dialog
initDialog
show
Overview
overview
7Static
static
73d0047fff2...18.exe
windows7-x64
73d0047fff2...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nk.dll
windows7-x64
3$PLUGINSDI...nk.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDI...tp.dll
windows7-x64
3$PLUGINSDI...tp.dll
windows10-2004-x64
3�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1�...��.exe
windows7-x64
6�...��.exe
windows10-2004-x64
6Behavioral task
behavioral1
Sample
3d0047fff2f917e95a568f57a323aaa8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d0047fff2f917e95a568f57a323aaa8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/rfshdktp.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/rfshdktp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
IE ɱ.url
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
IE ɱ.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
֮.exe
Resource
win7-20240903-en
Target
3d0047fff2f917e95a568f57a323aaa8_JaffaCakes118
Size
629KB
MD5
3d0047fff2f917e95a568f57a323aaa8
SHA1
277f974f11474f90aef0b443c4fdb892932f30a8
SHA256
7a8d168bb1256401fdac6fa662956a1e7c01e2f399bba8b193081e588869af9c
SHA512
62054913fa92529c66a90f2bbccc44214d9812da05ba531a6ecdfea739ed724b500ddadbae04433f785571eb9adf2a478c8acf1a5c1518025ef0976368db438a
SSDEEP
12288:uoEH4yZgUGuHIn0YPq0WvSTWs8wt5ETXlFo0/JgBlMDZWseMaF8ZRC:uo04yZg4ILq0v8wt5ETVq0/+M89MDZ4
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/nsRandom.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/nsRandom.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
3d0047fff2f917e95a568f57a323aaa8_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/ShellLink.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/locate.dll |
unpack001/$PLUGINSDIR/nsRandom.dll |
unpack002/out.upx |
unpack001/$PLUGINSDIR/rfshdktp.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
MultiByteToWideChar
wsprintfA
CoCreateInstance
GetShortCutArgs
GetShortCutDescription
GetShortCutHotkey
GetShortCutIconIndex
GetShortCutIconLocation
GetShortCutShowMode
GetShortCutTarget
GetShortCutWorkingDirectory
SetShortCutArgs
SetShortCutDescription
SetShortCutHotkey
SetShortCutIconIndex
SetShortCutIconLocation
SetShortCutShowMode
SetShortCutTarget
SetShortCutWorkingDirectory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcatA
lstrcpynA
lstrcmpA
lstrlenA
GlobalAlloc
GlobalFree
lstrcmpiA
CompareFileTime
lstrcpyA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
FileTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
SendMessageA
wsprintfA
GetDlgItem
FindWindowExA
CharUpperA
_Close
_Find
_GetSize
_Open
_RMDirEmpty
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetRandom
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHGetSpecialFolderLocation
SHChangeNotify
refreshDesktop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
midiStreamClose
WSAGetLastError
ImmNotifyIME
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
ImmDisableIME
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
ReadFile
GetFileSize
TlsSetValue
GetVersionExW
DeviceIoControl
GetTempFileNameW
OpenProcess
GlobalFree
LockResource
SizeofResource
LoadResource
FindResourceW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetWindowsDirectoryW
HeapFree
HeapAlloc
GetProcessHeap
SetErrorMode
LocalFree
TerminateThread
GetExitCodeThread
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
SetLastError
CancelWaitableTimer
SetWaitableTimer
CreateWaitableTimerW
GetDiskFreeSpaceExW
SetEndOfFile
SetFilePointer
WriteFile
TlsAlloc
GetFileAttributesW
GetSystemDefaultLangID
GetUserDefaultLangID
EnumResourceLanguagesW
GetVersion
FreeResource
GetProcAddress
LocalAlloc
ExitProcess
SetUnhandledExceptionFilter
SetProcessWorkingSetSize
TerminateProcess
LoadLibraryExW
GlobalDeleteAtom
GlobalAddAtomW
CreateSemaphoreW
ReleaseSemaphore
FlushInstructionCache
TlsGetValue
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcessId
GetCommandLineW
lstrcmpW
VirtualProtect
GetCurrentProcess
