_ItemDlg@16
_MainWndProc@16
_ProgressDlg@16
_PromptDlg@16
_SharedDlg@16
Overview
overview
7Static
static
7Dfm2Txt.exe
windows7-x64
7Dfm2Txt.exe
windows10-2004-x64
7EN_wincmp3.chm
windows7-x64
1EN_wincmp3.chm
windows10-2004-x64
1IniSort.exe
windows7-x64
7IniSort.exe
windows10-2004-x64
7IniSort98.exe
windows7-x64
7IniSort98.exe
windows10-2004-x64
7LineSort.exe
windows7-x64
7LineSort.exe
windows10-2004-x64
7OdfToTxt.exe
windows7-x64
1OdfToTxt.exe
windows10-2004-x64
1OdfToTxt.html
windows7-x64
1OdfToTxt.html
windows10-2004-x64
1OdfToTxtReadme.html
windows7-x64
1OdfToTxtReadme.html
windows10-2004-x64
1UnWise.exe
windows7-x64
3UnWise.exe
windows10-2004-x64
3Winstart.exe
windows7-x64
3Winstart.exe
windows10-2004-x64
3bin2hex.exe
windows7-x64
7bin2hex.exe
windows10-2004-x64
7keygen.exe
windows7-x64
7keygen.exe
windows10-2004-x64
7lnkconv.exe
windows7-x64
1lnkconv.exe
windows10-2004-x64
1pdftotext.dll
windows7-x64
7pdftotext.dll
windows10-2004-x64
7reg.bat
windows7-x64
1reg.bat
windows10-2004-x64
1register.url
windows7-x64
6register.url
windows10-2004-x64
3Behavioral task
behavioral1
Sample
Dfm2Txt.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Dfm2Txt.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
EN_wincmp3.chm
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
EN_wincmp3.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
IniSort.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
IniSort.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
IniSort98.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
IniSort98.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
LineSort.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
LineSort.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
OdfToTxt.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
OdfToTxt.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
OdfToTxt.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
OdfToTxt.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
OdfToTxtReadme.html
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
OdfToTxtReadme.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
UnWise.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
UnWise.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Winstart.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Winstart.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
bin2hex.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
bin2hex.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
keygen.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
keygen.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
lnkconv.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
lnkconv.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
pdftotext.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
pdftotext.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
reg.bat
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
reg.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
register.url
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
register.url
Resource
win10v2004-20240709-en
Target
3e94d04fd84536f6297238171dc84900_JaffaCakes118
Size
2.1MB
MD5
3e94d04fd84536f6297238171dc84900
SHA1
696fb7f8d2f9ee1ce13b5eca61e0ee1479ca0caa
SHA256
fced89ce4b8ce3fb7ac8b82bd8138c7ea84a97c82ad265d30b3b028835235090
SHA512
b46319f712961b534887ef4a67d97127c42ddd42680131fc95ad6a37ec7e7ec9d1e8f25a00f4b1ceac32d9771ab24d1e504a606ef6957e25114fde5e80bbe900
SSDEEP
49152:ET2DkcfaenDKqifjrqIUvgyXIOBIzCRgTAygMBrrwOxlEbF40jA:EKnVGNLrCvgyXpRigMBvbxKxTjA
