Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
3TVK.exe
windows7-x64
7TVK.exe
windows10-2004-x64
7//...ll.exe
windows7-x64
//...ll.exe
windows10-2004-x64
/Buffering.htm
windows7-x64
/Buffering.htm
windows10-2004-x64
/LoginTV.htm
windows7-x64
/LoginTV.htm
windows10-2004-x64
/WhatsNew.htm
windows7-x64
/WhatsNew.htm
windows10-2004-x64
/config.dll
windows7-x64
/config.dll
windows10-2004-x64
/mobilefee.htm
windows7-x64
/mobilefee.htm
windows10-2004-x64
/setup.exe
windows7-x64
/setup.exe
windows10-2004-x64
$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/modules/$R0.dll
windows7-x64
6$TEMP/modules/$R0.dll
windows10-2004-x64
6$TEMP/modu...dr.dll
windows7-x64
6$TEMP/modu...dr.dll
windows10-2004-x64
6$TEMP/modu...xr.dll
windows7-x64
7$TEMP/modu...xr.dll
windows10-2004-x64
7$TEMP/modu...xr.exe
windows7-x64
1$TEMP/modu...xr.exe
windows10-2004-x64
1$TEMP/modu...ll.exe
windows7-x64
1$TEMP/modu...ll.exe
windows10-2004-x64
1$TEMP/modu...gn.dll
windows7-x64
1$TEMP/modu...gn.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
TVK.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
TVK.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
//uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
//uninstall.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral5
Sample
/Buffering.htm
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
/Buffering.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
/LoginTV.htm
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
/LoginTV.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
/WhatsNew.htm
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
/WhatsNew.htm
Resource
win10v2004-20240708-en
Behavioral task
behavioral11
Sample
/config.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
/config.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
/mobilefee.htm
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
/mobilefee.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
/setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
/setup.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
$TEMP/modules/$R0.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$TEMP/modules/$R0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
$TEMP/modules/addr.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$TEMP/modules/addr.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
$TEMP/modules/auxr.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$TEMP/modules/auxr.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
$TEMP/modules/auxr.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$TEMP/modules/auxr.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
$TEMP/modules/shell.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$TEMP/modules/shell.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
$TEMP/modules/sign.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
$TEMP/modules/sign.dll
Resource
win10v2004-20240704-en
Target
30aa764e3efb7e234cc694e92d9e495d_JaffaCakes118
Size
1.8MB
MD5
30aa764e3efb7e234cc694e92d9e495d
SHA1
6563914a1b3849e0ff402b176856684ac2a5da1a
SHA256
d6129731391f088c7c219e2cf69fed6d71e769514e29e65c179116feba1d3d8d
SHA512
af55716fc4806902f92b801399a5d520302722d81b6974ca9e6f72f3191947273efe3f1dd841920d04cd8a26a039c49d21756de402eefd18f20ad770aedcdc48
SSDEEP
49152:cW71Kf0tt8SqQsPcrlU+0OXgS2HX7z2q1:zztX6PJFw2HrCq1
Checks for missing Authenticode signature.
resource |
---|
unpack001/TVK.exe |
unpack002///uninstall.exe |
unpack004/$PLUGINSDIR/InstallOptions.dll |
unpack004/$PLUGINSDIR/System.dll |
unpack002//ɽ.exe |
unpack002//InstallOptions.dll |
unpack002/$_4612_/PSNetwork.dll |
unpack002/$_4741_/AcIERHelper.dll |
resource | yara_rule |
---|---|
static1/unpack001/TVK.exe | nsis_installer_1 |
static1/unpack002///uninstall.exe | nsis_installer_1 |
static1/unpack002//setup.exe | nsis_installer_1 |
static1/unpack002//setup.exe | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImageList_Create
ord17
ImageList_AddMasked
ImageList_Destroy
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
