dialog
initDialog
show
Overview
overview
8Static
static
35fd20558cf...18.exe
windows7-x64
35fd20558cf...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3IEDriver.dll
windows7-x64
1IEDriver.dll
windows10-2004-x64
1IEManager.dll
windows7-x64
1IEManager.dll
windows10-2004-x64
1IEMate.dll
windows7-x64
6IEMate.dll
windows10-2004-x64
6IEMateLib.dll
windows7-x64
1IEMateLib.dll
windows10-2004-x64
1IEMateLib2.dll
windows7-x64
1IEMateLib2.dll
windows10-2004-x64
1IEMateLib3.dll
windows7-x64
1IEMateLib3.dll
windows10-2004-x64
1IEPromotion.dll
windows7-x64
1IEPromotion.dll
windows10-2004-x64
1IEProtect.dll
windows7-x64
1IEProtect.dll
windows10-2004-x64
1IERepair.exe
windows7-x64
1IERepair.exe
windows10-2004-x64
1NsPlugin.dll
windows7-x64
8NsPlugin.dll
windows10-2004-x64
8cab.dll
windows7-x64
1cab.dll
windows10-2004-x64
1fixhomepage.exe
windows7-x64
8fixhomepage.exe
windows10-2004-x64
8page/ieprotect.htm
windows7-x64
1page/ieprotect.htm
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
5fd20558cfaf74699409a55c56dd5d07_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5fd20558cfaf74699409a55c56dd5d07_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
IEDriver.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
IEDriver.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
IEManager.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
IEManager.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
IEMate.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
IEMate.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
IEMateLib.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
IEMateLib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
IEMateLib2.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
IEMateLib2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
IEMateLib3.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
IEMateLib3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
IEPromotion.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
IEPromotion.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
IEProtect.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
IEProtect.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
IERepair.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
IERepair.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
NsPlugin.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
NsPlugin.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
cab.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
cab.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
fixhomepage.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
fixhomepage.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
page/ieprotect.htm
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
page/ieprotect.htm
Resource
win10v2004-20240709-en
Target
5fd20558cfaf74699409a55c56dd5d07_JaffaCakes118
Size
869KB
MD5
5fd20558cfaf74699409a55c56dd5d07
SHA1
89b0c8cceead078934e0390ac5e31a25023a055f
SHA256
5ab29f7c771e3e202f22b4f852b54a26ef4deea7f322038547d366ea750b3bb0
SHA512
49668391587321c5baa9250ed72c25e49e684406ceb9efdb0fa02474507eb06fbdbf4dcc2e2dba047acaab62d31492ec2a2ab87a7edcded073afcd17edae0c02
SSDEEP
24576:/2f0MDrehZ5BMXSdqJ6yR8TTLNcAeYJ0fOpDn:Of0MyJM5GT3NkYOfMDn
Checks for missing Authenticode signature.
resource |
---|
5fd20558cfaf74699409a55c56dd5d07_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/nsProcess.dll |
unpack001/IEDriver.dll |
unpack001/IEManager.dll |
