Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
8Static
static
3dt412cn_v2...te.exe
windows7-x64
dt412cn_v2...te.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$TEMP/SPTD...64.exe
windows7-x64
8$TEMP/SPTD...64.exe
windows10-2004-x64
1$TEMP/SPTD...86.exe
windows7-x64
3$TEMP/SPTD...86.exe
windows10-2004-x64
3AdVantageSetup.exe
windows7-x64
7AdVantageSetup.exe
windows10-2004-x64
3DaemonPlugin.dll
windows7-x64
3DaemonPlugin.dll
windows10-2004-x64
3Lang/ARA.dll
windows7-x64
1Lang/ARA.dll
windows10-2004-x64
1Lang/CHS.dll
windows7-x64
1Lang/CHS.dll
windows10-2004-x64
1Lang/CHT.dll
windows7-x64
1Lang/CHT.dll
windows10-2004-x64
1Lang/CRO.dll
windows7-x64
1Lang/CRO.dll
windows10-2004-x64
1Lang/CZE.dll
windows7-x64
1Lang/CZE.dll
windows10-2004-x64
1Lang/DEU.dll
windows7-x64
1Lang/DEU.dll
windows10-2004-x64
1Lang/DUT.dll
windows7-x64
1Lang/DUT.dll
windows10-2004-x64
1Lang/ENU.dll
windows7-x64
1Lang/ENU.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
dt412cn_v2/daemon4120-lite.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dt412cn_v2/daemon4120-lite.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptionsEx.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptionsEx.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$TEMP/SPTDinst-x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$TEMP/SPTDinst-x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$TEMP/SPTDinst-x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/SPTDinst-x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AdVantageSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AdVantageSetup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
DaemonPlugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
DaemonPlugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Lang/ARA.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Lang/ARA.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Lang/CHS.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Lang/CHS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Lang/CHT.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Lang/CHT.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Lang/CRO.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Lang/CRO.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Lang/CZE.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Lang/CZE.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Lang/DEU.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Lang/DEU.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Lang/DUT.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Lang/DUT.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Lang/ENU.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Lang/ENU.dll
Resource
win10v2004-20241007-en
Target
28ec39ede5d9dba17fc932cb6ab2c54b_JaffaCakes118
Size
3.6MB
MD5
28ec39ede5d9dba17fc932cb6ab2c54b
SHA1
e3f9e3a75301558d6ab9669df79ab1e0ed032202
SHA256
24e8c7c3f1df4225036026249ee22fa5330b9ec2c8c87f78fd02cbf763fcf465
SHA512
d4d33f6ee186724bf3242ec6a97981459b7d44e87eb1490baa17c469528bd415cdf132db3b551d15b83f8e2be6f91a7e401cd30e850f6bb3d473847c4890c992
SSDEEP
98304:j1vkRSEqF2eUSLmT42Aftks4FonNr1uclHE0akvAy:jlkRShF2e/n92sGedonkv1
Checks for missing Authenticode signature.
