Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Overview
overview
8Static
static
3fa0ff1ca10...18.exe
windows7-x64
7fa0ff1ca10...18.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
6$PLUGINSDI...ib.dll
windows10-2004-x64
6$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3ISOMounter.exe
windows7-x64
3ISOMounter.exe
windows10-2004-x64
3guidlib.dll
windows7-x64
6guidlib.dll
windows10-2004-x64
6isoinst.dll
windows7-x64
3isoinst.dll
windows10-2004-x64
3sciter.dll
windows7-x64
3sciter.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3x64/ibinldr.sys
windows7-x64
1x64/ibinldr.sys
windows10-2004-x64
1x86/ibinldr.sys
windows7-x64
1x86/ibinldr.sys
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
fa0ff1ca1098aa22398801590e87d876_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa0ff1ca1098aa22398801590e87d876_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/guidlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/guidlib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/isoinst.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/isoinst.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ISOMounter.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ISOMounter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
guidlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
guidlib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
isoinst.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
isoinst.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
sciter.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
sciter.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
x64/ibinldr.sys
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
x64/ibinldr.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
x86/ibinldr.sys
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
x86/ibinldr.sys
Resource
win10v2004-20240802-en
Target
fa0ff1ca1098aa22398801590e87d876_JaffaCakes118
Size
2.3MB
MD5
fa0ff1ca1098aa22398801590e87d876
SHA1
99577ce4d609df1e76f007b290fd1b12b752793a
SHA256
aba50aaf397ede3be29fd7802028d190137f9fe1f9b3c2bc1c55523c12a590bb
SHA512
18035b95a7dd3933f37aadac3dceaa251248e96e6c3ce712b60657c2199965fbeb1f9978c0adf36325cfd6d3e44599cf3f93bdfa31bc2842713a2e3e23081f90
SSDEEP
49152:JjZkbRnVmmTGRHhVKvDxVELMQ37INHRFXz86RJobbUWuJSI9mMZ:JWBoxH8D/VHX/JCbBYzmMZ
Checks for missing Authenticode signature.
resource |
---|
fa0ff1ca1098aa22398801590e87d876_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/guidlib.dll |
unpack001/$PLUGINSDIR/isoinst.dll |
unpack001/ISOMounter.exe |
unpack001/guidlib.dll |
unpack001/isoinst.dll |
unpack001/uninst.exe |
unpack002/$PLUGINSDIR/System.dll |
unpack002/$PLUGINSDIR/nsDialogs.dll |
unpack002/$PLUGINSDIR/nsExec.dll |
unpack001/x86/ibinldr.sys |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
CloseHandle
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpA
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
WideCharToMultiByte
lstrlenA
MulDiv
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
lstrlenW
GetAsyncKeyState
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
GetClassInfoW
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
FindWindowExW
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectW
SetBkMode
SetTextColor
SelectObject
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumValueW
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyW
lstrcpynW
