438
ord6383
ord2801
_wcsnset
_mbscmp
_purecall
printf
rand
_ftol
isdigit
_strupr
srand
free
malloc
realloc
atoi
_CxxThrowException
_strnicmp
mbstowcs
_except_handler3
wcscmp
__RTDynamicCast
strncmp
wcschr
swprintf
wcslen
wcscpy
_itow
toupper
wcsstr
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
__CxxFrameHandler
InterlockedExchange
LocalFree
HeapFree
GetProcessHeap
HeapAlloc
GlobalLock
GlobalUnlock
GetVersion
MulDiv
GetUserDefaultLangID
FindResourceExA
GetTimeFormatW
GetDateFormatW
GetLocaleInfoW
GetLocalTime
lstrcmpA
RaiseException
GlobalAlloc
GlobalFree
LocalAlloc
GetVersionExA
OutputDebugStringA
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
lstrlenW
InterlockedDecrement
InterlockedIncrement
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetCaretPos
SetCaretPos
GetKeyState
GetScrollInfo
GetWindowDC
CallNextHookEx
GetDesktopWindow
SetWindowsHookExA
UnhookWindowsHookEx
InflateRect
GetMenuBarInfo
AdjustWindowRectEx
GetSystemMenu
DrawMenuBar
TrackPopupMenu
GetMenu
IsMenu
GetActiveWindow
SetCapture
ClientToScreen
ReleaseCapture
IsIconic
IsZoomed
LockWindowUpdate
GetCursorPos
GetWindowRgn
GetCapture
SetWindowRgn
SetRectEmpty
GrayStringA
DrawTextA
TabbedTextOutA
ScreenToClient
IsWindowVisible
IsWindowEnabled
GetWindowLongA
GetWindowTextW
GetWindow
GetForegroundWindow
IsWindow
RemovePropA
SetPropA
IsWindowUnicode
SetWindowLongW
SetWindowLongA
WindowFromDC
GetDC
ReleaseDC
GetSystemMetrics
ShowWindow
SetForegroundWindow
SetActiveWindow
GetWindowPlacement
SetWindowPlacement
ValidateRect
IsRectEmpty
SetRect
GetWindowRect
OffsetRect
CopyImage
PtInRect
SetCursor
LoadCursorA
GetClientRect
CharNextA
GetParent
PostMessageA
GetClassLongA
SetClassLongA
GetClassNameA
SendMessageA
SetWindowPos
RedrawWindow
EnumChildWindows
GetWindowTextLengthA
GetWindowTextA
GetMenuStringW
GetMenuStringA
SystemParametersInfoW
ShowScrollBar
SetScrollPos
SetScrollInfo
EnableScrollBar
GetMessagePos
KillTimer
SetTimer
EndPaint
MapWindowPoints
CallWindowProcA
BeginPaint
DrawEdge
GetPropA
GetSysColorBrush
FillRect
FrameRect
DestroyIcon
UnionRect
EqualRect
GetScrollPos
GetDlgCtrlID
GetSysColor
InvertRect
IntersectRect
SubtractRect
UpdateWindow
DrawFrameControl
DrawFocusRect
SystemParametersInfoA
GetMenuItemRect
SetMenuItemInfoA
GetMenuItemInfoA
GetTabbedTextExtentA
TrackMouseEvent
DrawStateA
LoadIconA
WindowFromPoint
RemoveMenu
AppendMenuA
GetSubMenu
CallWindowProcW
CopyRect
GetWindowTextLengthW
GetMenuItemCount
GetMenuItemID
GetMenuState
GetDlgItem
GetIconInfo
DrawIconEx
SetFocus
GetNextDlgTabItem
GetAncestor
DrawTextW
GetFocus
SendMessageW
HideCaret
GetTopWindow
ShowCaret
InvalidateRect
SetWindowOrgEx
GetDIBColorTable
CreatePalette
CreateHalftonePalette
GetDeviceCaps
SelectPalette
RealizePalette
CreateDIBSection
IntersectClipRect
GetClipRgn
GetTextMetricsA
ExtTextOutW
CreateFontIndirectW
SetStretchBltMode
CreateSolidBrush
GetClipBox
StretchBlt
Rectangle
CreatePatternBrush
SetBrushOrgEx
UnrealizeObject
GetTextExtentPoint32A
PlayEnhMetaFile
SetPixel
Arc
Ellipse
GetTextExtentPoint32W
GetObjectA
SaveDC
CreatePen
RestoreDC
CreateFontIndirectA
GetPixel
GetTextExtentPointW