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/pdftotext.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/Dfm2Txt.exe | upx |
static1/unpack001/IniSort.exe | upx |
static1/unpack001/IniSort98.exe | upx |
static1/unpack001/LineSort.exe | upx |
static1/unpack001/bin2hex.exe | upx |
static1/unpack001/keygen.exe | upx |
static1/unpack001/pdftotext.dll | upx |
static1/unpack001/uniqline.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Dfm2Txt.exe |
unpack002/out.upx |
unpack001/IniSort.exe |
unpack003/out.upx |
unpack001/IniSort98.exe |
unpack004/out.upx |
unpack001/LineSort.exe |
unpack005/out.upx |
unpack001/OdfToTxt.exe |
unpack001/UnWise.exe |
unpack001/Winstart.exe |
unpack001/bin2hex.exe |
unpack006/out.upx |
unpack001/keygen.exe |
unpack007/out.upx |
unpack001/lnkconv.exe |
unpack001/pdftotext.dll |
unpack001/uniqline.exe |
unpack009/out.upx |
unpack001/unzip32.dll |
unpack001/urlconv.exe |
unpack001/wincmpExt.dll |
unpack001/wincmpext64.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
WaitForSingleObject
MoveFileExA
GetVersionExA
CreateDirectoryA
LocalFree
FormatMessageA
GetLastError
SizeofResource
CreateProcessA
RemoveDirectoryA
GetFileAttributesA
GetPrivateProfileIntA
SetErrorMode
GlobalAlloc
GlobalLock
DeleteFileA
FreeResource
WinExec
lstrcatA
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
GlobalUnlock
GlobalFree
OpenFile
lstrcpynA
WritePrivateProfileStringA
MultiByteToWideChar
_lcreat
_lwrite
FileTimeToDosDateTime
GetFileTime
FileTimeToLocalFileTime
GetSystemDirectoryA
_lread
GetDriveTypeA
lstrcmpA
_lopen
_llseek
MulDiv
lstrcmpiA
_lclose
lstrcpyA
GetModuleFileNameA
lstrlenA
CopyFileA
GetTempPathA
GetTempFileNameA
LoadResource
FindResourceA
LockResource
GetPrivateProfileStringA
GetLocalTime
FreeEnvironmentStringsA
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsW
VirtualFree
ExitProcess
HeapCreate
HeapDestroy
GetEnvironmentVariableA
ReadFile
SetFilePointer
WriteFile
GetStdHandle
SetHandleCount
SetStdHandle
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
GetCurrentProcess
TerminateProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapFree
HeapAlloc
MoveFileA
CreateFileA
GetFileType
SetEndOfFile
CloseHandle
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
GetCPInfo
VirtualAlloc
GetACP
GetOEMCP
LoadBitmapA
UpdateWindow
RegisterClassA
SetWindowTextA
wsprintfA
MessageBoxA
GetSysColor
CreateWindowExA
DispatchMessageA
ShowWindow
LoadIconA
KillTimer
DestroyWindow
GetMessageA
ExitWindowsEx
LoadCursorA
SetCursor
EnableWindow
IsWindowVisible
CreateDialogParamA
IsDialogMessageA
PostMessageA
EndPaint
PostQuitMessage
GetClientRect
BeginPaint
ReleaseDC
InvalidateRect
GetDC
DefWindowProcA
MoveWindow
GetWindowRect
SetDlgItemTextA
EndDialog
GetDlgItemTextA
SetRect
ScreenToClient
GetWindowTextA
SendMessageA
SendDlgItemMessageA
GetDlgItem
SetFocus
OemToCharA
DialogBoxParamA
DrawEdge
CharNextA
GetDialogBaseUnits
FillRect
DrawIcon
LoadStringA
GetParent
EnumChildWindows
FindWindowA
DdeCreateDataHandle
DdeInitializeA
DdeCreateStringHandleA
DdeClientTransaction
DdeGetData
TranslateMessage
SetTimer
DdeUninitialize
PeekMessageA
DdeDisconnect
DdeFreeDataHandle
DdeConnect
CreateBrushIndirect
TextOutA
SetTextColor
GetTextExtentPointA
CreateFontA
GetDeviceCaps
SetBkMode
BitBlt
GetObjectA
DeleteDC
PatBlt
CreateSolidBrush
CreateCompatibleDC
RealizePalette
SelectPalette
SelectObject
MoveToEx
CreatePen
LineTo
SetBkColor
StretchBlt
ExtTextOutA
CreateCompatibleBitmap
CreateFontIndirectA
GetStockObject
DeleteObject
GetOpenFileNameA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegOpenKeyExA
CloseServiceHandle
OpenSCManagerA
RegSetValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyA
RegOpenKeyA
DeleteService
ControlService
OpenServiceA
ShellExecuteA
CoUninitialize
CoCreateInstance
CoInitialize
_ItemDlg@16
_MainWndProc@16
_ProgressDlg@16
_PromptDlg@16
_SharedDlg@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ShellExecuteA
GetCPInfo
WideCharToMultiByte
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LoadLibraryA
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapFree
HeapAlloc
VirtualAlloc
GetProcAddress
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AddAtomA
CopyFileA
ExitProcess
FindAtomA
GetAtomNameA
MultiByteToWideChar
SetUnhandledExceptionFilter
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memset
printf
puts
signal
CoCreateInstance
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetDocInfo
GetDocInfoU
GetTextContent
GetTextContentFormatted
GetUnicodeTextContent
GetUnicodeTextContentFormatted
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
free
__lconv_init
toupper
_adjust_fdiv
mktime
time
_initterm
_get_osfhandle
setlocale
fclose
strncpy
gmtime
_mbsrchr
tolower
_isctype
_pctype
localtime
putc
fflush
longjmp
fopen
mblen
__mb_cur_max
_mbschr
_mbsinc
_iob
fgets
strncmp
sprintf
_setjmp3
realloc
malloc
_chmod
_isatty
_mkdir
_read
_lseek
_setmode
_fileno
_open
_unlink
_stat
_write
_tzset
_putenv
_close
_strnicmp
_strupr
FileTimeToSystemTime
InitializeCriticalSection
ReleaseMutex
FindFirstFileA
FindNextFileA
GlobalFree
GlobalAlloc
GlobalUnlock
lstrcpyA
GetCurrentProcess
GlobalLock
CreateMutexA
InterlockedExchange
HeapAlloc
GetFullPathNameA
lstrlenA
lstrcmpiA
lstrcpynA
EnterCriticalSection
GetVersion
SetEndOfFile
SetFilePointer
CloseHandle
SetFileTime
GetLastError
SetFileAttributesA
CreateFileA
FileTimeToLocalFileTime
GetVolumeInformationA
GetProcessHeap
GetLocaleInfoA
WaitForSingleObject
FindClose
SetVolumeLabelA
GetDriveTypeA
GetFileAttributesA
GetFileTime
LeaveCriticalSection
HeapFree
SetKernelObjectSecurity
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityDescriptorControl
GetKernelObjectSecurity
GetSecurityDescriptorLength
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
IsValidAcl
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
IsValidSid
GetSecurityDescriptorGroup
CharToOemA
OemToCharA
UzpFreeMemBuffer
UzpVersion
UzpVersion2
Wiz_Grep
Wiz_Init
Wiz_NoPrinting
Wiz_SetOpts
Wiz_SingleEntryUnzip
Wiz_Unzip
Wiz_UnzipToMemory
Wiz_Validate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
AddAtomA
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
FindAtomA
GetAtomNameA
GetFullPathNameA
GetLastError
GetPrivateProfileStringA
GetProcAddress
GetTickCount
GlobalAlloc
GlobalFree
LoadLibraryA
SetUnhandledExceptionFilter
SleepEx
WriteFile
lstrcatA
lstrcmpA
lstrcpynA
lstrlenA
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memset
printf
puts
signal
strchr
strcpy
strstr
strtol
strtoul
FindWindowExA
GetDesktopWindow
SendMessageA
wsprintfA
FtpOpenFileA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetGetLastResponseInfoA
InternetOpenA
InternetQueryOptionA
InternetReadFile
InternetSetOptionA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImmReleaseContext
ImmGetContext
ImmSetCompositionFontW
ImmSetCompositionWindow
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
StrStrIA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
GetStartupInfoA
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
IsBadWritePtr
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
IsBadReadPtr
GetEnvironmentStrings
GetEnvironmentStringsW
GetCommandLineA
GetStdHandle
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
lstrcpyW
GetACP
GetOEMCP
