dialog
initDialog
show
Overview
overview
8Static
static
32eb2d1d59b...18.exe
windows7-x64
82eb2d1d59b...18.exe
windows10-2004-x64
8$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$SYSDIR/wisdeskdc.dll
windows7-x64
3$SYSDIR/wisdeskdc.dll
windows10-2004-x64
3cspmc.dll
windows7-x64
3cspmc.dll
windows10-2004-x64
3paismmdrv.dll
windows7-x64
3paismmdrv.dll
windows10-2004-x64
3paismmdrv.dll
windows7-x64
3paismmdrv.dll
windows10-2004-x64
3paismmdrv.dll
windows7-x64
3paismmdrv.dll
windows10-2004-x64
3sismhelper2.dll
windows7-x64
3sismhelper2.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3widmsis.exe
windows7-x64
4widmsis.exe
windows10-2004-x64
4Static task
static1
Behavioral task
behavioral1
Sample
2eb2d1d59b8baec2477bd080c5b6ad9f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2eb2d1d59b8baec2477bd080c5b6ad9f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$SYSDIR/wisdeskdc.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$SYSDIR/wisdeskdc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cspmc.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
cspmc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
paismmdrv.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
paismmdrv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
paismmdrv.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
paismmdrv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
paismmdrv.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
paismmdrv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
sismhelper2.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
sismhelper2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
widmsis.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
widmsis.exe
Resource
win10v2004-20241007-en
Target
2eb2d1d59b8baec2477bd080c5b6ad9f_JaffaCakes118
Size
413KB
MD5
2eb2d1d59b8baec2477bd080c5b6ad9f
SHA1
1fe650e99709f8e77b05b722dccf39b354500660
SHA256
68f6ac49e24d5f013aa78c976bc385a2d226a9885b26a9f48dc0ea6c77dd879c
SHA512
78601d762e0181502ae3e08466d0094c49ca7ed4f20cb1a29e10b4d1d74ff265bc0200a74aaeb61f19783f3c702a4134dc7965046c095415f505dbcc600664a3
SSDEEP
6144:5shaFrwAhWeYVxQnAfIa3pwLIywKY1I4Aw4xsGS2OJZDwZo4yhZAdgxHqmZZ:oaFrwSGVxQ+6MLWshMZo4mZXxHZZZ
Checks for missing Authenticode signature.
resource |
---|
2eb2d1d59b8baec2477bd080c5b6ad9f_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/UAC.dll |
unpack001/$SYSDIR/wisdeskdc.dll |
unpack001/cspmc.dll |
unpack001/paismmdrv.dll.2000 |
unpack001/paismmdrv.dll.2003 |
unpack001/paismmdrv.dll.xp |
unpack001/paismmdrv.sys.2000 |
unpack001/paismmdrv.sys.2003 |
unpack001/paismmdrv.sys.xp |
unpack001/sismhelper2.dll |
unpack001/uninstall.exe |
unpack002/$PLUGINSDIR/UAC.dll |
unpack001/widmsis.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
static1/unpack001/uninstall.exe | nsis_installer_1 |
static1/unpack001/uninstall.exe | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GlobalAlloc
lstrlenA
lstrcpynA
GetVersionExA
lstrcmpiA
GetCurrentThreadId
LoadLibraryA
FreeLibrary
GetLastError
GetExitCodeProcess
WaitForSingleObject
DuplicateHandle
Sleep
GetCurrentProcessId
CreateThread
GetCommandLineA
OpenProcess
MultiByteToWideChar
FormatMessageA
LocalFree
GlobalFree
CloseHandle
SetLastError
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetModuleHandleA
SendMessageW
DialogBoxParamA
CharNextA
UnhookWindowsHookEx
CallNextHookEx
GetClassNameA
SetWindowsHookExA
SendMessageTimeoutA
WaitForInputIdle
DefWindowProcA
PostMessageA
GetLastActivePopup
PostQuitMessage
SetForegroundWindow
DispatchMessageA
GetMessageA
CreateWindowExA
RegisterClassA
UnregisterClassA
GetWindowTextA
TranslateMessage
IsDialogMessageA
PeekMessageA
MsgWaitForMultipleObjects
IsWindow
GetWindowThreadProcessId
MessageBoxA
SetWindowLongA
LoadImageA
DestroyWindow
GetWindowLongA
EnableWindow
ShowWindow
SetWindowTextA
wsprintfA
GetDlgItem
SendMessageA
LoadStringA
EndDialog
RegCloseKey
QueryServiceStatus
OpenServiceA
CloseServiceHandle
