dialog
initDialog
show
Overview
overview
7Static
static
3098ac0abec...18.exe
windows7-x64
7098ac0abec...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/exdll.dll
windows7-x64
3$PLUGINSDIR/exdll.dll
windows10-2004-x64
3AutoUpdate.dll
windows7-x64
3AutoUpdate.dll
windows10-2004-x64
3CaiHong.dll
windows7-x64
3CaiHong.dll
windows10-2004-x64
3CaiHong.exe
windows7-x64
7CaiHong.exe
windows10-2004-x64
7Reporter.dll
windows7-x64
3Reporter.dll
windows10-2004-x64
3msimg32.dll
windows7-x64
3msimg32.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/exdll.dll
windows7-x64
3$PLUGINSDIR/exdll.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
098ac0abecc4ef0b1523053dda3cd4dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
098ac0abecc4ef0b1523053dda3cd4dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/exdll.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/exdll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
AutoUpdate.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
AutoUpdate.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
CaiHong.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CaiHong.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
CaiHong.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
CaiHong.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Reporter.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Reporter.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
msimg32.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
msimg32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
uninstall.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/exdll.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/exdll.dll
Resource
win10v2004-20240802-en
Target
098ac0abecc4ef0b1523053dda3cd4dd_JaffaCakes118
Size
1.6MB
MD5
098ac0abecc4ef0b1523053dda3cd4dd
SHA1
d85fbf81cbe371f80a50966cf509b732e7d0fa36
SHA256
74be6c40d1f22f291dd504e97570c7c678ce9e46e32dfd94c94126de75ae21cd
SHA512
e2aa57a1c483ac726527acc35ae82727839600d1c60be63c7cc01337427e2e90652020126fb23f834256416113ad5fdf4dba48df75f62163c0473458851a20ce
SSDEEP
24576:2c5YG52ob3weTAASN0mX/odwVbYM63xSe1QvyVkEwMD8FumJrVK25YadBP4l6:2UjTwe8Ag0mgdw6Se1QvyVvwr9yaXP4M
Checks for missing Authenticode signature.
resource |
---|
098ac0abecc4ef0b1523053dda3cd4dd_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/exdll.dll |
unpack001/AutoUpdate.dll |
unpack001/CaiHong.dll |
unpack001/CaiHong.exe |
unpack001/Reporter.dll |
unpack001/msimg32.dll |
unpack001/uninstall.exe |
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/exdll.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
static1/unpack001/uninstall.exe | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
OpenProcess
lstrcmpiA
CloseHandle
Process32First
CreateToolhelp32Snapshot
GlobalFree
lstrcpyA
MultiByteToWideChar
Process32Next
FlushFileBuffers
ReadFile
SetStdHandle
GetStringTypeW
GetStringTypeA
GlobalAlloc
lstrcpynA
GetCurrentThreadId
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
GetCPInfo
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
SetFilePointer
LoadLibraryA
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
WriteFile
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
TerminateThread
WaitForSingleObject
Sleep
ExitProcess
RtlUnwind
RaiseException
GetCommandLineA
GetVersionExA
HeapAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
InterlockedExchange
VirtualQuery
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
HeapFree
SetUnhandledExceptionFilter
GetCurrentProcess
SetHandleCount
MessageBoxA
wsprintfA
KillTimer
GetDlgItem
SendMessageA
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
SetWindowPos
ShowWindow
SetTimer
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CoUninitialize
CoInitialize
CoCreateGuid
UuidToStringA
RpcStringFreeA
Netbios
connect
closesocket
