HEEnterWindowLoop
HEEnterWindowLoopInNewThread
HESpecifySettings
Overview
overview
7Static
static
716Edit.dll
windows7-x64
116Edit.dll
windows10-2004-x64
1LDE/IntelliDump.dll
windows7-x64
1LDE/IntelliDump.dll
windows10-2004-x64
1LDE/armadmp.dll
windows7-x64
3LDE/armadmp.dll
windows10-2004-x64
3LDS_Client...mp.exe
windows7-x64
1LDS_Client...mp.exe
windows10-2004-x64
1LDS_Client...ep.dll
windows7-x64
1LDS_Client...ep.dll
windows10-2004-x64
1LordPE_fix.exe
windows7-x64
3LordPE_fix.exe
windows10-2004-x64
1LordPlug.dll
windows7-x64
1LordPlug.dll
windows10-2004-x64
1LordPlug.d...lug.js
windows7-x64
3LordPlug.d...lug.js
windows10-2004-x64
3Misc/16Edit.dll
windows7-x64
1Misc/16Edit.dll
windows10-2004-x64
1Misc/16Edit.exe
windows7-x64
3Misc/16Edit.exe
windows10-2004-x64
3Misc/16Edit.vbs
windows7-x64
1Misc/16Edit.vbs
windows10-2004-x64
1Misc/LordElf.exe
windows7-x64
1Misc/LordElf.exe
windows10-2004-x64
1Misc/MetaPuck.exe
windows7-x64
1Misc/MetaPuck.exe
windows10-2004-x64
1Misc/PESnoop.exe
windows7-x64
7Misc/PESnoop.exe
windows10-2004-x64
7Misc/RunKMD.exe
windows7-x64
1Misc/RunKMD.exe
windows10-2004-x64
1Misc/RunVxD.exe
windows7-x64
1Misc/RunVxD.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
16Edit.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
16Edit.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
LDE/IntelliDump.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
LDE/IntelliDump.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
LDE/armadmp.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
LDE/armadmp.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
LDS_Clients/CoolDump1.4/Cooldump.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
LDS_Clients/CoolDump1.4/Cooldump.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
LDS_Clients/CoolDump1.4/Genoep.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
LDS_Clients/CoolDump1.4/Genoep.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
LordPE_fix.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
LordPE_fix.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
LordPlug.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
LordPlug.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
LordPlug.dll_src/LordPlug.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
LordPlug.dll_src/LordPlug.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
Misc/16Edit.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Misc/16Edit.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
Misc/16Edit.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Misc/16Edit.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
Misc/16Edit.vbs
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Misc/16Edit.vbs
Resource
win10v2004-20240708-en
Behavioral task
behavioral23
Sample
Misc/LordElf.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Misc/LordElf.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
Misc/MetaPuck.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Misc/MetaPuck.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
Misc/PESnoop.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Misc/PESnoop.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
Misc/RunKMD.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
Misc/RunKMD.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
Misc/RunVxD.exe
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
Misc/RunVxD.exe
Resource
win10v2004-20240704-en
Target
2f3be4ec89b6eaee56142a4f88c358ea_JaffaCakes118
Size
358KB
MD5
2f3be4ec89b6eaee56142a4f88c358ea
SHA1
dafe566451c533ef83856f82fb91fc1ddc20a9d5
SHA256