GetProcAddress
WideCharToMultiByte
lstrcatW
lstrlenW
lstrcmpiW
LoadLibraryW
GetModuleHandleW
MultiByteToWideChar
VirtualAlloc
VirtualProtect
FreeLibrary
wsprintfW
CLSIDFromString
StringFromGUID2
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeviceIoControl
CloseHandle
CreateMutexW
SetFilePointer
CreateDirectoryW
WriteFile
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
GetLastError
CreateFileW
GetPrivateProfileSectionW
DeleteFileW
WritePrivateProfileStringW
GetPrivateProfileSectionNamesW
CreateFileA
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
InterlockedExchange
Sleep
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteConsoleW
GetFileType
GetStdHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
RaiseException
RtlUnwind
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
ExitProcess
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
HeapSize
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
wsprintfA
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
RegEnumValueW
SHGetSpecialFolderPathW
SHFileOperationW
CoCreateGuid
PathIsDirectoryW
PathFileExistsW
PathFindFileNameW
GetAdaptersAddresses
initlib
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
MultiByteToWideChar
GetTimeZoneInformation
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcessHeap
SetEndOfFile
GetACP
SetLastError
LoadLibraryA
WriteConsoleW
GetFileTime
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FreeLibrary
GetModuleHandleW
GlobalMemoryStatusEx
GetCurrentProcessId
FindVolumeClose
MoveFileExW
LocalFree
GetProcAddress
GetWindowsDirectoryW
LoadLibraryW
GetSystemInfo
CloseHandle
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
OpenProcess
DeleteCriticalSection
GetSystemDirectoryW
GetFileAttributesW
CreateFileW
LocalAlloc
GetModuleFileNameW
SetFileTime
InterlockedDecrement
DeviceIoControl
WriteFile
GetCommandLineW
FindFirstVolumeW
GetFileSizeEx
QueryDosDeviceW
ReadFile
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetStdHandle
GetModuleFileNameA
CreateThread
TerminateThread
QueryPerformanceFrequency
Sleep
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
InterlockedExchange
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RtlUnwind
InterlockedFlushSList
RaiseException
LoadLibraryExW
ExitProcess
GetModuleHandleExW
wsprintfA
wsprintfW
RegCreateKeyW
CryptDestroyKey
CryptAcquireContextA
CryptGetKeyParam
CryptAcquireContextW
CryptEncrypt
CryptDecrypt
CryptCreateHash
CryptHashData
CryptSetKeyParam
CryptImportKey
CryptGetHashParam
CryptReleaseContext
RegEnumKeyW
RegEnumValueW
CreateServiceW
RegCloseKey
QueryServiceLockStatusW
UnlockServiceDatabase
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
ChangeServiceConfig2W
LockServiceDatabase
RegEnumKeyExW
RegSetValueExW
FreeSid
StartServiceW
CheckTokenMembership
RegOpenKeyExW
RegQueryValueExW
OpenServiceW
CommandLineToArgvW
SysFreeString
SysAllocString
GetProcessImageFileNameW
SHDeleteKeyW
SHGetValueW
SHSetValueW
inet_addr
WSAStartup
send
gethostbyname
socket
connect
recv
closesocket
WSACleanup
htons
sendto
WSASetLastError
WSAGetLastError
GetAdaptersAddresses
CryptImportPublicKeyInfo
CryptBinaryToStringA
CryptStringToBinaryA
CryptDecodeObjectEx
CryptStringToBinaryW
init
release
start
stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetLastError
DeviceIoControl
GetLastError
CreateFileA
DefineDosDeviceA
CloseHandle
LocalFree
FormatMessageA
GetModuleFileNameA