recv
send
WSACleanup
WSAStartup
setsockopt
getsockopt
__WSAFDIsSet
select
WSAGetLastError
htons
ioctlsocket
socket
gethostbyname
inet_addr
InternetCrackUrlA
CreateSessionId
IsQQInstall
IsQQRunning
KillAllQQProcess
QQKillTimer
QQSetTimer
Report
ReportData
SendUrl
SetProxyConfig
SetReportConfig
myFunction
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Documents and Settings\Administrator\桌面\2.6\AutoUpdate\Release\AutoUpdate.pdb
LocalFree
lstrcpynA
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
lstrcpyA
GetVolumeInformationA
GetFullPathNameA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
LocalAlloc
lstrlenA
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
lstrcatA
GetModuleHandleA
GetFileAttributesA
GlobalFlags
lstrcmpW
FreeLibrary
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
HeapFree
GetCommandLineA
HeapReAlloc
HeapSize
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
OutputDebugStringA
lstrcmpiA
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
GetSystemTime
SetCurrentDirectoryA
GetTickCount
GetCurrentThreadId
SetEvent
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
DeleteFileA
CreateThread
CreateEventA
WaitForSingleObject
OpenThread
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLocalTime
GetFileTime
CreateDirectoryA
CreateMutexA
GetLastError
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
MoveFileExA
FindNextFileA
FindClose
CreateFileA
CloseHandle
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LeaveCriticalSection
GetVersionExA
SetPropA
GetClassInfoExA
GetClassLongA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
SetForegroundWindow
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
GetPropA
SetWindowsHookExA
CallNextHookEx
GetKeyState
ValidateRect
ClientToScreen
GetWindow
GetDlgCtrlID
PtInRect
GetFocus
GetClassNameA
GetWindowTextA
MessageBoxA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
PostThreadMessageA
DialogBoxParamA
PostMessageA
SetWindowTextA
MoveWindow
GetClientRect
GetDlgItem
SendMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EndDialog
GetSystemMetrics
GetWindowRect
GetMessageA
PeekMessageA
RemovePropA
CharUpperA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessagePos
GetMessageTime
LoadIconA
MapWindowPoints
DispatchMessageA
ord17
PathFindFileNameA
PathIsDirectoryA
PathFileExistsA
PathStripToRootA
PathIsUNCA
RpcStringFreeA
UuidToStringA
SendARP
InternetSetStatusCallback
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetCreateUrlA
gethostname
gethostbyname
LresultFromObject
CreateStdAccessibleObject
CreateBitmap
GetStockObject
DeleteDC
SetViewportExtEx
ScaleWindowExtEx
OffsetViewportOrgEx
DeleteObject
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
PtVisible
RectVisible
TextOutA
ExtTextOutA
SetWindowExtEx
ScaleViewportExtEx
GetDeviceCaps
Escape
SelectObject
SetViewportOrgEx
DocumentPropertiesA
OpenPrinterA
ClosePrinter
GetFileTitleA
CoCreateGuid
VariantClear
VariantChangeType
VariantInit
CheckUpdate
CleanupAutoUpdate
CreateCfgFile
DoPatch
DoUpdateMessageBox
StartupAutoUpdate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
f:\svc_src\SvnTemp2.7\UIInject\Release\UIInject.pdb
FindClose
FindNextFileA
FindFirstFileA
FindResourceA
SizeofResource
LockResource
LoadResource
WideCharToMultiByte
GetEnvironmentVariableA
Thread32First
Thread32Next
GetPrivateProfileStringA
LCMapStringW
OpenProcess
ReadProcessMemory
GlobalSize
GlobalLock
GlobalAlloc
GlobalUnlock
CreateMutexA
MoveFileExA
GetCurrentThreadId
CreateEventA
ResetEvent
CreateThread
OpenEventA
SetEvent
GetTickCount
DisableThreadLibraryCalls
GetLastError
lstrcmpiA
lstrcmpiW
lstrlenW
MultiByteToWideChar
GetVersion
FreeLibrary
LoadLibraryA
SetCurrentDirectoryA
OpenThread
WaitForSingleObject
Sleep
OutputDebugStringA
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringA
UnhandledExceptionFilter