unpack001/IEMate.dll |
unpack001/IEPromotion.dll |
unpack001/IEProtect.dll |
unpack001/IERepair.exe |
unpack001/NsPlugin.dll |
unpack001/cab.dll |
unpack001/fixhomepage.exe |
unpack001/plugins/imFilter.dll |
unpack001/regedit.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CloseHandle
TerminateProcess
OpenProcess
lstrcmpiA
WideCharToMultiByte
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryA
GetVersionExA
GlobalFree
lstrcpynA
GlobalAlloc
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
CreateFileA
SizeofResource
LockResource
LoadResource
WriteFile
Sleep
GetLastError
GetVersion
MultiByteToWideChar
SetEndOfFile
CloseHandle
DeleteFileA
GetSystemDirectoryA
GetModuleFileNameA
FindResourceA
DeviceIoControl
wsprintfA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerA
StartServiceA
wcslen
strcpy
strrchr
strcat
strlen
memset
printf
sprintf
fclose
fread
fopen
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
_purecall
_stat
ftell
fseek
fwrite
fflush
malloc
free
realloc
__dllonexit
_onexit
_initterm
_adjust_fdiv
GetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
LoadLibraryA
SetEndOfFile
GetProcAddress
MultiByteToWideChar
GetVersion
CreateFileA
GetLastError
DisableThreadLibraryCalls
WideCharToMultiByte
GetWindowsDirectoryA
lstrlenA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetSystemDirectoryA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetModuleFileNameA
DeviceIoControl
IsBadCodePtr
SetUnhandledExceptionFilter
GetLocalTime
GetTimeZoneInformation
RtlUnwind
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
HeapAlloc
HeapFree
HeapReAlloc
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
TerminateProcess
GetCurrentProcess
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetFullPathNameA
GetCurrentDirectoryA
WriteFile
FlushFileBuffers
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
SetStdHandle
wsprintfA
LoadStringA
RegEnumKeyA
RegCloseKey
RegQueryValueA
RegQueryValueExA
RegEnumValueA
RegOpenKeyA
SysFreeString
SysAllocStringLen
ord21
ord16
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetNumberFormatW
GetWindowsDirectoryW
GetCommandLineW
DeviceIoControl
LocalAlloc
CompareStringW
UnmapViewOfFile
GetExitCodeThread
CreateThread
SetCurrentDirectoryW
LocalFree
WritePrivateProfileStringW
GetPrivateProfileStringW
GetCurrentDirectoryW
GetComputerNameW
GetProfileIntW
SetErrorMode
ResumeThread
MulDiv
FreeResource
GetWindowsDirectoryA
CopyFileA
GetShortPathNameA
OpenMutexW
GetSystemTimeAsFileTime
SetThreadPriority
ReleaseMutex
IsBadStringPtrW
GetCommandLineA
SetWaitableTimer
SuspendThread
SetEndOfFile
GetTempFileNameW
MapViewOfFileEx
CreateFileMappingW
OpenFileMappingW
CreateWaitableTimerW
lstrcpyA
FormatMessageW
FlushViewOfFile
FileTimeToSystemTime
FileTimeToLocalFileTime
IsBadReadPtr
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadCodePtr
ReadProcessMemory
GetCurrentThread
GetModuleFileNameA
CreateFileA
ReadFile
SetFilePointer
SystemTimeToFileTime
FindNextFileW
GetCurrentProcessId
GlobalAddAtomW
GlobalFindAtomW
SetEnvironmentVariableA
CompareStringA
SetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetDateFormatA
GetTimeFormatA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
GetOEMCP
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
HeapCreate
QueryPerformanceCounter
GetCPInfo
LCMapStringW
LCMapStringA
ExitThread
GetSystemInfo
RtlUnwind
ExitProcess
VirtualFree
VirtualAlloc
CreateEventA
GetCurrentDirectoryA
TerminateThread
GetLocalTime
RemoveDirectoryA