ece03e039f856eca26b0444b60acebca889b26287d84a231b7a7de7aeb15ba3e
SHA512
2f01fb2d946bd57369430d3bbd9c5acc5c50b7d6b056624b9555b904b03c60a79b7a2ffee902f3e577e9c41fb5636138c9d20dd9a46c63fcc6e1663d9b203c3c
SSDEEP
6144:zk/iyjW7/oCJg2DpBT1JVODyFOif6+ARJEURApV9//zUKtjots4geLYnfrd:zF/TJbpBBJwOFOKcO/zU74eSZ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/LDS_Clients/CoolDump1.4/Genoep.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/Misc/PESnoop.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/16Edit.DLL |
unpack001/LDE/IntelliDump.LDE |
unpack001/LDE/armadmp.lde |
unpack001/LDS_Clients/CoolDump1.4/Cooldump.exe |
unpack001/LDS_Clients/CoolDump1.4/Genoep.dll |
unpack001/LordPE_fix.EXE |
unpack001/LordPlug.dll |
unpack001/Misc/16Edit.DLL |
unpack001/Misc/16Edit.exe |
unpack001/Misc/LordElf.exe |
unpack001/Misc/MetaPuck.exe |
unpack001/Misc/PESnoop.exe |
unpack002/out.upx |
unpack001/Misc/RunKMD.exe |
unpack001/Misc/RunVxD.exe |
unpack001/Misc/SoftSnoop/APISnoop.dll |
unpack001/Misc/SoftSnoop/ForceLibrary.dll |
unpack001/Misc/SoftSnoop/Plugins/HelloWorld.dll |
unpack001/Misc/SoftSnoop/Plugins/MsgHook.dll |
unpack001/Misc/SoftSnoop/Plugins/PluginExp3.dll |
unpack001/Misc/SoftSnoop/Plugins/TestMe.exe |
unpack001/Misc/SoftSnoop/SoftSnoop.exe |
unpack001/Misc/yPER.exe |
unpack001/PROCS.DLL |
unpack001/PSAPI.DLL |
unpack001/REALIGN.DLL |
unpack001/SDK/LordPE/LDS/Examples/CallModMem.EXE |
unpack001/SDK/LordPE/LDS/Examples/LDSChat.exe |
unpack001/SDK/LordPE/LDS/Examples/LDS_DmpTst.exe |
unpack001/SDK/LordPE/LDS/Examples/LDS_LoadDump.exe |
unpack001/SDK/LordPE/LDS/Examples/LDS_TaskViewer.exe |
unpack001/SDK/LordPE/LDS/Examples/LDS_VerPid.exe |
unpack001/SDK/procsDLL/examples/UseProcs1.exe |
unpack001/SDK/procsDLL/examples/useprocs2.exe |
unpack001/TrapDll.exe |
unpack001/英文原版/LordPE.EXE |
unpack001/英文原版/LordPE_fix.EXE |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HEEnterWindowLoop
HEEnterWindowLoopInNewThread
HESpecifySettings
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualQueryEx
CloseHandle
ReadProcessMemory
lstrcpyA
OpenProcess
DisableThreadLibraryCalls
MessageBoxA
GetActiveWindow
wsprintfA
_adjust_fdiv
free
_initterm
malloc
DumpProcessRange
GetLDEName
ShowLDEInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DumpArm
DumpProcessRange
GetLDEName
ShowLDEInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindOEP
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
gmtime
toupper
div
asctime
mktime
_timezone
_except_handler3
strncmp
sprintf
strchr
free
realloc
malloc
strstr
lstrcpynA
lstrcatA
lstrlenA
CreateProcessA
WideCharToMultiByte
lstrlenW
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentProcess
TerminateProcess
VirtualProtectEx
WriteFile
FindClose
FindNextFileA
LoadLibraryA
SetFilePointer
SetThreadPriority
VirtualFree
IsBadReadPtr
lstrcmpiA
ExitProcess
SetFileAttributesA
OutputDebugStringA
lstrcpyA
GetFileAttributesA
ResumeThread
GetCurrentThread
DeleteFileA
GetTempPathA
SetPriorityClass
VirtualQueryEx
lstrcmpA
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentDirectoryA
UnmapViewOfFile
MulDiv
GetStartupInfoA
CreatePipe
WaitForSingleObject
CopyFileA
MapViewOfFile
CreateFileMappingA
SetEndOfFile
WritePrivateProfileStringA
GetPrivateProfileStringA
VirtualUnlock
VirtualLock
GetModuleFileNameA
SetCurrentDirectoryA
GetFileSize
CloseHandle
OpenProcess
ReadProcessMemory
GetModuleHandleA
CreateFileA
GetProcAddress
WriteProcessMemory
GetCurrentProcessId
Sleep
ReadFile
GetPriorityClass
FindFirstFileA
VirtualAlloc
GetCommandLineA
ShowWindow
SetMenuItemInfoA
AppendMenuA
CreatePopupMenu
SetWindowTextA
