Set
Unload
Overview
overview
7Static
static
3da9aa96c96...18.exe
windows7-x64
7da9aa96c96...18.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ps.dll
windows7-x64
3$PLUGINSDI...ps.dll
windows10-2004-x64
31314.exe
windows7-x64
31314.exe
windows10-2004-x64
3$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...ce.exe
windows7-x64
3$PROGRAM_F...ce.exe
windows10-2004-x64
3gpupdate.exe
windows7-x64
3gpupdate.exe
windows10-2004-x64
3ipseccmd.exe
windows7-x64
3ipseccmd.exe
windows10-2004-x64
3polstore.dll
windows7-x64
3polstore.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3winipsec.dll
windows7-x64
3winipsec.dll
windows10-2004-x64
3ܾ�...��.bat
windows7-x64
3ܾ�...��.bat
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
1314.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
1314.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduService.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduService.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
gpupdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
gpupdate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
ipseccmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ipseccmd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
polstore.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
polstore.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
uninst.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
winipsec.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
winipsec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ܾ˿˲.bat
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ܾ˿˲.bat
Resource
win10v2004-20240802-en
Target
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118
Size
1.2MB
MD5
da9aa96c9630ec4e6d3afac19baac2f0
SHA1
4215e5ed9f8bc1be227788f5e23c9ee488290ac5
SHA256
81e9fdae84f8ab3f326927f01990390588c68c890f3630547c7960c6cc1906f7
SHA512
40a5f9c755132167d1a591e90ee5c6a15bcc93d529ae011a4724ddb77b4d6df987bfed0facf7fadfdc60f5572085e3e0bf380dd57bb645d951aa2066311ff6b6
SSDEEP
24576:/FlPiET3JkuWPPCIwyUbLFMbDJx21PC8tqj7jRXxT5oH:/niET3Jku0qpbLFMbDJSPx27XmH
Checks for missing Authenticode signature.
resource |
---|
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118 |
unpack001/$PLUGINSDIR/BrandingURL.dll |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/LangDLL.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/ToolTips.dll |
unpack001/1314.exe |
unpack001/gpupdate.exe |
unpack001/ipseccmd.exe |
unpack001/polstore.dll |
unpack001/uninst.exe |
unpack003/$PLUGINSDIR/FindProcDLL.dll |
unpack001/winipsec.dll |
resource | yara_rule |
---|---|
static1/unpack001/1314.exe | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
CloseHandle
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
ExitProcess
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
GlobalFree
GetWindowRect
SetCapture
InvalidateRect
SendMessageA
GetCapture
ClientToScreen
GetDlgItem
RedrawWindow
EnableWindow
LoadImageA
SetPropA
GetWindowLongA
PtInRect
ReleaseCapture
SetCursor
GetPropA
CallWindowProcA
SetWindowLongA
GetObjectA
SetTextColor
CreateFontIndirectA
ShellExecuteA
Set
Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetACP
GlobalFree
lstrcpynA
lstrcmpA
lstrlenA
GetModuleHandleA
MulDiv
lstrcpyA
GlobalAlloc
