Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Overview
overview
9Static
static
74d6d2db68a...18.exe
windows7-x64
94d6d2db68a...18.exe
windows10-2004-x64
9background.html
windows7-x64
1background.html
windows10-2004-x64
1js/api/chrome.js
windows7-x64
3js/api/chrome.js
windows10-2004-x64
3js/api/cookie.js
windows7-x64
3js/api/cookie.js
windows10-2004-x64
3js/api/message.js
windows7-x64
3js/api/message.js
windows10-2004-x64
3js/background.js
windows7-x64
3js/background.js
windows10-2004-x64
3js/lib/app_api.js
windows7-x64
3js/lib/app_api.js
windows10-2004-x64
3js/lib/async_api.js
windows7-x64
3js/lib/async_api.js
windows10-2004-x64
3js/lib/bg_app_api.js
windows7-x64
3js/lib/bg_app_api.js
windows10-2004-x64
3js/lib/coo...ore.js
windows7-x64
3js/lib/coo...ore.js
windows10-2004-x64
3js/lib/data_store.js
windows7-x64
3js/lib/data_store.js
windows10-2004-x64
3js/lib/delegate.js
windows7-x64
3js/lib/delegate.js
windows10-2004-x64
3js/lib/events.js
windows7-x64
3js/lib/events.js
windows10-2004-x64
3js/lib/onB...oad.js
windows7-x64
3js/lib/onB...oad.js
windows10-2004-x64
3js/lib/reports.js
windows7-x64
3js/lib/reports.js
windows10-2004-x64
3js/lib/util.js
windows7-x64
3js/lib/util.js
windows10-2004-x64
3Behavioral task
behavioral1
Sample
4d6d2db68a687e5ee633847c96cb2fa2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d6d2db68a687e5ee633847c96cb2fa2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
background.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
background.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
js/api/chrome.js
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
js/api/chrome.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
js/api/cookie.js
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
js/api/cookie.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
js/api/message.js
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
js/api/message.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
js/background.js
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
js/background.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
js/lib/app_api.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
js/lib/app_api.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
js/lib/async_api.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
js/lib/async_api.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
js/lib/bg_app_api.js
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
js/lib/bg_app_api.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
js/lib/cookie_store.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
js/lib/cookie_store.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
js/lib/data_store.js
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
js/lib/data_store.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
js/lib/delegate.js
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
js/lib/delegate.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
js/lib/events.js
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
js/lib/events.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
js/lib/onBGDocumentLoad.js
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
js/lib/onBGDocumentLoad.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
js/lib/reports.js
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
js/lib/reports.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
js/lib/util.js
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
js/lib/util.js
Resource
win10v2004-20240709-en
Target
4d6d2db68a687e5ee633847c96cb2fa2_JaffaCakes118
Size
1.9MB
MD5
4d6d2db68a687e5ee633847c96cb2fa2
SHA1
67a854f0cff2bc48e5f911557a0498720268f5b8
SHA256
8b5f91719139554efc5c6697a0167b01fa36243b991fda5a4b74df7f323f3758
SHA512
35314896b1db17c75ff92653ad44b7d1d0d668b56ceb65bc5374c2fd85c32f00e99179be5ba76f906418a3ef7305a7de4131edd575d5ebe856a1d24d4459f626
SSDEEP
24576:LT1jt9z+JDuJAHNwHxnot9XD8F3I3c5lW2eW3zrj9mlTn2nS9SRdea/17JtgvFR:X/9qJcAOim+MO2eWDNmFjglJSvFR
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/md5dll.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/md5dll.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/Dialer.dll |
unpack001/$PLUGINSDIR/ExecDos.dll |
unpack001/$PLUGINSDIR/Processes.dll |
unpack001/$PLUGINSDIR/StdUtils.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/UserInfo.dll |
unpack001/$PLUGINSDIR/ZipDLL.dll |
unpack001/$PLUGINSDIR/inetc.dll |
unpack001/$PLUGINSDIR/md5dll.dll |
unpack004/out.upx |