OpenSCManagerA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
ShellExecuteExA
CoInitialize
CoUninitialize
Exec
ExecCodeSegment
ExecWait
GetElevationType
GetOuterHwnd
GetShellFolderPath
IsAdmin
RunElevated
ShellExec
ShellExecWait
StackPush
SupportsUAC
Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Devels\Monitor\Bins\wisdeskdc.pdb
SetEvent
CreateProcessA
UnmapViewOfFile
GetCurrentThreadId
ResetEvent
MapViewOfFile
CreateFileMappingA
SetThreadPriority
GetCurrentThread
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
GetShortPathNameA
FreeLibraryAndExitThread
TerminateThread
CreateThread
GetModuleFileNameA
GetVersionExA
LoadLibraryA
FormatMessageA
GetProcAddress
FlushFileBuffers
CreateFileA
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LocalAlloc
GetCurrentProcessId
OpenEventA
lstrlenW
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
OpenProcess
GetCurrentProcess
DuplicateHandle
CreateEventA
CloseHandle
GetLastError
LocalFree
lstrlenA
MultiByteToWideChar
GetPrivateProfileIntA
WritePrivateProfileStringA
GetTickCount
Sleep
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
GetSystemMetrics
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetDesktopWindow
GetDC
ReleaseDC
GetThreadDesktop
GetUserObjectInformationA
GetCursorInfo
DrawIcon
RegisterWindowMessageA
PostMessageA
wsprintfW
EnumDisplayDevicesA
EnumDisplaySettingsA
ChangeDisplaySettingsA
wsprintfA
SetCursorPos
GetCursorPos
CreateDIBSection
SelectObject
BitBlt
DeleteObject
CreateDCA
DeleteDC
CreateCompatibleDC
RegCreateKeyA
GetUserNameA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
SetEntriesInAclA
SetSecurityInfo
RegDeleteValueA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
MSWinLeventMngment
MSWinLoffMngment
SetWinName
WinSysSet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Devels\Monitor\Bins\cspmc.pdb
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord3830
ord762
ord784
ord781
ord2322
ord310
ord1482
ord297
ord2468
ord876
ord5403
ord1024
ord2018
ord5583
ord3806
ord1010
ord6754
ord765
ord315
ord1084
ord1037
ord1092
ord1206
ord1208
ord1098
ord371
ord1917
ord1167
ord1120
ord1201
ord1175
ord1177
ord314
ord1209
ord581
ord5102
ord6219
ord5382
ord3832
ord764
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord3683
ord304
ord578
?terminate@@YAXXZ
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_malloc_crt
_except_handler4_common
_decode_pointer
_onexit
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_stricmp
??0exception@std@@QAE@XZ
__CxxFrameHandler3
free
malloc
memcpy
_invalid_parameter_noinfo
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
atoi
realloc
atol
_encoded_null
_crt_debugger_hook
??1exception@std@@UAE@XZ
__clean_type_info_names_internal
_lock
_encode_pointer
__dllonexit
_unlock
GetVersionExA
InterlockedExchange
lstrlenA
ResumeThread
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
EnterCriticalSection
LeaveCriticalSection
Sleep
DeleteCriticalSection
InitializeCriticalSection
LocalFree
LocalAlloc
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetLocaleInfoA
GetThreadLocale
MessageBoxA
RegisterWindowMessageA
CoUninitialize
CoCreateInstance
CoInitialize
SysAllocString
VariantInit
SysFreeString
VariantClear
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
ADDPM
CLEARPM
DELPM
FREEPM
GETPM
INITPM
UNINITPM
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\WINDDK\3790.1830\src\video\displays\mirror\disp\objfre_w2K_x86\i386\paismmdrv.pdb
EngDebugPrint
EngFreeMem
EngCreateSemaphore
EngDebugBreak
EngAllocMem
EngDeleteSemaphore
EngReleaseSemaphore
EngAcquireSemaphore
EngLockSurface
EngCreateBitmap
EngUnmapFile
EngDeleteSurface
EngUnlockSurface
EngAssociateSurface
EngCreateDeviceSurface
EngDeletePalette
EngCopyBits
EngBitBlt
EngStrokePath
EngTextOut
EngMovePointer
EngMapFile
EngCreatePalette
EngFindImageProcAddress
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\winddk\7600.16385.0\src\video\displays\mirror\disp\objfre_wnet_x86\i386\paismmdrv.pdb
EngDebugPrint