ReadProcessMemory
WriteProcessMemory
GetLongPathNameW
GetFileTime
SetFileTime
GetLastError
WaitForMultipleObjects
FindNextChangeNotification
GetStartupInfoA
GetModuleHandleA
FreeLibrary
TlsFree
LoadLibraryW
GetCurrentThreadId
GetModuleHandleW
CreateDirectoryW
lstrlenW
FindClose
FindNextFileW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetShortPathNameW
FindFirstFileW
GetModuleFileNameW
InterlockedDecrement
CloseHandle
DeleteFileW
Sleep
GlobalUnlock
GlobalLock
GlobalAlloc
WideCharToMultiByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
lstrlenA
GetTickCount
MultiByteToWideChar
GetTempPathW
lstrcatW
GetLocaleInfoW
WaitForSingleObject
CopyFileW
VirtualQuery
RemoveDirectoryW
CreateMutexW
ReleaseMutex
GetSystemDirectoryW
IsBadWritePtr
IsBadReadPtr
MoveFileExW
MoveFileW
ExpandEnvironmentStringsW
CreateFileW
SystemTimeToFileTime
GetSystemTime
SetFileAttributesW
GetPrivateProfileIntW
lstrcmpiW
ResetEvent
SetEvent
CreateEventW
FindFirstChangeNotificationW
FindCloseChangeNotification
PostQuitMessage
IsMenu
GetMenuStringW
GetMenuItemID
keybd_event
MapVirtualKeyW
CheckMenuRadioItem
SubtractRect
EndMenu
IsChild
EnumChildWindows
IntersectRect
RemoveMenu
SetCursorPos
DialogBoxParamW
LoadImageW
SetWindowPos
GetWindowRect
ShowWindow
SetWindowLongW
GetDlgItem
SendMessageW
LoadStringW
SetWindowTextW
GetWindowTextW
PostMessageW
IsIconic
SetFocus
MessageBoxW
IsWindowVisible
UnhookWindowsHookEx
SetWindowsHookExW
SetPropW
ScreenToClient
RemovePropW
GetPropW
CheckDlgButton
EnableWindow
CreateWindowExW
IsWindow
InflateRect
CallNextHookEx
MenuItemFromPoint
SystemParametersInfoW
SetParent
SetActiveWindow
CopyIcon
DrawIconEx
MoveWindow
RegisterClassExW
CopyImage
GetForegroundWindow
CloseClipboard
DestroyIcon
SetClipboardData
CopyRect
GetClientRect
EndPaint
GetSysColor
IsDlgButtonChecked
DrawEdge
DrawTextW
FillRect
BeginPaint
DestroyWindow
SetForegroundWindow
GetParent
DefWindowProcW
ReleaseDC
GetDC
OffsetRect
CallWindowProcW
GetWindowLongW
GetComboBoxInfo
PtInRect
GetCursorPos
GetKeyState
InvalidateRect
GetWindowTextLengthW
GetSystemMetrics
RegisterClipboardFormatW
IsClipboardFormatAvailable
EnableMenuItem
GetSubMenu
LoadMenuW
GetAsyncKeyState
SetCursor
LoadCursorW
CharNextW
EmptyClipboard
OpenClipboard
InsertMenuW
IsWindowEnabled
GetKeyboardLayoutNameW
LoadKeyboardLayoutW
LoadAcceleratorsW
TranslateAcceleratorW
DestroyAcceleratorTable
CreateAcceleratorTableW
CopyAcceleratorTableW
GetKeyNameTextW
GetClipboardData
GetMonitorInfoW
MonitorFromWindow
SetRect
RegisterHotKey
UnregisterHotKey
WindowFromPoint
SetRectEmpty
TrackPopupMenu
TrackPopupMenuEx
GetWindowDC
GetMenuState
EqualRect
GetGUIThreadInfo
GetSystemMenu
EndDialog
GetMenuInfo
GetMenuItemInfoW
IsZoomed
SetWindowRgn
SetMenuInfo
GetMenuItemCount
CheckMenuItem
GetSysColorBrush
DestroyMenu
FindWindowW
GetWindowPlacement
SetWindowPlacement
TrackMouseEvent
UpdateWindow
RegisterWindowMessageW
GetWindowModuleFileNameW
SetMenuItemInfoW
EnumWindows
GetWindowThreadProcessId
FindWindowExW
GetMenu
SendMessageTimeoutW
EnumThreadWindows
GetClassNameW
GetMessagePos
SetCapture
ReleaseCapture
ShowCursor
KillTimer
ClientToScreen
SetTimer
RedrawWindow
GetFocus
DeleteMenu
GetAncestor
CreatePopupMenu
InsertMenuItemW
GetDlgItemTextW
LoadBitmapW
PeekMessageW
TranslateMessage
DispatchMessageW
CharUpperW
DdeGetData
DdeFreeDataHandle
DdeQueryStringW
DdeFreeStringHandle
DdeUninitialize
DdeInitializeW
DdeCreateStringHandleW
DdeNameService
GetMessageW
PostThreadMessageW
CharLowerW
SetDlgItemTextW
GetDesktopWindow
MapWindowPoints
LoadIconW
DrawIcon
CreateRectRgnIndirect
FillRgn
GetDIBits
CreateDIBSection
MoveToEx
LineTo
CreateRoundRectRgn
CombineRgn
CreateRectRgn
SelectClipRgn
GetObjectW
CreateFontIndirectW
CreatePatternBrush
SetBkColor
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
Rectangle
EnumFontsW
GetStockObject
SetTextColor
SetBkMode
SelectObject
CreateSolidBrush
DeleteObject
GetSaveFileNameW
ChooseColorW
GetOpenFileNameW