DestroyIcon
LoadIconA
InvalidateRect
CharLowerA
LoadBitmapA
SetDlgItemTextA
GetDlgItemTextA
GetSysColorBrush
DestroyCursor
SetClassLongA
LoadCursorA
GetParent
EnableWindow
GetWindowTextA
EnableMenuItem
IsIconic
MoveWindow
GetWindowDC
TrackPopupMenu
CheckMenuRadioItem
SetTimer
GetActiveWindow
GetClassInfoA
DialogBoxParamA
FindWindowA
SetForegroundWindow
CheckDlgButton
GetDlgItem
EndDialog
IsDlgButtonChecked
SendDlgItemMessageA
wvsprintfA
GetAsyncKeyState
SetClipboardData
GetWindowRect
SetWindowPos
SetWindowLongA
KillTimer
IsZoomed
DestroyMenu
IsWindowEnabled
CheckRadioButton
SetFocus
GetCursorPos
ScreenToClient
SendMessageA
GetClipboardData
CloseClipboard
CallWindowProcA
MessageBeep
wsprintfA
MessageBoxA
CharUpperA
OpenClipboard
EnumClipboardFormats
EmptyClipboard
GetDeviceCaps
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
DeleteObject
GetSaveFileNameA
GetOpenFileNameA
RegCreateKeyExA
RegSetValueExA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
AdjustTokenPrivileges
RegCloseKey
ShellExecuteA
SHGetFileInfoA
DragFinish
DragAcceptFiles
DragQueryFileA
ImageList_Remove
InitCommonControlsEx
ImageList_Destroy
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
GetProcessPathID
GetModuleHandleList
GetProcessIDList
GetProcessBaseSize
GetNumberOfModules
GetNumberOfProcesses
GetModuleSize
GetModulePath
GetProcessPath
RealignPE
ReBasePEImage
WipeReloc
HEEnterWindowLoop
HESpecifySettings
BindImageEx
ImageRvaToVa
ImageRvaToSection
CheckSumMappedFile
ImageNtHeader
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenA
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
SetFocus
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetDlgItemTextA
GetDlgItem
SendMessageA
SetDlgItemTextA
GetNextitem
PopMenuCopy
Searchimport
SetCursortoItem
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HEEnterWindowLoop
HEEnterWindowLoopInNewThread
HESpecifySettings
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
ExitProcess
MessageBoxA
GetOpenFileNameA
HESpecifySettings
HEEnterWindowLoop
__getmainargs
__CxxFrameHandler
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpiA
CloseHandle
CreateFileMappingA
CreateFileA
lstrcmpA
UnmapViewOfFile
MapViewOfFile
SetConsoleTitleA
printf
_exit
_XcptFilter
_except_handler3
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_getch
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\VC7\projects\MetaPuck\Release\MetaPuck.pdb
ImageList_Add
ImageList_Create
ImageList_Destroy
ord6
InitCommonControlsEx
ReadFile
CloseHandle
CreateFileA
lstrcpyA
lstrcpynA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetFileType
SetHandleCount
WriteFile
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetUnhandledExceptionFilter
HeapSize
GetCurrentProcess
TerminateProcess
GetProcAddress
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetFileSize
lstrcatA
VirtualQuery
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
lstrlenA
GetModuleHandleA
GetEnvironmentStringsW
LoadBitmapA
SendDlgItemMessageA
LoadIconA
EndDialog
SetTimer
SendMessageA
SetMenuItemInfoA
CheckDlgButton
SetDlgItemTextA
GetDlgItem
SetWindowLongA
IsDlgButtonChecked
GetDlgItemTextA
CharUpperA
GetClassInfoA
CallWindowProcA
GetDlgCtrlID
GetParent
MessageBoxA
LoadCursorA
DialogBoxParamA
RegisterClassA
GetSystemMetrics
CreateWindowExA
LoadMenuA
SetMenu
ShowWindow
UpdateWindow
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyAcceleratorTable
PostQuitMessage
DefWindowProcA
DestroyMenu
MoveWindow
GetWindowRect
GetClientRect
wsprintfA
wvsprintfA
KillTimer
DeleteObject
GetSaveFileNameA
GetOpenFileNameA
DragFinish
DragAcceptFiles