GetTextExtentPointA
GetTextMetricsW
SetBoundsRect
ExcludeClipRect
SelectClipRgn
CreateRoundRectRgn
CreateEllipticRgn
PtInRegion
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetViewportOrgEx
GetStockObject
ExtSelectClipRgn
PatBlt
GetBkMode
GetTextColor
GetBkColor
GetCurrentObject
SetBkMode
SetTextColor
CreateRectRgn
OffsetRgn
GetRegionData
ExtCreateRegion
BeginPath
MoveToEx
LineTo
EndPath
WidenPath
PathToRegion
GetRgnBox
CreateRectRgnIndirect
CombineRgn
CreateCompatibleDC
SelectObject
CreateBitmap
CreateCompatibleBitmap
BitBlt
SetBkColor
DeleteObject
DeleteDC
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegQueryValueExA
RegEnumKeyExA
ShellExecuteA
ImageList_Draw
UninitializeFlatSB
InitializeFlatSB
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_Create
ImageList_DrawEx
ImageList_GetIconSize
ImageList_GetIcon
ImageList_GetImageInfo
ImageList_Destroy
GetHGlobalFromStream
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
VariantClear
LoadRegTypeLi
SysStringLen
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
AccessibleObjectFromWindow
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WMCreateProfileManager
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord3262
ord3081
ord3401
ord3670
ord561
ord1132
ord1131
ord3952
ord2724
ord6354
ord1216
ord1168
ord1227
ord6042
ord1877
ord4006
ord4249
ord2687
ord6364
ord4472
ord5498
ord3278
ord3353
ord3681
ord446
ord743
ord1177
ord1226
ord1210
ord1573
ord2439
ord1693
ord5618
ord994
ord4342
ord4687
ord4639
ord5674
ord2156
ord4856
ord4920
ord6002
ord2137
ord1963
ord5213
ord2953
ord3868
ord5150
ord4705
ord4707
ord2876
ord2998
ord5649
ord4113
ord4768
ord4903
ord4548
ord4521
ord4594
ord4988
ord4925
ord4930
ord4935
ord4659
ord4909
ord4908
ord4668
ord4667
ord4666
ord4648
ord4689
ord5023
ord4654
ord4643
ord4354
ord4780
ord4649
ord4637
ord4636
ord5060
ord4584
ord4371
ord4361
ord4356
ord4739
ord4741
ord4738
ord4409
ord4603
ord5008
ord4415
ord4992
ord4979
ord2488
ord3404
ord4539
ord2954
ord6055
ord4078
ord1776
ord3136
ord5241
ord2512
ord5163
ord6370
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2983
ord3148
ord3260
ord4466
ord2986
ord3080
ord4624
ord5825
ord758
ord723
ord3946
ord475
ord423
ord3626
ord2414
ord283
ord1116
ord5334
ord5328
ord5314
ord5324
ord5332
ord2541
ord537
ord535
ord2818
ord2652
ord1669
ord1200
ord4949
ord641
ord2514
ord324
ord4459
ord2795
ord2864
ord2379
ord4502
ord922
ord1614
ord2614
ord1685
ord6030
ord4650
ord4660
ord6883
ord4661
ord4202
ord5710
ord3502
ord2158
ord3258
ord1892
ord4252
ord3326
ord6365
ord1212
ord4570
ord4672
ord4843
ord5011
ord5265
ord4376
ord4853
ord4998
ord4713
ord6052
ord1775
ord2385
ord6371
ord5286
ord4438
ord3279
ord4625
ord4425
ord449
ord746
ord2278
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord4465
ord3259
ord3147
ord2982
ord1799
ord2554
ord4486
ord6375
ord815
ord541
ord341
ord801
ord654
ord2729
ord2730
ord6467
ord2727
ord3579
ord860
ord6143
ord6140
ord5608
ord5603
ord5861
ord5858
ord539
ord3237
ord2775
ord858
ord1081
ord5597
ord415
ord715
ord1601
ord4003
ord2486
ord4226
ord4622
ord825
ord290
ord540
ord2623
ord614
ord800