FindNextFileA
DeleteFileA
FindFirstFileA
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
CopyFileA
SetErrorMode
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
EnterCriticalSection
Sleep
LeaveCriticalSection
InitializeCriticalSection
CloseHandle
GlobalFree
GetModuleHandleA
LoadLibraryA
CreateThread
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
MulDiv
ExitProcess
CreateDialogParamA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
SetFocus
ScreenToClient
GetWindowRect
GetWindowLongA
SetClassLongA
IsWindowEnabled
SetWindowPos
LoadCursorA
SetCursor
GetDlgItemTextA
MapWindowPoints
GetMessagePos
LoadBitmapA
CallWindowProcA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
MessageBoxA
CharPrevA
DestroyWindow
SetTimer
SetForegroundWindow
ShowWindow
CharNextA
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
GetSysColor
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
ExitWindowsEx
PostQuitMessage
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
InvalidateRect
SetBkColor
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateSolidBrush
CreateFontA
SetBkMode
SetTextColor
CreateBrushIndirect
SelectObject
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImageList_Create
ord17
ImageList_AddMasked
ImageList_Destroy
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
FindNextFileA
DeleteFileA
FindFirstFileA
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
CopyFileA
SetErrorMode
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
EnterCriticalSection
Sleep
LeaveCriticalSection
InitializeCriticalSection
CloseHandle
GlobalFree
GetModuleHandleA
LoadLibraryA
CreateThread
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
MulDiv
ExitProcess
CreateDialogParamA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
SetFocus
ScreenToClient
GetWindowRect
GetWindowLongA
SetClassLongA
IsWindowEnabled
SetWindowPos
LoadCursorA
SetCursor
GetDlgItemTextA
MapWindowPoints
GetMessagePos
LoadBitmapA
CallWindowProcA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
MessageBoxA
CharPrevA
DestroyWindow
SetTimer
SetForegroundWindow
ShowWindow
CharNextA
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
GetSysColor
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
ExitWindowsEx
PostQuitMessage
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
InvalidateRect
SetBkColor
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateSolidBrush
CreateFontA
SetBkMode
SetTextColor
CreateBrushIndirect
SelectObject
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
MulDiv
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
RegisterClassA
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
EmptyClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SetForegroundWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindClose
FindNextFileA
FindFirstFileA
GetSystemDefaultLangID
LocalFree
ExpandEnvironmentStringsW
GetVersionExA
lstrcmpA
FindNextFileW
FindFirstFileW
GetModuleFileNameA
GetShortPathNameA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
GetCurrentProcess
CreateDirectoryA
CopyFileA
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
Process32Next
Process32First
CreateToolhelp32Snapshot
InterlockedIncrement
InterlockedDecrement
HeapDestroy
lstrcatA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
IsDBCSLeadByte
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
SetFileTime
GetLocalTime
SetEnvironmentVariableA
CompareStringW
GetTickCount
SetEndOfFile
GetOEMCP
GetACP
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
Sleep
ExitProcess
GetVersion
GetCommandLineA
HeapReAlloc
GetSystemTime
CreateThread
LoadLibraryA
GetProcAddress
FreeLibrary
ExpandEnvironmentStringsA
lstrcatW
GetCurrentProcessId
lstrcpyA
lstrcmpiA
SetFileAttributesA
MultiByteToWideChar
WritePrivateProfileStringA
lstrlenA
GetCurrentThreadId
GetProcessHeap
HeapFree
lstrcpyW
lstrcpynW
lstrcmpiW
GetPrivateProfileIntA
lstrlenW
GetPrivateProfileStringA
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetTimeZoneInformation
RtlUnwind
HeapAlloc
DeleteFileA