EngFreeMem
EngCreateSemaphore
EngDebugBreak
EngAllocMem
EngDeleteSemaphore
EngReleaseSemaphore
EngAcquireSemaphore
EngLockSurface
EngCreateBitmap
EngUnmapFile
EngDeleteSurface
EngUnlockSurface
EngAssociateSurface
EngCreateDeviceSurface
EngDeletePalette
EngCopyBits
EngBitBlt
EngStrokePath
EngTextOut
EngMovePointer
EngMapFile
EngCreatePalette
EngBugCheckEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\winddk\7600.16385.0\src\video\displays\mirror\disp\objfre_wxp_x86\i386\paismmdrv.pdb
EngDebugPrint
EngFreeMem
EngCreateSemaphore
EngDebugBreak
EngAllocMem
EngDeleteSemaphore
EngReleaseSemaphore
EngAcquireSemaphore
EngLockSurface
EngCreateBitmap
EngUnmapFile
EngDeleteSurface
EngUnlockSurface
EngAssociateSurface
EngCreateDeviceSurface
EngDeletePalette
EngCopyBits
EngBitBlt
EngStrokePath
EngTextOut
EngMovePointer
EngMapFile
EngCreatePalette
EngBugCheckEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
D:\WINDDK\3790.1830\src\video\displays\mirror\mini\objfre_w2K_x86\i386\paismmdrv.pdb
KeTickCount
VideoPortZeroMemory
VideoPortInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\winddk\7600.16385.0\src\video\displays\mirror\mini\objfre_wnet_x86\i386\paismmdrv.pdb
KeTickCount
VideoPortZeroMemory
VideoPortInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\winddk\7600.16385.0\src\video\displays\mirror\mini\objfre_wxp_x86\i386\paismmdrv.pdb
KeTickCount
VideoPortZeroMemory
VideoPortInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
GetTickCount
GetVersionExA
GetProcAddress
LoadLibraryA
CreateProcessA
GetShortPathNameA
WaitForSingleObject
CompareStringW
CompareStringA
GetTimeZoneInformation
FlushFileBuffers
CreateFileA
GetLocaleInfoW
CloseHandle
ReleaseSemaphore
GetCurrentProcessId
CreateSemaphoreA
OpenSemaphoreA
CreateEventA
SetEvent
OpenEventA
GetCurrentThreadId
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
GetCurrentThread
RtlUnwind
VirtualQuery
ExitProcess
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapSize
SetEnvironmentVariableA
CallNextHookEx
GetKeyState
GetKeyNameTextA
UnhookWindowsHookEx
SetWindowsHookExA
SetSecurityDescriptorDacl
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
InitializeSecurityDescriptor
Cherish
CherishEnd
CherishKey
CherishMouseTrack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GlobalAlloc
lstrlenA
lstrcpynA
GetVersionExA
lstrcmpiA
GetCurrentThreadId
LoadLibraryA
FreeLibrary
GetLastError
GetExitCodeProcess
WaitForSingleObject
DuplicateHandle
Sleep
GetCurrentProcessId
CreateThread
GetCommandLineA
OpenProcess
MultiByteToWideChar
FormatMessageA
LocalFree
GlobalFree
CloseHandle
SetLastError
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetModuleHandleA
SendMessageW
DialogBoxParamA
CharNextA
UnhookWindowsHookEx
CallNextHookEx
GetClassNameA
SetWindowsHookExA
SendMessageTimeoutA
WaitForInputIdle
DefWindowProcA
PostMessageA
GetLastActivePopup
PostQuitMessage
SetForegroundWindow
DispatchMessageA
GetMessageA
CreateWindowExA
RegisterClassA
UnregisterClassA
GetWindowTextA
TranslateMessage
IsDialogMessageA
PeekMessageA
MsgWaitForMultipleObjects
IsWindow
GetWindowThreadProcessId
MessageBoxA
SetWindowLongA
LoadImageA
DestroyWindow
GetWindowLongA
EnableWindow
ShowWindow
SetWindowTextA
wsprintfA
GetDlgItem
SendMessageA
LoadStringA
EndDialog
RegCloseKey
QueryServiceStatus
OpenServiceA
CloseServiceHandle
OpenSCManagerA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
ShellExecuteExA
CoInitialize
CoUninitialize
Exec
ExecCodeSegment
ExecWait
GetElevationType
GetOuterHwnd
GetShellFolderPath
IsAdmin
RunElevated
ShellExec
ShellExecWait
StackPush
SupportsUAC
Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WSASocketA
getpeername
closesocket
ioctlsocket
WSAIoctl
getservbyport
inet_addr
gethostbyaddr
connect
setsockopt
getservbyname
WSASetLastError
select
htonl
gethostbyname
htons
socket
WSACleanup
WSAStartup
accept
listen
getsockname
bind
sendto
ntohs
recvfrom
shutdown
recv
send
inet_ntoa
WSAGetLastError
capGetDriverDescriptionA
capCreateCaptureWindowA
mixerGetLineControlsA
waveInPrepareHeader
waveInAddBuffer
waveInOpen
waveInStart
waveInGetDevCapsA
waveInGetNumDevs
mixerClose
mixerSetControlDetails
mixerGetControlDetailsA
waveInUnprepareHeader
mixerGetLineInfoA
mixerOpen
waveInClose
waveInStop
waveInReset
ShellExecuteExA
ExtEscape
CreateDCA
SetBkMode
CreateSolidBrush
CreateFontA
SetTextColor
GetDeviceCaps
CreateCompatibleDC
CreateDIBSection
SelectObject
DeleteDC
DeleteObject
BitBlt
SetupDiCreateDeviceInfoList
SetupDiSetClassInstallParamsA
CM_Get_Device_ID_ExA
SetupDiGetDeviceInfoListDetailA
SetupDiGetDeviceInstallParamsA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiGetINFClassA
SetupDiCreateDeviceInfoA
SetupDiSetDeviceRegistryPropertyA
SetupDiCallClassInstaller
SetupDiDestroyDeviceInfoList
GetConsoleCP
WriteFile
ReadFile
GetConsoleMode
RtlUnwind
ExitProcess
GetCommandLineA
GetStartupInfoA
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
HeapReAlloc
SetFilePointer
GetSystemTimeAsFileTime
GetStdHandle
Sleep
GetShortPathNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetPriorityClass
SetThreadPriority
GetCurrentThread
DeleteFileA
GetTickCount
TerminateThread
CloseHandle
UnhandledExceptionFilter
GetCurrentProcess
GetModuleFileNameA
GetComputerNameA
OpenEventA
SetEvent
GetModuleHandleA
CreateMutexA
GetLastError
ReleaseMutex
GetWindowsDirectoryA
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
FindFirstFileA
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentThreadId
RaiseException
lstrlenA
GetProfileStringA
WriteProfileStringA
WaitForSingleObject
lstrcpynA
CreateProcessA
lstrcpyA
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
LoadLibraryA
FormatMessageA
LocalFree
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
ResetEvent
CreateEventA
FreeLibrary
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcessId
OpenSemaphoreA
ReleaseSemaphore
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
LocalAlloc
TerminateProcess
SetErrorMode
GetVersionExA
GetSystemDirectoryA
WritePrivateProfileStringA
GetPrivateProfileIntA
CreateFileA
CreateFileMappingA
GetFullPathNameA
CompareStringA
InterlockedExchange
SetLastError
GetACP
GetLocaleInfoA
GetThreadLocale
SetUnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
GetFileType
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapSize
WriteConsoleA
GetConsoleOutputCP
GetOEMCP
LCMapStringA
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
QueryPerformanceCounter
SetEndOfFile
GetStringTypeA
GetTimeZoneInformation
CreateThread
SetEnvironmentVariableA
ChangeDisplaySettingsExA
wsprintfA
ChangeDisplaySettingsA
RegisterClassExA
CreateWindowExA
EnumDisplayDevicesA
GetThreadDesktop
SetCursorPos
SystemParametersInfoA
GetCursorPos
IsIconic
AttachThreadInput
GetWindowThreadProcessId
KillTimer
IsWindow
EndDialog
SetFocus
GetWindowTextA
MessageBoxA
DialogBoxParamA
ShowWindow
GetDlgItem
PostQuitMessage
SetWindowTextA
PostMessageA
GetDlgCtrlID
SetTimer
SetWindowPos
BringWindowToTop
SetForegroundWindow
LoadIconA
SendMessageA
ExitWindowsEx
DispatchMessageA
GetMessageA
RegisterWindowMessageA
CreateDialogParamA
DefWindowProcA
keybd_event
BlockInput
FindWindowA
DrawIcon
GetCursorInfo
DestroyWindow
CloseDesktop
SetThreadDesktop
OpenInputDesktop
MoveWindow
ReleaseDC
GetSystemMetrics
GetDC
GetDesktopWindow
GetForegroundWindow
EnumDisplaySettingsA
OpenProcessToken
AdjustTokenPrivileges
GetUserNameA
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
RegDeleteValueA
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
AllocateAndInitializeSid
SetEntriesInAclA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
OpenServiceA
LookupPrivilegeValueA
QueryServiceStatus
ControlService
DeleteService
StartServiceA
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
ImpersonateSelf
OpenThreadToken
SetSecurityDescriptorGroup
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
SysFreeString
VariantClear
SysStringLen
SysAllocString
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