resource |
---|
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/InstallOptionsEx.dll |
unpack002/$PLUGINSDIR/setuphlp.dll |
unpack002/AdVantageSetup.exe |
unpack002/Lang/ARA.dll |
unpack002/Lang/CHS.dll |
unpack002/Lang/CHT.dll |
unpack002/Lang/CRO.dll |
unpack002/Lang/CZE.dll |
unpack002/Lang/DEU.dll |
unpack002/Lang/DUT.dll |
unpack002/Lang/ENU.dll |
unpack002/Lang/FRE.dll |
unpack002/Lang/HEB.dll |
unpack002/Lang/HUN.dll |
unpack002/Lang/ITA.dll |
unpack002/Lang/JPN.dll |
unpack002/Lang/LTH.dll |
unpack002/Lang/NOR.dll |
unpack002/Lang/POL.dll |
unpack002/Lang/PTB.dll |
unpack002/Lang/ROM.dll |
unpack002/Lang/RUS.dll |
unpack002/Lang/SER.dll |
unpack002/Lang/SPA.dll |
unpack002/Lang/SVE.dll |
unpack002/Lang/SVK.dll |
unpack002/Lang/UKR.dll |
unpack002/Plugins/Images/bw5mount.dll |
unpack002/Plugins/Images/bwtmount.dll |
unpack002/Plugins/Images/ccdmount.dll |
unpack002/Plugins/Images/cuemount.dll |
unpack002/Plugins/Images/iszmount.dll |
unpack002/Plugins/Images/nrgmount.dll |
unpack002/Plugins/Images/pdimount.dll |
unpack002/Plugins/Images/pfcmount.dll |
unpack002/pfctoc.dll |
unpack001/dt412cn_v2/dt412chs.exe |
resource | yara_rule |
---|---|
static1/unpack001/dt412cn_v2/daemon4120-lite.exe | nsis_installer_1 |
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetModuleHandleA
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
LoadLibraryA
ExitProcess
GetCurrentProcess
CopyFileA
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
GetTempFileNameA
lstrcpyA
lstrlenA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
RemoveDirectoryA
GlobalFree
MulDiv
GetProcAddress
FreeLibrary
MultiByteToWideChar
DeleteFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
SetWindowTextA
SetTimer
DestroyWindow
CreateDialogParamA
ExitWindowsEx
CharNextA
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
DefWindowProcA
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
OleUninitialize
OleInitialize
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetModuleHandleA
GetPrivateProfileIntA
GlobalAlloc
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
lstrcmpiA
GetDlgCtrlID
GetClientRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
MapWindowPoints
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
SendMessageA
SetWindowTextA
GetWindowTextA
wsprintfA
CharNextA
CreateWindowExA
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrcmpiA
GetModuleHandleA
TerminateProcess
GetPrivateProfileIntA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetPrivateProfileStringA
lstrcatA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalAlloc
GetCurrentProcess
lstrcpynA
DrawTextA
SetCursor
LoadCursorA
PtInRect
GetWindowLongA
GetDlgCtrlID
DestroyIcon
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
ShowWindow
SetWindowLongA
GetClientRect
SetWindowRgn
LoadIconA
LoadImageA
MapDialogRect
CreateDialogParamA
EnableWindow
GetDlgItem
DrawFocusRect
CallWindowProcA
PostMessageA
DestroyWindow
GetWindowRect
ScreenToClient
SetWindowPos
CreateWindowExA
CharNextA
SendMessageA
SetWindowTextA
GetWindowTextA
MessageBoxA
wsprintfA
MapWindowPoints
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenA
GetLocaleInfoA
GetUserDefaultLCID
lstrcatA
lstrcpyA
CloseHandle
GetLastError
DeviceIoControl
CreateFileA
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryA
GetCurrentProcess
lstrlenA
lstrcmpA
LocalFree
WaitForSingleObject
CreateMutexA
CreateEventA
LocalAlloc
GlobalAlloc
GlobalFree
GetCurrentThread
FreeLibrary
SetEvent
LoadLibraryA
GlobalReAlloc
IsDBCSLeadByte
GetVersionExA
CreateProcessA
ReleaseMutex
Sleep
SetCurrentDirectoryA
lstrcmpiA
GetCurrentDirectoryA
LockResource
LoadResource
SizeofResource
FindResourceA
FindClose
FindFirstFileA
GetPrivateProfileSectionA
VirtualUnlock
VirtualLock
