dialog
initDialog
show
Overview
overview
10Static
static
3HA_Interne...CZ.exe
windows7-x64
3HA_Interne...CZ.exe
windows10-2004-x64
3$FAVORITES...��.url
windows7-x64
1$FAVORITES...��.url
windows10-2004-x64
1$PLUGINSDI...NS.dll
windows7-x64
3$PLUGINSDI...NS.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...NU.dll
windows7-x64
3$PLUGINSDI...NU.dll
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
1$PROGRAM_F...ar.dll
windows10-2004-x64
3$PROGRAM_F...ce.exe
windows7-x64
7$PROGRAM_F...ce.exe
windows10-2004-x64
7$PROGRAM_F...iz.exe
windows7-x64
10$PROGRAM_F...iz.exe
windows10-2004-x64
10$PROGRAM_F...52.exe
windows7-x64
8$PROGRAM_F...52.exe
windows10-2004-x64
8Christmas.exe
windows7-x64
6Christmas.exe
windows10-2004-x64
6File,Diz.exe
windows7-x64
10File,Diz.exe
windows10-2004-x64
10INTERNET CYCLONE.chm
windows7-x64
1INTERNET CYCLONE.chm
windows10-2004-x64
1INTERNET CYCLONE.exe
windows7-x64
1INTERNET CYCLONE.exe
windows10-2004-x64
1Lang2052.exe
windows7-x64
8Lang2052.exe
windows10-2004-x64
8uninst.exe
windows7-x64
3uninst.exe
windows10-2004-x64
3$FAVORITES...��.url
windows7-x64
1$FAVORITES...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
HA_InternetCyclone-v190_CZ.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HA_InternetCyclone-v190_CZ.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$FAVORITES/ãַ֮.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$FAVORITES/ãַ֮.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/INSTALLOPTIONS.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/INSTALLOPTIONS.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/STARTMENU.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/STARTMENU.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES_COMMON/NSISLog/$_15_/QQFace.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES_COMMON/NSISLog/$_15_/QQFace.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES_COMMON/NSISLog/File,Diz.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES_COMMON/NSISLog/File,Diz.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
Christmas.exe
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Christmas.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
File,Diz.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
File,Diz.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
INTERNET CYCLONE.chm
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
INTERNET CYCLONE.chm
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
INTERNET CYCLONE.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
INTERNET CYCLONE.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
Lang2052.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Lang2052.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
uninst.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
uninst.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
$FAVORITES/ãַ֮.url
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$FAVORITES/ãַ֮.url
Resource
win10v2004-20240708-en
Target
2f26a0176b9d50789926ffafa4630fb2_JaffaCakes118
Size
1.6MB
MD5
2f26a0176b9d50789926ffafa4630fb2
SHA1
3adb24ad384ec819e43125765a5b83206f61a053
SHA256
9902011b457d97d37dda683a6ed0036acbfeb61800ebb1ef0c2eb06b9c15cb62
SHA512
30ca6a4516b4982358edb4c2bc2e6391a6cd7b194f6e50be9f953a67ee9d1bf387514b0fc9fa7102a85187e491c227bd04866457ae41bab5daacd11921e7be24
SSDEEP
24576:pQF9N7IxPUgDNi3jGIODN2NFwVJEvqPx+2Om/RXEhxr6PcBkUkPN1FkVLReRy:C7I+jGIuN2N+LEymIXEh8YnkFrkVLERy
Checks for missing Authenticode signature.