DeleteFileA
FindNextFileA
FindFirstFileA
CreateDirectoryA
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GlobalDeleteAtom
UnhandledExceptionFilter
TerminateProcess
OutputDebugStringW
GetFileSize
VirtualQuery
VirtualProtect
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
EnterCriticalSection
LeaveCriticalSection
lstrcpynW
LoadLibraryExW
CreateMutexW
GetTempPathW
lstrcatW
FreeLibrary
CopyFileW
DeleteFileW
CreateDirectoryW
WideCharToMultiByte
FindFirstFileW
FindClose
CreateFileW
WriteFile
CreateEventW
WaitForMultipleObjects
ResetEvent
SetEvent
WaitForSingleObject
CloseHandle
IsBadStringPtrA
GetCurrentThreadId
lstrlenA
Sleep
InterlockedDecrement
lstrcmpW
lstrlenW
lstrcmpiW
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
InterlockedIncrement
MultiByteToWideChar
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
FlushInstructionCache
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
lstrcpyW
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
LoadLibraryW
LoadLibraryA
LoadStringW
LoadAcceleratorsW
GetIconInfo
InsertMenuItemW
InsertMenuW
IsMenu
GetAsyncKeyState
mouse_event
InvalidateRgn
GetUpdateRect
GetMessageW
GetDCEx
EqualRect
SetRect
DialogBoxParamW
SetMenu
GetScrollPos
IsWindowEnabled
DrawFocusRect
FillRect
DestroyCursor
OffsetRect
IsRectEmpty
MoveWindow
GetLastActivePopup
EnumChildWindows
GetWindowTextA
GetClassNameA
OpenClipboard
CloseClipboard
GetWindowPlacement
RegisterWindowMessageW
GetCapture
RegisterHotKey
ModifyMenuW
UnregisterHotKey
keybd_event
CharUpperBuffW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
RegisterWindowMessageA
IsWindowVisible
SetForegroundWindow
SetClipboardData
ReleaseCapture
SetCapture
GetDoubleClickTime
EndPaint
BeginPaint
GetDlgCtrlID
GetComboBoxInfo
EmptyClipboard
FindWindowW
FrameRect
SetWindowPlacement
EndDialog
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetTimer
GetParent
WindowFromPoint
GetCursorPos
GetKeyState
SendMessageW
CreatePopupMenu
PeekMessageA
MsgWaitForMultipleObjects
PostThreadMessageA
wsprintfA
wvsprintfA
DestroyMenu
AppendMenuW
GetMenuItemInfoW
SetCursor
UnionRect
GetDesktopWindow
PostQuitMessage
SetParent
GetSubMenu
AdjustWindowRectEx
LoadMenuW
SetMenuDefaultItem
CheckMenuRadioItem
GetMenuItemID
EnableMenuItem
DeleteMenu
GetMenuItemCount
RedrawWindow
ShowWindow
InvalidateRect
UpdateWindow
ClientToScreen
wvsprintfW
GetDC
TrackPopupMenu
GetClassInfoExW
KillTimer
ScrollWindowEx
SetScrollPos
ShowScrollBar
GetScrollInfo
SetScrollInfo
IsDlgButtonChecked
SetLastErrorEx
IsIconic
RegisterClassExW
LoadCursorW
wsprintfW
SetFocus
SetMenuItemInfoW
GetMonitorInfoW
MonitorFromPoint
GetMenuStringW
PtInRect
SetWindowLongW
GetWindowLongW
SetWindowTextW
GetWindowTextW
IsWindow
CallWindowProcW
DrawTextW
DefWindowProcW
UnregisterClassW
CreateWindowExW
GetWindowRect
SetWindowPos
GetClientRect
PostThreadMessageW
TrackPopupMenuEx
GetWindowDC
ReleaseDC
SetRectEmpty
SystemParametersInfoW
DestroyIcon
LoadBitmapW
WaitMessage
DispatchMessageW
TranslateMessage
PeekMessageW
PostMessageW
GetActiveWindow
GetSystemMetrics
DrawStateW
DrawEdge
CopyRect
GetSysColor
MapWindowPoints
InflateRect
LoadImageW
MessageBoxW
CheckMenuItem
FindWindowExW
SetWindowTextA
GetDlgItem
GetWindowTextLengthW
CharNextW
DestroyWindow
GetClassNameW
GetForegroundWindow
GetFocus
GetWindow
GetWindowThreadProcessId
GetCursor
ScreenToClient
GetWindowLongA
TextOutW
MoveToEx
LineTo
CreateDCW
GetTextExtentPoint32W
CreateRectRgn
CombineRgn
CreateRectRgnIndirect
CreateBitmap