SizeofResource
GetLogicalDrives
HeapFree
GetCommandLineW
InitializeCriticalSectionEx
CreateMutexA
ReleaseMutex
GetModuleHandleA
HeapSize
LoadLibraryA
LockResource
HeapReAlloc
RaiseException
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
FreeLibrary
WriteConsoleW
CreateFileW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WriteFile
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
WideCharToMultiByte
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
MultiByteToWideChar
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlUnwind
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
SetEndOfFile
FindWindowExA
GetCursorPos
IsIconic
SetForegroundWindow
GetMessageA
DispatchMessageA
GetParent
SetActiveWindow
wsprintfA
ShowWindow
IsWindowVisible
GetWindowTextA
TranslateMessage
LoadIconA
Shell_NotifyIconA
SHChangeNotify
CoUninitialize
CoInitialize
OleUninitialize
OleInitialize
PathRemoveFileSpecA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeviceIoControl
CloseHandle
CreateMutexW
SetFilePointer
CreateDirectoryW
WriteFile
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
GetLastError
CreateFileW
GetPrivateProfileSectionW
DeleteFileW
WritePrivateProfileStringW
GetPrivateProfileSectionNamesW
CreateFileA
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
InterlockedExchange
Sleep
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteConsoleW
GetFileType
GetStdHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
RaiseException
RtlUnwind
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
ExitProcess
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
HeapSize
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
wsprintfA
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
RegEnumValueW
SHGetSpecialFolderPathW
SHFileOperationW
CoCreateGuid
PathIsDirectoryW
PathFileExistsW
PathFindFileNameW
GetAdaptersAddresses
initlib
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
MultiByteToWideChar
GetTimeZoneInformation
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcessHeap
SetEndOfFile
GetACP
SetLastError
LoadLibraryA
WriteConsoleW
GetFileTime
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FreeLibrary
GetModuleHandleW
GlobalMemoryStatusEx
GetCurrentProcessId
FindVolumeClose
MoveFileExW
LocalFree
GetProcAddress
GetWindowsDirectoryW
LoadLibraryW
GetSystemInfo
CloseHandle
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
OpenProcess
DeleteCriticalSection
GetSystemDirectoryW
GetFileAttributesW
CreateFileW
LocalAlloc
GetModuleFileNameW
SetFileTime
InterlockedDecrement
DeviceIoControl
WriteFile
GetCommandLineW
FindFirstVolumeW
GetFileSizeEx
QueryDosDeviceW
ReadFile
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetStdHandle
GetModuleFileNameA
CreateThread
TerminateThread
QueryPerformanceFrequency
Sleep
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
InterlockedExchange
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RtlUnwind
InterlockedFlushSList
RaiseException
LoadLibraryExW
ExitProcess
GetModuleHandleExW
wsprintfA
wsprintfW
RegCreateKeyW
CryptDestroyKey
CryptAcquireContextA
CryptGetKeyParam
CryptAcquireContextW
CryptEncrypt
CryptDecrypt
CryptCreateHash
CryptHashData
CryptSetKeyParam
CryptImportKey
CryptGetHashParam
CryptReleaseContext
RegEnumKeyW
RegEnumValueW
CreateServiceW
RegCloseKey
QueryServiceLockStatusW
UnlockServiceDatabase
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