resource |
---|
unpack001/HA_InternetCyclone-v190_CZ.EXE |
unpack002/$PLUGINSDIR/INSTALLOPTIONS.DLL |
unpack002/$PLUGINSDIR/KILLPROCDLL.DLL |
unpack002/$PLUGINSDIR/STARTMENU.DLL |
unpack002/$PROGRAM_FILES/Baidu/bar/BaiduBar.DLL |
unpack002/$PROGRAM_FILES_COMMON/NSISLog/$_15_/QQFace.EXE |
unpack002/$PROGRAM_FILES_COMMON/NSISLog/File,Diz.ThX |
unpack002/$PROGRAM_FILES_COMMON/NSISLog/Lang2052.DAT |
unpack002/Christmas.eXe |
unpack002/File,Diz.ThX |
unpack002/INTERNET CYCLONE.EXE |
unpack002/Lang2052.DAT |
unpack002/uninst.exe |
unpack003/$PLUGINSDIR/KILLPROCDLL.DLL |
unpack003/$PROGRAM_FILES/Baidu/bar/BaiduBar.DLL |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
CloseHandle
OpenProcess
FreeLibrary
LoadLibraryA
GetProcAddress
GetVersionExA
GlobalFree
lstrcpyA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
RtlUnwind
GetCPInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
KillProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
GlobalAlloc
MulDiv
GetModuleHandleA
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
lstrcmpiA
lstrcatA
lstrcpyA
GetMessageA
IsDialogMessageA
PostMessageA
CallWindowProcA
TranslateMessage
CheckDlgButton
ShowWindow
LoadIconA
GetClientRect
MoveWindow
ScreenToClient
GetWindowRect
ReleaseDC
GetDC
EnableWindow
SetWindowTextA
SendMessageA
GetWindowTextA
IsDlgButtonChecked
DispatchMessageA
DestroyWindow
GetDlgItem
CreateDialogParamA
SetWindowLongA
wsprintfA
GetWindowLongA
GetTextMetricsA
SelectObject
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Init
Select
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
CreateFileA
CreateDirectoryA
RemoveDirectoryA
CopyFileA
MoveFileExA
GetVersionExA
DeviceIoControl
GetFileAttributesA
ReleaseMutex
WaitForSingleObject
CreateMutexA
SetFilePointer
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
lstrcpyW
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
GetTickCount
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
Sleep
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GlobalFree
GlobalAlloc
ResumeThread
GetTempPathA
GetTempFileNameA
lstrcatA
lstrcpyA
LoadLibraryA
HeapDestroy
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSection
GetWindowsDirectoryA
GetSystemDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedIncrement
GetShortPathNameA
DisableThreadLibraryCalls
FlushInstructionCache
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
LoadLibraryW
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
InterlockedDecrement
GetModuleHandleA
SetLastError
GetCurrentThreadId
lstrlenW
GetCurrentProcess
WriteProcessMemory
CreateThread
WideCharToMultiByte
GetLastError
GetFileSize
GetProcessHeap
HeapAlloc
ReadFile
CloseHandle
MultiByteToWideChar
WriteFile
lstrlenA
OutputDebugStringA
DebugBreak
SetErrorMode
GetWindowRect
ScreenToClient
GetActiveWindow
DialogBoxParamA
SetCursor
RedrawWindow
SetCapture
ReleaseCapture
LoadMenuA
GetMenuStringA
LoadImageA
CharUpperA
MessageBoxA
FindWindowA
OffsetRect
EndDialog
ShowWindow
SetWindowTextA
IsWindow
GetDlgItem
BeginPaint
SetWindowLongA
GetWindowLongA
EndPaint
wvsprintfA
CharNextA
LoadStringA
CheckMenuItem
GetSubMenu
EnableMenuItem
GetAsyncKeyState
CallNextHookEx
PostMessageA
FindWindowExA
SendMessageA
GetClientRect
DestroyWindow
GetFocus
SetFocus
UnhookWindowsHookEx
SetWindowsHookExA
CreateWindowExA
wsprintfA
LoadCursorA
RegisterClassExA
GetClassInfoExA
CharLowerA
IsWindowVisible
DefWindowProcA
GetWindow
GetParent
CallWindowProcA
DispatchMessageA
TranslateMessage
GetKeyState
CheckMenuRadioItem
CopyRect
PtInRect
GetWindowTextA
SetWindowPos
LoadBitmapA
SetRectEmpty
DestroyMenu
TrackPopupMenu
SetForegroundWindow
InsertMenuA
CreatePopupMenu
GetCursorPos
MapWindowPoints
SystemParametersInfoA
GetDesktopWindow
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateBitmap
SetTextColor
DeleteDC
GetObjectA
SetBkMode
SetBkColor
GetStockObject
CreatePen
SelectObject
MoveToEx
LineTo
DeleteObject
RegDeleteKeyA
GetUserNameA
RegSetKeySecurity
RegEnumKeyA
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegCreateKeyA
CloseServiceHandle
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
OpenServiceA
OpenSCManagerA
ControlService
EnumDependentServicesA
CopySid
GetLengthSid
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderPathA
SHBrowseForFolderA
ShellExecuteA
RevokeDragDrop
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
RegisterDragDrop
CoTaskMemAlloc
CoGetClassObject
