CloseProcess
ExistsProcess
KillProcess
QuitProcess
Overview
overview
7Static
static
7e0fea321a8...18.exe
windows7-x64
7e0fea321a8...18.exe
windows10-2004-x64
7$PLUGINSDI...rk.dll
windows7-x64
3$PLUGINSDI...rk.dll
windows10-2004-x64
3$_2_/QQMin...DL.exe
windows7-x64
3$_2_/QQMin...DL.exe
windows10-2004-x64
3$_2_/QQMin...xy.dll
windows7-x64
3$_2_/QQMin...xy.dll
windows10-2004-x64
3$_2_/QQMin...er.exe
windows7-x64
7$_2_/QQMin...er.exe
windows10-2004-x64
7$PLUGINSDI...rk.dll
windows7-x64
3$PLUGINSDI...rk.dll
windows10-2004-x64
3$_2_/QQMin...DL.exe
windows7-x64
7$_2_/QQMin...DL.exe
windows10-2004-x64
7$_2_/QQMin...xy.dll
windows7-x64
3$_2_/QQMin...xy.dll
windows10-2004-x64
3Behavioral task
behavioral1
Sample
e0fea321a862be53a1d5cafd5daf9ac0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0fea321a862be53a1d5cafd5daf9ac0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/processwork.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/processwork.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/MiniQQDL.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/MiniQQDL.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/QQDLProxy.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/QQDLProxy.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/image/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/image/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/processwork.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/processwork.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$_2_/QQMiniDownloader/comm/QQDL.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$_2_/QQMiniDownloader/comm/QQDL.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$_2_/QQMiniDownloader/comm/tnproxy.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$_2_/QQMiniDownloader/comm/tnproxy.dll
Resource
win10v2004-20240802-en
Target
e0fea321a862be53a1d5cafd5daf9ac0_JaffaCakes118
Size
1.2MB
MD5
e0fea321a862be53a1d5cafd5daf9ac0
SHA1
7c08dae1faeeb58aa41bfc00c273b787c0ed91be
SHA256
95b1bd377b91fe07287514bb49728a99c93923ecd68af5d321b67410de1e6f0e
SHA512
cbc404302f99a3bcf3aeeefc25842fb539b34114c359769ae592388f318b468529d7e2ded4b52ea5facc17a47722f3046d72b5c57770799c194a0e301844a87d
SSDEEP
24576:HdMTeWmB/SFhfPblYz2MCnJzxxDU8TiReLhIV83OmIOI3MT:HdMTeWySFhfTlC/CNzQ1RyW8aOh
resource | yara_rule |
---|---|
static1/unpack001/$_2_/QQMiniDownloader/comm/QQDL.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
e0fea321a862be53a1d5cafd5daf9ac0_JaffaCakes118 |
unpack001/$PLUGINSDIR/processwork.dll |
unpack001/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/MiniQQDL.exe |
unpack001/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/image/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/uninstaller.exe |
unpack002/$PLUGINSDIR/processwork.dll |
unpack003/out.upx |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
static1/unpack001/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/image/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/uninstaller.exe | nsis_installer_1 |
static1/unpack001/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/image/$_2_/QQMiniDownloader/QQT_QQTang3.4Beta1Build1.EXE/uninstaller.exe | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
CloseProcess
ExistsProcess
KillProcess
QuitProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_TrackMouseEvent
InitCommonControlsEx
GlobalFree
GetModuleFileNameA
GetProcAddress
MultiByteToWideChar
lstrlenA
CloseHandle
GetCurrentThread
GetStartupInfoW
GlobalAlloc
GetModuleHandleW
GetLocalTime
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
WideCharToMultiByte
lstrcatW
lstrlenW
lstrcpynW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetLastError
CreateMutexW
GetCommandLineW
GetVersionExW
InterlockedExchange
GetModuleFileNameW
CreateDirectoryW
GetFileAttributesW
GlobalUnlock
GlobalLock
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceW
DrawTextW
SetRect
InflateRect
GetMessageW
GetWindowTextW
DispatchMessageW
FindWindowW
SetForegroundWindow
BringWindowToTop
GetMenuState
GetSystemMenu
DrawIconEx
GetSystemMetrics
GetClassNameW
GetClassInfoExW
RegisterWindowMessageW
CallWindowProcW
LoadImageW
PostQuitMessage
PostMessageW
SetWindowTextW
GetClientRect
MessageBoxW
DrawAnimatedRects
EnumChildWindows
GetWindowRect
LoadIconW
FlashWindow
SetWindowPos
IsWindow
DestroyWindow
SetFocus
CheckDlgButton
SetDlgItemInt
GetDlgItem
SendDlgItemMessageW
EndPaint
ShowWindow
IsIconic
FindWindowA
SendMessageTimeoutW
SendMessageW
DrawIcon
EndDialog
DialogBoxParamW
CreateDialogParamW
GetWindowDC
GetCapture
SetCapture
ReleaseCapture
IntersectRect
GetDC
ReleaseDC
IsZoomed
OffsetRect
GetActiveWindow
PtInRect
WindowFromPoint
SetCursor
FindWindowExW
IsWindowVisible
EnumThreadWindows
SetWindowRgn
RedrawWindow
InvalidateRect
GetWindow
SystemParametersInfoW
MapWindowPoints
DrawFocusRect
GetParent
ScreenToClient
ClientToScreen
DefWindowProcW
LoadCursorW
RegisterClassExW
SetWindowLongW
CallNextHookEx
GetClassInfoW
SetWindowsHookExW
CreateWindowExW
UnhookWindowsHookEx
GetWindowLongW
LoadMenuW
GetSubMenu
GetCursorPos
TrackPopupMenu
DestroyMenu
KillTimer
SetTimer
GetDlgItemInt
IsDlgButtonChecked
EnableWindow
BeginPaint
TranslateMessage
UpdateWindow
CreateFontIndirectW
StretchBlt
CreateRectRgnIndirect
GetTextExtentPoint32W
CombineRgn
CreateRoundRectRgn
GetStockObject
CreateRectRgn
SelectClipRgn
ExcludeClipRect
GetClipBox
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
RoundRect
Rectangle
CreatePen
MoveToEx
LineTo
SetBkColor
ExtTextOutW
DeleteObject
CreateSolidBrush
SetBkMode
SetTextColor
SelectObject
RegOpenKeyExW
MapGenericMask
RevertToSelf
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
AccessCheck
RegQueryValueExW
RegCloseKey
GetFileSecurityW
ImpersonateSelf
OpenThreadToken
ShellExecuteW
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
Shell_NotifyIconW
CoFreeLibrary
CreateStreamOnHGlobal
CoLoadLibrary
SafeArrayAccessData
SafeArrayUnaccessData
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?_Copy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z
?_Xlen@std@@YAXXZ
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@0@Z
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@PBG@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?substr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBE?AV12@II@Z
??9std@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBG@Z
?find_last_of@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIPBGII@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
?append@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@ABV12@II@Z
?_Freeze@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ
??Mstd@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@0@Z
?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z
fclose
strrchr
_snprintf
fflush
_splitpath
strncat
strncpy
fwrite
_purecall
__CxxFrameHandler
_vsnprintf
wcslen
_vsnwprintf
_snwprintf
free
malloc
??2@YAPAXI@Z
__p___wargv
__p___argc
_ftol
wcscmp
wcsrchr
_wcsicmp
toupper
wcschr
_wcsdup
wcsncpy
__dllonexit
_onexit
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
fopen
__p__fmode
_except_handler3
__set_app_type
_controlfp
GdipDrawImageRectI
GdipImageSelectActiveFrame
GdiplusStartup
GdiplusShutdown
GdipAlloc
GdipFree
GdipGetImageHeight
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCloneImage
GdipDisposeImage
GdipDeleteGraphics
GdipDrawImageRectRectI
GdipCreateFromHDC
GdipCreateHBITMAPFromBitmap
GdipGetImagePixelFormat
GdipCloneBitmapAreaI
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipLoadImageFromStreamICM
GdipLoadImageFromFile
GdipLoadImageFromFileICM
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileExA
DeleteFileA
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
Sleep
GetCurrentProcessId
TerminateThread
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
Process32Next
OpenProcess
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
WinExec
lstrcatA
SetCurrentDirectoryA
GetLastError
EnterCriticalSection
LeaveCriticalSection
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
HeapDestroy
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpyA
lstrlenA
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
GetShortPathNameA
FlushInstructionCache
GetCurrentProcess
GetCPInfo
GetStringTypeW
CreateFileA
WriteFile
GetCurrentDirectoryA
CloseHandle
GetStringTypeA
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetUserDefaultLCID
EnumSystemLocalesA
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetACP
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetStdHandle
GetFileType
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
SetConsoleCtrlHandler
GetOEMCP
LocalFree
InterlockedExchange
RtlUnwind
RaiseException
CreateThread
TlsSetValue
ExitThread
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
HeapFree
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
ExitProcess
FatalAppExitA
HeapAlloc
SetUnhandledExceptionFilter
TerminateProcess
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetHandleCount
GetStdHandle
CharNextA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
OleRun
CoCreateInstance
CoGetInterfaceAndReleaseStream
CreateErrorInfo
SysStringLen
LoadRegTypeLi
DispCallFunc
RegisterTypeLi
LoadTypeLi
VariantCopy
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
VariantClear
SysFreeString
GetErrorInfo
SetErrorInfo
VariantChangeType
SysAllocString
InternetGetConnectedState
InternetCloseHandle
InternetOpenA
InternetCanonicalizeUrlA
InternetOpenUrlA
InternetReadFile
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
CloseProcess
ExistsProcess
KillProcess
QuitProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteCriticalSection
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LoadLibraryA
InterlockedIncrement
GetProcAddress
FreeLibrary
GetTickCount
CloseHandle
Sleep
TlsSetValue
TlsFree
TlsAlloc
TlsGetValue
htonl
sendto
connect
htons
ntohs
ntohl
gethostbyname
WSAStartup
WSACleanup
select
closesocket
ioctlsocket
setsockopt
socket
bind
recvfrom
recv
send
getpeername
listen
accept
inet_ntoa
__WSAFDIsSet
WSAGetLastError
gethostname
inet_addr
_adjust_fdiv
_onexit
malloc
_initterm
__dllonexit
_CxxThrowException
??1type_info@@UAE@XZ
strcmp
memmove
isdigit
fgetc
_ftol
atoi
strncpy
strstr
free
calloc
memset
rand
srand
strcpy
memcpy
_beginthreadex
strlen
time
_iob
fputc
sprintf
printf
_purecall
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@G@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??1?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?setw@std@@YA?AU?$_Smanip@H@1@H@Z
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?str@?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I@Z
??1_Winit@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
GetAdaptersInfo
GetIfEntry
InternetGetConnectedState
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