ord4424
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord2384
ord2985
ord823
ord6041
ord1182
ord1577
ord1575
ord1176
ord4407
ord3663
_ftol
_initterm
malloc
_adjust_fdiv
??1type_info@@UAE@XZ
_mbscmp
sprintf
strstr
free
_onexit
__dllonexit
__CxxFrameHandler
LoadLibraryA
DeviceIoControl
GetLocalTime
QueryPerformanceCounter
GlobalMemoryStatus
GetDiskFreeSpaceA
GetComputerNameA
LocalFree
LocalAlloc
GetSystemInfo
InterlockedDecrement
InterlockedIncrement
GetVersionExA
GetTickCount
GetCurrentThreadId
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateFileA
GetFileType
GetFileSize
ReadFile
GetLastError
CloseHandle
MultiByteToWideChar
MulDiv
lstrlenA
GetCurrentProcessId
WideCharToMultiByte
GetModuleHandleW
InvalidateRect
GetParent
IsWindowVisible
SetTimer
FillRect
KillTimer
EnableWindow
GetDC
CreateDIBitmap
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegDeleteKeyA
StringFromGUID2
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
VariantChangeType
SysAllocStringLen
SysFreeString
VariantClear
SysAllocString
LoadRegTypeLi
VariantInit
ICClose
ICSendMessage
ICGetInfo
ICOpen
ICInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord11
acmStreamOpen
acmStreamPrepareHeader
acmStreamConvert
acmStreamUnprepareHeader
AMGetErrorTextA
mmioOpenA
timeSetEvent
timeGetTime
mmioWrite
mmioAdvance
mmioSetInfo
mmioSeek
mmioCreateChunk
mmioGetInfo
mmioDescend
mmioAscend
mmioRead
mmioClose
memcpy
abs
memset
exit
vfprintf
_vsnprintf
fputs
printf
fflush
calloc
putc
modf
atol
atof
fread
fscanf
fopen
fclose
floor
fwrite
strstr
wcslen
strncmp
strncpy
free
_purecall
_CIpow
rand
_except_handler3
strrchr
sprintf
__CxxFrameHandler
malloc
_ftol
ceil
_strdup
_stat
_tempnam
_unlink
_open
_write
_close
fseek
memcmp
_iob
fprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_strlwr
lstrcmpiA
SetErrorMode
VirtualFree
VirtualAlloc
GetSystemInfo
ReleaseSemaphore
GetCurrentProcess
DuplicateHandle
InterlockedDecrement
InterlockedIncrement
GetTickCount
WaitForMultipleObjects
GetCurrentThread
GetThreadPriority
SetThreadPriority
GetCurrentThreadId
InterlockedExchange
GetACP
CreateSemaphoreA
GetModuleHandleA
DisableThreadLibraryCalls
GetVersionExA
FlushFileBuffers
SetEndOfFile
GetFileInformationByHandle
WritePrivateProfileStringA
lstrcpynA
ReadFile
lstrcpyA
ResetEvent
CreateEventA
SetFilePointer
SetEvent
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
WaitForSingleObject
lstrcatA
CreateThread
OutputDebugStringA
GetCurrentProcessId
GetLastError
FormatMessageA
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
Sleep
LockResource
SizeofResource
LoadResource
FindResourceA
CloseHandle
GetFileSize
CreateFileA
CopyFileA
DeleteFileA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WriteFile
InvalidateRect
ShowWindow
DestroyWindow
DefWindowProcA
LoadStringA
LoadStringW
GetWindowRect
MsgWaitForMultipleObjects
MoveWindow
wvsprintfA
MessageBoxA
GetDesktopWindow
PostMessageA
DrawTextA
ReleaseDC
GetDC
CreateDialogParamA
SetWindowLongA
PostThreadMessageA
DispatchMessageA
GetQueueStatus
wsprintfA
GetWindowLongA
PeekMessageA
RegisterWindowMessageA
SetWindowTextA
GetWindowTextA