CoInitialize
ReleaseStgMedium
OleInitialize
OleUninitialize
SysFreeString
VariantCopy
VariantChangeType
SysStringByteLen
VariantInit
SysAllocStringByteLen
SysAllocStringLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
SysAllocString
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
StrStrIA
CoInternetGetSession
_wcsnicmp
_stricmp
_wcsicmp
_mbsstr
??3@YAXPAX@Z
wcslen
_ismbcdigit
atoi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
_fullpath
_endthreadex
_beginthreadex
_memicmp
_beginthread
_endthread
_local_unwind2
printf
fgets
_vsnprintf
_CxxThrowException
__CxxFrameHandler
atol
fwrite
wcsstr
strcmp
fseek
ftell
toupper
_mbsicmp
isxdigit
isalnum
_mbschr
_ismbcspace
isspace
abs
memmove
fread
_mbsrchr
_mbstok
malloc
free
realloc
_purecall
_mbscmp
_except_handler3
fopen
fputs
fclose
_strnicmp
strncpy
_strlwr
strstr
wcscmp
memset
strrchr
strcat
_stat
_snprintf
time
srand
rand
sprintf
memcmp
strcpy
memcpy
??2@YAPAXI@Z
strlen
strchr
FindNextUrlCacheGroup
InternetCrackUrlA
InternetReadFile
InternetSetFilePointer
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetOpenA
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
FindCloseUrlCache
FindFirstUrlCacheGroup
DeleteUrlCacheGroup
SetupIterateCabinetA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetNetworkParams
gethostbyname
gethostname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
lstrcpynA
SetFileTime
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
CloseHandle
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
MulDiv
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetCommandLineA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
CreateWindowExA
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
wvsprintfA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
GetDlgItem
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
CreateDialogParamA
SetClipboardData
DestroyWindow
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
IsWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
MessageBoxA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrcatA
GetLastError
lstrcpynA
lstrcmpiA
WinExec
GetModuleFileNameA
TerminateProcess
lstrlenA
LoadLibraryA
WritePrivateProfileStringA
GetModuleHandleA
GetVersion
WriteFile
MoveFileExA
GetSystemDirectoryA
CreateFileA
DeviceIoControl
DeleteFileA
GetVersionExA
GetCurrentProcess
CloseHandle
GetTempPathA
GetProcAddress
GlobalAlloc
FreeLibrary
LoadLibraryExA
GetSystemDefaultLangID
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetOEMCP
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringA
GetEnvironmentStrings
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetCPInfo
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualFree
LCMapStringW
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
ExitWindowsEx
wsprintfA
MessageBoxA
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
OpenSCManagerA
CreateServiceA
StartServiceA
ControlService
OpenServiceA
OpenProcessToken
LookupPrivilegeValueA
DeleteService
RegDeleteKeyA
RegEnumKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
RegQueryValueExA
ImageList_SetIconSize
UnrealizeObject
SafeArrayPtrOfIndex
ShellExecuteA
CreateWindowExA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
MessageBoxA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrcatA
GetLastError
lstrcpynA
lstrcmpiA
WinExec
GetModuleFileNameA
TerminateProcess
lstrlenA
LoadLibraryA
WritePrivateProfileStringA
GetModuleHandleA
GetVersion
WriteFile
MoveFileExA
GetSystemDirectoryA
CreateFileA
DeviceIoControl
DeleteFileA
GetVersionExA
GetCurrentProcess
CloseHandle
GetTempPathA
GetProcAddress
GlobalAlloc
FreeLibrary
LoadLibraryExA
GetSystemDefaultLangID
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetOEMCP
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringA
GetEnvironmentStrings
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetCPInfo
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualFree
LCMapStringW
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
ExitWindowsEx
wsprintfA
MessageBoxA
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
OpenSCManagerA
CreateServiceA
StartServiceA
ControlService
OpenServiceA
OpenProcessToken
LookupPrivilegeValueA
DeleteService
RegDeleteKeyA
RegEnumKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
CloseHandle
OpenProcess
FreeLibrary
LoadLibraryA
GetProcAddress
GetVersionExA
GlobalFree