ChangeServiceConfig2W
LockServiceDatabase
RegEnumKeyExW
RegSetValueExW
FreeSid
StartServiceW
CheckTokenMembership
RegOpenKeyExW
RegQueryValueExW
OpenServiceW
CommandLineToArgvW
SysFreeString
SysAllocString
GetProcessImageFileNameW
SHDeleteKeyW
SHGetValueW
SHSetValueW
inet_addr
WSAStartup
send
gethostbyname
socket
connect
recv
closesocket
WSACleanup
htons
sendto
WSASetLastError
WSAGetLastError
GetAdaptersAddresses
CryptImportPublicKeyInfo
CryptBinaryToStringA
CryptStringToBinaryA
CryptDecodeObjectEx
CryptStringToBinaryW
init
release
start
stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\sciter\sciter\sdk\bin\32\sciter.dll.pdb
GetWindowLongW
SetWindowLongW
GetWindowRect
UpdateLayeredWindow
SetCursor
MapWindowPoints
UpdateWindow
SetFocus
GetFocus
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
DestroyIcon
KillTimer
GetParent
IsWindow
SendMessageW
GetCursorPos
InvalidateRect
GetDesktopWindow
GetClientRect
LoadCursorW
MoveWindow
RegisterClassW
RedrawWindow
ShowWindow
WindowFromPoint
CreateWindowExW
SetWindowPos
DestroyWindow
PostMessageW
DefWindowProcW
GetWindowThreadProcessId
GetWindowTextW
EnableWindow
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
IsWindowUnicode
SystemParametersInfoW
PostQuitMessage
GetClassLongW
SetWindowsHookExW
EnumThreadWindows
EndDeferWindowPos
SetCapture
LoadIconW
TranslateMessage
GetUpdateRect
IsRectEmpty
GetMessageTime
UnhookWindowsHookEx
IsWindowEnabled
GetDoubleClickTime
CallMsgFilterW
IsChild
PeekMessageW
ClientToScreen
GetMonitorInfoW
SetTimer
DispatchMessageW
GetCapture
GetAsyncKeyState
BeginDeferWindowPos
SetClassLongW
GetActiveWindow
RegisterClassExW
GetScrollInfo
NotifyWinEvent
SetWindowTextW
GetSystemMetrics
CallNextHookEx
ScreenToClient
MonitorFromWindow
GetDC
GetWindow
MonitorFromPoint
GetKeyState
AdjustWindowRectEx
DeferWindowPos
GetMessageW
SetScrollInfo
EnumDisplayDevicesW
EnumDisplayMonitors
GetSysColor
DestroyCaret
FindWindowW
GetKeyboardLayout
CreateCaret
SetCaretPos
RegisterClipboardFormatW
OpenClipboard
EmptyClipboard
CloseClipboard
CountClipboardFormats
EnumClipboardFormats
SetClipboardData
IsClipboardFormatAvailable
GetClipboardData
GetClipboardSequenceNumber
LoadStringW
MessageBeep
DestroyCursor
LoadCursorFromFileA
CreateIconIndirect
GetIconInfo
DrawIconEx
MessageBoxW
SetActiveWindow
MessageBoxA
GetQueueStatus
PostThreadMessageW
MsgWaitForMultipleObjects
SetWinEventHook
DispatchMessageA
MapVirtualKeyW
GetMessageA
AnimateWindow
IsWindowVisible
GetWindowPlacement
FindMimeFromData
AccessibleObjectFromWindow
LresultFromObject
GetThemePartSize
CloseThemeData
SetWindowTheme
OpenThemeData
DrawThemeBackground
IsThemeBackgroundPartiallyTransparent
ImmGetCompositionStringW
ImmNotifyIME
ImmAssociateContextEx
ImmSetCandidateWindow
ImmReleaseContext
ImmGetContext
ImmIsIME
ImageList_Destroy
ImageList_GetIconSize
ImageList_DrawEx
timeEndPeriod
PlaySoundW
timeBeginPeriod
timeGetTime
timeSetEvent
timeKillEvent
ScriptBreak
ScriptPlace
ScriptApplyDigitSubstitution
ScriptFreeCache
ScriptItemize
ScriptShape
getsockopt
setsockopt
WSAGetLastError
GetAddrInfoW
FreeAddrInfoW
listen
shutdown
htons
WSAIoctl
bind
ioctlsocket
WSARecv
socket
WSASocketW
select
WSARecvFrom
WSASetLastError
WSAStartup
WSASend
closesocket
InternetOpenA
InternetSetOptionW
HttpSendRequestA
InternetErrorDlg
InternetQueryOptionW
HttpQueryInfoA
InternetConnectA
HttpOpenRequestA
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