WideCharToMultiByte
CompareStringA
InterlockedExchange
PtInRect
ScreenToClient
GetCursorPos
GetDC
SetWindowTextW
GetWindowTextLengthW
GetParent
DrawTextW
SendMessageA
IsWindow
GetAsyncKeyState
SetCursor
GetClientRect
GetWindowTextW
SetWindowLongA
PostMessageW
SendMessageW
LoadCursorA
CopyRect
GetSysColor
FindWindowExW
LoadImageW
DestroyIcon
CallNextHookEx
SetWindowsHookExW
UnhookWindowsHookEx
wsprintfA
LoadImageA
ReleaseDC
GetWindowLongA
CharNextA
FindWindowExA
GetClassNameA
CreateWindowExA
DestroyWindow
wsprintfW
GetWindowRect
CreatePopupMenu
InsertMenuItemW
CheckMenuItem
TrackPopupMenu
DestroyMenu
CallWindowProcW
SetWindowLongW
GetDlgCtrlID
GetWindowThreadProcessId
FillRect
GetFocus
GetTextExtentPointW
SetTextColor
SetBkMode
GetTextExtentPoint32W
CreateCompatibleDC
GetObjectA
SelectObject
CreateDIBSection
BitBlt
DeleteObject
DeleteDC
CreateSolidBrush
RegDeleteValueA
RegOpenKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
SHGetSpecialFolderPathW
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
VarUI4FromStr
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysFreeString
SysAllocString
PathAppendA
PathRemoveFileSpecA
PathFileExistsA
StrStrIW
StrCmpIW
StrCmpW
StrStrIA
PathFindFileNameA
StrStrW
StrCmpNIW
StrCpyW
StrCatW
StrCpyNW
StrDupW
UrlApplySchemeW
PathIsURLW
StrRetToBufW
StrRStrIW
PathFileExistsW
PathIsDirectoryW
StrDupA
StrNCatW
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
InternetCrackUrlW
InternetCrackUrlA
FindCloseUrlCache
URLDownloadToFileA
ImageList_Remove
ImageList_ReplaceIcon
gethostbyname
inet_ntoa
WSAGetLastError
WSAStartup
recv
connect
inet_addr
htons
send
setsockopt
socket
closesocket
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindClose
FindNextFileA
FindFirstFileA
GetSystemDefaultLangID
LocalFree
ExpandEnvironmentStringsW
GetVersionExA
lstrcmpA
FindNextFileW
FindFirstFileW
GetModuleFileNameA
GetShortPathNameA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
GetCurrentProcess
CreateDirectoryA
CopyFileA
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
Process32Next
Process32First
CreateToolhelp32Snapshot
InterlockedIncrement
InterlockedDecrement
HeapDestroy
lstrcatA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
IsDBCSLeadByte
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
SetFileTime
GetLocalTime
SetEnvironmentVariableA
CompareStringW
GetTickCount
SetEndOfFile
GetOEMCP
GetACP
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
Sleep
ExitProcess
GetVersion
GetCommandLineA
HeapReAlloc
GetSystemTime
CreateThread
LoadLibraryA
GetProcAddress
FreeLibrary
ExpandEnvironmentStringsA
lstrcatW
GetCurrentProcessId
lstrcpyA
lstrcmpiA
SetFileAttributesA
MultiByteToWideChar
WritePrivateProfileStringA
lstrlenA
GetCurrentThreadId
GetProcessHeap
HeapFree
lstrcpyW
lstrcpynW
lstrcmpiW
GetPrivateProfileIntA
lstrlenW
GetPrivateProfileStringA
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetTimeZoneInformation
RtlUnwind
HeapAlloc
DeleteFileA
WideCharToMultiByte
CompareStringA
InterlockedExchange
PtInRect
ScreenToClient
GetCursorPos
GetDC
SetWindowTextW
GetWindowTextLengthW
GetParent
DrawTextW
SendMessageA
IsWindow
GetAsyncKeyState
SetCursor
GetClientRect
GetWindowTextW
SetWindowLongA
PostMessageW
SendMessageW
LoadCursorA
CopyRect
GetSysColor
FindWindowExW
LoadImageW
DestroyIcon
CallNextHookEx
SetWindowsHookExW
UnhookWindowsHookEx
wsprintfA
LoadImageA
ReleaseDC
GetWindowLongA
CharNextA
FindWindowExA
GetClassNameA
CreateWindowExA
DestroyWindow
wsprintfW
GetWindowRect
CreatePopupMenu
InsertMenuItemW
CheckMenuItem
TrackPopupMenu
DestroyMenu
CallWindowProcW
SetWindowLongW
GetDlgCtrlID
GetWindowThreadProcessId
FillRect
GetFocus
GetTextExtentPointW
SetTextColor
SetBkMode
GetTextExtentPoint32W
CreateCompatibleDC
GetObjectA
SelectObject
CreateDIBSection
BitBlt
DeleteObject
DeleteDC
CreateSolidBrush
RegDeleteValueA
RegOpenKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
SHGetSpecialFolderPathW
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
VarUI4FromStr
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysFreeString
SysAllocString
PathAppendA
PathRemoveFileSpecA
PathFileExistsA
StrStrIW
StrCmpIW
StrCmpW
StrStrIA
PathFindFileNameA
StrStrW
StrCmpNIW
StrCpyW
StrCatW
StrCpyNW
StrDupW
UrlApplySchemeW
PathIsURLW
StrRetToBufW
StrRStrIW
PathFileExistsW
PathIsDirectoryW
StrDupA
StrNCatW
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
InternetCrackUrlW
InternetCrackUrlA
FindCloseUrlCache
URLDownloadToFileA
ImageList_Remove
ImageList_ReplaceIcon
gethostbyname
inet_ntoa
WSAGetLastError
WSAStartup
recv
connect
inet_addr
htons
send
setsockopt
socket
closesocket
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetAdaptersInfo
RtlUnwind
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
InterlockedDecrement
InterlockedIncrement
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CloseHandle
Aux_Aux
Aux_Uid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetPrivateProfileIntA
ExpandEnvironmentStringsA
CreateDirectoryA
DeleteFileA
FreeLibrary
WinExec
lstrcatA
SetEnvironmentVariableA
CompareStringW
GetTimeZoneInformation
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetPrivateProfileStringA
HeapSize
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
WritePrivateProfileStringA
SetFileAttributesA
LoadLibraryA
GetProcAddress
LocalFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
GetCurrentThreadId
GetSystemDefaultLangID
SetThreadLocale
RaiseException
ReleaseMutex
CloseHandle
CreateMutexA
GetLastError
GetCurrentProcess
FlushInstructionCache
InterlockedDecrement
OutputDebugStringA
DebugBreak
CompareStringA
InterlockedIncrement
lstrcmpiA
lstrlenA
lstrcpyA
GetModuleFileNameA
UnhandledExceptionFilter
GetThreadLocale
IsWindowEnabled
GetSysColor
GetFocus
FillRect
GetDlgCtrlID
GetCursorPos
ScreenToClient
CallWindowProcA
PtInRect
SetFocus
SetCapture
GetCapture
ReleaseCapture
IsDialogMessageA
LoadImageA
GetDlgItem
GetParent
SetDlgItemTextA
GetSystemMetrics
PostQuitMessage
CheckDlgButton
IsDlgButtonChecked
SetCursor
InvalidateRect
UpdateWindow
DestroyCursor
SetRectEmpty
FrameRect
EnableWindow
DestroyWindow
CreateDialogParamA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowA
IsWindowVisible
IsIconic
BringWindowToTop
SetForegroundWindow
DefWindowProcA
ShowWindow
LoadStringA
wvsprintfA
CharNextA
SetWindowTextA
CreateWindowExA
ReleaseDC
GetDC
DrawTextA
OffsetRect
GetClassNameA
SetWindowLongA
CreateCursor
GetWindowTextLengthA
GetWindowTextA
GetWindowLongA
GetWindow
GetWindowRect
SystemParametersInfoA
MapWindowPoints
SetWindowPos
EndPaint
IsWindow
SendMessageA
BeginPaint
GetClientRect
ClientToScreen
DrawFocusRect
SetBkColor
GetTextExtentPointA
SetBkMode
CreateSolidBrush
SetTextColor
TextOutA
DeleteDC
GetStockObject
GetObjectA
DeleteObject
LineTo
MoveToEx
SelectObject
ExtTextOutA
CreateFontIndirectA
CreatePen
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
ShellExecuteA
CoUninitialize
CoInitialize
PathFileExistsA
PathRemoveFileSpecA
PathAppendA
SHGetValueA
InitCommonControlsEx
_TrackMouseEvent
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSystemDefaultLangID
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateProcess
CloseHandle
WritePrivateProfileStringA
InterlockedIncrement
DebugBreak
OutputDebugStringA
InterlockedDecrement
GetLastError
GetPrivateProfileIntA
Sleep
WinExec
ReadFile
SetStdHandle
FlushFileBuffers
CreateDirectoryA
lstrlenA
FindFirstFileA
SetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetModuleFileNameA
GetPrivateProfileStringA
LocalFree
ExpandEnvironmentStringsA
RaiseException
VirtualAlloc
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
HeapFree
HeapAlloc
HeapReAlloc
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
SetFilePointer
SetUnhandledExceptionFilter
CharNextA
wvsprintfA
LoadStringA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegEnumKeyA
SHDeleteKeyA
SHSetValueA
SHGetValueA
PathFileExistsA
PathRemoveFileSpecA
PathAppendA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CloseHandle
ReadFile
GetFileSize
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CopyFileA
WriteFile
HeapAlloc
HeapFree