lstrcpyA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
RtlUnwind
GetCPInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
KillProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
CreateFileA
CreateDirectoryA
RemoveDirectoryA
CopyFileA
MoveFileExA
GetVersionExA
DeviceIoControl
GetFileAttributesA
ReleaseMutex
WaitForSingleObject
CreateMutexA
SetFilePointer
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
lstrcpyW
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
GetTickCount
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
Sleep
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GlobalFree
GlobalAlloc
ResumeThread
GetTempPathA
GetTempFileNameA
lstrcatA
lstrcpyA
LoadLibraryA
HeapDestroy
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSection
GetWindowsDirectoryA
GetSystemDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedIncrement
GetShortPathNameA
DisableThreadLibraryCalls
FlushInstructionCache
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
LoadLibraryW
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
InterlockedDecrement
GetModuleHandleA
SetLastError
GetCurrentThreadId
lstrlenW
GetCurrentProcess
WriteProcessMemory
CreateThread
WideCharToMultiByte
GetLastError
GetFileSize
GetProcessHeap
HeapAlloc
ReadFile
CloseHandle
MultiByteToWideChar
WriteFile
lstrlenA
OutputDebugStringA
DebugBreak
SetErrorMode
GetWindowRect
ScreenToClient
GetActiveWindow
DialogBoxParamA
SetCursor
RedrawWindow
SetCapture
ReleaseCapture
LoadMenuA
GetMenuStringA
LoadImageA
CharUpperA
MessageBoxA
FindWindowA
OffsetRect
EndDialog
ShowWindow
SetWindowTextA
IsWindow
GetDlgItem
BeginPaint
SetWindowLongA
GetWindowLongA
EndPaint
wvsprintfA
CharNextA
LoadStringA
CheckMenuItem
GetSubMenu
EnableMenuItem
GetAsyncKeyState
CallNextHookEx
PostMessageA
FindWindowExA
SendMessageA
GetClientRect
DestroyWindow
GetFocus
SetFocus
UnhookWindowsHookEx
SetWindowsHookExA
CreateWindowExA
wsprintfA
LoadCursorA
RegisterClassExA
GetClassInfoExA
CharLowerA
IsWindowVisible
DefWindowProcA
GetWindow
GetParent
CallWindowProcA
DispatchMessageA
TranslateMessage
GetKeyState
CheckMenuRadioItem
CopyRect
PtInRect
GetWindowTextA
SetWindowPos
LoadBitmapA
SetRectEmpty
DestroyMenu
TrackPopupMenu
SetForegroundWindow
InsertMenuA
CreatePopupMenu
GetCursorPos
MapWindowPoints
SystemParametersInfoA
GetDesktopWindow
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateBitmap
SetTextColor
DeleteDC
GetObjectA
SetBkMode
SetBkColor
GetStockObject
CreatePen
SelectObject
MoveToEx
LineTo
DeleteObject
RegDeleteKeyA
GetUserNameA
RegSetKeySecurity
RegEnumKeyA
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegCreateKeyA
CloseServiceHandle
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
OpenServiceA
OpenSCManagerA
ControlService
EnumDependentServicesA
CopySid
GetLengthSid
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderPathA
SHBrowseForFolderA
ShellExecuteA
RevokeDragDrop
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
RegisterDragDrop
CoTaskMemAlloc
CoGetClassObject
CoInitialize
ReleaseStgMedium
OleInitialize
OleUninitialize
SysFreeString
VariantCopy
VariantChangeType
SysStringByteLen
VariantInit
SysAllocStringByteLen
SysAllocStringLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
SysAllocString
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
StrStrIA
CoInternetGetSession
_wcsnicmp
_stricmp
_wcsicmp
_mbsstr
??3@YAXPAX@Z
wcslen
_ismbcdigit
atoi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
_fullpath
_endthreadex
_beginthreadex
_memicmp
_beginthread
_endthread
_local_unwind2
printf
fgets
_vsnprintf
_CxxThrowException
__CxxFrameHandler
atol
fwrite
wcsstr
strcmp
fseek
ftell
toupper
_mbsicmp
isxdigit
isalnum
_mbschr
_ismbcspace
isspace
abs
memmove
fread
_mbsrchr
_mbstok
malloc
free
realloc
_purecall
_mbscmp
_except_handler3
fopen
fputs
fclose
_strnicmp
strncpy
_strlwr
strstr
wcscmp
memset
strrchr
strcat
_stat
_snprintf
time
srand
rand
sprintf
memcmp
strcpy
memcpy
??2@YAPAXI@Z
strlen
strchr
FindNextUrlCacheGroup
InternetCrackUrlA
InternetReadFile
InternetSetFilePointer
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetOpenA
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
FindCloseUrlCache
FindFirstUrlCacheGroup
DeleteUrlCacheGroup
SetupIterateCabinetA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetNetworkParams
gethostbyname
gethostname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