Polyline
GetCurrentObject
CreateDIBSection
GetTextAlign
SetTextAlign
GetBkColor
StretchBlt
BitBlt
SetViewportOrgEx
CreateCompatibleBitmap
CreatePen
Polygon
SelectPalette
RealizePalette
GetDIBits
GetDeviceCaps
CreateCompatibleDC
GetTextMetricsW
ExtTextOutW
Rectangle
SetTextColor
SetBkMode
CreateSolidBrush
SetBkColor
CreateFontIndirectW
DeleteDC
SelectObject
CreatePatternBrush
SetROP2
RestoreDC
GetStockObject
DeleteObject
GetObjectW
SaveDC
CryptCreateHash
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegEnumKeyW
CryptAcquireContextW
RegCreateKeyExA
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
GetUserNameW
RegQueryValueW
RegSetValueW
RegOpenKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
SHGetSpecialFolderPathW
ord195
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteW
SHFileOperationW
SHGetMalloc
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
CoGetClassObject
OleInitialize
CoTaskMemRealloc
OleUninitialize
CreateStreamOnHGlobal
CLSIDFromProgID
CoCreateInstance
RegisterDragDrop
ReleaseStgMedium
SysAllocStringLen
VariantClear
SysStringByteLen
VariantInit
VariantCopy
VariantChangeType
SafeArrayDestroy
VarBstrCmp
SafeArrayCreate
SafeArrayUnaccessData
SafeArrayAccessData
UnRegisterTypeLi
RegisterTypeLi
OleLoadPicture
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysAllocStringByteLen
SysFreeString
SysStringLen
SafeArrayPutElement
GetErrorInfo
SysAllocString
UrlCreateFromPathW
SHRegGetBoolUSValueW
StrCmpIW
SHGetValueW
PathRemoveFileSpecW
PathFileExistsW
StrCmpNIW
StrCpyNW
StrCpyW
PathFindExtensionW
PathIsDirectoryW
ord16
PathFindFileNameW
SHSetValueW
UrlIsW
TransparentBlt
CoInternetParseUrl
URLDownloadToFileW
CoInternetGetSession
SymGetModuleBase64
StackWalk64
SymSetOptions
SymGetOptions
SymFunctionTableAccess64
SymGetLineFromAddr64
SymGetSymFromAddr64
SymCleanup
SymInitialize
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
InternetSetOptionW
InternetSetStatusCallbackW
InternetOpenUrlW
HttpQueryInfoW
InternetOpenW
InternetCloseHandle
InternetReadFileExA
InternetReadFile
GetUrlCacheEntryInfoExW
InternetCanonicalizeUrlW
GetAdaptersInfo
AccessibleChildren
AccessibleObjectFromPoint
??0CScErrLog@@QAE@ABV0@@Z
??0CScErrLog@@QAE@PBD0H@Z
??1CScErrLog@@UAE@XZ
??4CScErrLog@@QAEAAV0@ABV0@@Z
??_7CScErrLog@@6B@
?ThreadProxy@CScErrLog@@KGIPAX@Z
?ThreadWork@CScErrLog@@IAEXXZ
?_createDirectory@CScErrLog@@IAEHPAD@Z
?_idebug1@@YAXPADZZ
?_idebug2@@YAXPADZZ
?_idebug3@@YAXPADZZ
?_idebug4@@YAXPADZZ
?_idebug5@@YAXPADZZ
?_idebug@@YAXPADZZ
?_readRegistoryFilePath@CScErrLog@@IAEHPAD@Z
?_readRegistoryLoglevel@CScErrLog@@IAEHPADPAH@Z
?_readRegistoryOutputFlag@CScErrLog@@IAE_NXZ
?_tidebug1@@YAXPAGZZ
?_tidebug2@@YAXPAGZZ
?_tidebug3@@YAXPAGZZ
?_tidebug4@@YAXPAGZZ
?_tidebug5@@YAXPAGZZ
?_tidebug@@YAXPAGZZ
?dump_binary@CScErrLog@@QAEXPADPAEH@Z
?flushlogbuff@CScErrLog@@IAEHH@Z
?g_pScErrLog@@3PAVCScErrLog@@A
?get_lastlogindex@CScErrLog@@IAEHXZ
?get_logfile_info@CScErrLog@@QAEABUSXLOGPARAM@@XZ
?geterror@CScErrLog@@QAEHXZ
?getlogLevel@CScErrLog@@QAEHXZ
?idebug1@@YAXPADZZ
?idebug2@@YAXPADZZ
?idebug3@@YAXPADZZ
?idebug4@@YAXPADZZ
?idebug5@@YAXPADZZ
?idebug@@YAXPADZZ
?is_output_debug@CScErrLog@@QBE_NXZ
?logfilebackup@CScErrLog@@IAEXH@Z
?logtype_string@CScErrLog@@2PAPBDA
?logwrite@CScErrLog@@IAEHPADH@Z
?makelogfile@CScErrLog@@IAEHXZ
?put@CScErrLog@@QAEXHPAD@Z
?put@CScErrLog@@QAEXHW4tagKind@1@W4tagType@1@PBD22@Z
?put@CScErrLog@@QAEXHW4tagKind@1@W4tagType@1@PBG22@Z
?putf@CScErrLog@@QAAXHPADZZ
?putf_nh@CScErrLog@@QAAXPADZZ
?rm_directory@CScErrLog@@IAEXPAD@Z
?rm_oldlog@CScErrLog@@IAEXXZ
?setlogLevel@CScErrLog@@QAEXH@Z
?setlogMaxDay@CScErrLog@@QAEXH@Z
?writefile@CScErrLog@@QAEXPADH@Z
?writefile_nh@CScErrLog@@QAEXPAEH@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord3953
ord5307
ord2396
ord6467
ord860
ord800
ord858
ord924
ord537
ord540
ord1116
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord4698
ord4079
ord5302
ord5300
ord2725
ord3346
ord5199
ord1089
ord3922
ord5731
ord2512
ord600
ord826
ord269
ord2554
ord4486
ord6375
ord815
ord1131
ord4274
_initterm
__CxxFrameHandler
??2@YAPAXI@Z
__dllonexit
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
memcpy
free
_onexit
LocalFree
WritePrivateProfileStringA
CreateDirectoryA
lstrlenA
LocalAlloc
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
ord16
ord21
ord15
ord57
ord18
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileAttributesW
GetVersion
GetModuleHandleW
LoadLibraryW
GetModuleFileNameW
LoadLibraryA
SetLastError
GetLongPathNameA
VirtualProtect
GetModuleHandleA
CreateThread
MultiByteToWideChar
FreeLibrary
OutputDebugStringA
WideCharToMultiByte
GetSystemDirectoryA
GetModuleFileNameA
DeviceIoControl
GetWindowsDirectoryA
GetCurrentProcess
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
GetVersionExA
FindFirstFileA
GetFileAttributesA
GetProcAddress
VirtualAlloc
SetFileAttributesA
RemoveDirectoryA
DeleteFileA
UnmapViewOfFile
FindNextFileA
FindClose
CreateFileA
GetFileSize
CreateFileMappingA
CloseHandle
MapViewOfFile
LocalFree
MessageBoxA
EndDialog
wsprintfA
GetDlgItemTextA
KillTimer
SendMessageA
CheckDlgButton
IsDlgButtonChecked
SetTimer
SetWindowTextA
GetDlgItem
DialogBoxParamA
DeleteObject
CreateFontA
OpenProcessToken
FreeSid
RegOpenKeyExA
RegGetKeySecurity
RegCloseKey
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
GetLengthSid
CopySid
InitializeSecurityDescriptor
AddAce
InitializeAcl
AllocateAndInitializeSid
RegEnumKeyA
RegQueryInfoKeyA
RegSetKeySecurity
SetSecurityDescriptorDacl
CommandLineToArgvW
SHGetSpecialFolderPathA
CoCreateInstance
_wcsicmp
strlen
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_adjust_fdiv
_initterm
_onexit
__dllonexit
realloc
free
malloc
fflush
fwrite
_stat
_purecall
strncpy
_mbsicmp
_mbscmp
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
strrchr
printf
fclose
fread
fopen
__CxxFrameHandler
wcscpy
??1type_info@@UAE@XZ
memmove
strstr
_stricmp
_strlwr
_except_handler3
strchr
ftell
fseek
SHDeleteKeyA
GetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LockResource
LoadResource
FindResourceW
FindResourceExW
CloseHandle
lstrlenW
GetModuleFileNameW
GetProcAddress
LoadLibraryW
GetLastError
GetCommandLineW
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
lstrcpyW
GetModuleHandleW
FreeLibrary
LoadLibraryExW
lstrcmpiW
lstrcpynW
CreateDirectoryW
WritePrivateProfileStringW
FlushFileBuffers
SetStdHandle
SizeofResource
IsBadReadPtr
LoadLibraryA
SetFilePointer
GetOEMCP
GetStringTypeW
GetStringTypeA
GetCPInfo
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
TerminateProcess
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExW
InterlockedExchange
GetThreadLocale
GetLocaleInfoA
IsBadWritePtr
VirtualFree
HeapCreate
SetUnhandledExceptionFilter
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
LCMapStringW
LCMapStringA
VirtualQuery
GetACP
IsBadCodePtr
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
ExitProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoW
VirtualProtect
VirtualAlloc