LeaveCriticalSection
EnterCriticalSection
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatus
GetProcessHeap
GetCurrentThreadId
GetCurrentProcessId
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetPrivateProfileStringA
GetModuleFileNameA
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetExitCodeProcess
LCMapStringW
LCMapStringA
ReadFile
InitializeCriticalSection
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
HeapSize
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
WriteFile
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
ExitProcess
CryptGenRandom
RegDeleteValueA
RegSetValueExA
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegDeleteKeyA
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetSystemMetrics
GetCursorPos
GetActiveWindow
GetCapture
GetClipboardOwner
GetClipboardViewer
GetDesktopWindow
GetFocus
GetInputState
GetMessagePos
GetMessageTime
GetOpenClipboardWindow
GetProcessWindowStation
GetQueueStatus
GetCaretPos
IsCharAlphaNumericA
CharLowerA
MessageBoxA
wsprintfA
SHGetFolderPathA
ShellExecuteA
CoCreateGuid
A0DB34FC6FE35D429A28ADDE5467D4D7
Hlp1
Hlp10
Hlp2
Hlp3
Hlp4
Hlp5
Hlp6
Hlp7
Hlp8
Hlp9
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
f:\projects\sptd\setup\objfre_wnet_amd64\amd64\SPTDinst.pdb
RegDeleteValueA
RegSetValueExA
SetSecurityDescriptorDacl
AllocateAndInitializeSid
OpenServiceA
CloseServiceHandle
RegQueryValueExA
RegCreateKeyExA
CreateServiceA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
InitializeSecurityDescriptor
OpenSCManagerA
RegGetKeySecurity
FreeSid
RegSetKeySecurity
HeapFree
CreateMutexA
WaitForSingleObject
LocalAlloc
ReleaseMutex
LoadLibraryA
CloseHandle
LocalFree
GetTickCount
GetLastError
VirtualFree
CreateThread
GetProcAddress
GetProcessHeap
VirtualAlloc
HeapAlloc
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetStartupInfoW
HeapReAlloc
GetCurrentProcess
GetModuleHandleA
GetCommandLineA
Sleep
UnhandledExceptionFilter
EndDialog
GetDlgItem
DialogBoxParamA
EnableWindow
MessageBoxA
SendMessageA
SendDlgItemMessageA
srand
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
memset
?terminate@@YAXXZ
fwrite
rand
fclose
_tempnam
_errno
free
_mbsnbicmp
sprintf
_mbsicmp
_unlink
rename
_fsopen
memmove
CertCloseStore
CertOpenStore
CertSetCertificateContextProperty
CertFreeCertificateContext
CertAddEncodedCertificateToStore
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
f:\projects\sptd\setup\objfre_w2k_x86\i386\SPTDinst.pdb
OpenSCManagerA
FreeSid
EqualSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegSetKeySecurity
RegGetKeySecurity
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
CreateServiceA
CloseServiceHandle
OpenServiceA
RegDeleteKeyA
GetProcAddress
GetModuleHandleA
LocalFree
CreateMutexA
LocalAlloc
HeapFree
HeapAlloc
GetSystemDirectoryA
CloseHandle
CreateThread
ReleaseMutex
GetTickCount
WaitForSingleObject
GetCommandLineA
VirtualFree
VirtualAlloc
GetProcessHeap
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
LoadLibraryA
GetCurrentThread
GetLastError
GetCurrentProcess
Sleep
HeapReAlloc
UnhandledExceptionFilter
MessageBoxA
EnableWindow
GetDlgItem
SendDlgItemMessageA
SendMessageA
DialogBoxParamA
EndDialog
free
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
?terminate@@YAXXZ
_controlfp
_unlink
_fsopen
fwrite
fclose
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_mbsnbicmp
_mbsicmp
srand
memset
memmove
rand
_tempnam
rename
_errno
CertSetCertificateContextProperty
CertAddEncodedCertificateToStore
CertOpenStore
CertCloseStore
CertFreeCertificateContext
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetQueryOptionA
InternetGetConnectedState
InternetTimeToSystemTime
InternetCombineUrlA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
SetupIterateCabinetA