SetEnvironmentVariableA
GetDriveTypeW
SetFileAttributesW
DeleteFileW
ResetEvent
SetEvent
Sleep
lstrcpynW
MultiByteToWideChar
WaitForSingleObject
lstrlenW
GetFileSize
GetDateFormatW
SetHandleCount
GetUserDefaultLCID
GetProcessVersion
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetTimeFormatW
GetFileAttributesW
ReadFile
GetTickCount
GetModuleHandleW
FindResourceW
HeapSize
GetFileType
SetStdHandle
SetEnvironmentVariableW
GetTimeZoneInformation
HeapReAlloc
TerminateProcess
ExitThread
CreateThread
RaiseException
RtlUnwind
ExitProcess
GetStartupInfoW
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GlobalFlags
GetCommandLineW
GetProfileIntW
GetPrivateProfileIntW
lstrcmpW
lstrcmpiA
GetCurrentThread
GlobalGetAtomNameW
LocalFileTimeToFileTime
FileTimeToSystemTime
CreateEventW
ResumeThread
GetShortPathNameW
GetThreadLocale
GetStringTypeExW
GetVolumeInformationW
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcess
DuplicateHandle
lstrcmpA
SetLastError
GetModuleHandleA
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GlobalSize
lstrlenA
GetFullPathNameW
lstrcmpiW
SetFilePointer
SetEndOfFile
GetFileInformationByHandle
GetLastError
FormatMessageW
MoveFileW
SetVolumeLabelW
GetDiskFreeSpaceW
SizeofResource
VirtualAlloc
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetSystemTime
GetProcessHeap
FileTimeToLocalFileTime
FileTimeToDosDateTime
CreateFileMappingA
LockResource
LoadResource
CreateFileA
LoadLibraryA
LocalAlloc
LocalFree
InterlockedDecrement
InterlockedIncrement
GetVersionExW
GetVersion
DeviceIoControl
SetFileTime
GetFileTime
CreateProcessW
GetCurrentDirectoryW
CreateDirectoryW
lstrcatW
SearchPathW
FindFirstFileW
FindNextFileW
FindClose
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
DeleteCriticalSection
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetLocalTime
SystemTimeToFileTime
SetCurrentDirectoryW
CopyFileW
GetTempPathW
GetTempFileNameW
CompareFileTime
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetDriveTypeA
IsBadCodePtr
GetCPInfo
WritePrivateProfileStringW
GetModuleFileNameW
FindResourceA
FreeLibrary
VirtualFree
WideCharToMultiByte
GetProcAddress
LoadLibraryW
CloseHandle
WriteFile
CreateFileW
GlobalAddAtomA
MulDiv
GetPrivateProfileStringW
GetProfileStringA
SetDlgItemTextW
IsDialogMessageW
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
wvsprintfW
LoadStringW
ValidateRect
GetMessageW
GetDesktopWindow
ReuseDDElParam
UnpackDDElParam
SetCursorPos
WaitMessage
GetWindowThreadProcessId
IsZoomed
ShowOwnedPopups
GetDCEx
GetTabbedTextExtentA
SetParent
RegisterClipboardFormatW
DestroyCaret
MessageBoxW
SetScrollPos
GetScrollInfo
ScrollWindowEx
SetScrollInfo
BeginPaint
EndPaint
LockWindowUpdate
CreateWindowExW
DefWindowProcW
CharToOemBuffA
OemToCharBuffA
wsprintfW
wsprintfA
CreateAcceleratorTableW
DestroyAcceleratorTable
SetClassLongW
MessageBeep
TrackPopupMenuEx
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
GetTopWindow
CreateMenu
MapVirtualKeyW
GetKeyNameTextW
SetMenuItemInfoW
IsMenu
CopyAcceleratorTableW
GetMenuItemInfoW
CallWindowProcW
GetMessagePos
DrawEdge
DrawStateW
CharUpperW
FrameRect
DrawFocusRect
GetActiveWindow
GetNextDlgTabItem
GetWindowLongW
TabbedTextOutW
EqualRect
GetSysColorBrush
RegisterClassExW
SetWindowRgn
SetRectEmpty
DestroyIcon
GetIconInfo
GetWindowDC
CallNextHookEx
GetClipboardData
OpenClipboard
EmptyClipboard
ShowWindow
TranslateAcceleratorW
LoadAcceleratorsW
SendDlgItemMessageA
SendDlgItemMessageW
SetCaretPos
ShowCaret
HideCaret
GetAsyncKeyState
SetCursor
DrawTextExW
DispatchMessageW
TranslateMessage
DrawTextW
DrawFrameControl
PeekMessageW
PostQuitMessage
IsIconic
IsWindowEnabled