unpack001/$PLUGINSDIR/nsislog.dll |
unpack001/$PLUGINSDIR/nsisos.dll |
unpack001/$PLUGINSDIR/text.txt |
unpack001/$_81_ |
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
FreeLibrary
lstrcpynA
GlobalAlloc
AttemptConnect
AutodialHangup
AutodialOnline
AutodialUnattended
GetConnectedState
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
Sleep
lstrcatA
lstrcmpiA
TerminateProcess
ReadFile
GetExitCodeProcess
PeekNamedPipe
CreateFileA
FlushFileBuffers
WriteFile
lstrlenA
CloseHandle
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetProcAddress
GetModuleHandleA
GlobalAlloc
GetExitCodeThread
WaitForSingleObject
CreateThread
lstrcpyA
lstrcpynA
wsprintfA
GetClassNameA
GetDlgItem
FindWindowExA
SendMessageA
exec
isdone
wait
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
FreeLibrary
OpenProcess
CloseHandle
TerminateProcess
GlobalFree
lstrcpyA
GetCommandLineA
GetVersionExA
ExitProcess
GetModuleHandleA
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
UnhandledExceptionFilter
DisableThreadLibraryCalls
WriteFile
SetFilePointer
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
GetSystemInfo
FindWindowA
GetDesktopWindow
wsprintfA
UpdateWindow
FindDevice
FindProcess
KillProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
srand
sscanf
_snprintf
rand
time
memset
??2@YAPAXI@Z
strncpy
_stricmp
strchr
??3@YAXPAX@Z
ord176
GlobalFree
MultiByteToWideChar
GetVersionExA
CreateThread
WaitForSingleObject
CloseHandle
TerminateThread
GetCommandLineA
GlobalAlloc
lstrcpynA
wsprintfA
MessageBoxA
MessageBoxW
ShellExecuteExA
ShellExecuteA
SHFileOperationA
CoInitializeEx
CoUninitialize
CoCreateInstance
VariantClear
VariantInit
SysAllocString
DisableVerboseMode
Dummy
EnableVerboseMode
ExecShellAsUser
ExecShellWait
FormatStr
FormatStr2
FormatStr3
GetAllParameters
GetParameter
Rand
RandList
RandMax
RandMinMax
RevStr
SHFileCopy
SHFileMove
ScanStr
ScanStr2
ScanStr3
Time
TrimStr
TrimStrLeft
TrimStrRight
WaitForProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
lstrcpynA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
GetLocaleInfoW
LoadLibraryA
IsBadCodePtr
LocalFree
FormatMessageA
GetLastError
MapViewOfFile
CreateFileMappingA
CloseHandle
UnmapViewOfFile
GetDiskFreeSpaceA
CreateFileA
GetCurrentDirectoryA
SetFileAttributesA
GetFileAttributesA
GetDriveTypeA
SetVolumeLabelA
DeleteFileA
MoveFileA
CreateDirectoryA
EnterCriticalSection
Sleep
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
HeapReAlloc
HeapAlloc
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetEnvironmentVariableA
SetCurrentDirectoryA
GetFileType
FlushFileBuffers
SetStdHandle
ExitProcess
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
TerminateProcess
GetCurrentProcess
HeapSize
SetHandleCount
GetStdHandle
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
SetEndOfFile
ReadFile
SetFilePointer
GetACP
GetOEMCP
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetProcAddress
GetStringTypeA
GetStringTypeW
IsBadReadPtr
SendMessageA
GetDlgItem
SetWindowTextA
FindWindowExA
OemToCharBuffA
CharToOemBuffA
extractall
extractfile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AccessibleObjectFromWindow
WSACleanup
gethostbyname
WSAStartup
inet_ntoa
URLDownloadToCacheFileA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetGetCookieA
InternetSetCookieA
InternetSetOptionA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
CreateThread
GetCurrentThreadId
GetCurrentProcessId
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetLastError
ReleaseMutex
OpenMutexA
CreateMutexA
Sleep
SetEvent
CreateEventA
RaiseException
FlushInstructionCache
GetCurrentProcess
SetLastError
LocalFree
FormatMessageA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GlobalFlags
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
lstrcpyA
LocalAlloc
InitializeCriticalSection
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetExitCodeProcess
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
WaitForSingleObject
OpenProcess
Process32Next
CreateToolhelp32Snapshot
WideCharToMultiByte
GetVersion
MoveFileExA
GetTempPathA
CopyFileExA
ExpandEnvironmentStringsA
LoadLibraryW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
LCMapStringW
GetFileType
SetHandleCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ExitProcess
HeapSize
GetStringTypeW
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
IsProcessorFeaturePresent
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
CloseHandle
OutputDebugStringA
DebugBreak
InterlockedIncrement
VirtualAllocEx
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InterlockedExchange
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
LCMapStringA
InterlockedCompareExchange
InterlockedPushEntrySList
VirtualProtect
HeapAlloc
GetLocalTime
GetSystemTimeAsFileTime
RtlUnwind
EncodePointer
DecodePointer
HeapFree
VirtualFree
InterlockedPopEntrySList
GetStringTypeExA
TerminateProcess
CharLowerA
MessageBoxA
PostMessageA
CharNextA
SetWindowLongA
GetClassInfoExA
LoadCursorA
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetWindowLongA
CallWindowProcA
UnregisterClassA
GetDesktopWindow
GetWindowThreadProcessId
DestroyIcon
InvalidateRect
SendMessageA
GetWindowRect
ReleaseDC
LoadStringA
SetWindowPos
GetParent
FindWindowExA
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
SetTimer
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowTextA
EnumWindows
GetForegroundWindow
SetFocus
BringWindowToTop
SetForegroundWindow
AttachThreadInput
IsWindowVisible
GetDC
wvsprintfA
DestroyWindow
CreateFontA
SelectObject
GetTextExtentPoint32A
DeleteObject
GetObjectA
RegQueryValueExA
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSidSubAuthority
SHGetFolderPathA
ShellExecuteExA
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
CreateStreamOnHGlobal
VariantClear
SysAllocString
VariantChangeType
SysAllocStringLen
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantInit
SysFreeString
ord176
ImageList_GetImageCount
ImageList_Remove
ImageList_ReplaceIcon
GdipDrawPath
GdipSetInterpolationMode
GdipGetImageGraphicsContext
GdipCreatePathGradientFromPath
GdipWindingModeOutline
GdipAddPathEllipseI
GdipAddPathRectangleI
GdipSetStringFormatTrimming
GdipSetStringFormatAlign
GdipCreateSolidFill
GdipCreateHICONFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateFontFromDC
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipGraphicsClear
GdipDeleteGraphics
GdipSetPathGradientFocusScales
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipDeletePath
GdipCreatePath
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipDeleteBrush
GdipAlloc
GdipFree
GdipFillPath
GdipCreateFontFromLogfontA
GdipCloneBitmapAreaI
GdipCloneBrush
GdipDrawString
GdipMeasureString
GdipCloneImage
GdipDeleteFont
GdipDrawImageRectI
GdiplusShutdown
GdipGetImagePixelFormat
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AccessibleObjectFromWindow
WSACleanup
gethostbyname
WSAStartup
inet_ntoa
URLDownloadToCacheFileA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetGetCookieA
InternetSetCookieA
InternetSetOptionA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
CreateThread
GetCurrentThreadId
GetCurrentProcessId
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetLastError
ReleaseMutex
OpenMutexA
CreateMutexA
Sleep
SetEvent
CreateEventA
RaiseException
FlushInstructionCache
GetCurrentProcess
SetLastError
LocalFree
FormatMessageA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GlobalFlags
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
lstrcpyA
LocalAlloc
InitializeCriticalSection
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetExitCodeProcess
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
WaitForSingleObject
OpenProcess
Process32Next
CreateToolhelp32Snapshot
WideCharToMultiByte
GetVersion
MoveFileExA
GetTempPathA
CopyFileExA
ExpandEnvironmentStringsA
LoadLibraryW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
LCMapStringW
GetFileType
SetHandleCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ExitProcess
HeapSize
GetStringTypeW
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
IsProcessorFeaturePresent
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
CloseHandle
OutputDebugStringA
DebugBreak
InterlockedIncrement
VirtualAllocEx
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InterlockedExchange
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
LCMapStringA
InterlockedCompareExchange
InterlockedPushEntrySList
VirtualProtect
HeapAlloc
GetLocalTime
GetSystemTimeAsFileTime
RtlUnwind
EncodePointer
DecodePointer
HeapFree
VirtualFree
InterlockedPopEntrySList
GetStringTypeExA
TerminateProcess
CharLowerA
MessageBoxA
PostMessageA
CharNextA
SetWindowLongA
GetClassInfoExA
LoadCursorA
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetWindowLongA
CallWindowProcA
UnregisterClassA
GetDesktopWindow
GetWindowThreadProcessId
DestroyIcon
InvalidateRect
SendMessageA
GetWindowRect
ReleaseDC
LoadStringA
SetWindowPos
GetParent
FindWindowExA
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
SetTimer
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowTextA
EnumWindows
GetForegroundWindow
SetFocus
BringWindowToTop
SetForegroundWindow
AttachThreadInput
IsWindowVisible
GetDC
wvsprintfA
DestroyWindow
CreateFontA
SelectObject
GetTextExtentPoint32A
DeleteObject
GetObjectA
RegQueryValueExA
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSidSubAuthority
SHGetFolderPathA
ShellExecuteExA
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
CreateStreamOnHGlobal
VariantClear
SysAllocString
VariantChangeType
SysAllocStringLen
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantInit
SysFreeString
ord176
ImageList_GetImageCount
ImageList_Remove
ImageList_ReplaceIcon
GdipDrawPath
GdipSetInterpolationMode
GdipGetImageGraphicsContext
GdipCreatePathGradientFromPath
GdipWindingModeOutline
GdipAddPathEllipseI
GdipAddPathRectangleI
GdipSetStringFormatTrimming
GdipSetStringFormatAlign
GdipCreateSolidFill
GdipCreateHICONFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateFontFromDC
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipGraphicsClear
GdipDeleteGraphics
GdipSetPathGradientFocusScales
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipDeletePath
GdipCreatePath
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipDeleteBrush
GdipAlloc
GdipFree
GdipFillPath
GdipCreateFontFromLogfontA
GdipCloneBitmapAreaI
GdipCloneBrush
GdipDrawString
GdipMeasureString
GdipCloneImage
GdipDeleteFont
GdipDrawImageRectI
GdiplusShutdown
GdipGetImagePixelFormat
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_mbschr
_adjust_fdiv
malloc
_initterm
free
strlen
strchr
strrchr
_mbsrchr
strtoul
memset
_mbsstr
strtol
GlobalFree
CreateThread
WaitForSingleObject
TerminateThread
GetModuleHandleA
MulDiv
lstrcpyA
GlobalAlloc
LoadLibraryA
GetProcAddress
lstrcmpiA
CreateFileA
GetFileSize
lstrlenA
WriteFile
ReadFile
lstrcmpA
lstrcpynA
lstrcatA
GetLastError
DeleteFileA
CloseHandle
SleepEx
SetFilePointer
GetTickCount
MessageBoxA
GetParent
ShowWindow
SetWindowLongA
IsWindow
SetWindowTextA
SendDlgItemMessageA
GetDlgItem
PostMessageA
GetWindowTextA
SendMessageA
SetDlgItemTextA
SetWindowPos
SystemParametersInfoA
GetClientRect
GetWindowRect
SetTimer
LoadIconA
UpdateWindow
DestroyWindow
KillTimer
RedrawWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
IsWindowVisible
EnableWindow
CreateDialogParamA
FindWindowExA
wsprintfA
GetWindowLongA
HttpSendRequestA
HttpSendRequestExA
HttpQueryInfoA
FtpCreateDirectoryA
FtpOpenFileA
InternetGetLastResponseInfoA
InternetSetFilePointer
InternetSetOptionA
InternetQueryOptionA
InternetCloseHandle
InternetErrorDlg
HttpOpenRequestA
HttpAddRequestHeadersA
HttpEndRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetReadFile
InternetWriteFile
ord17
get
head
post
put
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileMD5
GetMD5
GetMD5File
GetMD5Random
GetMD5String
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Log
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetEnvironmentStringsA
GetVersionExA
RtlUnwind
RtlZeroMemory
lstrcpyA
_fdopen
_open_osfhandle
_ultoa
fclose
_cexit
malloc
printf
raise
setbuf
strcpy
osplatform
osversion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\source\notepad++\trunk\PowerEditor\bin\npp.pdb
InitCommonControlsEx
ImageList_SetIconSize
ord17
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_Draw
PathStripPathW
PathIsRelativeW
PathAddExtensionW
PathFindExtensionW
PathRemoveExtensionW
PathMatchSpecW
PathIsDirectoryW
PathCompactPathExW
PathFindFileNameW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
SHGetMalloc
Shell_NotifyIconW
SHGetSpecialFolderLocation
ShellExecuteW
DragQueryPoint
SHGetPathFromIDListW
SHBrowseForFolderW
DragFinish
DragQueryFileW
GlobalAlloc
CreateDirectoryW
GlobalSize
FindClose
FindNextFileW
FindFirstFileW
TerminateThread
CreateThread
CopyFileW
lstrcpynW
GetSystemInfo
GetModuleHandleW
GetVersionExW
ExpandEnvironmentStringsW
GetTimeFormatW
GetDateFormatW
GetLocalTime
MulDiv
WaitForMultipleObjects
WaitForSingleObject
OpenEventW
SetEvent
GetExitCodeProcess
ReadFile
PeekNamedPipe
Sleep
ResumeThread
CreateEventW
CreateProcessW
CreatePipe
GetACP
SizeofResource
LockResource
LoadResource
FindResourceW
LocalLock
LocalAlloc
GetTempPathW
CreateMutexW
SetLastError
GetCommandLineW
HeapReAlloc
VirtualAlloc
VirtualFree
GlobalLock
HeapDestroy
SetFilePointer
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
ExitProcess
HeapSize
GetFileType
SetHandleCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
GetStdHandle
WriteFile
GetCurrentDirectoryA
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
GetStringTypeW
GetStringTypeA
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoA
GetProcessHeap
HeapAlloc
GetVersionExA
GetCommandLineA
HeapFree
GetSystemTimeAsFileTime
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RaiseException
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
LocalUnlock
LoadLibraryW
GetProcAddress
CreateFileW
GetCurrentProcessId
GetCurrentProcess
CloseHandle
GlobalFree
FreeLibrary
SetCurrentDirectoryW
GetCurrentThreadId
GetCurrentDirectoryW
WideCharToMultiByte
MultiByteToWideChar
GetLastError
FormatMessageW
LocalFree
GetFileAttributesW
SetFileAttributesW
MoveFileW
GetFullPathNameW
GetLongPathNameW
lstrcmpiW
DeleteFileW
lstrcpyW
lstrlenW
GetModuleFileNameW
lstrcatW
lstrcmpW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetEnvironmentVariableA
SetStdHandle
LoadLibraryA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEndOfFile
GetDriveTypeA
CompareStringA
CompareStringW
HeapCreate
FindWindowW
ReleaseCapture
RegisterClassExW
CreateDialogIndirectParamW
GetCapture
DragDetect
AppendMenuW
RegisterWindowMessageW
IsWindow
DestroyCursor
CreateCursor
ScrollWindow
SetScrollInfo
SetMenuItemInfoW
InsertMenuItemW
LoadStringW
TranslateAcceleratorW
GetMessageA
GetMessageW
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
GetMenuItemCount
IsClipboardFormatAvailable
GetClipboardData
GetMenuStringW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MonitorFromWindow
GetMonitorInfoW
SetForegroundWindow
SetWindowPlacement
GetMenuState
EnableMenuItem
CheckMenuRadioItem
DestroyAcceleratorTable
GetSubMenu
GetMenuItemID
ModifyMenuW
EndDialog
DialogBoxIndirectParamW
DialogBoxParamW
RemoveMenu
LoadIconW
DestroyIcon
mouse_event
WindowFromPoint
PtInRect
SetDlgItemInt
MapWindowPoints
GetKeyState
CreatePopupMenu
InsertMenuW
DestroyMenu
TrackPopupMenu
GetWindowTextW
MessageBoxA
SetCapture
GetActiveWindow
IsChild
GetDlgCtrlID
RedrawWindow
GetCursorPos
CreateAcceleratorTableW
IsWindowUnicode
SetWindowLongA
CallWindowProcA
CharUpperW
SetWindowsHookExW
UnhookWindowsHookEx
SetParent
SetWindowTextW
LoadBitmapW
CallNextHookEx
ScreenToClient
GetDlgItemTextW
SetDlgItemTextW
MessageBoxW
GetDlgItemInt
CharLowerW
DrawIcon
TranslateMessage
CreateDialogParamW
DrawFocusRect
FillRect
FrameRect
SendDlgItemMessageW
SetWindowLongW
GetWindowLongW
GetSysColor
InflateRect
ClientToScreen
CallWindowProcW
IsWindowVisible
GetWindowRect
ShowWindow
SetWindowPos
RegisterClassW
BeginPaint
EndPaint
GetFocus
PostMessageW
LoadCursorW
SetCursor
DestroyWindow
CreateCaret
DestroyCaret
GetSystemMetrics
GetWindowPlacement
MoveWindow
CreateWindowExW
SetFocus
GetScrollPos
GetScrollRange
UpdateWindow
DefWindowProcW
DrawFrameControl
GetMenu
ShowCaret
MessageBeep
DrawTextW
SetCaretPos
HideCaret
GetParent
ShowScrollBar
SetScrollRange
InvalidateRect
SetScrollPos
GetKeyboardState
ToAscii
wsprintfW
GetDC
DrawEdge
DrawTextExW
ReleaseDC
GetClientRect
LoadImageW
DrawIconEx
GetDlgItem
SendMessageW
EnableWindow
DispatchMessageW
CreateMenu
GetClassNameW
PostQuitMessage
LoadMenuW
SystemParametersInfoW
SetMenu
IsDialogMessageW
IsDialogMessageA
PeekMessageW
IsZoomed
DeleteMenu
RealChildWindowFromPoint
IsIconic
DrawMenuBar
CheckMenuItem
GetTextMetricsW
CreateHatchBrush
LineTo
MoveToEx
RestoreDC
SaveDC
DeleteDC
BitBlt
CreateCompatibleBitmap
GetObjectW
CreateFontW
SetBkColor
SetWindowOrgEx
OffsetWindowOrgEx
PatBlt
SetBrushOrgEx
CreatePatternBrush
CreateBitmap
EnumFontFamiliesExW
EndDoc
EndPage
ExtTextOutW
SetTextAlign
StartPage
StartDocW
DPtoLP
GetDeviceCaps
GetTextExtentPointW
CreateFontIndirectW
GetPixel
SetTextColor
CreateSolidBrush
GetTextExtentPoint32W
GetROP2
SetROP2
GetStockObject
CreatePen
Rectangle
DeleteObject
SetBkMode
CreateCompatibleDC
SelectObject
ChooseColorW
GetOpenFileNameW
PrintDlgW
GetSaveFileNameW
RegCloseKey
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
IsTextUnicode
RegQueryInfoKeyW
CoInitialize
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AreFileApisANSI
CloseHandle
CreateFileA
CreateFileMappingA
CreateFileW
DeleteCriticalSection
DeleteFileA
DeleteFileW
EnterCriticalSection
ExitProcess
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetFileAttributesA
GetFileAttributesExW
GetFileAttributesW
GetFileSize
GetFullPathNameA
GetFullPathNameW
GetLastError
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathA
GetTempPathW
GetTickCount
GetVersionExA
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
LockFile
LockFileEx
MapViewOfFile
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
SetEndOfFile
SetFilePointer
SetUnhandledExceptionFilter
Sleep
TlsGetValue
UnlockFile
UnlockFileEx
UnmapViewOfFile
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_access
_assert
_cexit
_flsbuf
_iob
_isatty
_isctype
_onexit
_pctype
_setmode
_winmajor
abort
atexit
atoi
calloc
exit
fclose
fflush
fgets
fopen
fprintf
fputc
fputs
free
fwrite
getenv
localtime
malloc
memcmp
memmove
memset
printf
putchar
puts
qsort
realloc
signal
strcmp
strncmp
strncpy
strtol
tolower
vfprintf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\Users\Shai\Crossrider\cr-ie-plugin\output\ButtonUtil.pdb
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetCrackUrlA
InternetSetOptionA
InternetOpenA
GetVersion
GetLastError
GetModuleFileNameA
ExpandEnvironmentStringsA
CreateFileA
ReadFile
SetLastError
LocalFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GlobalFlags
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
SetEvent
lstrcpyA
CreateEventA
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
LocalAlloc
WriteFile
SetFilePointer
FindResourceA
FreeLibrary
LoadResource
SizeofResource
IsDBCSLeadByte
lstrlenW
RaiseException
lstrcmpiA
LoadLibraryExA
GetCommandLineA
CreateThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
Sleep
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStringTypeW
HeapCreate
HeapDestroy
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
GetConsoleCP
ReleaseMutex
WaitForSingleObject
VirtualQuery
CloseHandle
OpenMutexA
CreateMutexA
WideCharToMultiByte
GetModuleHandleA
GetProcAddress
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
DebugBreak
InterlockedIncrement
InterlockedDecrement
lstrlenA
EncodePointer
DecodePointer
GetLocalTime
GetSystemTimeAsFileTime
HeapFree
GetConsoleMode
FlushFileBuffers
CreateFileW
GetProcessHeap
SetEndOfFile
SetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
LoadLibraryW
LCMapStringW
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
RtlUnwind
WriteConsoleW
UnhookWindowsHookEx
SetWindowsHookExA
SetWindowPos
GetWindowRect
ReleaseDC
GetDC
DestroyIcon
PostMessageA
GetParent
CallNextHookEx
GetWindowThreadProcessId
GetDesktopWindow
SendMessageA
GetWindowTextA
FindWindowExA
CharNextA
wvsprintfA
LoadStringA
InvalidateRect
DestroyWindow
GetTextExtentPoint32A
SelectObject
DeleteObject
GetObjectA
CreateFontA
RegSetValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
OpenProcessToken
GetTokenInformation
RegDeleteValueA
RegQueryInfoKeyW
RegCloseKey
RegCreateKeyExA
GetSidSubAuthority
GetSidSubAuthorityCount
SHGetFolderPathA
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CreateStreamOnHGlobal
VariantClear
VarUI4FromStr
ImageList_GetImageCount
ImageList_ReplaceIcon
ImageList_Remove
GdiplusShutdown
GdiplusStartup
GdipCloneBitmapAreaI
GdipCreateHICONFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawImageRectI
GdipMeasureString
GdipDrawString
GdipFillPath
GdipGraphicsClear
GdipDrawPath
GdipSetInterpolationMode
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipSetPathGradientFocusScales
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipCreatePathGradientFromPath
GdipWindingModeOutline
GdipAddPathEllipseI
GdipAddPathRectangleI
GdipDeletePath
GdipCreatePath
GdipSetStringFormatTrimming
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AccessibleObjectFromWindow
WSACleanup
gethostbyname
WSAStartup
inet_ntoa
URLDownloadToCacheFileA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetGetCookieA
InternetSetCookieA
InternetSetOptionA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
CreateThread
GetCurrentThreadId
GetCurrentProcessId
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetLastError
ReleaseMutex
OpenMutexA
CreateMutexA
Sleep
SetEvent
CreateEventA
RaiseException
FlushInstructionCache
GetCurrentProcess
SetLastError
LocalFree
FormatMessageA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GlobalFlags
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
lstrcpyA
LocalAlloc
InitializeCriticalSection
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetExitCodeProcess
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
WaitForSingleObject
OpenProcess
Process32Next
CreateToolhelp32Snapshot
WideCharToMultiByte
GetVersion
MoveFileExA
GetTempPathA
CopyFileExA
ExpandEnvironmentStringsA
LoadLibraryW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
LCMapStringW
GetFileType
SetHandleCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ExitProcess
HeapSize
GetStringTypeW
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
IsProcessorFeaturePresent
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
CloseHandle
OutputDebugStringA
DebugBreak
InterlockedIncrement
VirtualAllocEx
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InterlockedExchange
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
LCMapStringA
InterlockedCompareExchange
InterlockedPushEntrySList
VirtualProtect
HeapAlloc
GetLocalTime
GetSystemTimeAsFileTime
RtlUnwind
EncodePointer
DecodePointer
HeapFree
VirtualFree
InterlockedPopEntrySList
GetStringTypeExA
TerminateProcess
CharLowerA
MessageBoxA
PostMessageA
CharNextA
SetWindowLongA
GetClassInfoExA
LoadCursorA
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetWindowLongA
CallWindowProcA
UnregisterClassA
GetDesktopWindow
GetWindowThreadProcessId
DestroyIcon
InvalidateRect
SendMessageA
GetWindowRect
ReleaseDC
LoadStringA
SetWindowPos
GetParent
FindWindowExA
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
SetTimer
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowTextA
EnumWindows
GetForegroundWindow
SetFocus
BringWindowToTop
SetForegroundWindow
AttachThreadInput
IsWindowVisible
GetDC
wvsprintfA
DestroyWindow
CreateFontA
SelectObject
GetTextExtentPoint32A
DeleteObject
GetObjectA
RegQueryValueExA
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSidSubAuthority
SHGetFolderPathA
ShellExecuteExA
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
CreateStreamOnHGlobal
VariantClear
SysAllocString
VariantChangeType
SysAllocStringLen
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantInit
SysFreeString
ord176
ImageList_GetImageCount
ImageList_Remove
ImageList_ReplaceIcon
GdipDrawPath
GdipSetInterpolationMode
GdipGetImageGraphicsContext
GdipCreatePathGradientFromPath
GdipWindingModeOutline
GdipAddPathEllipseI
GdipAddPathRectangleI
GdipSetStringFormatTrimming
GdipSetStringFormatAlign
GdipCreateSolidFill
GdipCreateHICONFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateFontFromDC
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipGraphicsClear
GdipDeleteGraphics
GdipSetPathGradientFocusScales
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipDeletePath
GdipCreatePath
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipDeleteBrush
GdipAlloc
GdipFree
GdipFillPath
GdipCreateFontFromLogfontA
GdipCloneBitmapAreaI
GdipCloneBrush
GdipDrawString
GdipMeasureString
GdipCloneImage
GdipDeleteFont
GdipDrawImageRectI
GdiplusShutdown
GdipGetImagePixelFormat
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AccessibleObjectFromWindow
URLDownloadToCacheFileA
CoInternetGetSession
InternetSetOptionA
InternetReadFile
HttpQueryInfoA
InternetGetCookieA
InternetSetCookieA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetCrackUrlA
InternetOpenA
WSACleanup
gethostbyname
WSAStartup
inet_ntoa
FreeLibrary
LoadLibraryA
CloseHandle
GetLastError
GetCurrentProcess
OpenProcess
Sleep
TerminateProcess
WaitForSingleObject
CreateThread
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
SetLastError
WideCharToMultiByte
LocalFree
FormatMessageA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
UnmapViewOfFile
SetEvent
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
CreateEventA
lstrcpyA
LocalAlloc
InitializeCriticalSection
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
lstrlenW
ReleaseMutex
lstrcmpiA
DisableThreadLibraryCalls
GetModuleFileNameA
GetModuleHandleW
IsDBCSLeadByte
SizeofResource
LoadResource
GetCurrentProcessId
LoadLibraryExA
OpenMutexA
lstrlenA
GetVersion
ExpandEnvironmentStringsA
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
HeapDestroy
HeapCreate
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
HeapReAlloc
GetLocalTime
GetSystemTimeAsFileTime
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
GetCurrentThreadId
OutputDebugStringA
DebugBreak
InterlockedIncrement
FindResourceA
InterlockedDecrement
GetModuleHandleA
GetProcAddress
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryW
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
CompareStringW
SetEnvironmentVariableA
GetStringTypeExA
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LCMapStringA
CreateMutexA
LoadStringA
CharNextA
PostMessageA
GetWindowThreadProcessId
EnumWindows
SetWindowLongA
GetClassInfoExA
LoadCursorA
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetWindowLongA
CallWindowProcA
DestroyWindow
GetDesktopWindow
DestroyIcon
SendMessageA
GetWindowRect
wvsprintfA