CloseHandle
ResumeThread
InterlockedDecrement
EnterCriticalSection
GetTempPathA
GlobalAlloc
GetTickCount
GetWindowsDirectoryA
GlobalLock
FindResourceA
GlobalUnlock
LeaveCriticalSection
LoadResource
RaiseException
MulDiv
LockResource
GetFileAttributesA
SizeofResource
DeleteCriticalSection
GetLocalTime
CreateFileA
GetPrivateProfileStringA
GetCurrentThreadId
WriteFile
FlushInstructionCache
GlobalHandle
SetLastError
WritePrivateProfileStringA
InitializeCriticalSection
lstrlenW
MultiByteToWideChar
lstrcmpA
GetVersionExA
WideCharToMultiByte
Sleep
GetExitCodeProcess
GetStringTypeExA
FindFirstFileA
GetThreadLocale
CompareStringA
lstrcmpiA
FindNextFileA
FindClose
GetCurrentProcess
lstrcpyA
FindResourceExA
GetTempFileNameA
RemoveDirectoryA
FreeLibrary
IsDBCSLeadByte
GetModuleHandleA
LoadLibraryExA
CreateMutexA
LoadLibraryA
GetProcAddress
InterlockedExchange
ReadFile
SetEndOfFile
SetFilePointer
GetFileSize
SystemTimeToFileTime
FileTimeToSystemTime
LocalAlloc
InterlockedIncrement
SetPriorityClass
DeleteFileA
GlobalFree
GetCurrentThread
GetCommandLineA
SetThreadPriority
CreateProcessA
CreateDirectoryA
GetShortPathNameA
lstrcpynA
lstrlenA
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetACP
GetLocaleInfoA
GetSystemTimeAsFileTime
HeapDestroy
HeapReAlloc
HeapSize
DebugBreak
GetStartupInfoA
ExitProcess
VirtualProtect
GetSystemInfo
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetLastError
SetRect
AdjustWindowRectEx
SystemParametersInfoA
ShowWindow
GetWindowRect
GetTopWindow
OffsetRect
SendDlgItemMessageA
IsDialogMessageA
LoadImageA
GetSystemMetrics
IsIconic
MapWindowPoints
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetClassNameA
DestroyAcceleratorTable
BeginPaint
SetCapture
IsChild
GetParent
ReleaseCapture
GetClientRect
GetFocus
GetWindowTextA
CharUpperBuffA
GetDlgItem
SetFocus
SetWindowTextA
CallWindowProcA
SetWindowLongA
UnregisterClassA
FillRect
DestroyWindow
CreateDialogIndirectParamA
SetWindowPos
IsWindow
InvalidateRect
SendMessageA
GetClassInfoExA
CreateWindowExA
SetWindowContextHelpId
BringWindowToTop
CreateAcceleratorTableA
EndPaint
MapDialogRect
SetForegroundWindow
LoadCursorA
AttachThreadInput
CharNextA
RegisterClassExA
RedrawWindow
GetDC
GetWindowThreadProcessId
ReleaseDC
GetForegroundWindow
GetDesktopWindow
DefWindowProcA
ClientToScreen
ScreenToClient
PostMessageA
wsprintfA
PostQuitMessage
wvsprintfA
SetTimer
MoveWindow
RegisterWindowMessageA
GetSysColor
KillTimer
GetWindowLongA
GetWindowTextLengthA
InvalidateRgn
GetWindow
DeleteObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
GetStockObject
GetObjectA
BitBlt
SelectObject
GetDeviceCaps
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
SHFileOperationA
ShellExecuteExA
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
StringFromGUID2
CoFreeUnusedLibraries
CoCreateGuid
CoGetClassObject
CreateBindCtx
CoCreateInstance
OleInitialize
OleLockRunning
CoUninitialize
CoInitialize
CoTaskMemRealloc
CreateStreamOnHGlobal
VariantInit
VarI4FromStr
VarUI4FromStr
OleCreateFontIndirect
SysStringLen
SysAllocStringLen
SysStringByteLen
SysFreeString
SysAllocString
VariantClear
DispCallFunc
LoadRegTypeLi
LoadTypeLi
PathGetArgsA
PathRemoveFileSpecA
CreateAsyncBindCtx
RegisterBindStatusCallback
CreateURLMoniker
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\Projects\1\dt\panel\Release\DaemonPlugin.pdb
ord1
ord20
ord18
ord5
ord19
ord10
ord17
ord23
ord7
ord48
ord4
ord16
ord12
ord22
ord9
WinHttpOpenRequest
WinHttpSendRequest
WinHttpWriteData
WinHttpConnect
WinHttpOpen
WinHttpCloseHandle
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSetCredentials
InterlockedExchange
CompareStringA
GetLocaleInfoW
EnumResourceLanguagesW
ConvertDefaultLocale
GlobalGetAtomNameW
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
GetProfileIntW
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GlobalFlags
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetCommandLineA
RtlUnwind
ExitProcess
HeapSize
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetExitCodeProcess
CreateProcessW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetEnvironmentVariableW
lstrcmpA
GetModuleHandleA
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
CopyFileW
GlobalSize
MulDiv
GlobalFree
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GlobalMemoryStatus
GetThreadTimes
GetProcessTimes
GetProcessWorkingSetSize
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
LoadLibraryA
VirtualLock
Sleep
VirtualUnlock
GetCurrentProcess
GetFileSize
CreateFileW
GetVolumeInformationW
GetDriveTypeW
GlobalUnlock
GlobalLock
GlobalAlloc
FindClose
FindNextFileW
FindFirstFileW
GetPrivateProfileIntW
DeleteAtom
GlobalAddAtomW
DeviceIoControl
GetSystemDirectoryA
CreateFileA
FindFirstChangeNotificationW
ResetEvent
WaitForSingleObject
FindCloseChangeNotification
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
CreateMutexW
LocalAlloc
SetEvent
WideCharToMultiByte
GetLogicalDrives
LocalFree
CreateThread
CloseHandle
CreateEventW
GetCommandLineW
FormatMessageW
lstrlenW
DeleteCriticalSection
CreateDirectoryW
lstrcmpiW
GetPrivateProfileStringW
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
WritePrivateProfileStringW
FreeLibrary
RaiseException
LoadLibraryExW
InitializeCriticalSection
MultiByteToWideChar
LoadLibraryW
lstrlenA
GetLastError
SetLastError
GetVersion
FreeResource
GetCPInfo
InterlockedDecrement
InterlockedIncrement
GetLocaleInfoA
GetModuleFileNameA
GetSystemInfo
GetModuleHandleW
GetVersionExW
GetProcAddress
GetPrivateProfileStringA
GetUserDefaultLCID
GetVersionExA
FindResourceW
LoadResource
LockResource
SizeofResource
SendDlgItemMessageA
CheckMenuItem
EnableMenuItem
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowDC
BeginPaint
EndPaint
InflateRect
DestroyMenu
GetWindowThreadProcessId
ValidateRect
PostQuitMessage
ShowOwnedPopups
TranslateAcceleratorW
SetMenu
BringWindowToTop
InsertMenuItemW
LoadAcceleratorsW
LoadMenuW
ReuseDDElParam
UnpackDDElParam
CharUpperW
WindowFromPoint
UnregisterClassW
GetMenu
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DeferWindowPos
DefWindowProcW
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
GetWindowTextLengthW
GetWindowTextW
IsWindowEnabled
GetDlgCtrlID
IsDialogMessageW
SetDlgItemTextW
GetWindow
GetActiveWindow
GetClipboardOwner
GetClipboardViewer
GetInputState
UnregisterClassA
GetMessageTime
GetOpenClipboardWindow
GetProcessWindowStation
GetQueueStatus
GetCaretPos
CallNextHookEx
UnhookWindowsHookEx
WinHelpW
DialogBoxParamA
SetFocus
SetParent
SetRectEmpty
IsRectEmpty
OffsetRect
SetWindowTextW
IsWindowVisible
GetAsyncKeyState
GetForegroundWindow
SetForegroundWindow
IsWindow
GetIconInfo
PtInRect
ClientToScreen
GetCapture
LoadCursorW
SetCursor
SetCapture
ReleaseCapture
DrawFocusRect
RemovePropW
CallWindowProcW
GetPropW
SetPropW
PostMessageW
ScreenToClient
ShowWindow
SetDlgItemTextA
GetDlgItem
SendDlgItemMessageW
MoveWindow
GetParent
RegisterWindowMessageW
SetWindowLongW
EndDialog
GetDlgItemTextW
GetWindowLongW
LoadStringW
DialogBoxParamW
wsprintfW
DispatchMessageW
TranslateMessage
DestroyWindow
KillTimer
GetMessageW
SetTimer
CreateWindowExW
SetWindowPos
UpdateWindow
GetCursorPos
CharNextW
InvalidateRect
LoadIconW
MessageBoxW
LoadImageW
GetMenuItemInfoW
CreatePopupMenu
GetMenuItemCount
AppendMenuW
CreateMenu
GetSubMenu
ReleaseDC
GetMenuItemID
GetDC
GrayStringW
GetMenuState
DestroyIcon
SetRect
DrawTextExW
GetSysColorBrush
GetSysColor
FillRect
DrawTextW
DrawIconEx
TabbedTextOutW
SetWindowsHookExW
GetClassLongW
GetClassNameW
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
PeekMessageW
MapWindowPoints
SystemParametersInfoW
CopyRect
ModifyMenuW
TrackPopupMenu
GetKeyState
IsCharAlphaNumericW
DrawEdge
GetSystemMetrics
wsprintfA
LoadBitmapW
GetDesktopWindow
GetClientRect
GetWindowRect
SendMessageW
EnableWindow
GetFocus
GetMessagePos
LineTo
MoveToEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
CreatePatternBrush
SetBkMode
RestoreDC
SetTextColor
GetStockObject
Rectangle
GetTextExtentPoint32W
Escape
DeleteDC
DeleteObject
GetDeviceCaps
CreateSolidBrush
BitBlt
SetPixel
SelectObject
CreateDIBSection
GetPixel
CreateCompatibleDC
CreateFontIndirectW
GetObjectW
ExtTextOutW
CreateCompatibleBitmap
TextOutW
CreatePen
PatBlt
Ellipse
RectVisible
PtVisible
GetBkMode
SaveDC
CreateBitmap
SetBkColor
GetClipBox
CopyMetaFileW
DPtoLP
StretchBlt
GetBitmapBits
SetMapMode
GetFileTitleW
GetOpenFileNameW
DocumentPropertiesW
ClosePrinter
OpenPrinterW
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
CryptGenRandom
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegSetValueExA
InitializeSecurityDescriptor
SetEntriesInAclW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetFolderPathW
DragQueryFileW
ShellExecuteExA
ShellExecuteW
DragFinish
ShellExecuteExW
ImageList_GetIconSize
_TrackMouseEvent
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
CoCreateGuid
CreateClassMoniker
GetRunningObjectTable
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitializeEx
StringFromGUID2
CoCreateInstance
RevokeDragDrop
RegisterDragDrop
CreateStreamOnHGlobal
DoDragDrop
OleDuplicateData
ReleaseStgMedium
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SysStringLen
VarBstrCmp
SysFreeString
LoadTypeLi
LoadRegTypeLi
SysAllocString
A0DB34FC6FE35D429A28ADDE5467D4D7
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PfcGetToc
PfcFreeToc
WideCharToMultiByte
IsBadReadPtr
DisableThreadLibraryCalls
ImagePluginClose
ImagePluginGetInfo
ImagePluginGetVersion
ImagePluginOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CM_Get_Child
CM_Get_Sibling
CM_Get_Device_IDW
CM_Locate_DevNodeW
CM_Get_DevNode_Status
CMP_WaitNoPendingInstallEvents
SetupDiDeleteDevRegKey
SetupDiGetDeviceRegistryPropertyW
SetupDiSetSelectedDevice
SetupDiSetClassInstallParamsA
SetupDiDestroyDeviceInfoList
SetupDiOpenDeviceInfoW
SetupDiCreateDeviceInfoList
SetupDiRemoveDevice
wnsprintfW
LocalAlloc
Sleep
IsBadReadPtr
GetModuleFileNameW
GetPrivateProfileIntW
GetPrivateProfileStringW
MultiByteToWideChar
VirtualFree
FreeLibrary
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetCurrentProcess
GetProcAddress
GetModuleHandleA
LoadLibraryW
VirtualAlloc
LoadLibraryExW
SetCurrentDirectoryW
GetCurrentDirectoryW
ReleaseMutex
WaitForSingleObject
GetLastError
VirtualUnlock
VirtualLock
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatus
GetProcessHeap
GetCurrentThreadId
GetCurrentThread
CompareStringA
HeapSize
SetEndOfFile
FlushFileBuffers
GetTimeZoneInformation
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSection
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
CreateMutexA
LocalFree
CloseHandle
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringA
WideCharToMultiByte
FreeEnvironmentStringsA
CreateFileW
CreateFileA
GetModuleFileNameA
ExitProcess
HeapReAlloc
HeapCreate
HeapDestroy
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetFullPathNameW
RemoveDirectoryW
CreateDirectoryW
SetEnvironmentVariableW
FindFirstFileW
FindNextFileW
MoveFileW
GetFullPathNameA
RemoveDirectoryA
CreateDirectoryA
GetDriveTypeA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFilePointer
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
MoveFileA
DeleteFileA
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
HeapFree
HeapAlloc
RtlUnwind
RaiseException
GetCommandLineA
GetVersionExA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