GetDlgItem
SendMessageA
GetPixel
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
CreateFontA
SetBkColor
SetBkMode
GetStockObject
Rectangle
GetDIBits
DeleteObject
DeleteDC
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegSetValueA
RegEnumKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
CoFreeUnusedLibraries
StringFromGUID2
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
GetRunningObjectTable
CreateItemMoniker
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
S2CSplash
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
MultiByteToWideChar
GetSystemDirectoryA
GetModuleHandleA
GetTickCount
GetCurrentThread
GetCurrentProcessId
CreateMutexA
WaitForSingleObject
GetLastError
ReleaseMutex
CloseHandle
GetProcAddress
GetACP
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
WideCharToMultiByte
LeaveCriticalSection
FreeLibrary
GetThreadPriority
SetThreadPriority
CreateThread
Sleep
GetSystemInfo
ReleaseSemaphore
CreateSemaphoreA
WaitForMultipleObjects
SetEvent
GetCurrentThreadId
GetCurrentProcess
DuplicateHandle
ResetEvent
CreateEventA
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
VirtualFree
GetVersionExA
DisableThreadLibraryCalls
lstrlenA
VirtualAlloc
GetDC
wsprintfA
PeekMessageA
MsgWaitForMultipleObjects
wvsprintfA
PostThreadMessageA
RegisterWindowMessageA
GetQueueStatus
DispatchMessageA
SetRectEmpty
ReleaseDC
CreateDIBSection
CreateCompatibleDC
GetMapMode
SetMapMode
SelectObject
DeleteObject
GetDeviceCaps
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegSetValueA
RegCreateKeyA
CoCreateInstance
CoUninitialize
StringFromCLSID
CoTaskMemAlloc
StringFromGUID2
CoInitialize
CoFreeUnusedLibraries
CoTaskMemFree
_wtoi
strncpy
_access
getenv
sprintf
_purecall
_ftol
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
strstr
StrStrIA
SysFreeString
SysAllocString
timeGetTime
timeSetEvent
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_onexit
__dllonexit
_adjust_fdiv
malloc
_initterm
free
_purecall
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
timeGetTime
timeSetEvent
SetThreadPriority
GetACP
GetTickCount
GetCurrentThread
GetThreadPriority
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
CreateEventA
ResetEvent
DuplicateHandle
GetCurrentProcess
GetCurrentThreadId
SetEvent
WaitForMultipleObjects
WaitForSingleObject
CreateSemaphoreA
ReleaseSemaphore
GetSystemInfo
VirtualAlloc
VirtualFree
FreeLibrary
LoadLibraryA
lstrlenA
MultiByteToWideChar
GetLastError
GetModuleFileNameA
WideCharToMultiByte
DisableThreadLibraryCalls
InterlockedExchange
CreateThread
GetProcAddress
GetModuleHandleA
GetVersionExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyA
RegSetValueA
wsprintfA
PeekMessageA
MsgWaitForMultipleObjects
wvsprintfA
PostThreadMessageA
RegisterWindowMessageA
GetQueueStatus
DispatchMessageA
CoTaskMemAlloc
CoFreeUnusedLibraries
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
SysFreeString
SysAllocString
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
VirtualProtect
MessageBoxA
VariantCopy
HH_By_Soft2CN
Reserverd
fzh_s2c
refreshDesktop
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE