dialog
initDialog
show
Overview
overview
7Static
static
3Hjqq_V3.6.1_crsky.exe
windows7-x64
7Hjqq_V3.6.1_crsky.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Config.exe
windows7-x64
3Config.exe
windows10-2004-x64
3Hujiao.dll
windows7-x64
3Hujiao.dll
windows10-2004-x64
3SonicUI.dll
windows7-x64
3SonicUI.dll
windows10-2004-x64
3msimg32.dll
windows7-x64
3msimg32.dll
windows10-2004-x64
3patcher.exe
windows7-x64
3patcher.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7QQ.exe
windows7-x64
3QQ.exe
windows10-2004-x64
3新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Hjqq_V3.6.1_crsky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Hjqq_V3.6.1_crsky.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Config.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Config.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Hujiao.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Hujiao.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SonicUI.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
SonicUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
msimg32.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
msimg32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
patcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
patcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
QQ.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
QQ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
新云软件.url
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
新云软件.url
Resource
win10v2004-20240802-en
Target
fd79836c324c6054236dc019289d9fab_JaffaCakes118
Size
3.4MB
MD5
fd79836c324c6054236dc019289d9fab
SHA1
d5f050d83e409d3c5de85d9e4dd516c87f43e2ea
SHA256
e08c3626a1c31d7d41230206b82c57827140827dc766dfbeb5f14722bfe2c7c3
SHA512
6ec61f773f140382250c8bf5cc71d9efd5834ad80a1c4b57c84b574e4d3cc10257c18eb568ffb837be68b7ce1d0fd1b7c6a44ec7ab5b660e5318f5923b67006b
SSDEEP
98304:Kxs/uhewPaq/qYHSIU9dpN9idqGBeaRwOWu/+4H:Us/8spdpNS93wO1/vH
Checks for missing Authenticode signature.
resource |
---|
unpack001/Hjqq_V3.6.1_crsky.exe |
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/System.dll |
unpack002/Config.exe |
unpack002/Hujiao.dll |
unpack002/SonicUI.dll |
unpack002/msimg32.dll |
unpack002/patcher |
unpack002/uninst.exe |
unpack002/QQ.exe |
resource | yara_rule |
---|---|
static1/unpack001/Hjqq_V3.6.1_crsky.exe | nsis_installer_1 |
static1/unpack002/uninst.exe | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\Program\Soho\CybomaQQ\Config\Release\Config.pdb
GetProcAddress
GetCommandLineA
LoadLibraryA
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
RtlUnwind
ExitProcess
RaiseException
GetModuleHandleA
GetStartupInfoA
GetVersionExA
HeapAlloc
TlsAlloc
SetLastError
GetCurrentThreadId
GetLastError
TlsFree
TlsSetValue
TlsGetValue
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapFree
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InterlockedExchange
VirtualQuery
InitializeCriticalSection
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\Program\Soho\CybomaQQ\Cyboma\Release\Cyboma.pdb
VirtualProtect
WriteProcessMemory
VirtualAlloc
VirtualFree
CreateEventA
VirtualQuery
WaitForSingleObject
TerminateThread
SetEvent
ResetEvent
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FreeLibrary
GetCurrentProcess
FlushInstructionCache
HeapAlloc
InterlockedDecrement
InterlockedIncrement
MulDiv
GetProcessHeap
HeapFree
LCMapStringW
CreateMutexA
FindFirstFileA
FindNextFileA
FindClose
SetFileAttributesA
MoveFileExA
GlobalAlloc
GlobalLock
lstrcpyW
GlobalUnlock
OpenProcess
ReadProcessMemory
LoadLibraryA
lstrcmpiA
CompareStringA
CompareStringW
GetVersion
LeaveCriticalSection
EnterCriticalSection
GetLastError
lstrcmpA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetCurrentDirectoryA
SetEnvironmentVariableA
GetCommandLineA
lstrcpyA
lstrlenA
lstrcatA
lstrlenW
lstrcmpiW
MultiByteToWideChar
OpenFileMappingA
DisableThreadLibraryCalls
GetProcAddress
GetModuleHandleA
GetCurrentThreadId
Sleep
WideCharToMultiByte
OutputDebugStringA
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetTimeZoneInformation
IsBadWritePtr