SetWindowTextA
SetDlgItemTextA
SendDlgItemMessageA
EndDialog
DialogBoxParamA
LoadIconA
SendMessageA
ShowWindow
GetDC
CreateFontIndirectA
GetDeviceCaps
DeleteObject
LangDialog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
GlobalFree
HeapAlloc
GetClientRect
SendMessageA
CreateWindowExA
ord17
Author
Classic
Modern
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
lstrcmpiA
CopyFileA
ExitProcess
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcmpA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetCurrentProcess
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EndDialog
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
RegisterClassA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
TrackPopupMenu
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetupIterateCabinetW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetPrivateProfileStringW
GetACP
MoveFileExW
RemoveDirectoryW
FindNextFileW
FindClose
FindFirstFileW
SetFilePointer
Process32NextW
GetCurrentProcessId
Process32FirstW
CreateToolhelp32Snapshot
ReadProcessMemory
OpenProcess
GlobalFree
GlobalAlloc
LockResource
SetCurrentDirectoryW
TerminateThread
GetExitCodeThread
OpenMutexW
SetPriorityClass
CreateProcessW
ExpandEnvironmentStringsW
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
GetPrivateProfileIntW
WritePrivateProfileStringW
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
lstrcmpW
GetEnvironmentVariableW
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFileTime
SwitchToThread
SetErrorMode
CreateFileA
SetEvent
FileTimeToSystemTime
GetFileInformationByHandle
GetLocalTime
SetEnvironmentVariableA
CompareStringA
SetFileAttributesW
SetEndOfFile
SetConsoleCtrlHandler
GetOEMCP
GetDriveTypeA
GetFullPathNameA
FlushFileBuffers
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
SetCurrentDirectoryA
GetCurrentDirectoryA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
HeapSize
TerminateProcess
GetCurrentThread
FatalAppExitA
ExitProcess
GetCommandLineA
RaiseException
GetFullPathNameW
GetDriveTypeW
FileTimeToLocalFileTime
GetSystemTime
GetTimeZoneInformation
HeapReAlloc
RtlUnwind
GetWindowsDirectoryW
DeviceIoControl
GetSystemDirectoryW
CopyFileW
GetVersionExW
GetTempPathW
GetTempFileNameW
DeleteFileW
GlobalLock
GlobalUnlock
CompareStringW
LoadLibraryA
lstrcatW
lstrcpyW
DisableThreadLibraryCalls
TryEnterCriticalSection
HeapDestroy
ExitThread
GetCurrentThreadId
CreateThread
lstrcpynW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
lstrcmpiW
GetShortPathNameW
GetModuleFileNameW
GetModuleHandleW
OutputDebugStringA
GetVersion
GetFileAttributesW
GetModuleHandleA
LoadLibraryW
SetLastError
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
FreeLibrary
LocalFree
MultiByteToWideChar
CreateDirectoryW
CreateFileW
GetFileSize
ReadFile
WriteFile
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
WaitForSingleObject
CloseHandle
ReleaseMutex
GetProcessHeap
HeapAlloc
HeapFree
Sleep
GetLastError
GetTickCount
WideCharToMultiByte
WriteProcessMemory
lstrlenA
OutputDebugStringW
DebugBreak
lstrlenW
GetCurrentProcess
FlushInstructionCache
InterlockedDecrement
InterlockedIncrement
VirtualProtect
VirtualQuery
GetLocaleInfoW
EnableMenuItem
GetSysColorBrush
GetMessageW
PostThreadMessageW
DrawIconEx
InflateRect
FindWindowExW
GetUpdateRect
DeleteMenu
GetTopWindow
MenuItemFromPoint
GetMenuItemID
SetDlgItemTextW
CreateDialogParamW
GetDlgItemTextW
GetWindowDC
AdjustWindowRect
LoadIconW
EnumWindows
IsDialogMessageW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CharUpperW
CharUpperBuffA
GetAsyncKeyState
CharNextA
WaitForInputIdle
SetForegroundWindow
GetForegroundWindow
AttachThreadInput
CharLowerBuffW
CreatePopupMenu
AppendMenuW
CreateMenu
InsertMenuW
TrackPopupMenu
RemoveMenu
GetMenuItemInfoW
CopyRect
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
RedrawWindow
GetMenuItemCount
WindowFromPoint
InsertMenuItemW
SetScrollPos
SetScrollInfo
GetScrollInfo
SetWindowRgn
GetMenuItemRect
RemovePropW
SetPropW
GetPropW
SetWindowLongA
DefWindowProcW
EndDialog
ShowWindow
SetWindowTextW
IsWindow
SetWindowLongW
GetDlgItem
LoadImageW
EndPaint
BeginPaint
GetDC
CallWindowProcW
GetWindowLongW
LoadStringW
wvsprintfW
CharNextW
IsChild
EnableWindow
DestroyIcon
DialogBoxParamW
FindWindowW
MessageBoxW
GetClassInfoExW
RegisterClassExW
wsprintfW
ClientToScreen
IsRectEmpty
GetWindowThreadProcessId
GetGUIThreadInfo
IsWindowVisible
KillTimer
SetTimer
GetActiveWindow
AdjustWindowRectEx
IsWindowUnicode
CallWindowProcA
EnumChildWindows
GetMessagePos
MessageBeep
SetMenuItemInfoW
FrameRect
LoadBitmapW
DrawStateW
PeekMessageW
GetSubMenu
ModifyMenuW
TrackPopupMenuEx
CharLowerBuffA
CreateIconFromResourceEx
ScrollWindow
GetDesktopWindow
DestroyMenu
CharLowerW
PostMessageW
IsMenu
SetWindowPos
MapWindowPoints
GetClientRect
SystemParametersInfoW
GetWindowRect
GetWindow
GetParent
SendMessageW
DestroyWindow
RegisterWindowMessageW
PtInRect
SetRectEmpty
ScreenToClient
GetCursorPos
ReleaseCapture
GetCapture
SetCapture
SetFocus
UpdateWindow
SetCursor
InvalidateRect
GetDlgCtrlID
OffsetRect
ReleaseDC
GetWindowTextW
GetWindowTextLengthW
LoadCursorW
GetClassNameW
FillRect
DrawFocusRect
GetFocus
GetSysColor
IsWindowEnabled
DrawTextW
CreateWindowExW
DispatchMessageW
TranslateMessage
GetKeyState
MoveWindow
GetSystemMetrics
PatBlt
GetTextColor
Rectangle
CreateRectRgn
ExcludeClipRect
GetDeviceCaps
DPtoLP
SelectObject
MoveToEx
LineTo
DeleteObject
GetClipBox
ExtTextOutW
SaveDC
RestoreDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateBitmap
GetCurrentObject
CreateSolidBrush
GetTextExtentPoint32W
GetPixel
TextOutW
SetTextColor
DeleteDC
CreateFontIndirectW
SetBkMode
SetBkColor
GetStockObject
GetObjectW
CreatePen
SetViewportOrgEx
RegQueryValueExW
GetUserNameW
RegSetKeySecurity
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
RegCloseKey
RegEnumValueW
RegOpenKeyW
RegSetValueExW
RegCreateKeyW
RegDeleteValueW
QueryServiceStatus
ChangeServiceConfigW
StartServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
ControlService
EnumDependentServicesW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteKeyW
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
SetSecurityInfo
GetSecurityDescriptorSacl
RegEnumKeyW
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
DragQueryFileA
ExtractIconW
SHGetSpecialFolderPathW
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetFileInfoW
DuplicateIcon
OleInitialize
OleUninitialize
RevokeDragDrop
RegisterDragDrop
ReleaseStgMedium
CLSIDFromProgID
StringFromGUID2
GetHGlobalFromStream
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateGuid
CreateStreamOnHGlobal
SysAllocString
LoadRegTypeLi
VarUI4FromStr
LoadTypeLi
RegisterTypeLi
VariantClear
VariantCopy
VariantInit
SysStringLen
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SetErrorInfo
VariantChangeType
GetErrorInfo
SysAllocStringLen
SysFreeString
CreateErrorInfo
SHCopyKeyW
SHGetValueW
SHDeleteKeyW
SHDeleteValueW
SHSetValueW
StrStrIW
PathFindFileNameW
PathRemoveExtensionW
UrlUnescapeA
StrRetToStrW
StrRetToStrA
PathIsDirectoryA
PathRemoveFileSpecA
UrlUnescapeW
UrlCanonicalizeW
PathRemoveFileSpecW
PathFileExistsW
PathIsDirectoryW
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetCloseHandle
InternetReadFile
HttpSendRequestExA
InternetSetStatusCallbackW
FtpOpenFileA
HttpSendRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
InternetSetOptionA
InternetConnectA
InternetAttemptConnect
InternetSetFilePointer
FindFirstUrlCacheGroup
DeleteUrlCacheGroup
FindNextUrlCacheGroup
FindCloseUrlCache
FindFirstUrlCacheEntryW
FindNextUrlCacheEntryW
InternetOpenUrlW
HttpSendRequestExW
InternetWriteFile
HttpEndRequestW
InternetGetConnectedState
DeleteUrlCacheEntryW
InternetQueryDataAvailable
InternetGetCookieW
InternetSetCookieW
HttpQueryInfoW
GetUrlCacheEntryInfoW
InternetOpenW
InternetSetOptionW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
CoInternetGetSession
URLDownloadToFileW
UuidCreate
GetAdaptersInfo
GetNetworkParams
gethostname
gethostbyname
AlphaBlend
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
RunOnceRemove
RunOnceUpdate
SVCUninstall
Uninstall
UpdateBaiduToolbar
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathW
PathFileExistsW
GetShortPathNameW
GetModuleHandleW
GetModuleFileNameW
MultiByteToWideChar
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcpynW
InitializeCriticalSection
lstrcpyW
lstrcatW
InterlockedDecrement
InterlockedIncrement
CloseHandle
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
lstrlenW
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WideCharToMultiByte
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetCommandLineW
lstrcmpiW
LoadLibraryW
GetProcAddress
FreeLibrary
GetACP
GetOEMCP
FreeEnvironmentStringsW
GetCurrentProcess
WriteFile
GetStartupInfoA
GetFileType
FreeEnvironmentStringsA
GetStdHandle
SetHandleCount
GetCommandLineA
GetEnvironmentStrings
UnhandledExceptionFilter
TerminateProcess
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
HeapFree
RtlUnwind
HeapAlloc
HeapReAlloc
GetModuleHandleA
GetStartupInfoW
GetVersion
ExitProcess
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetEnvironmentStringsW
CharNextW
DispatchMessageW
GetMessageW
ShowWindow
PostThreadMessageW
GetClassInfoExW
LoadCursorW
wsprintfW
RegisterClassExW
CreateWindowExW
CallWindowProcW
GetWindowLongW
SetWindowLongW
PostQuitMessage
DestroyWindow
DefWindowProcW
FindWindowW
IsWindow
GetWindowThreadProcessId
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoInitializeEx
CoTaskMemFree
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FormatMessageW
CloseHandle
WaitForSingleObject
OpenEventW
GetLastError
GlobalFree
WaitForMultipleObjects
CreateThread
GetCurrentProcess
GetModuleHandleW
lstrlenW
GetConsoleOutputCP
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
SetUnhandledExceptionFilter
LocalAlloc
LocalReAlloc
GetCommandLineW