DragQueryFileA
CoUninitialize
CoInitialize
CoCreateInstance
SysAllocString
VariantChangeType
__getmainargs
ImageNtHeader
ImageRvaToVa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrlenA
_lwrite
lstrcmpiA
lstrcpyA
ExitProcess
DeviceIoControl
CloseHandle
GetVersion
GetCommandLineA
lstrcpynA
CreateFileA
wsprintfA
StartServiceA
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ControlService
_strnicmp
toupper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineA
lstrlenA
ExitProcess
DeviceIoControl
CloseHandle
CreateFileA
lstrcpyA
lstrcpynA
_lwrite
getchar
strncat
_stricmp
_strnicmp
toupper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TlsFree
GlobalFree
GetProcAddress
TlsAlloc
TlsSetValue
GlobalAlloc
TlsGetValue
lstrcmpiA
VirtualProtect
GetModuleHandleA
SendMessageA
MessageBoxA
FindWindowA
_except_handler3
free
_initterm
_strnicmp
strstr
_adjust_fdiv
malloc
RetTrapProc
TrappedApiCall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetThreadContext
GetModuleHandleA
GetVersion
GlobalFree
ReadProcessMemory
GlobalAlloc
OpenProcess
CloseHandle
SetThreadContext
SuspendThread
Sleep
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetProcAddress
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
_initterm
malloc
_adjust_fdiv
_stricmp
free
ForceLibrary
ForceLibraryDBG
PerformCleanup
TrapEntry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
GetProcAddress
_initterm
free
malloc
_adjust_fdiv
StartSSPlugin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CheckDlgButton
DialogBoxParamA
EndDialog
IsDlgButtonChecked
GetModuleHandleA
GetProcAddress
WriteProcessMemory
lstrcmpiA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartSSPlugin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
MessageBoxA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSSApi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UnmapViewOfFile
lstrcmpiA
MapViewOfFile
CloseHandle
Sleep
CreateFileMappingA
GetFileSize
CreateFileA
lstrcpyA
SetFilePointer
SetEndOfFile
ValidatePE
WipeReloc
RealignPE
ImageNtHeader
printf
__setusermatherr
_initterm
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_controlfp
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
lstrcpynA
CloseHandle
OpenProcess
GetVersion
lstrcpyA
GetProcAddress
LoadLibraryA
_except_handler3
strstr
_strupr
free
_initterm
malloc
_adjust_fdiv
GetModuleHandleEx
GetModuleHandleList
GetModulePath
GetModuleSize
GetNumberOfModules
GetNumberOfProcesses
GetProcessBaseSize
GetProcessIDList
GetProcessPath
GetProcessPathID
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
_stricmp
RtlUnwind
sprintf
atoi
NtStopProfile
RtlUnicodeToOemN
_chkstk
DbgPrint
NtCreateProfile
RtlMultiByteToUnicodeN
NtAllocateVirtualMemory
RtlAdjustPrivilege
NtSetIntervalProfile
NtStartProfile
NtQueryInformationProcess
NtWriteFile
NtSetInformationProcess
RtlNtStatusToDosError
NtQueryVirtualMemory
NtQuerySystemInformation
LocalAlloc
MultiByteToWideChar
GetLastError
RaiseException
LoadLibraryA
FreeLibrary
GetProcAddress
InterlockedExchange
OpenFileMappingA
MapViewOfFile
DisableThreadLibraryCalls
CreateFileA
UnmapViewOfFile
GetProcessHeap
HeapAlloc
CloseHandle
lstrcpyA
GetProcessWorkingSetSize
lstrlenA
SetLastError
LocalFree
GetSystemInfo
ReadProcessMemory
WideCharToMultiByte
SetProcessWorkingSetSize
EmptyWorkingSet
EnumDeviceDrivers
EnumProcessModules
EnumProcesses
GetDeviceDriverBaseNameA
GetDeviceDriverBaseNameW
GetDeviceDriverFileNameA
GetDeviceDriverFileNameW
GetMappedFileNameA
GetMappedFileNameW
GetModuleBaseNameA
GetModuleBaseNameW
GetModuleFileNameExA
GetModuleFileNameExW
GetModuleInformation