GetEnvironmentStringsW
GetCommandLineA
lstrcpynA
SetFileAttributesA
DeleteFileA
GetModuleFileNameA
SetEnvironmentVariableA
CreateProcessA
CloseHandle
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentDirectoryA
lstrlenA
lstrcatA
WinExec
lstrcpyA
CreateDirectoryA
CopyFileA
GetModuleHandleA
GetProcAddress
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsBadWritePtr
HeapCreate
HeapDestroy
GetStartupInfoA
GetFileType
GetCurrentProcessId
GetPrivateProfileIntA
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
QueryPerformanceCounter
TerminateProcess
HeapSize
HeapReAlloc
IsBadReadPtr
HeapFree
HeapAlloc
GetSystemInfo
RtlUnwind
ExitProcess
CreateFileA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
GetCurrentProcess
VirtualAlloc
SetLastError
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateThread
VirtualQuery
VirtualFree
InterlockedDecrement
VirtualProtect
GetSystemTimeAsFileTime
FileTimeToSystemTime
GetSystemTime
MulDiv
LocalFree
FormatMessageA
GlobalFree
RaiseException
GlobalFlags
InterlockedIncrement
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeResource
lstrcmpA
GrayStringA
GetDC
IntersectRect
GetMenuItemCount
GetMenuItemID
GetMenuState
IsWindowEnabled
PtInRect
GetSysColorBrush
GetLastActivePopup
GetWindowPlacement
IsIconic
SystemParametersInfoA
OffsetRect
RegisterClassA
GetClassInfoA
AdjustWindowRectEx
GetMenu
GetKeyState
MapWindowPoints
PeekMessageA
LoadIconA
GetMessagePos
GetMessageTime
GetTopWindow
GetForegroundWindow
GetClassInfoExA
GetCapture
WinHelpA
RegisterWindowMessageA
ValidateRect
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
DestroyMenu
DrawTextExA
FindWindowA
CopyImage
WindowFromDC
GetDlgCtrlID
GetWindow
UnhookWindowsHookEx
GetCursorPos
SetFocus
MapVirtualKeyA
GetKeyNameTextA
GetWindowTextA
EnableWindow
SetWindowTextA
LoadStringA
RemovePropA
CallWindowProcA
SetPropA
GetPropA
PostQuitMessage
CreateWindowExA
CreateDialogParamA
GetClassLongA
SetCursor
DefWindowProcA
TrackMouseEvent
UnregisterClassA
LoadCursorA
RegisterClassExA
SetWindowRgn
LoadMenuA
ClientToScreen
SetMenuItemInfoA
TrackPopupMenu
GetSubMenu
EqualRect
SetWindowsHookExA
SetWindowLongA
SetLayeredWindowAttributes
SetRect
FindWindowExA
GetParent
GetFocus
DrawFocusRect
MessageBoxA
SetWindowPos
GetClientRect
FillRect
CopyRect
DestroyWindow
KillTimer
InvalidateRect
GetSysColor
SendMessageA
SetTimer
SetForegroundWindow
IsWindowVisible
GetWindowLongA
GetWindowThreadProcessId
GetClassNameA
UnregisterHotKey
RegisterHotKey
IsWindow
ShowWindow
EnumWindows
PostThreadMessageA
CheckDlgButton
BeginPaint
GetDlgItem
DrawTextA
TabbedTextOutA
GetAsyncKeyState
CallNextHookEx
DispatchMessageA
TranslateMessage
GetMessageA
ScreenToClient
EndPaint
DialogBoxParamA
GetWindowRect
GetSystemMetrics
MoveWindow
EndDialog
PostMessageA
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
SetClipboardData
EmptyClipboard
ReleaseDC
GetWindowDC
SendInput
SetClassLongA
SetBkMode
SetTextAlign
ExtTextOutA
CreateSolidBrush
CreateRectRgn
CombineRgn
CreatePen
MoveToEx
LineTo
GetTextColor
GetBkColor
GetObjectA
CreateFontIndirectA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
SelectObject
DeleteObject
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
GetPixel
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
GetStockObject
StretchBlt
GetBitmapBits
SetBitmapBits
GetCurrentObject
GetDeviceCaps
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Shell_NotifyIconA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
Shell_NotifyIconW
CoCreateGuid
CreateStreamOnHGlobal
ord17
InitCommonControlsEx
PathFileExistsA
PathIsDirectoryA
ImageDirectoryEntryToData
WSACleanup
WSAGetLastError
WSAStartup
WSASocketA
ioctlsocket
select
recvfrom
socket
connect
WSASend
closesocket
getsockname
gethostname
gethostbyname
getpeername
ntohl
ntohs
send
inet_addr
htons
htonl
sendto
CreateStdAccessibleObject
LresultFromObject
UuidToStringA
RpcStringFreeA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
OleLoadPicture
VariantInit
VariantChangeType
VariantClear
TransparentBlt
AlphaBlend
HandleLoadRet
LoadQQ
_CallWndProc@12
_FuncInit@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Administrator\桌面\2.7\Starter\ReleaseStarter.pdb
WaitForSingleObject
OpenThread
WinExec
GetProcAddress
LoadLibraryA
SetCurrentDirectoryA
GetModuleFileNameA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapReAlloc
VirtualAlloc
ExitProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedExchange
VirtualQuery
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
PeekMessageA
SetTimer
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
KillTimer
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostThreadMessageA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\Work\Shc\UIInject\HttpDownloader\Release\HttpDownloader.pdb
TerminateThread
EnterCriticalSection
Sleep
LeaveCriticalSection
DeleteCriticalSection
WaitForSingleObject
CreateThread
InitializeCriticalSection
CompareStringW
CompareStringA
CloseHandle
GetLocaleInfoW
FlushFileBuffers
GetTimeZoneInformation
ReadFile
SetStdHandle
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualAlloc
VirtualProtect
MultiByteToWideChar
SetFilePointer
RtlUnwind
ExitProcess
RaiseException
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
GetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
SetUnhandledExceptionFilter
HeapFree
HeapAlloc
InterlockedExchange
VirtualQuery
FatalAppExitA
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
SetEnvironmentVariableA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CoCreateGuid
setsockopt
gethostname
closesocket
recv
send
htons
inet_addr
gethostbyname
socket
ioctlsocket
connect
WSAGetLastError
select
__WSAFDIsSet
getsockopt
InternetCrackUrlA
UuidToStringA
RpcStringFreeA
SendARP
CreateSessionId
ReportData
ReportData2
SetProxyConfig
SetReportConfig
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrcmpiA
lstrlenA
GetModuleFileNameA
GetEnvironmentVariableA
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
RtlUnwind
InterlockedExchange
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
AlphaBlend
DllInitialize
GradientFill
TransparentBlt
vSetDdrawflag
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
OpenProcess
lstrcmpiA
CloseHandle
Process32First
CreateToolhelp32Snapshot
GlobalFree
lstrcpyA
MultiByteToWideChar
Process32Next
FlushFileBuffers
ReadFile
SetStdHandle
GetStringTypeW
GetStringTypeA
GlobalAlloc
lstrcpynA
GetCurrentThreadId
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
GetCPInfo
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
SetFilePointer
LoadLibraryA
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
WriteFile
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
TerminateThread
WaitForSingleObject
Sleep
ExitProcess
RtlUnwind
RaiseException
GetCommandLineA
GetVersionExA
HeapAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
InterlockedExchange
VirtualQuery
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
HeapFree
SetUnhandledExceptionFilter
GetCurrentProcess
SetHandleCount
MessageBoxA
wsprintfA
KillTimer
GetDlgItem
SendMessageA
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
SetWindowPos
ShowWindow
SetTimer
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CoUninitialize
CoInitialize
CoCreateGuid
UuidToStringA
RpcStringFreeA
Netbios
connect
closesocket
recv
send
WSACleanup
WSAStartup
setsockopt
getsockopt
__WSAFDIsSet
select
WSAGetLastError
htons
ioctlsocket
socket
gethostbyname
inet_addr
InternetCrackUrlA
CreateSessionId
IsQQInstall
IsQQRunning
KillAllQQProcess
QQKillTimer
QQSetTimer
Report
ReportData
SendUrl
SetProxyConfig
SetReportConfig
myFunction
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