LocalFree
SetThreadUILanguage
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
MultiByteToWideChar
Sleep
LCMapStringA
LCMapStringW
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
ReadFile
FlushFileBuffers
GetStringTypeA
GetStringTypeW
VirtualProtect
GetSystemInfo
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetFilePointer
SetStdHandle
GetLocaleInfoW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
LoadStringW
ExitWindowsEx
ForceSyncFgPolicy
RefreshPolicyEx
wvnsprintfW
CommandLineToArgvW
RtlCopySid
RtlLengthSid
NtQueryInformationToken
RtlConvertSidToUnicodeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_XcptFilter
_exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
exit
fwprintf
_strdup
??2@YAPAXI@Z
_cexit
_c_exit
__set_app_type
_controlfp
_except_handler3
wprintf
fopen
strtok
printf
_flushall
fgets
realloc
isdigit
isalpha
_stricmp
strrchr
atoi
free
strchr
strncmp
atol
sprintf
fprintf
wcstol
wcschr
towlower
tolower
wcscpy
wcsncmp
wcslen
swprintf
wcscmp
??3@YAXPAX@Z
_iob
StartServiceW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
GetModuleHandleA
GetModuleHandleW
GetLastError
FormatMessageW
LocalFree
MultiByteToWideChar
Sleep
inet_ntoa
gethostbyname
WSACleanup
WSAStartup
inet_addr
UuidCreate
UuidIsNil
UuidCompare
UuidFromStringA
UuidCreateNil
?cin@@3Vistream_withassign@@A
??5istream@@QAEAAV0@AAD@Z
?cerr@@3Vostream_withassign@@A
?endl@@YAAAVostream@@AAV1@@Z
??6ostream@@QAEAAV0@PBD@Z
??6ostream@@QAEAAV0@P6AAAV0@AAV0@@Z@Z
?cout@@3Vostream_withassign@@A
StringFromGUID2
CertNameToStrW
CertStrToNameW
ord39
ord56
ord61
ord55
ord62
ord69
ord70
ord40
ord71
ord72
ord25
ord73
ord74
ord65
ord35
ord49
ord30
ord24
ord64
ord48
ord34
ord29
ord47
ord33
ord28
ord38
ord23
ord63
ord46
ord51
ord45
ord22
IPSecEnumPolicyData
IPSecCopyPolicyData
IPSecEnumNFAData
IPSecGetISAKMPData
IPSecGetNegPolData
IPSecFreePolicyData
IPSecAllocPolStr
IPSecSetPolicyData
IPSecFreeMulPolicyData
IPSecAllocPolMem
IPSecCreatePolicyData
IPSecClosePolicyStore
IPSecOpenPolicyStore
IPSecDeleteISAKMPData
IPSecCreateISAKMPData
IPSecFreeISAKMPData
IPSecFreePolMem
IPSecDeleteNegPolData
IPSecDeleteFilterData
IPSecSetNFAData
IPSecCreateFilterData
IPSecCreateNegPolData
IPSecFreePolStr
IPSecFreeNegPolData
IPSecFreeFilterData
IPSecCreateNFAData
IPSecUnassignPolicy
IPSecGetAssignedPolicyData
IPSecAssignPolicy
IPSecDeletePolicyData
IPSecDeleteNFAData
IPSecGetFilterData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
_wremove
wcschr
_wcsicmp
time
wcsstr
_itow
wcscat
_wtol
wcslen
wcscpy
RegQueryValueExW
RegSaveKeyW
RegRestoreKeyW
RegCreateKeyExW
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegConnectRegistryW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
CloseServiceHandle
ControlService
StartServiceA
QueryServiceStatus
OpenServiceA
OpenSCManagerW
RegSetValueExW
LocalAlloc
GetCurrentThread
CloseHandle
GetCurrentProcess
LocalFree
GetModuleHandleW
GetLastError
DisableThreadLibraryCalls
FormatMessageW
UuidToStringW
UuidCreate
RpcStringFreeW
DsGetDcNameW
NetApiBufferFree
ord26
ord208
ord27
ord97
ord140
ord77
ord142
ord16
ord73
ord41
ord36
ord224
ord79
ord69
ord157
ord113
ord13
ord88
ord14
ord145
ord210
DllRegisterServer
DllUnregisterServer
IPSecAllocPolMem
IPSecAllocPolStr
IPSecAssignPolicy
IPSecClosePolicyStore
IPSecCopyAuthMethod
IPSecCopyFilterData
IPSecCopyFilterSpec
IPSecCopyISAKMPData
IPSecCopyNFAData
IPSecCopyNegPolData
IPSecCopyPolicyData
IPSecCreateFilterData
IPSecCreateISAKMPData
IPSecCreateNFAData
IPSecCreateNegPolData
IPSecCreatePolicyData
IPSecDeleteFilterData
IPSecDeleteISAKMPData
IPSecDeleteNFAData
IPSecDeleteNegPolData
IPSecDeletePolicyData
IPSecEnumFilterData
IPSecEnumISAKMPData
IPSecEnumNFAData
IPSecEnumNegPolData
IPSecEnumPolicyData
IPSecExportPolicies
IPSecFreeFilterData
IPSecFreeFilterSpec
IPSecFreeFilterSpecs
IPSecFreeISAKMPData
IPSecFreeMulFilterData
IPSecFreeMulISAKMPData
IPSecFreeMulNFAData
IPSecFreeMulNegPolData
IPSecFreeMulPolicyData
IPSecFreeNFAData
IPSecFreeNegPolData
IPSecFreePolMem
IPSecFreePolStr
IPSecFreePolicyData
IPSecGetAssignedDomainPolicyName
IPSecGetAssignedPolicyData
IPSecGetFilterData
IPSecGetISAKMPData
IPSecGetNegPolData
IPSecImportPolicies
IPSecIsDomainPolicyAssigned
IPSecIsLocalPolicyAssigned
IPSecOpenPolicyStore
IPSecReallocatePolMem
IPSecReallocatePolStr
IPSecRestoreDefaultPolicies
IPSecSetFilterData
IPSecSetISAKMPData
IPSecSetNFAData
IPSecSetNegPolData
IPSecSetPolicyData
IPSecUnassignPolicy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
CloseHandle
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
ExitProcess
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
OpenProcess
LoadLibraryA
CloseHandle
GetProcAddress
GetVersionExA
GlobalFree
lstrcpyA
HeapCreate
VirtualFree
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapReAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
HeapSize
FreeLibrary
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
DisableThreadLibraryCalls
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetACP
GetOEMCP
WriteFile
VirtualAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
GetCPInfo
wsprintfA
FindProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RtlUnwind
LocalFree
DisableThreadLibraryCalls
LocalAlloc
RpcBindingSetOption
RpcBindingFromStringBindingW
NdrClientCall2
RpcSsDestroyClientContext
RpcStringFreeW
RpcMgmtInqServerPrincNameW
RpcStringBindingComposeW
RpcBindingFree
RpcBindingSetAuthInfoW
RpcRaiseException
ntohl
AddMMAuthMethods
AddMMFilter
AddMMPolicy
AddQMPolicy
AddTransportFilter
AddTunnelFilter
CloseMMFilterHandle
CloseTransportFilterHandle
CloseTunnelFilterHandle
DeleteMMAuthMethods
DeleteMMFilter
DeleteMMPolicy
DeleteQMPolicy
DeleteTransportFilter
DeleteTunnelFilter
EnumIPSecInterfaces
EnumMMAuthMethods
EnumMMFilters
EnumMMPolicies
EnumQMPolicies
EnumQMSAs
EnumTransportFilters
EnumTunnelFilters
GetMMAuthMethods
GetMMFilter
GetMMPolicy
GetMMPolicyByID
GetQMPolicy
GetQMPolicyByID
GetTransportFilter
GetTunnelFilter
IPSecAddSAs
IPSecCloseIKENegotiationHandle
IPSecCloseNotifyHandle
IPSecDeleteMMSAs
IPSecDeleteQMSAs
IPSecEnumMMSAs
IPSecInitiateIKENegotiation
IPSecQueryIKENegotiationStatus
IPSecQueryIKEStatistics
IPSecQueryNotifyData
IPSecRegisterIKENotifyClient
InitializeDll
MatchMMFilter
MatchTransportFilter
MatchTunnelFilter
OpenMMFilterHandle
OpenTransportFilterHandle
OpenTunnelFilterHandle
QueryIPSecStatistics
SPDApiBufferAllocate
SPDApiBufferFree
SetMMAuthMethods
SetMMFilter
SetMMPolicy
SetQMPolicy
SetTransportFilter
SetTunnelFilter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