GetProcessMemoryInfo
GetWsChanges
InitializeProcessForWsWatch
QueryWorkingSet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageRvaToVa
ImageNtHeader
CloseHandle
DisableThreadLibraryCalls
SetEndOfFile
SetFilePointer
CreateFileA
GlobalFree
GlobalAlloc
LockResource
LoadResource
FindResourceA
malloc
_except_handler3
free
_initterm
div
_adjust_fdiv
ReBasePEImage
RealignPE
TruncateFile
ValidatePE
WipeReloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateProcessA
ExitProcess
GetCurrentProcessId
Sleep
SuspendThread
TerminateProcess
lstrcpynA
FindWindowA
MessageBoxA
SendMessageA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ShellExecuteA
GetOpenFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrlenA
GetCurrentProcessId
GetModuleHandleA
ExitProcess
SendMessageA
EndDialog
wsprintfA
GetDlgItem
DialogBoxParamA
FindWindowA
MessageBoxA
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetStdHandle
ReadConsoleA
_lwrite
lstrlenA
wsprintfA
GetNumberOfProcesses
GetProcessIDList
GetProcessPath
GetProcessBaseSize
GetNumberOfModules
GetModuleHandleList
GetModulePath
GetModuleSize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoA
GetModuleHandleA
GetModuleFileNameA
wsprintfA
MessageBoxA
GetModuleHandleEx
GetProcessPathID
_initterm
_adjust_fdiv
__p__commode
__setusermatherr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
__p__fmode
_controlfp
__set_app_type
_except_handler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
WriteFile
SetFilePointer
FreeLibrary
CreateFileA
CloseHandle
CreateFileMappingA
GetCurrentThread
MapViewOfFile
UnmapViewOfFile
GetCommandLineA
SetThreadPriority
LoadLibraryA
OutputDebugStringA
MessageBoxA
wsprintfA
ImageRvaToVa
ImageNtHeader
strstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
gmtime
toupper
div
asctime
mktime
_timezone
_except_handler3
strncmp
sprintf
strchr
free
realloc
malloc
strstr
lstrcpynA
lstrcatA
lstrlenA
CreateProcessA
WideCharToMultiByte
lstrlenW
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentProcess
TerminateProcess
VirtualProtectEx
WriteFile
FindClose
FindNextFileA
LoadLibraryA
SetFilePointer
SetThreadPriority
VirtualFree
IsBadReadPtr
lstrcmpiA
ExitProcess
SetFileAttributesA
OutputDebugStringA
lstrcpyA
GetFileAttributesA
ResumeThread
GetCurrentThread
DeleteFileA
GetTempPathA
SetPriorityClass
VirtualQueryEx
lstrcmpA
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentDirectoryA
UnmapViewOfFile
MulDiv
GetStartupInfoA
CreatePipe
WaitForSingleObject
CopyFileA
MapViewOfFile
CreateFileMappingA
SetEndOfFile
WritePrivateProfileStringA
GetPrivateProfileStringA
VirtualUnlock
VirtualLock
GetModuleFileNameA
SetCurrentDirectoryA
GetFileSize
CloseHandle
OpenProcess
ReadProcessMemory
GetModuleHandleA
CreateFileA
GetProcAddress
WriteProcessMemory
GetCurrentProcessId
Sleep
ReadFile
GetPriorityClass
FindFirstFileA
VirtualAlloc
GetCommandLineA
ShowWindow
SetMenuItemInfoA
AppendMenuA
CreatePopupMenu
SetWindowTextA
DestroyIcon
LoadIconA
InvalidateRect
CharLowerA
LoadBitmapA
SetDlgItemTextA
GetDlgItemTextA
GetSysColorBrush
DestroyCursor
SetClassLongA
LoadCursorA
GetParent
EnableWindow
GetWindowTextA
EnableMenuItem
IsIconic
MoveWindow
GetWindowDC
TrackPopupMenu
CheckMenuRadioItem
SetTimer
GetActiveWindow
GetClassInfoA
DialogBoxParamA
FindWindowA
SetForegroundWindow
CheckDlgButton
GetDlgItem
EndDialog
IsDlgButtonChecked
SendDlgItemMessageA
wvsprintfA
GetAsyncKeyState
SetClipboardData
GetWindowRect
SetWindowPos
SetWindowLongA
KillTimer
IsZoomed
DestroyMenu
IsWindowEnabled
CheckRadioButton
SetFocus
GetCursorPos
ScreenToClient
SendMessageA
GetClipboardData
CloseClipboard