ReadDirectoryChangesW
GetCurrentDirectoryW
GetShortPathNameW
GetLongPathNameW
WriteConsoleInputW
GetNumberOfConsoleInputEvents
FillConsoleOutputAttribute
CreateFileA
GetVolumeInformationW
GetLogicalDriveStringsW
ExitThread
SetInformationJobObject
AssignProcessToJobObject
CreateJobObjectW
FreeLibraryAndExitThread
SetFileAttributesW
UnregisterWaitEx
SetConsoleCursorPosition
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
LoadLibraryExW
GetProcAddress
GlobalUnlock
GlobalLock
GlobalSize
Sleep
MulDiv
QueryPerformanceFrequency
GlobalFree
GlobalAlloc
TlsSetValue
GetLocaleInfoW
MultiByteToWideChar
GetLastError
TlsAlloc
TlsGetValue
HeapFree
GetCommandLineW
HeapAlloc
LocalFree
GetProcessHeap
GetModuleFileNameA
LoadLibraryExA
GetEnvironmentVariableW
WideCharToMultiByte
FreeLibrary
GetCPInfo
RaiseException
DecodePointer
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTempPathA
GetTempFileNameA
GetFileAttributesW
CompareStringW
GetModuleFileNameW
CompareStringA
GetUserDefaultLCID
GetNumberFormatW
GetCurrencyFormatW
GetTimeFormatW
VerSetConditionMask
GetComputerNameW
VerifyVersionInfoW
GetDateFormatW
OutputDebugStringW
FindFirstFileW
FindNextFileW
FindClose
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
SetFilePointer
SetEndOfFile
CreateFileW
UnmapViewOfFile
FlushViewOfFile
CloseHandle
GetFileSize
CreateFileMappingW
MapViewOfFile
AllocConsole
FormatMessageW
LocalAlloc
lstrlenW
LocalSize
EncodePointer
InterlockedFlushSList
SetLastError
RtlUnwind
TlsFree
ExitProcess
GetModuleHandleExW
GetCurrentThread
GetACP
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetStdHandle
GetFileType
SetConsoleCtrlHandler
GetStringTypeW
WriteFile
GetConsoleCP
GetConsoleMode
DeleteFileW
ReadFile
SetFilePointerEx
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteConsoleW
ReadConsoleW
GetFileAttributesExW
CreateThread
lstrcmpW
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
CreateEventW
ResetEvent
DuplicateHandle
SetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualAlloc
VirtualFree
LoadLibraryW
GetTickCount
GetThreadPriority
SetThreadPriority
GetVersionExW
ResumeThread
CreateSemaphoreA
CreateEventA
SetErrorMode
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
CancelIo
SetHandleInformation
RegisterWaitForSingleObject
UnregisterWait
SetNamedPipeHandleState
CreateNamedPipeA
CreateNamedPipeW
PeekNamedPipe
QueueUserWorkItem
GetNamedPipeHandleStateA
SwitchToThread
WaitNamedPipeW
ConnectNamedPipe
CreateDirectoryW
DeviceIoControl
RemoveDirectoryW
SetFileTime
CreateHardLinkW
GetFileInformationByHandle
MoveFileExW
CopyFileW
GetModuleHandleA
LoadLibraryA
FormatMessageA
DebugBreak
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetConsoleCursorInfo
SetConsoleCursorInfo
FillConsoleOutputCharacterW
ReadConsoleInputW
AddFontMemResourceEx
GetObjectW
GetDIBits
CreateBitmap
GetGlyphIndicesW
StartPage
CreateFontW
EnumFontFamiliesExW
EndDoc
BitBlt
CreateDCW
SetMapMode
GetFontUnicodeRanges
StartDocW
EndPage
GetDeviceCaps
GetStockObject
RestoreDC
SetViewportOrgEx
SaveDC
GetClipBox
SetLayout
CreateCompatibleDC
DeleteObject
DeleteDC
CreateDIBSection
GetObjectA
SelectObject
ord203
GetSaveFileNameW
GetOpenFileNameW
PrintDlgW
CommDlgExtendedError
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetUserNameW
RegOpenKeyExW
RegQueryValueExW
ord727
ShellExecuteW
SHGetFileInfoW
ShellExecuteExW
CommandLineToArgvW
SHGetPathFromIDListW
SHBrowseForFolderW
ord74
DragQueryFileW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoUninitialize
CoFreeUnusedLibraries
CoCreateGuid
CoInitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
OleUninitialize
RegisterDragDrop
RevokeDragDrop
DoDragDrop
ReleaseStgMedium
CreateStreamOnHGlobal
SysFreeString
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreateVector
SysAllocStringLen
GdipCreateFontFromLogfontA
GdipGetLineSpacing
GdipCreateFontFromDC
GdiplusStartup
GdipCreateBitmapFromGraphics
GdipDrawImageI
GdipCreateHBITMAPFromBitmap
GdipDrawDriverString
GdiplusShutdown
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipAlloc
GdipFree
GdipCreateBitmapFromScan0
GdipCloneImage
GdipDisposeImage
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipFillRectangleI
GdipCreatePath
GdipDeletePath
GdipAddPathArcI
GdipAddPathLineI
GdipFillPath
GdipGetClipBoundsI
GdipCreateLineBrush
GdipMultiplyLineTransform
GdipCreateMatrix2
GdipSetLinePresetBlend
GdipSetLineWrapMode
GdipAddPathEllipse
GdipCreatePathGradientFromPath
GdipSetPathGradientPresetBlend
GdipSetPathGradientWrapMode
GdipSetPathGradientCenterPoint
GdipSetPathGradientTransform
GdipCreatePen1
GdipDeletePen
GdipDrawPath
GdipFillRectanglesI
GdipDrawLine
GdipSetClipRectI
GdipTranslateWorldTransform
GdipGetSmoothingMode
GdipSaveGraphics
GdipRestoreGraphics
GdipBeginContainer2
GdipGetImageGraphicsContext
GdipGraphicsClear
GdipGetPathWorldBounds
GdipClonePath
GdipSetClipRect
GdipAddPathRectangleI
GdipGetImageHeight
GdipGetImageWidth
GdipDeleteGraphics
GdipSetSmoothingMode
GdipEndContainer
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipDrawImageRectRect
GdipTransformPoints
GdipMultiplyWorldTransform
GdipCreateMatrix
GdipDeleteMatrix
GdipTranslateMatrix
GdipRotateMatrix
GdipScaleMatrix
GdipShearMatrix
GdipCreateTexture
GdipFillEllipse
GdipDrawEllipse
GdipFillPie
GdipDrawPie
GdipDrawArc
GdipFillRectangle
GdipDrawRectangle
GdipResetPath
GdipIsVisiblePathPoint
GdipStartPathFigure
GdipAddPathLine
GdipClosePathFigure
GdipSetPathFillMode
GdipAddPathArc
GdipAddPathBezier
GdipSetPageUnit
GdipSetCompositingQuality
GdipSetPixelOffsetMode
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipCreateFromHWND
GdipCreateFromHDC
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipGetFontHeightGivenDPI
GdipMeasureString
GdipDeleteFontFamily
GdipGetFamily
GdipGetCellAscent
GdipGetFontSize
GdipGetEmHeight
GdipGetCellDescent
GdipDrawString
GdipAddPathString
GdipGetFontStyle
GdipCreatePen2
GdipSetPenEndCap
GdipSetPenStartCap
GdipSetPenLineJoin
GdipSetPenMiterLimit
GdipSetPenDashStyle
GdipSetPenDashArray
GdipSetPenDashOffset
GdipDeleteFont
SciterAPI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
CloseHandle
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpA
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
WideCharToMultiByte
lstrlenA
MulDiv
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
lstrlenW
GetAsyncKeyState
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
GetClassInfoW
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
FindWindowExW
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectW
SetBkMode
SetTextColor
SelectObject
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumValueW
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyW
lstrcpynW
GetProcAddress
WideCharToMultiByte
lstrcatW
lstrlenW
lstrcmpiW
LoadLibraryW
GetModuleHandleW
MultiByteToWideChar
VirtualAlloc
VirtualProtect
FreeLibrary
wsprintfW
CLSIDFromString
StringFromGUID2
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
MulDiv
lstrlenW
HeapFree
GetProcessHeap
lstrcmpiW
HeapReAlloc
lstrcpynW
GetFileAttributesW
lstrcpyW
GetCurrentDirectoryW
SetCurrentDirectoryW
HeapAlloc
GlobalFree
LoadCursorW
RemovePropW
DrawFocusRect
GetPropW
DrawTextW
GetWindowTextW
GetDlgItem
SetWindowLongW
SetWindowPos
CreateDialogParamW
MapWindowPoints
GetWindowRect
SetCursor
CreateWindowExW
IsWindow
SetTimer
KillTimer
DispatchMessageW
TranslateMessage
GetMessageW
IsDialogMessageW
ShowWindow
wsprintfW
GetClientRect
CharPrevW
CallWindowProcW
SetPropW
DestroyWindow
MapDialogRect
CharNextW
SendMessageW
GetWindowLongW
SetTextColor
SHGetPathFromIDListW
SHBrowseForFolderW
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
CoTaskMemFree
Create
CreateControl
CreateItem
CreateTimer
GetUserData
KillTimer
OnBack
OnChange
OnClick
OnNotify
SelectFileDialog
SelectFolderDialog
SetRTL
SetUserData
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyW
MultiByteToWideChar
lstrlenA
lstrcmpiW
lstrlenW
ExitProcess
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
lstrcpynW
GetCommandLineW
Sleep
TerminateProcess
GlobalReAlloc
GlobalUnlock
GlobalSize
ReadFile
GetModuleHandleW
GetTickCount
GetStartupInfoW
CreatePipe
GetVersionExW
GlobalLock
DeleteFileW
lstrcatW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
CopyFileW
GetTempFileNameW
GlobalFree
GlobalAlloc
GetModuleFileNameW
GetProcAddress
PeekNamedPipe
GetCurrentProcess
CharPrevW
CharNextW
SendMessageW
FindWindowExW
wsprintfW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Exec
ExecToLog
ExecToStack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\pdb\isodisk.pdb
ZwFsControlFile
ZwReadFile
KeSetPriorityThread
RtlInitUnicodeString
IoDeleteDevice
KeSetEvent
RtlAppendUnicodeToString
KeInitializeEvent
RtlQueryRegistryValues
ZwCreateDirectoryObject
ZwOpenProcessToken
ZwAdjustPrivilegesToken
ZwSetInformationFile
SeCreateClientSecurity
RtlFreeUnicodeString
ZwMakeTemporaryObject
ZwCreateFile
PsCreateSystemThread
MmMapLockedPagesSpecifyCache
RtlAnsiStringToUnicodeString
ExInterlockedInsertTailList
PsTerminateSystemThread
_vsnwprintf
ZwClose
IofCompleteRequest
ObReferenceObjectByHandle
KeWaitForSingleObject
PsRevertToSelf
ExInterlockedRemoveHeadList
PsDereferenceImpersonationToken
RtlCopyUnicodeString
ObfDereferenceObject
ZwQueryInformationFile
ZwWriteFile
DbgPrint
PsDereferencePrimaryToken
SeTokenType
KeBugCheckEx
ExFreePoolWithTag
SeImpersonateClient
ExAllocatePoolWithTag
ProbeForWrite
MmGetSystemRoutineAddress
IoFreeMdl
ExEventObjectType
MmProbeAndLockPages
RtlCompareMemory
MmUnlockPages
PsGetCurrentProcessId
RtlTimeToSecondsSince1970
ZwWaitForSingleObject
KeQueryTimeIncrement
RtlInitAnsiString
IoAllocateMdl
RtlUnicodeStringToAnsiString
RtlCompareString
_vsnprintf
ZwMapViewOfSection
RtlGetVersion
ExSystemTimeToLocalTime
ZwSetEvent
RtlTimeToTimeFields
RtlFreeAnsiString
RtlCompareUnicodeString
ZwCreateSection
ZwOpenSection
KeInitializeMutex
isspace
strstr
strchr
KeReleaseMutex
ZwFreeVirtualMemory
ExInitializeNPagedLookasideList
ExpInterlockedPushEntrySList
ExpInterlockedPopEntrySList
KeDelayExecutionThread
ExDeletePagedLookasideList
ExQueryDepthSList
ZwOpenProcess
ZwQueryInformationProcess
ExInitializePagedLookasideList
ExDeleteNPagedLookasideList
RtlAppendUnicodeStringToString
ZwEnumerateKey
ExDeleteResourceLite
ExInitializeResourceLite
ZwQuerySystemInformation
