AttemptConnect
AutodialHangup
AutodialOnline
AutodialUnattended
GetConnectedState
Overview
overview
7Static
static
34103f3ac4d...18.exe
windows7-x64
74103f3ac4d...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$WINDIR/Sy...er.dll
windows7-x64
1$WINDIR/Sy...er.dll
windows10-2004-x64
1Cleaner.exe
windows7-x64
1Cleaner.exe
windows10-2004-x64
1Firewall.exe
windows7-x64
1Firewall.exe
windows10-2004-x64
1Resources/...op.htm
windows7-x64
1Resources/...op.htm
windows10-2004-x64
1Resources/...ty.htm
windows7-x64
1Resources/...ty.htm
windows10-2004-x64
1Sweeper.exe
windows7-x64
3Sweeper.exe
windows10-2004-x64
3Uninstaller.exe
windows7-x64
1Uninstaller.exe
windows10-2004-x64
1firewall.sys
windows7-x64
1firewall.sys
windows10-2004-x64
1foxiecoreu.dll
windows7-x64
6foxiecoreu.dll
windows10-2004-x64
6foxietoolbaru.dll
windows7-x64
6foxietoolbaru.dll
windows10-2004-x64
6uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Static task
static1
Behavioral task
behavioral1
Sample
4103f3ac4d5bc3546475e3d681665a48_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4103f3ac4d5bc3546475e3d681665a48_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$WINDIR/System32/MP3IFilter.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$WINDIR/System32/MP3IFilter.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Cleaner.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Cleaner.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Firewall.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Firewall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Resources/HTML/Desktop.htm
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Resources/HTML/Desktop.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Resources/HTML/Infinity.htm
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Resources/HTML/Infinity.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Sweeper.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Sweeper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Uninstaller.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Uninstaller.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
firewall.sys
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
firewall.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
foxiecoreu.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
foxiecoreu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
foxietoolbaru.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
foxietoolbaru.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
uninst.exe
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
uninst.exe
Resource
win10v2004-20240709-en
Target
4103f3ac4d5bc3546475e3d681665a48_JaffaCakes118
Size
1.4MB
MD5
4103f3ac4d5bc3546475e3d681665a48
SHA1
1ca6c69a4437b7ac6d1528a627263ab94aaa538b
SHA256
3c72f2851f20fee1e57a73226a2d4a54d88f55fbcaa817bac22eaf01cb79c8de
SHA512
74ecac7b514cb8c85ce99a69d52ce6365ddfa9dc557b21742a2e4e621ecff02048ff67679b20a6915cb86e0b7d9475eb871ee9424636e9d377eca254a0566ed0
SSDEEP
24576:Yk2nx/H2D3SrB0f1N93/FMEnh45Pr3HisdUXGN4r4ac13ehxqmQsTk01H4UTV+0O:YZBH2rKB6N9lePr33N4nhxqmQU464
Checks for missing Authenticode signature.