RegDeleteKeyW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
RegOpenKeyExW
RegCreateKeyW
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumKeyW
RegQueryInfoKeyW
RegSetKeySecurity
CopySid
RegCreateKeyExW
OpenProcessToken
GetTokenInformation
AddAce
Shell_NotifyIconW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetMalloc
DragQueryFileW
SHAppBarMessage
SHFreeNameMappings
SHChangeNotify
DoEnvironmentSubstW
SHFileOperationW
ShellExecuteW
SHGetSpecialFolderPathW
ExtractIconExW
SHGetFileInfoW
ShellExecuteExW
RevokeDragDrop
OleCreate
OleUninitialize
OleInitialize
CLSIDFromProgID
OleDraw
CoCreateGuid
CoGetInterfaceAndReleaseStream
CLSIDFromString
StringFromCLSID
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoUninitialize
ReleaseStgMedium
RegisterDragDrop
CoGetMalloc
DoDragDrop
CoInitialize
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
OleDuplicateData
CreateStreamOnHGlobal
CoTaskMemAlloc
OleRun
OleSetContainedObject
SysStringLen
SafeArrayAccessData
SafeArrayDestroy
SysAllocStringByteLen
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
SafeArrayCreateVector
HttpOpenRequestW
HttpSendRequestExW
InternetOpenW
InternetConnectW
InternetSetStatusCallbackW
InternetCloseHandle
InternetReadFileExA
InternetReadFile
HttpEndRequestW
FtpOpenFileW
InternetWriteFile
InternetGetLastResponseInfoW
FtpCommandW
InternetQueryOptionW
FtpGetFileSize
InternetCanonicalizeUrlW
FindFirstUrlCacheEntryW
UnlockUrlCacheEntryFileW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryA
UnlockUrlCacheEntryFileA
FindNextUrlCacheEntryA
FindCloseUrlCache
InternetSetOptionA
DeleteUrlCacheEntryA
DeleteUrlCacheEntryW
InternetCrackUrlW
GetUrlCacheEntryInfoW
CommitUrlCacheEntryW
CreateUrlCacheEntryW
HttpQueryInfoW
InternetGetConnectedState
InternetSetOptionW
PathFindFileNameW
UrlCombineW
PathMatchSpecW
UrlIsOpaqueW
StrStrIW
PathCombineW
PathFindExtensionW
PathGetDriveNumberW
PathIsDirectoryW
PathIsURLW
SHGetValueW
PathIsRootW
SHAutoComplete
UrlGetPartW
SHSetValueW
SHDeleteValueW
PathRemoveFileSpecW
StrCpyNW
StrStrIA
PathMatchSpecA
UrlCanonicalizeW
SHEnumKeyExW
SHEnumValueW
StrCmpW
PathFileExistsW
PathIsUNCW
UrlIsW
SHQueryInfoKeyW
StrRetToBufW
SHDeleteKeyW
_i64tow
_wtoi64
localtime
wcsftime
gmtime
_ui64tow
swscanf
fseek
ftell
fread
_wtol
_ltow
malloc
free
_wfopen
fwprintf
fclose
iswdigit
swprintf
vswprintf
wcsncmp
_ftol
_wtoi
_except_handler3
wcscat
_snprintf
_itow
wcschr
time
_wcsnicmp
_beginthreadex
memmove
wcscmp
_wcsicmp
wcsstr
??2@YAPAXI@Z
wcsrchr
wcsncpy
wcscpy
_snwprintf
wcslen
wcspbrk
__CxxFrameHandler
wcsncat
fwrite
_purecall
fputs
strrchr
strncpy
strchr
mktime
wcstod
iswspace
realloc
strpbrk
strstr
sscanf
iswlower
atoi
sprintf
fopen
_wstrtime
_strlwr
_CIpow
strncmp
_atoi64
fputws
wcstok
exit
scanf
printf
isalnum
toupper
towlower
towupper
_ismbslead
fprintf
_strnicmp
fgets
rewind
_CxxThrowException
__dllonexit
_onexit
?terminate@@YAXXZ
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_stricmp
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_controlfp
strncat
ObtainUserAgentString
RegisterBindStatusCallback
RevokeBindStatusCallback
CoInternetCombineUrl
CoInternetGetSession
Netbios
GdiplusStartup
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipGetImageEncoders
GdipGetImageHeight
GdipLoadImageFromStream
GdipAlloc
GdipDeleteGraphics
GdipSetInterpolationMode
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipCreateImageAttributes
GdipCreateFromHDC
GdipFree
GdipDisposeImage
GdipDrawImageRectRectI
GdipCloneImage
GdipGetImageWidth
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Duplicate
ImageList_GetImageCount
ImageList_AddMasked
ImageList_Create
ImageList_DragEnter
ImageList_BeginDrag
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Destroy
ImageList_GetIcon
ImageList_DrawEx
ImageList_GetImageInfo
ImageList_DragShowNolock
ImageList_DragMove
ImageList_EndDrag
ImageList_Add
ImageList_Draw
ord16
ImageList_SetBkColor
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