FindWindowW
ClientToScreen
ScreenToClient
SetWindowLongW
DestroyMenu
SetMenu
BringWindowToTop
SetActiveWindow
IsRectEmpty
GetWindow
IsWindow
GetClassNameW
GetClassInfoExW
DeleteMenu
InsertMenuW
GetMenuItemCount
GetMenuItemID
GetFocus
GetDlgCtrlID
GetMenu
FillRect
InflateRect
GetCapture
ReleaseCapture
SetCapture
KillTimer
SetTimer
IsWindowVisible
GetSystemMenu
RemoveMenu
LoadBitmapW
IntersectRect
UpdateWindow
IsClipboardFormatAvailable
SetFocus
MoveWindow
SetRect
OffsetRect
GetCursorPos
GetSysColor
ModifyMenuW
RedrawWindow
CopyRect
WinHelpW
GetClassInfoW
RegisterClassW
TrackPopupMenu
SetWindowPlacement
GetWindowTextLengthW
SetPropW
GetPropW
RemovePropW
GetWindowTextW
SetWindowTextW
GetMenuStringW
SystemParametersInfoW
LoadIconW
LoadCursorW
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageW
GetWindowPlacement
EndDialog
GetSystemMetrics
CreateDialogIndirectParamW
DestroyWindow
SetClipboardData
MapWindowPoints
SetWindowPos
InvalidateRect
GetDlgItem
GetDC
ReleaseDC
PtInRect
WindowFromPoint
IsChild
AdjustWindowRectEx
ScrollWindow
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
EnableScrollBar
CreateCaret
UnhookWindowsHookEx
SetWindowsHookExW
CloseClipboard
PostMessageW
CreatePopupMenu
AppendMenuW
GetKeyState
GetClientRect
LoadMenuW
GetSubMenu
EnableMenuItem
GetWindowRect
EnableWindow
GetParent
SendMessageW
GrayStringW
DestroyCursor
LoadImageW
WindowFromDC
CallWindowProcA
UnregisterClassW
GetWindowTextLengthA
ExcludeUpdateRgn
GetWindowTextA
DrawTextA
GetClassInfoA
DefDlgProcA
DefWindowProcA
CharNextA
CharLowerW
RemovePropA
SetWindowsHookExA
GetWindowLongA
SendMessageA
IsWindowUnicode
GetClassNameA
SetWindowLongA
SetPropA
GetPropA
LoadStringA
PatBlt
CreateSolidBrush
GetDeviceCaps
Rectangle
GetTextExtentPoint32W
SelectObject
GetObjectW
GetStockObject
GetTextMetricsW
DeleteObject
StretchBlt
BitBlt
CreateCompatibleDC
GetBitmapDimensionEx
GetCharWidthW
GetBkColor
SetViewportExtEx
GetTextColor
GetCurrentObject
RoundRect
CreateHatchBrush
Ellipse
CreateCompatibleBitmap
FrameRgn
OffsetRgn
EqualRgn
CreatePolygonRgn
CreateRoundRectRgn
CombineRgn
CreateRectRgn
GetWindowOrgEx
GetViewportExtEx
GetWindowExtEx
GetMapMode
LPtoDP
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
Pie
DeleteDC
SetTextColor
SetBkColor
CreateBitmap
GetNearestColor
CreatePalette
CreatePen
RealizePalette
SetDIBits
GetDIBits
SelectPalette
SetMapMode
SetBitmapDimensionEx
CreateDCW
TextOutA
GetCurrentPositionEx
MoveToEx
SetTextAlign
GetClipBox
StartDocW
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetStretchBltMode
SetViewportOrgEx
OffsetViewportOrgEx
CreateRectRgnIndirect
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
LineTo
CreatePatternBrush
SetRectRgn
DPtoLP
StretchDIBits
CreateFontW
AbortDoc
EndDoc
EndPage
StartPage
SetAbortProc
GetViewportOrgEx
GetStretchBltMode
GetPolyFillMode
GetTextAlign
GetBkMode
GetROP2
GetTextFaceW
GetTextExtentPoint32A
CopyMetaFileW
ExtTextOutA
GetTextExtentPointA
CreateDIBitmap
CreateFontIndirectW
GetSaveFileNameW
ChooseColorW
PrintDlgW
ChooseFontW
GetOpenFileNameW
CommDlgExtendedError
PageSetupDlgW
GetFileTitleW
GetPrinterW
ClosePrinter
OpenPrinterW
DocumentPropertiesW
EnumPrintersW
SetFileSecurityW
RegSetValueW
RegCreateKeyW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegQueryValueW
GetFileSecurityW
GetUserNameW
RegOpenKeyW
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ExtractIconW
DragAcceptFiles
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExW
DragFinish
DragQueryFileW
ShellExecuteW
SHGetFileInfoW
ImageList_Destroy
ord13
ord17
ImageList_LoadImageW
ImageList_Create
ord14
ImageList_GetIcon