GetSystemInfo
GetMessageW
DispatchMessageW
ShowWindow
UnregisterClassW
SendMessageW
SetWindowLongW
TranslateMessage
LoadStringW
MessageBoxW
GetWindowTextW
GetWindowTextLengthW
SetDlgItemTextW
MessageBeep
SetFocus
GetWindowLongW
GetParent
GetWindow
GetWindowRect
SystemParametersInfoW
GetClientRect
MapWindowPoints
SetWindowPos
GetSystemMetrics
LoadImageW
GetDlgItem
EnableWindow
PostQuitMessage
CharNextW
DefWindowProcW
CreateDialogParamW
IsDialogMessageW
DestroyWindow
PeekMessageW
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
ShellExecuteW
SHGetSpecialFolderPathW
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoUninitialize
CoCreateInstance
VarUI4FromStr
PathRemoveFileSpecW
UrlCreateFromPathW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
GetModuleFileNameA
CloseHandle
WaitForSingleObject
CreateProcessA
GlobalFree
lstrcpyA
FreeLibrary
strcat
strcpy
strrchr
atoi
__dllonexit
_onexit
memset
Install
Investigate
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\steupIemate\cabinet\Release\cabinet.pdb
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
SetFileAttributesW
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileW
GetLastError
CreateDirectoryW
GetTempPathW
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileInformationByHandle
FreeLibrary
DeleteFileW
GetProcAddress
LoadLibraryW
FindNextFileW
FindClose
FindFirstFileW
lstrcatW
lstrcpyW
RaiseException
RtlUnwind
ExitProcess
GetFileType
ReadFile
WriteFile
SetFilePointer
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
HeapAlloc
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
SetEndOfFile
SetHandleCount
GetStdHandle
GetStartupInfoA
SetStdHandle
TerminateProcess
GetCurrentProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
InterlockedExchange
VirtualQuery
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
FlushFileBuffers
VirtualProtect
GetSystemInfo
CompressFile
CompressFolder
DeCompressFolder
Test
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetCurrentProcess
TerminateProcess
OpenProcess
GetEnvironmentVariableA
InterlockedDecrement
lstrcpynA
lstrlenA
InterlockedIncrement
MultiByteToWideChar
GetPrivateProfileStringA
GetProcAddress
OutputDebugStringA
FindNextFileA
SetLastError
GetFullPathNameA
lstrcpyA
WritePrivateProfileStringA
Process32Next
Process32First
CreateToolhelp32Snapshot
FlushFileBuffers
SetFileAttributesA
DeleteFileA
SearchPathA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
ExpandEnvironmentStringsA
VirtualQuery
GetModuleFileNameA
GetCurrentDirectoryA
GetLongPathNameA
GetShortPathNameA
FindFirstFileA
FindClose
GetFileAttributesA
GetVersionExA
GetLastError
DebugBreak
LocalFree
SetStdHandle
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
SetFilePointer
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapAlloc
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsGetValue
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LoadStringA
CharLowerA
CharNextA
wvsprintfA
OpenServiceA
CloseServiceHandle
DeleteService
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegEnumKeyA
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
GetExplicitEntriesFromAclA
DeleteAce
OpenSCManagerA
SHGetPathFromIDListA
SHGetFileInfoA
SHGetSpecialFolderPathA
SHChangeNotify
SHGetMalloc
SHGetSpecialFolderLocation
CoCreateInstance
CoInitialize
CoUninitialize
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
SHSetValueA
SHDeleteValueA
StrNCatA
PathCombineA
SHGetValueA
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