resource |
---|
4103f3ac4d5bc3546475e3d681665a48_JaffaCakes118 |
unpack001/$PLUGINSDIR/Dialer.dll |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/NSISdl.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$WINDIR/System32/MP3IFilter.dll |
unpack001/Cleaner.exe |
unpack001/Firewall.exe |
unpack001/Sweeper.exe |
unpack001/Uninstaller.exe |
unpack001/firewall.sys |
unpack001/foxiecoreu.dll |
unpack001/foxietoolbaru.dll |
unpack001/uninst.exe |
unpack001/update.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
static1/unpack001/uninst.exe | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
lstrcpynA
GetCommandLineA
SetFileTime
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
lstrcatA
GetSystemDirectoryA
CloseHandle
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
MulDiv
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
CreateWindowExA
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
CreateDialogParamA
EmptyClipboard
DestroyWindow
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
GetDlgItem
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
FreeLibrary
lstrcpynA
GlobalAlloc
GetProcAddress
AttemptConnect
AutodialHangup
AutodialOnline
AutodialUnattended
GetConnectedState
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetModuleHandleA
GetPrivateProfileIntA
GlobalAlloc
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
lstrcmpiA
GetDlgCtrlID
GetClientRect
SetWindowRgn
LoadIconA
MapWindowPoints
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadImageA
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
lstrcpynA
lstrlenA
lstrcatA
GlobalAlloc
GlobalFree
lstrcpyA
GetTickCount
DeleteFileA
WriteFile
Sleep
CreateFileA
CreateThread
WaitForSingleObject
MulDiv
CloseHandle
CharPrevA
SetWindowLongA
RegisterWindowMessageA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
GetWindowRect
GetClientRect
ShowWindow
IsWindowVisible
GetFocus
GetDlgItem
FindWindowExA
SetWindowTextA
SendMessageA
wsprintfA
SetDlgItemTextA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
gethostbyname
inet_addr
ioctlsocket
htons
socket
closesocket
shutdown
connect
__WSAFDIsSet
select
recv
WSAGetLastError
send
WSACleanup
WSAStartup
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
DebugBreak
lstrlenW
GetShortPathNameW
GetModuleFileNameW
FreeLibrary
SizeofResource
GetVersionExW
InitializeCriticalSection
GetLastError
LoadLibraryExW
lstrcmpiW
lstrcpynW
GetFileSize
GetLocaleInfoW
GetSystemDefaultLCID
LocalFree
FormatMessageW
HeapDestroy
DisableThreadLibraryCalls
SetFilePointer
ReadFile
CloseHandle
CreateFileW
OutputDebugStringW
lstrlenA
FindResourceW
LoadResource
RtlUnwind
HeapSize
WideCharToMultiByte
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
GetStringTypeW
GetCurrentProcess
LCMapStringW
TerminateProcess
GetStringTypeA
SetStdHandle
GetProcAddress
GetOEMCP
GetACP
MultiByteToWideChar
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RaiseException
HeapFree
HeapReAlloc
HeapAlloc
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
ExitProcess
LCMapStringA
FreeEnvironmentStringsA
LoadLibraryA
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
GetCPInfo
IsBadCodePtr
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
IsBadReadPtr
wsprintfW
CharNextW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryInfoKeyW
RegEnumValueW
CoTaskMemRealloc
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
VarUI4FromStr
ntohl
PathIsURLW
PathCreateFromUrlW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Storm\Work\FoxieCleaner\Release\FoxeCleaner.pdb
timeGetTime
TerminateProcess
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
ExitThread
CreateThread
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
GetTimeZoneInformation
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VirtualFree
IsBadWritePtr
GetStdHandle
ExitProcess
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalFree
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
GlobalFlags
InterlockedIncrement
GetCurrentDirectoryA
GetFullPathNameA