CallWindowProcA
MessageBeep
wsprintfA
MessageBoxA
CharUpperA
OpenClipboard
EnumClipboardFormats
EmptyClipboard
GetDeviceCaps
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
DeleteObject
GetSaveFileNameA
GetOpenFileNameA
RegCreateKeyExA
RegSetValueExA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
AdjustTokenPrivileges
RegCloseKey
ShellExecuteA
SHGetFileInfoA
DragFinish
DragAcceptFiles
DragQueryFileA
ImageList_Remove
InitCommonControlsEx
ImageList_Destroy
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
GetProcessPathID
GetModuleHandleList
GetProcessIDList
GetProcessBaseSize
GetNumberOfModules
GetNumberOfProcesses
GetModuleSize
GetModulePath
GetProcessPath
RealignPE
ReBasePEImage
WipeReloc
HEEnterWindowLoop
HESpecifySettings
BindImageEx
ImageRvaToVa
ImageRvaToSection
CheckSumMappedFile
ImageNtHeader
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
gmtime
toupper
div
asctime
mktime
_timezone
_except_handler3
strncmp
sprintf
strchr
free
realloc
malloc
strstr
lstrcpynA
lstrcatA
lstrlenA
CreateProcessA
WideCharToMultiByte
lstrlenW
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentProcess
TerminateProcess
VirtualProtectEx
WriteFile
FindClose
FindNextFileA
LoadLibraryA
SetFilePointer
SetThreadPriority
VirtualFree
IsBadReadPtr
lstrcmpiA
ExitProcess
SetFileAttributesA
OutputDebugStringA
lstrcpyA
GetFileAttributesA
ResumeThread
GetCurrentThread
DeleteFileA
GetTempPathA
SetPriorityClass
VirtualQueryEx
lstrcmpA
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentDirectoryA
UnmapViewOfFile
MulDiv
GetStartupInfoA
CreatePipe
WaitForSingleObject
CopyFileA
MapViewOfFile
CreateFileMappingA
SetEndOfFile
WritePrivateProfileStringA
GetPrivateProfileStringA
VirtualUnlock
VirtualLock
GetModuleFileNameA
SetCurrentDirectoryA
GetFileSize
CloseHandle
OpenProcess
ReadProcessMemory
GetModuleHandleA
CreateFileA
GetProcAddress
WriteProcessMemory
GetCurrentProcessId
Sleep
ReadFile
GetPriorityClass
FindFirstFileA
VirtualAlloc
GetCommandLineA
ShowWindow
SetMenuItemInfoA
AppendMenuA
CreatePopupMenu
SetWindowTextA
DestroyIcon
LoadIconA
InvalidateRect
CharLowerA
LoadBitmapA
SetDlgItemTextA
GetDlgItemTextA
GetSysColorBrush
DestroyCursor
SetClassLongA
LoadCursorA
GetParent
EnableWindow
GetWindowTextA
EnableMenuItem
IsIconic
MoveWindow
GetWindowDC
TrackPopupMenu
CheckMenuRadioItem
SetTimer
GetActiveWindow
GetClassInfoA
DialogBoxParamA
FindWindowA
SetForegroundWindow
CheckDlgButton
GetDlgItem
EndDialog
IsDlgButtonChecked
SendDlgItemMessageA
wvsprintfA
GetAsyncKeyState
SetClipboardData
GetWindowRect
SetWindowPos
SetWindowLongA
KillTimer
IsZoomed
DestroyMenu
IsWindowEnabled
CheckRadioButton
SetFocus
GetCursorPos
ScreenToClient
SendMessageA
GetClipboardData
CloseClipboard
CallWindowProcA
MessageBeep
wsprintfA
MessageBoxA
CharUpperA
OpenClipboard
EnumClipboardFormats
EmptyClipboard
GetDeviceCaps
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
DeleteObject
GetSaveFileNameA
GetOpenFileNameA
RegCreateKeyExA
RegSetValueExA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
AdjustTokenPrivileges
RegCloseKey
ShellExecuteA
SHGetFileInfoA
DragFinish
DragAcceptFiles
DragQueryFileA
ImageList_Remove
InitCommonControlsEx
ImageList_Destroy
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
GetProcessPathID
GetModuleHandleList
GetProcessIDList
GetProcessBaseSize
GetNumberOfModules
GetNumberOfProcesses
GetModuleSize
GetModulePath
GetProcessPath
RealignPE
ReBasePEImage
WipeReloc
HEEnterWindowLoop
HESpecifySettings
BindImageEx
ImageRvaToVa
ImageRvaToSection
CheckSumMappedFile
ImageNtHeader
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