SetWindowPos
GetParent
FindWindowExA
UnhookWindowsHookEx
SetTimer
KillTimer
CharNextW
MessageBoxA
CharLowerA
GetWindowTextA
IsWindowVisible
UnregisterClassA
GetSidSubAuthorityCount
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteKeyA
GetTokenInformation
RegOpenKeyExA
GetSidSubAuthority
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumValueA
ShellExecuteA
SHGetFolderPathA
ShellExecuteExA
CoGetClassObject
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoCreateGuid
CLSIDFromProgID
SysAllocString
SysFreeString
SysStringLen
VariantInit
VariantClear
DispCallFunc
LoadTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysAllocStringLen
VariantChangeType
VariantCopy
UnRegisterTypeLi
GdiplusShutdown
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AccessibleObjectFromWindow
WSACleanup
gethostbyname
WSAStartup
inet_ntoa
URLDownloadToCacheFileA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetGetCookieA
InternetSetCookieA
InternetSetOptionA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
CreateThread
GetCurrentThreadId
GetCurrentProcessId
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetLastError
ReleaseMutex
OpenMutexA
CreateMutexA
Sleep
SetEvent
CreateEventA
RaiseException
FlushInstructionCache
GetCurrentProcess
SetLastError
LocalFree
FormatMessageA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GlobalFlags
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
lstrcpyA
LocalAlloc
InitializeCriticalSection
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetExitCodeProcess
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
WaitForSingleObject
OpenProcess
Process32Next
CreateToolhelp32Snapshot
WideCharToMultiByte
GetVersion
MoveFileExA
GetTempPathA
CopyFileExA
ExpandEnvironmentStringsA
LoadLibraryW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
LCMapStringW
GetFileType
SetHandleCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ExitProcess
HeapSize
GetStringTypeW
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
IsProcessorFeaturePresent
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
CloseHandle
OutputDebugStringA
DebugBreak
InterlockedIncrement
VirtualAllocEx
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InterlockedExchange
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
LCMapStringA
InterlockedCompareExchange
InterlockedPushEntrySList
VirtualProtect
HeapAlloc
GetLocalTime
GetSystemTimeAsFileTime
RtlUnwind
EncodePointer
DecodePointer
HeapFree
VirtualFree
InterlockedPopEntrySList
GetStringTypeExA
TerminateProcess
CharLowerA
MessageBoxA
PostMessageA
CharNextA
SetWindowLongA
GetClassInfoExA
LoadCursorA
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetWindowLongA
CallWindowProcA
UnregisterClassA
GetDesktopWindow
GetWindowThreadProcessId
DestroyIcon
InvalidateRect
SendMessageA
GetWindowRect
ReleaseDC
LoadStringA
SetWindowPos
GetParent
FindWindowExA
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
SetTimer
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowTextA
EnumWindows
GetForegroundWindow
SetFocus
BringWindowToTop
SetForegroundWindow
AttachThreadInput
IsWindowVisible
GetDC
wvsprintfA
DestroyWindow
CreateFontA
SelectObject
GetTextExtentPoint32A
DeleteObject
GetObjectA
RegQueryValueExA
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSidSubAuthority
SHGetFolderPathA
ShellExecuteExA
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
CreateStreamOnHGlobal
VariantClear
SysAllocString
VariantChangeType
SysAllocStringLen
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantInit
SysFreeString
ord176
ImageList_GetImageCount
ImageList_Remove
ImageList_ReplaceIcon
GdipDrawPath
GdipSetInterpolationMode
GdipGetImageGraphicsContext
GdipCreatePathGradientFromPath
GdipWindingModeOutline
GdipAddPathEllipseI
GdipAddPathRectangleI
GdipSetStringFormatTrimming
GdipSetStringFormatAlign
GdipCreateSolidFill
GdipCreateHICONFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateFontFromDC
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipGraphicsClear
GdipDeleteGraphics
GdipSetPathGradientFocusScales
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipDeletePath
GdipCreatePath
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipDeleteBrush
GdipAlloc
GdipFree
GdipFillPath
GdipCreateFontFromLogfontA
GdipCloneBitmapAreaI
GdipCloneBrush
GdipDrawString
GdipMeasureString
GdipCloneImage
GdipDeleteFont
GdipDrawImageRectI
GdiplusShutdown
GdipGetImagePixelFormat
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