GlobalAlloc
lstrcmpA
GetCurrentThreadId
HeapSize
GlobalUnlock
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
ExitProcess
HeapAlloc
GetCurrentProcess
FlushInstructionCache
MulDiv
lstrcmpiW
GetProcessHeap
HeapFree
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
lstrcatA
GetModuleFileNameA
lstrcpyA
lstrcpynA
lstrcmpiA
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
InterlockedExchange
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
HeapReAlloc
CreateWindowExA
SendMessageA
GetWindowLongA
InvalidateRect
SetWindowLongA
CharNextA
GetFocus
IsChild
SetFocus
GetDlgItem
IsWindow
DestroyAcceleratorTable
RedrawWindow
PtInRect
DefWindowProcA
DestroyWindow
GetSysColor
ReleaseCapture
SetCapture
FillRect
GetClientRect
GetDC
ReleaseDC
InvalidateRgn
GetDesktopWindow
CallWindowProcA
EndPaint
BeginPaint
UnregisterClassA
GetWindow
SetWindowPos
GetClassNameA
GetParent
UnionRect
SetWindowRgn
OffsetRect
EqualRect
IntersectRect
GetKeyState
ShowWindow
wsprintfA
CreateAcceleratorTableA
RegisterClassExA
LoadCursorA
GetClassInfoExA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
RegisterWindowMessageA
CloseMetaFile
RestoreDC
SetWindowExtEx
SetWindowOrgEx
SaveDC
CreateMetaFileA
SetViewportOrgEx
SetMapMode
LPtoDP
CreateDCA
SetTextAlign
DeleteMetaFile
SetBkMode
SetTextColor
CreateFontIndirectA
LineTo
MoveToEx
CreatePen
FillRgn
SelectClipRgn
CreateRectRgn
GetClipRgn
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
TextOutA
CreateRectRgnIndirect
DeleteObject
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
OleLoadFromStream
OleSaveToStream
OleRegGetMiscStatus
CreateOleAdviseHolder
OleRegGetUserType
OleInitialize
CreateDataAdviseHolder
WriteClassStm
OleRegEnumVerbs
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
OleUninitialize
VariantChangeType
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
OleCreatePropertyFrame
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
??2@YAPAXI@Z
_purecall
??_U@YAPAXI@Z
realloc
wcsncpy
__CxxFrameHandler
??_V@YAXPAX@Z
??3@YAXPAX@Z
_CxxThrowException
_except_handler3
_resetstkoflw
free
malloc
?terminate@@YAXXZ
_initterm
_adjust_fdiv
__CppXcptFilter
_onexit
memset
PathFindExtensionA
UrlCombineW
StrCpyNW
InternetCreateUrlW
InternetCrackUrlW
_TrackMouseEvent
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\iemate2\regedit\Release\regedit.pdb
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
VirtualQuery
InterlockedExchange
RtlUnwind
LoadLibraryA
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
InitializeCriticalSection
GetStdHandle
SetHandleCount
HeapAlloc
HeapFree
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCurrentProcess
TerminateProcess
GetModuleHandleA
GetProcAddress
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetVersionExA
GetCommandLineA
GetCurrentThreadId
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
SearchPathW
GetFileSize
GetLastError
OutputDebugStringW
CreateFileW
CloseHandle
WideCharToMultiByte
WriteFile
ReadFile
MultiByteToWideChar
lstrcmpW
ExitProcess
lstrlenW
lstrcpyW
GetFileType
CharNextW
IsCharAlphaNumericW
CharUpperW
IsDialogMessageW
PeekMessageW
TranslateMessage
DispatchMessageW
wsprintfW
SendDlgItemMessageW
RegSetValueExW
RegEnumValueW
RegCreateKeyW
RegOpenKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegDeleteKeyW
RegSetValueW
RegSetValueExA
RegFlushKey
RegDeleteValueW
StrChrW
StrToIntW
ExportWinNT50RegFile
ImportRegFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