HeapCreate
HeapDestroy
SetUnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
TerminateProcess
ExitThread
HeapSize
IsBadReadPtr
HeapReAlloc
LoadResource
LockResource
SizeofResource
FindResourceA
GetModuleFileNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetEnvironmentVariableA
GetPrivateProfileIntA
CreateFileA
GetLocalTime
GetFileTime
CloseHandle
DeleteFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
CopyFileA
GetDriveTypeA
GetSystemInfo
CreateProcessA
CreateThread
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
RaiseException
DeleteCriticalSection
InitializeCriticalSection
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
GetFullPathNameA
DuplicateHandle
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GetCurrentThread
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetCurrentProcessId
GlobalDeleteAtom
lstrcmpW
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFree
FormatMessageA
LocalFree
SetLastError
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenThread
SuspendThread
GetThreadContext
ResumeThread
VirtualQueryEx
VirtualProtectEx
RegisterHotKey
IsWindow
ShowWindow
EnumWindows
UnregisterHotKey
LoadIconA
GetClassNameA
InflateRect
PtInRect
DrawTextA
ClientToScreen
wsprintfA
InvalidateRgn
SetCapture
ReleaseCapture
CreateAcceleratorTableA
CharNextA
RedrawWindow
FillRect
IsChild
GetFocus
GetSysColor
DestroyAcceleratorTable
GetWindowTextLengthA
RegisterWindowMessageA
GetClassInfoExA
KillTimer
SetTimer
GetWindow
GetWindowTextA
SetMenuItemInfoA
CreateDialogParamA
DialogBoxParamA
DefWindowProcA
TrackMouseEvent
LoadCursorA
RegisterClassExA
CreateWindowExA
SetForegroundWindow
IsDialogMessageA
UnhookWindowsHookEx
PostQuitMessage
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSysColorBrush
IsWindowEnabled
GetLastActivePopup
ValidateRect
GetKeyState
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
CopyRect
GetWindowPlacement
SystemParametersInfoA
RegisterClassA
GetClassInfoA
AdjustWindowRectEx
GetMenu
MapWindowPoints
GetWindowThreadProcessId
GetMessagePos
GetMessageTime
GetTopWindow
GetForegroundWindow
GetClassLongA
GetCapture
WinHelpA
TabbedTextOutA
DrawTextExA
GrayStringA
DestroyMenu
SetWindowTextA
EnableWindow
GetDesktopWindow
SetFocus
PeekMessageA
LoadMenuA
GetSubMenu
GetCursorPos
TrackPopupMenu
InvalidateRect
EndDialog
DestroyIcon
GetClientRect
DrawIconEx
LoadImageA
BeginPaint
EndPaint
SendInput
GetDlgCtrlID
FindWindowExA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
FindWindowA
GetSystemMetrics
SubtractRect
MessageBoxA
EqualRect
SendMessageA
CallNextHookEx
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
SetRect
SetPropA
SetActiveWindow
IsIconic
PostMessageA
SetWindowPos
GetDC
ReleaseDC
MoveWindow
GetWindowRect
GetParent
ScreenToClient
UpdateWindow
GetDlgItem
DestroyWindow
GetPropA
SetWindowLongA
RemovePropA
CallWindowProcA
UnregisterClassA
IsWindowVisible
GetWindowLongA
PostThreadMessageA
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
CreatePen
SelectObject
MoveToEx
LineTo
DeleteObject
SetBkColor
ExtTextOutA
GetPixel
CreateBitmap
GetClipBox
SaveDC
RestoreDC
SetMapMode
GetDeviceCaps
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
GetStockObject
SetTextColor
GetOpenFileNameA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Shell_NotifyIconW
SHGetSpecialFolderPathA
Shell_NotifyIconA
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleInitialize
OleLockRunning
OleUninitialize
CreateStreamOnHGlobal
StringFromGUID2
CoCreateGuid
CoTaskMemAlloc
VariantChangeType
SysFreeString
VariantClear
SysAllocString
VariantInit
SysAllocStringLen
SysStringLen
SysStringByteLen
OleCreateFontIndirect
LoadRegTypeLi
VarUI4FromStr
LoadTypeLi
ord17
StrStrW
StrStrA
PathIsDirectoryA
PathFileExistsA
SendARP
GetModuleInformation
inet_addr
setsockopt
recvfrom
htonl
connect
send
getpeername
ntohl
ntohs
gethostname
WSASend
sendto
inet_ntoa
getsockname
gethostbyname
htons
WSAStartup
socket
ioctlsocket
closesocket
ImageDirectoryEntryToData
LresultFromObject
CreateStdAccessibleObject
UuidToStringA
RpcStringFreeA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
InternetSetStatusCallback