ImageList_Draw
ImageList_SetBkColor
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_Add
ImageList_GetImageCount
ImageList_GetIconSize
_TrackMouseEvent
ReleaseStgMedium
CoLockObjectExternal
RegisterDragDrop
CoFileTimeNow
DoDragDrop
OleIsCurrentClipboard
OleGetClipboard
OleSetClipboard
CoCreateInstance
CoInitialize
CoUninitialize
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemAlloc
OleDuplicateData
RevokeDragDrop
CreateStreamOnHGlobal
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
VariantTimeToSystemTime
SysAllocString
SysStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcmpiW
SizeofResource
lstrcpynW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
GetProcAddress
FreeLibrary
lstrlenA
lstrcatW
InterlockedIncrement
InterlockedDecrement
CloseHandle
UnmapViewOfFile
FlushViewOfFile
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
MultiByteToWideChar
DisableThreadLibraryCalls
GetModuleHandleW
GetShortPathNameW
GetModuleFileNameW
lstrlenW
WideCharToMultiByte
LoadLibraryW
lstrcpyW
GetStringTypeW
FlushFileBuffers
LCMapStringA
GetStringTypeA
LCMapStringW
GetVersionExA
GetEnvironmentVariableA
SetStdHandle
GetFileAttributesW
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetVersion
RaiseException
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
ExitProcess
TerminateProcess
GetCurrentProcess
HeapSize
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
FreeEnvironmentStringsW
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
IsBadCodePtr
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetKeyState
InsertMenuW
CharNextW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
DragQueryFileW
ShellExecuteW
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
CoTaskMemFree
ReleaseStgMedium
CoCreateInstance
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
lstrcmpiW
InterlockedIncrement
InterlockedDecrement
DisableThreadLibraryCalls
GetProcAddress
GetModuleHandleW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
DeleteCriticalSection
LoadLibraryExW
CloseHandle
UnmapViewOfFile
FlushViewOfFile
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
FlushFileBuffers
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
GetModuleFileNameW
GetFileAttributesW
FindResourceW
WideCharToMultiByte
CreateFileA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
HeapDestroy
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
InsertMenuW
CharNextW
GetKeyState
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
DragQueryFileW
ShellExecuteW
CoCreateInstance
ReleaseStgMedium
CoTaskMemAlloc
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetLastError
lstrcmpiW
DisableThreadLibraryCalls
GetProcAddress
GetModuleHandleW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
DeleteCriticalSection
CloseHandle
UnmapViewOfFile
FlushViewOfFile
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
FlushFileBuffers
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
GetModuleFileNameW
GetFileAttributesW
LoadLibraryExW
WideCharToMultiByte
CreateFileA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlPcToFileHeader
RtlUnwindEx
HeapAlloc
HeapFree
GetCurrentThreadId
FlsSetValue
GetCommandLineA
EncodePointer
DecodePointer
FlsGetValue
FlsFree
SetLastError
FlsAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapSetInformation
HeapCreate
HeapDestroy
HeapReAlloc
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InsertMenuW
CharNextW
GetKeyState
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
DragQueryFileW
ShellExecuteW
CoCreateInstance
ReleaseStgMedium
CoTaskMemAlloc
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