SetStdHandle
CompareStringW
GetActiveWindow
GetCapture
GetClipboardOwner
GetDesktopWindow
GetFocus
GetInputState
GetMessagePos
GetMessageTime
GetOpenClipboardWindow
GetProcessWindowStation
GetQueueStatus
GetCaretPos
GetCursorPos
RegisterWindowMessageA
LoadStringW
BroadcastSystemMessageA
GetClipboardViewer
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
CheckTokenMembership
RegCloseKey
RegQueryValueExA
CryptGenRandom
RegCreateKeyExA
RegDeleteKeyW
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
FreeSid
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\Projects\1\dt\panel\Release\DAEMONPanel.pdb
IsDebuggerPresent
HeapReAlloc
RtlUnwind
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
GetProcessHeap
HeapAlloc
HeapFree
GetFileTime
GetFileAttributesW
FileTimeToLocalFileTime
SetErrorMode
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
FileTimeToSystemTime
GetThreadLocale
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GlobalGetAtomNameW
WritePrivateProfileStringW
InterlockedIncrement
GetTickCount
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GetCurrentProcessId
lstrcmpA
WideCharToMultiByte
InterlockedDecrement
GlobalFree
GlobalAlloc
FormatMessageW
LocalFree
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleA
FindClose
FindNextFileW
FindFirstFileW
GetCurrentThreadId
CloseHandle
ReadFile
GetFileSize
CreateFileW
CreateMutexW
FreeLibrary
InitializeCriticalSection
lstrcmpiW
ReleaseMutex
LoadLibraryExW
RaiseException
DeleteCriticalSection
EnterCriticalSection
GetModuleFileNameW
lstrlenW
LeaveCriticalSection
SizeofResource
MultiByteToWideChar
lstrlenA
GetProcAddress
GetVersionExW
GetModuleHandleW
LoadLibraryW
GetVersion
GetLastError
GetCPInfo
SetLastError
LockResource
FreeResource
LoadResource
GetSystemTimeAsFileTime
FindResourceW
GetNextDlgGroupItem
MessageBeep
CharUpperW
TranslateAcceleratorW
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatW
ShowWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
ShowOwnedPopups
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextW
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetMenu
CreateWindowExW
InvalidateRgn
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetDlgCtrlID
CallWindowProcW
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
ValidateRect
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
DestroyMenu
IntersectRect
InflateRect
EndPaint
BeginPaint
GetWindowDC
SetRectEmpty
SetWindowLongW
LoadCursorW
SetCursor
KillTimer
PostQuitMessage
PeekMessageW
UnhookWindowsHookEx
SetForegroundWindow
SetWindowsHookExW
GetCursorPos
AnimateWindow
CallNextHookEx
GetWindowInfo
ScreenToClient
WindowFromPoint
SetMenuDefaultItem
SetWindowPos
SetTimer
GetParent
PostMessageW
ReleaseCapture
SetCapture
UpdateWindow
InvalidateRect
IsRectEmpty
CopyAcceleratorTableW
PostThreadMessageW
UnregisterClassW
UnpackDDElParam
ReuseDDElParam
PtInRect
GetWindowRect
ClientToScreen
GetCapture
LoadMenuW
LoadAcceleratorsW
InsertMenuItemW
BringWindowToTop
GetClassInfoExW
SetMenu
RegisterWindowMessageW
EnableWindow
CharNextW
IsWindow
LoadIconW
GetDesktopWindow
SendMessageW
MoveWindow
GetClientRect
GetDC
GetMenuState
LoadBitmapW
GetSystemMetrics
DestroyIcon
SetRect
DrawIconEx
GetSysColor
GetSubMenu
SystemParametersInfoW
ModifyMenuW
CreatePopupMenu
GetMenuItemInfoW
GrayStringW
GetSysColorBrush
CreateMenu
GetMenuItemCount
FillRect
DrawEdge
AppendMenuW
DrawTextExW
DrawTextW
GetMenuItemID
ReleaseDC
TabbedTextOutW
CopyRect
DefWindowProcW
UnregisterClassA
LineTo
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
CreateBitmap
SetWindowOrgEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetClipBox
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
PatBlt