InternetSetOptionA
InternetOpenA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCreateUrlA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
DoConfig
IsCyboRunning
LoadQQ
ReportData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\Program\LocalSrc\SonicUI_src\SonicUI\Release\SonicUI.pdb
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetModuleHandleA
GetProcAddress
IsBadReadPtr
lstrcpyA
FindResourceA
LoadResource
SizeofResource
FreeResource
LockResource
IsBadCodePtr
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrlenA
lstrcmpiA
lstrcmpiW
CompareStringA
CompareStringW
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersion
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
ReadProcessMemory
VirtualQueryEx
LocalFree
lstrcpynA
FormatMessageA
SetLastError
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
GlobalFlags
CloseHandle
GetCurrentThreadId
lstrcmpW
lstrcatA
FreeLibrary
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCPInfo
GetOEMCP
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
CreateFileA
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapReAlloc
HeapSize
TerminateProcess
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
SetStdHandle
SetEnvironmentVariableA
WriteProcessMemory
VirtualProtectEx
AdjustWindowRectEx
GetMenu
SetForegroundWindow
MapWindowPoints
LoadIconA
GetMessagePos
GetMessageTime
GetTopWindow
GetForegroundWindow
GetClassInfoExA
GetCapture
WinHelpA
RegisterWindowMessageA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
DestroyMenu
PostQuitMessage
GetSubMenu
GetMenuItemCount
GetClassInfoA
RegisterClassA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetDlgItem
ModifyMenuA
EnableMenuItem
CheckMenuItem
MoveWindow
GetActiveWindow
WindowFromPoint
BeginPaint
EndPaint
GetPropA
RemovePropA
GetParent
SetPropA
ValidateRect
UpdateLayeredWindow
SetLayeredWindowAttributes
ShowWindow
IsWindowVisible
GetWindowRect
ClientToScreen
GetWindow
InvalidateRect
SetClassLongA
EqualRect
GetCursorPos
GetUpdateRect
LoadCursorA
RegisterClassExA
GetWindowLongA
GetLayeredWindowAttributes
CallWindowProcA
TrackMouseEvent
SetWindowLongA
GetClassLongA
DefWindowProcA
SetTimer
ReleaseCapture
SetCapture
ScreenToClient
IsWindow
IntersectRect
OffsetRect
WindowFromDC
GetClientRect
GetDesktopWindow
GetDC
GetMenuItemID
GetMenuState
UnregisterClassA
GetSysColorBrush
GetSysColor
GetSystemMetrics
ReleaseDC
PostMessageA
CopyRect
PtInRect
DestroyWindow
CreateWindowExA
SetWindowPos
SendMessageA
SetRect
GetMenuCheckMarkDimensions
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
GetDlgCtrlID
GetFocus
SetWindowTextA
GetClassNameA
GetWindowTextA
MessageBoxA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadBitmapA
GetBkMode
SetBkMode
CreatePen
MoveToEx
LineTo
SetTextColor
TextOutA
GetTextExtentExPointA
GetTextExtentPoint32A
CreateFontIndirectA
SetMapMode
SetStretchBltMode
RestoreDC
SaveDC
GetClipBox
CreateBitmap
ExtSelectClipRgn
RealizePalette
GetDIBits
CreateRectRgnIndirect
GetStockObject
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
RectVisible
PtVisible
DeleteDC
DeleteObject
SelectObject
CreateDIBSection
CreateCompatibleDC
BitBlt
ExtTextOutA
SetBkColor
StretchBlt
CombineRgn
CreateRectRgn
SetDIBitsToDevice
GetObjectA
GetCurrentObject
SHCreateDirectoryExA
ShellExecuteA
CreateStreamOnHGlobal
VariantClear
OleLoadPicture
VariantChangeType
VariantInit
AlphaBlend
TransparentBlt
ord17
InitCommonControlsEx
PathFileExistsA
timeKillEvent
timeSetEvent
CreateStdAccessibleObject
LresultFromObject
ImageDirectoryEntryToData
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetSonicUI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
GetEnvironmentVariableA
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
RtlUnwind
InterlockedExchange
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
AlphaBlend
DllInitialize
GradientFill
TransparentBlt
vSetDdrawflag
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\Program\Soho\CybomaQQ\CybomaQQ\Release\CybomaQQ.pdb
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
InterlockedExchange
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