ZwCreateKey
ZwSetValueKey
ZwQueryValueKey
ZwDeleteKey
ZwOpenKey
ZwOpenEvent
ZwCreateEvent
RtlRandomEx
IoReuseIrp
KeResetEvent
KeReadStateEvent
KeReleaseInStackQueuedSpinLock
KeAcquireInStackQueuedSpinLock
IoCancelIrp
IoFreeIrp
IoAllocateIrp
KeWaitForMultipleObjects
IoCreateDevice
ObOpenObjectByPointer
ZwSetSecurityObject
IoDeviceObjectType
_snwprintf
RtlLengthSecurityDescriptor
SeCaptureSecurityDescriptor
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlAbsoluteToSelfRelativeSD
IoIsWdmVersionAvailable
SeExports
wcschr
_wcsnicmp
RtlLengthSid
RtlAddAccessAllowedAce
RtlGetSaclSecurityDescriptor
RtlGetDaclSecurityDescriptor
RtlGetGroupSecurityDescriptor
RtlGetOwnerSecurityDescriptor
__C_specific_handler
WskDeregister
WskReleaseProviderNPI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\pdb\isodisk.pdb
KeSetEvent
IofCompleteRequest
ExfInterlockedInsertTailList
SeCreateClientSecurity
ExAllocatePoolWithTag
memcpy
_aulldiv
memset
ZwQueryInformationFile
ZwClose
ZwSetInformationFile
ZwFsControlFile
RtlFreeUnicodeString
DbgPrint
ZwCreateFile
RtlAnsiStringToUnicodeString
ZwAdjustPrivilegesToken
ZwOpenProcessToken
KeWaitForSingleObject
ZwWriteFile
MmMapLockedPagesSpecifyCache
PsRevertToSelf
SeImpersonateClient
ExfInterlockedRemoveHeadList
PsTerminateSystemThread
KeSetPriorityThread
ObReferenceObjectByHandle
PsCreateSystemThread
KeInitializeEvent
RtlInitUnicodeString
ZwMakeTemporaryObject
ZwCreateDirectoryObject
RtlQueryRegistryValues
RtlAppendUnicodeToString
RtlCopyUnicodeString
KeTickCount
ObfDereferenceObject
ZwReadFile
ExFreePoolWithTag
_vsnprintf
ZwWaitForSingleObject
ZwSetEvent
RtlGetVersion
RtlCompareMemory
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
RtlCompareString
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
ZwMapViewOfSection
ZwOpenSection
ZwCreateSection
RtlCompareUnicodeString
RtlInitAnsiString
isspace
strchr
strstr
memmove
KeReleaseMutex
KeInitializeMutex
_aullrem
IoFreeMdl
MmUnlockPages
SeTokenType
MmProbeAndLockPages
IoAllocateMdl
PsGetCurrentProcessId
ProbeForWrite
ExEventObjectType
MmGetSystemRoutineAddress
RtlTimeToSecondsSince1970
KeQueryTimeIncrement
_alldiv
_allmul
ZwFreeVirtualMemory
InterlockedPopEntrySList
InterlockedPushEntrySList
ExInitializeNPagedLookasideList
ExInitializePagedLookasideList
ExDeletePagedLookasideList
ExDeleteNPagedLookasideList
KeDelayExecutionThread
ZwCreateKey
ZwOpenKey
ZwQueryValueKey
ZwDeleteKey
ZwSetValueKey
ZwCreateEvent
ZwOpenEvent
ZwEnumerateKey
RtlRandomEx
KeResetEvent
IoReuseIrp
IoCancelIrp
KeReadStateEvent
KeWaitForMultipleObjects
IoFreeIrp
IoAllocateIrp
ZwQuerySystemInformation
RtlAppendUnicodeStringToString
ExInitializeResourceLite
ExDeleteResourceLite
ZwSetSecurityObject
ObOpenObjectByPointer
IoDeviceObjectType
IoCreateDevice
RtlUnwind
RtlGetDaclSecurityDescriptor
RtlGetSaclSecurityDescriptor
RtlGetGroupSecurityDescriptor
RtlGetOwnerSecurityDescriptor
_snwprintf
RtlLengthSecurityDescriptor
SeCaptureSecurityDescriptor
SeExports
IoIsWdmVersionAvailable
_wcsnicmp
RtlAddAccessAllowedAce
RtlLengthSid
wcschr
RtlAbsoluteToSelfRelativeSD
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
KeBugCheckEx
PsDereferencePrimaryToken
PsDereferenceImpersonationToken
IoDeleteDevice
_vsnwprintf
KeGetCurrentThread
WskDeregister
WskReleaseProviderNPI
KeReleaseInStackQueuedSpinLock
KeGetCurrentIrql
KeAcquireInStackQueuedSpinLock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