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetStockObject
StretchBlt
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetDeviceCaps
Ellipse
CreateFontIndirectW
CreatePen
DeleteDC
GetBkMode
Escape
DeleteObject
CreateSolidBrush
SetPixel
BitBlt
GetPixel
SelectObject
CreateDIBSection
CreateCompatibleBitmap
GetObjectW
CreateCompatibleDC
GetTextExtentPoint32W
MoveToEx
GetFileTitleW
DocumentPropertiesW
OpenPrinterW
ClosePrinter
RegSetValueExW
RegDeleteValueW
RegQueryValueW
RegEnumKeyW
RegQueryValueExW
RegOpenKeyW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
SHAppBarMessage
DragFinish
DragQueryFileW
Shell_NotifyIconW
InitCommonControlsEx
ImageList_GetIconSize
_TrackMouseEvent
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
OleUIBusyW
OleFlushClipboard
OleIsCurrentClipboard
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoRegisterMessageFilter
CoTaskMemAlloc
CoRegisterClassObject
CoTaskMemFree
CoInitialize
CoTaskMemRealloc
CoRevokeClassObject
StringFromGUID2
CoCreateInstance
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
RegisterTypeLi
VarUI4FromStr
UnRegisterTypeLi
SysAllocString
SysAllocStringByteLen
SysStringByteLen
LoadTypeLi
SysFreeString
SysStringLen
LoadRegTypeLi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RaiseException
GetModuleHandleA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetCommandLineA
HeapAlloc
WritePrivateProfileStringA
ExitProcess
TerminateProcess
HeapSize
GetTimeZoneInformation
GetACP
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapFree
GlobalFlags
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
DuplicateHandle
GlobalFree
GlobalAlloc
GlobalReAlloc
FindFirstFileA
FindClose
UnlockFile
LockFile
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVersion
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GetEnvironmentStrings
GlobalLock
SetFilePointer
SetEndOfFile
GetCurrentThread
GlobalDeleteAtom
GetLastError
LocalFree
GetCurrentThreadId
lstrcmpA
GetFileTime
InterlockedDecrement
GetFileAttributesA
WideCharToMultiByte
InterlockedIncrement
GetModuleFileNameA
lstrcmpiA
GetVolumeInformationA
GetFullPathNameA
lstrcpynA
MultiByteToWideChar
lstrcpyA
lstrlenA
LoadLibraryA
GetProcAddress
FlushFileBuffers
CloseHandle
CreateFileA
WriteFile
ReadFile
GetEnvironmentStringsW
GetCurrentProcess
GetEnvironmentVariableA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetFileSize
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsIconic
SystemParametersInfoA
GetWindowPlacement
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetSystemMetrics
CharUpperA
wsprintfA
LoadBitmapA
GetMenuCheckMarkDimensions
LoadStringA
DeleteObject
SaveDC
RestoreDC
GetStockObject
SelectObject
SetBkColor
SetTextColor
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
CreateBitmap
DeleteDC
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
ord17
PfcFreeToc
PfcGetToc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
GetVersionExA
OpenFile
FreeLibrary
GetProcAddress
LoadLibraryA
_lcreat
WinExec
_lopen
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
SetErrorMode
ExitProcess
_lwrite
GetLastError
lstrcatA
GlobalLock
FormatMessageA
LocalFree
lstrcpyA
GetTempPathA
GetWindowsDirectoryA
GetTempFileNameA
MulDiv
lstrlenA
_lread
_llseek
GlobalUnlock
GlobalFree
GlobalAlloc
_lclose
ExitWindowsEx
wsprintfA
CreateWindowExA
ShowWindow
SetWindowPos
UpdateWindow
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
MessageBoxA
BeginPaint
DrawTextA
EndPaint
InvalidateRect
PostQuitMessage
DefWindowProcA
GetDC
ReleaseDC
GetClientRect
SendMessageA
SetTextColor
SetBkMode
SelectObject
StretchDIBits
CreateFontA
TextOutA
RealizePalette
SelectPalette
CreatePalette
GetStockObject
DeleteObject
CreateSolidBrush
GetDeviceCaps
PatBlt
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