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
FlushFileBuffers
GetStringTypeA
GetStringTypeW
SetStdHandle
LCMapStringA
LCMapStringW
RtlUnwind
Sign_SplitSgnFile
Sign_VerifySgnFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MulDiv
lstrcpynA
GetModuleHandleA
GlobalAlloc
MultiByteToWideChar
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcatA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
lstrcmpiA
GetDlgCtrlID
SetWindowLongA
LoadIconA
LoadImageA
PtInRect
GetDC
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
GetDlgItem
GetWindowLongA
DrawTextA
DrawFocusRect
MapWindowPoints
CallWindowProcA
PostMessageA
SetWindowTextA
SendMessageA
GetWindowTextA
SetFocus
MessageBoxA
wsprintfA
CreateWindowExA
SetTextColor
SelectObject
CreateCompatibleDC
DeleteObject
GetTextExtentPoint32A
DeleteDC
SetBkMode
SetBkColor
GetTextMetricsA
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
SHGetMalloc
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord5572
ord2915
ord4277
ord4278
ord2763
ord1228
ord6283
ord3721
ord3619
ord809
ord795
ord2614
ord556
ord3663
ord3626
ord2414
ord4275
ord5875
ord2864
ord1088
ord2122
ord1641
ord3797
ord6358
ord6197
ord2859
ord6880
ord926
ord2860
ord4129
ord5683
ord6663
ord4774
ord4402
ord3640
ord693
ord4243
ord3301
ord3910
ord6605
ord2754
ord6696
ord3293
ord6282
ord538
ord6569
ord1085
ord5601
ord802
ord542
ord922
ord6905
ord6007
ord4220
ord2584
ord3654
ord2438
ord6270
ord2863
ord1644
ord2546
ord291
ord5710
ord2824
ord6874
ord2642
ord1175
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord3953
ord2725
ord771
ord2528
ord1008
ord497
ord1948
ord5303
ord4699
ord5715
ord817
ord565
ord2726
ord4226
ord6215
ord2086
ord5450
ord6394
ord5440
ord6383
ord283
ord5678
ord5789
ord5787
ord5873
ord6172
ord5736
ord2814
ord834
ord3573
ord3089
ord1116
ord1176
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord1669
ord5681
ord4224
ord2652
ord6334
ord3874
ord3092
ord858
ord1768
ord5280
ord470
ord755
ord4234
ord2301
ord324
ord567
ord6467
ord1168
ord1146
ord641
ord656
ord3610
ord4424
ord3402
ord4837
ord5290
ord1776
ord6055
ord3597
ord4853
ord4376
ord6199
ord2370
ord4202
ord6877
ord3337
ord4171
ord6311
ord2764
ord3097
ord6453
ord3998
ord6907
ord939
ord5953
ord2379
ord4710
ord3996
ord4258
ord825
ord2302
ord489
ord768
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4835
ord3798
ord5287
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4854
ord4377
ord5265
ord4358
ord4948
ord4976
ord4742
ord4905
ord5160
ord5162
ord5161
ord1907
ord940
ord356
ord535
ord941
ord2770
ord2781
ord4058
ord3181
ord3178
ord3310
ord668
ord2818
ord540
ord3811
ord2820
ord537
ord800
ord860
ord823
ord539
strstr
_beginthreadex
_mbscmp
memset
memcmp
memcpy
atoi
sprintf
strlen
time
srand
rand
__CxxFrameHandler
_purecall
_stricmp
_strcmpi
_strnicmp
_vsnprintf
_except_handler3
atof
_mbccpy
_mbsnbcmp
_mbsstr
_mbclen
_mbsncmp
_mbschr
strcat
strncpy
fopen
fwrite
fflush
fclose
_mbsicmp
sscanf
_mbsrchr
??8type_info@@QBEHABV0@@Z
_CxxThrowException
_ftol
toupper
vsprintf
strcpy
exit
__dllonexit
_onexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
free
_initterm
malloc
_adjust_fdiv
_endthreadex
InterlockedIncrement
GetVersionExA
DeviceIoControl
lstrcmpA
LockFile
WriteFile
UnlockFile
ReadFile
MoveFileA
FindFirstFileA
FindNextFileA
FindClose
GetFileSize
SetFilePointer
SetEndOfFile
GetFileAttributesA
GlobalFree
GetModuleFileNameA
GlobalAlloc
GlobalLock
GlobalUnlock
LocalAlloc
OutputDebugStringA
lstrcpyA
ResetEvent
SetEvent
WaitForSingleObject
GetExitCodeThread
CreateFileA
WideCharToMultiByte
LocalFree
InterlockedDecrement
TerminateProcess
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
SetLastError
GetLastError
InterlockedExchange
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
GetPrivateProfileIntA
DeleteFileA
QueryPerformanceCounter
QueryPerformanceFrequency
lstrlenW
GetTempFileNameA
GetTempPathA
SetUnhandledExceptionFilter
VirtualQuery
GetFileTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
IsBadReadPtr
MultiByteToWideChar
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