FindClose
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
InterlockedDecrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
lstrcpynA
WritePrivateProfileStringA
FreeResource
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
MultiByteToWideChar
HeapDestroy
HeapCreate
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
ResumeThread
GlobalAlloc
SetEvent
WaitForSingleObject
CloseHandle
ResetEvent
GetCurrentProcess
GetProcessHeap
HeapAlloc
HeapFree
GetPrivateProfileStringA
FindFirstFileA
RemoveDirectoryA
FindNextFileA
GetWindowsDirectoryA
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
LoadLibraryW
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetDriveTypeA
FreeEnvironmentStringsA
DestroyMenu
GetSysColorBrush
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
wsprintfA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
MessageBoxA
GetLastActivePopup
IsWindowEnabled
PostQuitMessage
PostMessageA
SetRect
GetDC
ReleaseDC
FillRect
OpenClipboard
EmptyClipboard
CloseClipboard
RedrawWindow
GetDlgItem
GetParent
SetPropA
GetWindowLongA
GetCapture
InvalidateRect
SetCapture
GetWindowRect
ClientToScreen
PtInRect
ReleaseCapture
LoadCursorA
SetCursor
GetPropA
CallWindowProcA
SetWindowLongA
RemovePropA
GetSysColor
GetSystemMetrics
LoadIconA
EnableWindow
SetParent
GetClientRect
IsIconic
SendMessageA
DrawIcon
CopyRect
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
CreateFontA
GetClipBox
SetMapMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
BitBlt
GetObjectA
CreateFontIndirectA
DeleteObject
SetTextColor
PtVisible
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegQueryValueExA
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegCloseKey
RegSetValueExA
RegQueryValueA
RegOpenKeyA
GetUserNameA
RegOpenKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
ShellExecuteA
ImageList_Destroy
ord17
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
CoInitialize
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateProcessW
GetPrivateProfileStringW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleW
OpenMutexW
CreateMutexW
Sleep
InterlockedExchange
DeviceIoControl
CloseHandle
CreateFileW
SearchPathW
GetLastError
WideCharToMultiByte
CompareStringW
TerminateProcess
CompareStringA
GetLocaleInfoW
SetConsoleCtrlHandler
SetEndOfFile
CreateFileA
LoadLibraryA
ReadFile
IsBadCodePtr
IsBadReadPtr
SetStdHandle
GetStringTypeW
GetStringTypeA
GetProcAddress
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetCommandLineW
GetCPInfo
GetModuleFileNameW
SetEnvironmentVariableA
GetOEMCP
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
FormatMessageW
MultiByteToWideChar
HeapAlloc
HeapFree
RaiseException
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoW
GetVersion
ExitProcess
HeapReAlloc
FatalAppExitA
LCMapStringA
LCMapStringW
IsBadWritePtr
GetEnvironmentStrings
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetCurrentProcess
HeapSize
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetLastError
TlsGetValue
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
FlushFileBuffers
GetCurrentThread
WriteFile
SetFilePointer
UnhandledExceptionFilter
LoadMenuW
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
MessageBoxW
LoadStringW
RegisterClassW
LoadCursorW
PostMessageW
GetWindow
FindWindowExW
DefWindowProcW
DestroyWindow
RegisterWindowMessageW
LoadImageW
PostQuitMessage
DestroyMenu
TrackPopupMenu
SetForegroundWindow
SetMenuItemInfoW
GetCursorPos
GetMenuItemInfoW
GetSubMenu
RegDeleteValueW
CloseServiceHandle
OpenServiceW
CreateServiceW
OpenSCManagerW
DeleteService
StartServiceW
ControlService
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegEnumValueW
RegEnumKeyExW
RegCreateKeyExW
QueryServiceStatus
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
ShellExecuteW
Shell_NotifyIconW
CLSIDFromProgID
CoCreateInstance
SHDeleteKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
GetModuleFileNameExA
timeGetTime
MakeSureDirectoryPathExists
GetLongPathNameA
OpenProcess
TerminateProcess
CreateDirectoryA