CreateProcessA
GetProcAddress
LoadLibraryExA
GetCurrentThreadId
lstrcpynA
lstrcmpiA
CreateEventA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemInfo
GlobalMemoryStatus
GetModuleHandleA
OpenFile
GetACP
CopyFileA
SetFileTime
SystemTimeToFileTime
CloseHandle
GetTickCount
GetSystemTime
EnableWindow
GetMessagePos
RegisterWindowMessageA
FillRect
MessageBeep
PostThreadMessageA
GetMenuItemCount
GetMenuItemID
LoadMenuA
GetSubMenu
PostMessageA
SetWindowPos
GetCursorPos
ScreenToClient
UpdateWindow
SendDlgItemMessageA
SetDlgItemTextA
ShowWindow
SetForegroundWindow
LoadCursorA
CopyIcon
GetWindowRect
GetDC
ReleaseDC
InflateRect
InvalidateRect
IsWindow
SetCursor
PtInRect
ReleaseCapture
RedrawWindow
SetCapture
DestroyCursor
GetSysColor
wsprintfA
GetParent
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
SetWindowLongA
GetWindowLongA
IsWindowVisible
IsIconic
KillTimer
SetTimer
MessageBoxA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
LoadIconA
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
GetStockObject
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptAcquireContextA
RegEnumValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
GetUserNameA
ExtractIconA
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteA
CoInitialize
OleRun
CoCreateInstance
CoTaskMemFree
CoCreateGuid
StringFromCLSID
CoUninitialize
SysAllocString
VariantClear
SysFreeString
GetErrorInfo
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?find_last_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?find_first_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?_Xran@std@@YAXXZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0Init@ios_base@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?empty@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE_NXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDIABV?$allocator@D@1@@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??9std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
getpeername
gethostname
WSAStartup
recvfrom
WSACleanup
sendto
send
recv
inet_addr
connect
gethostbyname
setsockopt
shutdown
WSACreateEvent
WSAEventSelect
WSACloseEvent
WSASocketA
socket
htons
bind
getsockname
ntohs
listen
WSASetEvent
WSAWaitForMultipleEvents
WSAGetLastError
WSASetLastError
WSAResetEvent
WSAEnumNetworkEvents
accept
closesocket
WSASend
inet_ntoa
WSARecv
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetGetConnectedState
InternetOpenA
InternetCloseHandle
InternetSetCookieA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
WMCreateReader
WMCreateWriter
??0CPSNetwork@@QAE@ABV0@@Z
??0CPSNetwork@@QAE@XZ
??1CPSNetwork@@UAE@XZ
??4CPSNetwork@@QAEAAV0@ABV0@@Z
??_7CPSNetwork@@6B@
?Connect@CPSNetwork@@QAEHXZ
?Disconnect@CPSNetwork@@QAEXXZ
?GetCacheTime@CPSNetwork@@QAEHXZ
?GetChannelName@CPSNetwork@@QAEPBDXZ
?GetChannelOnlineCount@CPSNetwork@@QAEKXZ
?GetComment@CPSNetwork@@QAEPBDH@Z
?GetHttpURL@CPSNetwork@@QAEPBDH@Z
?GetMsg@CPSNetwork@@QAEHAAKPAD@Z
?GetPercent@CPSNetwork@@QAEHAAK0@Z
?GetStatus@CPSNetwork@@QAE?AW4PLAY_STATUS@@XZ
?GetStreamingType@CPSNetwork@@QAE?AW4STREAMING_TYPE@@XZ
?Save@CPSNetwork@@QAEHPBD@Z
?SetLogLevel@CPSNetwork@@QAEHH@Z
?SetParam@CPSNetwork@@QAEXPBD0@Z
?ShowPropertyDlg@CPSNetwork@@QAEXH@Z
FIO_Create
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord6111
ord2915
ord1200
ord1175
ord2393
ord1567
ord268
ord4160
ord3619
ord809
ord556
ord1088
ord2122
ord3797
ord6358
ord941
ord926
ord2860
ord6385
ord6930
ord5450
ord6394
ord5440
ord6383
ord6379
ord772
ord6142
ord500
ord5860
ord3986
ord5606
ord939
ord4284
ord5873
ord5834
ord2841
ord2448
ord2044
ord2107
ord6467
ord5861
ord6883
ord6648
ord4278
ord6663
ord703
ord404
ord603
ord273
ord275
ord2971
ord5759
ord6192
ord5756
ord6186
ord4330
ord6189
ord6021
ord5794
ord5678
ord5736
ord5579
ord5571
ord6061
ord5864
ord3596
ord3571
ord640
ord5785
ord1640
ord323
ord816
ord3908
ord562
ord940
ord1233
ord5575
ord6194
ord6378
ord3815
ord5981
ord6442
ord465
ord4204
ord6928
ord2652
ord4202
ord4224
ord1669
ord5710
ord2763
ord3716
ord790
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord3401
ord4622
ord3670
ord561
ord1134
ord3952
ord1205
ord2724
ord6354
ord1216
ord1227
ord6010
ord1877
ord4249
ord2486
ord2687
ord6364
ord3326
ord6365
ord4472
ord5498
ord3278
ord3353
ord3681
ord446
ord743
ord1177
ord4006
ord2727
ord2730
ord2729
ord5572
ord1210
ord2439
ord1693
ord5618
ord994
ord4342
ord4687
ord4639
ord5674
ord2156
ord4856
ord4920
ord6002
ord2137
ord1963
ord5213
ord2953
ord3868
ord5150
ord2575
ord4707
ord2876
ord5649
ord4113
ord4661
ord4660
ord4768
ord4650
ord4903
ord4548
ord4521
ord4594
ord4988
ord4925
ord4930
ord4935
ord4659
ord4909
ord4908
ord4668
ord4667
ord4666
ord4648
ord4689
ord5023
ord4654
ord4643
ord4354
ord4780
ord4649
ord4637
ord4636
ord5060
ord4584
ord4371
ord4361
ord4356
ord4739
ord4741
ord4738
ord4409
ord4603
ord4415
ord4992
ord4979
ord2488
ord3404
ord4539
ord4534
ord2954
ord2384
ord6370
ord2983
ord3148
ord3260
ord4466
ord2986
ord3080
ord4081
ord4624
ord5825
ord723
ord3946
ord423
ord5332
ord5328
ord5331
ord5314
ord5333
ord2541
ord4949
ord2998
ord4459
ord5033
ord4502
ord6030
ord6876
ord2956
ord1601
ord3474
ord1892
ord4252
ord1212
ord4570
ord4672
ord4843
ord5011
ord4713
ord6371
ord5286
ord4438
ord3279
ord4625
ord449
ord746
ord2278
ord6311
ord4171
ord2753
ord3546
ord4317
ord2243
ord5788
ord472
ord5787
ord6646
ord6334
ord2450
ord4133
ord4297
ord3005
ord4033
ord433
ord1132
ord1116
ord1176
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord1979
ord665
ord924
ord922
ord1641
ord641
ord795
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord2078
ord289
ord613
ord539
ord6143
ord4476
ord2764
ord6199
ord6605
ord4287
ord2688
ord801
ord541
ord283
ord3742
ord2795
ord6215
ord2086
ord2642
ord4299
ord6880
ord3092
ord2116
ord2614
ord6778
ord6453
ord1168
ord2567
ord3874
ord2380
ord4275
ord609
ord3574
ord4396
ord4023
ord6282
ord6283
ord5683
ord4277
ord4129
ord5875
ord5789
ord2754
ord6172
ord2859
ord5768
ord2864
ord4034
ord535
ord1949
ord818
ord2135
ord823
ord1146
ord1644
ord2863
ord6270
ord2379
ord2438
ord3654
ord2584
ord4220
ord470
ord755
ord4710
ord6380
ord6197
ord4234
ord2302
ord2370
ord2414
ord3626
ord3663
ord825
ord324
ord567
ord540
ord860
ord858
ord800
ord537
ord6877
ord2818
ord354
ord5186
ord3318
ord2919
ord4705
ord5442
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord3573
ord3721
ord4424
ord3402
ord5290
ord1776
ord1226
ord6055
ord1131
strstr
_mbsicmp
abs
fopen
fwrite
fflush
fclose
sprintf
time
strcmp
memset
atoi
strlen
_ftol
_stricmp
__CxxFrameHandler
_mbsstr
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_beginthreadex
_endthreadex
exit
memcpy
strcpy
_access
toupper
memcmp
wcsncpy
pow
atol
strcat
strchr
_mbsrchr
strncpy
strncmp
memmove
_mbscmp
strrchr
wcstol
wcscmp
wcslen
rand
srand
strtoul
??1type_info@@UAE@XZ
_except_handler3
?terminate@@YAXXZ
__dllonexit
_adjust_fdiv
malloc
_initterm
free
_onexit
CopyFileA
OpenFile
GetCurrentProcess
GetCurrentProcessId
GetSystemTime
OpenProcess
GetExitCodeProcess
TerminateProcess
WinExec
GetProcAddress
lstrcpynA
CreateDirectoryA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
CreateWaitableTimerA
SetWaitableTimer
WaitForMultipleObjects
ResumeThread
MulDiv
GlobalFree
CreateEventA
FindResourceA
LoadResource
SizeofResource
LockResource
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetACP
GetVersionExA
DeviceIoControl
InterlockedDecrement
GetLastError
CreateFileA
GetModuleFileNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
LeaveCriticalSection
LocalFree
LocalAlloc
ResetEvent
SetEvent
WaitForSingleObject
EnterCriticalSection
GetExitCodeThread
DeleteCriticalSection
InitializeCriticalSection
CreateProcessA
CloseHandle
lstrcpyA
GetPrivateProfileStringA
GetTickCount
Sleep
DeleteFileA
GetPrivateProfileIntA
WritePrivateProfileStringA
lstrlenA
lstrcatA
lstrlenW
GetMenuStringA
GetMenuState
InsertMenuItemA
MessageBoxA
GetParent
ClientToScreen
KillTimer
SetTimer
RegisterClassA
DefWindowProcA
PostMessageA
SetRect
ScreenToClient
PtInRect
SetCursor
LoadMenuA
GetSubMenu
GetCursorPos
GetClientRect
GetMessageA
TranslateMessage
PostThreadMessageA
GetCapture
CreatePopupMenu
AppendMenuA
GetClassInfoA
EnableMenuItem
DeleteMenu
InsertMenuA
GetPropA
RemoveMenu
MonitorFromWindow
GetMonitorInfoA
GetDesktopWindow
SetParent
SetRectEmpty
ShowCursor
GrayStringA
TabbedTextOutA
wsprintfA
ShowWindow
SetForegroundWindow
LoadCursorA
CopyIcon
SetWindowLongA
ReleaseCapture
RedrawWindow
DestroyCursor
GetMenuItemCount
GetMenuItemInfoA
GetMenuStringW
GetMenuItemID
ModifyMenuA
UpdateWindow
CopyRect
GetSystemMetrics
SystemParametersInfoA
CharLowerA
IntersectRect
IsRectEmpty
MoveWindow
OffsetRect
mouse_event
DispatchMessageA
InvalidateRect
IsWindow
GetDC
CheckMenuItem
ReleaseDC
EnableWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DrawTextA
FillRect
GetSysColor
GetWindowRect
SetPropA
GetWindowLongA
IsWindowVisible
SendMessageA
SetCapture
InflateRect
FrameRect
SetBkColor
GetViewportExtEx
GetWindowExtEx
SetMapMode
GetMapMode
PtVisible
RectVisible
CreateBitmap
ExtTextOutA
Escape
GetNearestColor
Rectangle
GetTextMetricsA
GetObjectA
CreateFontIndirectA
StretchBlt
CreateRectRgnIndirect
CombineRgn
FillRgn
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
GetDeviceCaps
GetStockObject
GetTextExtentPoint32A
SelectObject
PatBlt
DeleteObject
SetTextColor
SetBkMode
LPtoDP
TextOutA
CreateSolidBrush
DPtoLP
RegSetValueA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptAcquireContextA
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
SHGetMalloc
ShellExecuteA
ShellExecuteExA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
_TrackMouseEvent
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoCreateInstance
ord251
LoadRegTypeLi
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayDestroy
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??0logic_error@std@@QAE@ABV01@@Z
??0out_of_range@std@@QAE@ABV01@@Z
??1out_of_range@std@@UAE@XZ
??_7out_of_range@std@@6B@
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
?find_first_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?find_last_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?GetStreamingType@CPSNetwork@@QAE?AW4STREAMING_TYPE@@XZ
?GetPercent@CPSNetwork@@QAEHAAK0@Z
?GetChannelName@CPSNetwork@@QAEPBDXZ
?Save@CPSNetwork@@QAEHPBD@Z
?ShowPropertyDlg@CPSNetwork@@QAEXH@Z
?Connect@CPSNetwork@@QAEHXZ
?GetComment@CPSNetwork@@QAEPBDH@Z
??0CPSNetwork@@QAE@XZ
??1CPSNetwork@@UAE@XZ
?SetParam@CPSNetwork@@QAEXPBD0@Z
?GetHttpURL@CPSNetwork@@QAEPBDH@Z
?Disconnect@CPSNetwork@@QAEXXZ
?GetStatus@CPSNetwork@@QAE?AW4PLAY_STATUS@@XZ
WSACleanup
inet_ntoa
WSAStartup
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
CloseHandle
WriteFile
CreateFileA
FindClose
FindFirstFileA
SetFileTime
GetFileTime
LocalFree
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
SetEnvironmentVariableA
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
DisableThreadLibraryCalls
GetPrivateProfileSectionA
GetTickCount
CompareStringA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
ReadFile
LoadLibraryA
FlushFileBuffers
SetStdHandle
GetSystemDirectoryA
WideCharToMultiByte
GetPrivateProfileStringA
GetPrivateProfileIntA
GetWindowsDirectoryA
DeleteFileA
WritePrivateProfileStringA
GetLastError
MultiByteToWideChar
lstrlenW
CompareStringW
SetFilePointer
GetStringTypeW
GetStringTypeA
VirtualAlloc
SetHandleCount
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
RtlUnwind
CreateThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
RaiseException
TlsAlloc
TlsFree
SetLastError
HeapAlloc
HeapFree
ExitProcess
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
GetProcAddress
GetModuleHandleA
SetUnhandledExceptionFilter
EnumChildWindows
SetWindowTextA
GetClassNameA
GetWindowTextA
wsprintfA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ShellExecuteA
CoCreateGuid
CoInitialize
CoUninitialize
LoadRegTypeLi
SysStringLen
SysAllocStringLen
SysFreeString
VariantCopy
VariantChangeType
VariantClear
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetOpenA
InternetOpenUrlA
ord18
ord15
ord57
ord21
ord31
ord32
ord58
ord30
ord16
ord23
htons
inet_addr
ioctlsocket
socket
sendto
recvfrom
WSAStartup
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