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
DeleteFileA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
ResumeThread
GlobalAlloc
SetEvent
FreeResource
GetProcAddress
GetModuleHandleA
lstrcpynA
lstrcmpW
lstrcatA
FreeLibrary
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
lstrcpyA
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GetCurrentThread
SetLastError
WritePrivateProfileStringA
LocalFree
FormatMessageA
InterlockedDecrement
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
CreateFileA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GlobalFlags
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
WaitForSingleObject
CloseHandle
ResetEvent
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
wsprintfA
PostQuitMessage
ValidateRect
GetCursorPos
TranslateMessage
GetMessageA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
BeginPaint
EndPaint
GetSysColorBrush
DestroyMenu
GetClassLongA
GetClassInfoExA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
ShowWindow
SetWindowTextA
IsDialogMessageA
GetClassNameA
SendMessageA
EnableWindow
CopyRect
RegisterWindowMessageA
DrawIcon
IsIconic
GetClientRect
SetParent
LoadIconA
GetSystemMetrics
RemovePropA
SetWindowLongA
CallWindowProcA
GetPropA
SetCursor
LoadCursorA
ReleaseCapture
PtInRect
WinHelpA
MessageBoxA
RedrawWindow
CharUpperA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
ClientToScreen
GetWindowRect
SetCapture
InvalidateRect
GetCapture
GetWindowLongA
SetPropA
GetParent
GetDlgItem
FillRect
GetSysColor
ReleaseDC
GetDC
SetRect
GetWindow
ScaleWindowExtEx
SetWindowExtEx
SetMapMode
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetStockObject
CreateFontA
SetTextColor
DeleteObject
CreateFontIndirectA
GetObjectA
BitBlt
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
GetDeviceCaps
RestoreDC
SaveDC
CreateBitmap
SetBkColor
GetClipBox
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegConnectRegistryA
RegQueryValueA
RegEnumValueA
RegOpenKeyA
ShellExecuteA
SHFileOperationA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CreateStreamOnHGlobal
CoTaskMemFree
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
ord17
ImageList_Destroy
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
SHDeleteKeyA
LresultFromObject
CreateStdAccessibleObject
DocumentPropertiesA
OpenPrinterA
ClosePrinter
GetFileTitleA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CIcos
_adj_fptan
__vbaFreeVar
__vbaLenBstr
__vbaFreeVarList
_adj_fdiv_m64
ord517
_adj_fprem1
__vbaRecAnsiToUni
__vbaLsetFixstr
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaExitProc
__vbaObjSet
ord595
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaStrFixstr
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaStrCmp
DllFunctionCall
_adj_fpatan
__vbaRecUniToAnsi
EVENT_SINK_Release
__vbaNew
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
ord608
__vbaFPException
__vbaInStrVar
__vbaI2Var
_CIlog
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarDup
__vbaStrToAnsi
ord616
_CIatan
__vbaStrMove
ord618
_allmul
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
KeWaitForSingleObject
IoCreateDevice
RtlInitUnicodeString
IofCompleteRequest
ExAllocatePoolWithTag
ExFreePool
ObfDereferenceObject
IoCreateSymbolicLink
IofCallDriver
IoBuildDeviceIoControlRequest
KeInitializeEvent
IoGetDeviceObjectPointer
IoDeleteDevice
IoDeleteSymbolicLink
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenMutexW
CloseHandle
IsBadWritePtr
GetCurrentProcessId
FindResourceW
LoadResource
LockResource
WideCharToMultiByte
lstrcpynW
GetVersionExW
lstrlenA
CreateProcessW
GetPrivateProfileStringW
lstrcmpW
FlushInstructionCache
GetCurrentProcess
MultiByteToWideChar
InterlockedIncrement
GlobalAlloc
InterlockedDecrement
GlobalUnlock
LoadLibraryW
GlobalLock
FreeLibrary
lstrcatW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentThreadId
GetModuleFileNameW
GetModuleHandleW
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
GetShortPathNameW
HeapDestroy
LoadStringW
GetDC
DestroyIcon
DrawStateW
CopyRect
GetWindowRect
OffsetRect
UnionRect
GetAsyncKeyState
CharUpperW
MoveWindow
ShowWindow
SetTimer
GetKeyState
DialogBoxParamW
CreatePopupMenu
AppendMenuW
FindWindowExW
MessageBoxW
DestroyWindow
CharNextW
ReleaseDC
GetFocus
UnregisterClassW
RegisterClassExW
LoadCursorW
GetClassInfoExW
RegisterWindowMessageW
DefWindowProcW
GetWindowLongW
GetWindow
SetWindowLongW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
GetSysColor
SetFocus
IsChild
GetMenuItemCount
GetMenuItemInfoW
EndPaint
FillRect
CallWindowProcW
GetClientRect
IsWindow
BeginPaint
RedrawWindow
DrawTextW
TrackPopupMenuEx
GetWindowDC
IsWindowEnabled
GetActiveWindow
GetWindowThreadProcessId
ClientToScreen
GetSystemMetrics
SystemParametersInfoW
LoadBitmapW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
PostMessageW
ScreenToClient
LoadMenuW
GetSubMenu
SetMenuItemInfoW
GetClassNameW
SetWindowPos
InsertMenuW
TrackPopupMenu
GetAncestor
DestroyMenu
EnableMenuItem
EndDialog
CreateWindowExW
wsprintfW
GetDlgItem
SendMessageW
InvalidateRgn
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableW
GetDesktopWindow
GetParent
CreatePen
LineTo
MoveToEx
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetStockObject
GetCurrentObject
DeleteDC
DeleteObject
GetObjectW
CreateSolidBrush
ExtTextOutW
Rectangle
CreateFontIndirectW
SetBkMode
SetBkColor
SetTextColor
GetDeviceCaps
RegDeleteValueW
OpenSCManagerW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
QueryServiceStatus
OpenServiceW
CloseServiceHandle
StartServiceW
CLSIDFromProgID
CoCreateInstance
OleUninitialize
StringFromCLSID
CLSIDFromString
CoTaskMemFree
CoTaskMemAlloc
OleLockRunning
CreateStreamOnHGlobal
OleInitialize
RegisterTypeLi
LoadTypeLi
SysStringLen
VariantClear
SysAllocString
LoadRegTypeLi
OleCreateFontIndirect
SysStringByteLen
VariantChangeType
SysAllocStringLen
SysFreeString
SHDeleteKeyW
_strlwr
memcmp
free
__dllonexit
?terminate@@YAXXZ
_wtol
wcsrchr
wcscpy
wcschr
memmove
realloc
strncpy
memset
wcscmp
wcscat
time
srand
rand
swscanf
_onexit
_wcsicmp
memcpy
strstr
swprintf
wcslen
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_chkesp
_ftol
_adjust_fdiv
_except_handler3
_purecall
_wtoi
_initterm
malloc
ord17
ImageList_Draw
ImageList_GetIcon
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
ImageList_GetImageCount
?empty@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBE_NXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@PBG@Z
??Mstd@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@0@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@0@Z
?good@ios_base@std@@QBE_NXZ
?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@JW4seekdir@ios_base@2@@Z
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@G@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBGABV?$allocator@G@1@@Z
?length@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIXZ
??A?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAGI@Z
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBGABV10@@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??8std@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBG@Z
??Nstd@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBG@Z
??Pstd@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBG@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?substr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBE?AV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?gcount@?$basic_istream@DU?$char_traits@D@std@@@std@@QBEHXZ
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?find@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIABV12@I@Z
?eof@ios_base@std@@QBE_NXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV?$allocator@G@1@@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetShortPathNameW
DisableThreadLibraryCalls
DeleteCriticalSection
CreateProcessW
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
InterlockedIncrement
lstrcmpiW
GetCurrentThreadId
GetVersion
InterlockedDecrement
LoadLibraryA
GetModuleHandleW
GetFileAttributesW
GetProcAddress
lstrcatW
HeapDestroy
GetModuleFileNameW
GetCurrentProcess
GetVersionExW
lstrcpyW
GetOEMCP
GetACP
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
HeapSize
TerminateProcess
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCPInfo
LCMapStringW
LCMapStringA
ExitProcess
GetCommandLineA
RaiseException
lstrcpynW
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
MultiByteToWideChar
LoadLibraryW
GetModuleHandleA
InterlockedExchange
Sleep
GetLastError
lstrlenW
SetLastError
LockResource
LoadResource
FindResourceW
FlushInstructionCache
OutputDebugStringA
WideCharToMultiByte
lstrcmpW
GetCurrentProcessId
SetWindowLongW
LoadBitmapW
SystemParametersInfoW
GetSystemMetrics
DefWindowProcW
SendMessageW
GetWindowLongW
ClientToScreen
GetParent
IsWindow
GetWindowThreadProcessId
GetActiveWindow
IsWindowEnabled
GetWindowDC
ReleaseDC
CallWindowProcW
LoadMenuW
GetSubMenu
TrackPopupMenuEx
GetMenuItemInfoW
IntersectRect
OffsetRect
SetCapture
ScreenToClient
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
GetMessagePos
WindowFromPoint
GetMessageTime
GetDesktopWindow
InvalidateRect
RemoveMenu
EnableMenuItem
CharNextW
PostMessageW
GetDlgCtrlID
RedrawWindow
LoadImageW
GetFocus
CallNextHookEx
GetClassInfoExW
RegisterClassExW
LoadCursorW
SetFocus
ShowWindow
GetClientRect
SetWindowPos
MoveWindow
GetWindowTextLengthW
GetWindowTextW
CreateWindowExW
wsprintfW
UnhookWindowsHookEx
SetWindowsHookExW
DestroyWindow
FindWindowExW
GetWindow
GetKeyState
GetWindowRect
IsRectEmpty
LoadStringW
CopyRect
DrawStateW
SetMenuItemInfoW
DestroyMenu
GetSysColor
DestroyIcon
DrawTextW
GetMenuItemCount
DeleteObject
SetBkColor
MoveToEx
CreateFontIndirectW
SelectObject
DeleteDC
SetBkMode
SetTextColor
GetObjectW
Rectangle
ExtTextOutW
LineTo
CreateCompatibleDC
CreateSolidBrush
BitBlt
GetStockObject
GetCurrentObject
CreatePen
RegEnumKeyExW
RegCloseKey
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExW
CLSIDFromProgID
CoCreateInstance
SysFreeString
SysAllocString
VariantClear
LoadTypeLi
RegisterTypeLi
SysStringLen
LoadRegTypeLi
SHDeleteKeyW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
lstrcpynA
GetCommandLineA
SetFileTime
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
lstrcatA
GetSystemDirectoryA
CloseHandle
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
MulDiv
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
CreateWindowExA
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
CreateDialogParamA
EmptyClipboard
DestroyWindow
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
GetDlgItem
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateMutexW
GetTempPathW
MultiByteToWideChar
Sleep
lstrlenA
ResumeThread
lstrlenW
WideCharToMultiByte
WaitForSingleObject
CreateThread
CreateProcessW
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
EnterCriticalSection
SuspendThread
DeleteFileW
OpenMutexW
HeapDestroy
GetVersion
ExitProcess
GetStartupInfoA
GetCommandLineA
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
SetUnhandledExceptionFilter
SetEnvironmentVariableA
SetEndOfFile
GetLocaleInfoW
LoadLibraryA
GetOEMCP
CreateFileA
GetACP
LeaveCriticalSection
ReadFile
SetStdHandle
LCMapStringW
WriteFile
CloseHandle
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RaiseException
GetModuleHandleA
SetFilePointer
FlushFileBuffers
HeapSize
TerminateProcess
LCMapStringA
VirtualFree
GetCPInfo
CompareStringA
CompareStringW
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
TlsAlloc
VirtualAlloc
IsBadWritePtr
TlsSetValue
SetLastError
TlsGetValue
GetLastError
FindWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
CreateDialogParamW
SetTimer
GetDlgItem
SendMessageW
LoadImageW
SetWindowLongW
SetWindowTextW
ShowWindow
PostQuitMessage
DestroyWindow
MessageBoxW
EndPaint
DrawIconEx
BeginPaint
ScreenToClient
GetWindowRect
PostMessageW
GetWindow
wsprintfW
CreateFontIndirectW
DeleteDC
GetStockObject
GetObjectW
DeleteObject
RegCloseKey
RegEnumValueW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
HttpQueryInfoW
InternetReadFile
SHDeleteKeyW
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE