Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
8Static
static
75410cf5aeb...18.exe
windows7-x64
75410cf5aeb...18.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
5$PLUGINSDI...ol.dll
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...re.dll
windows7-x64
3$PLUGINSDI...re.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ip.dll
windows7-x64
3$PLUGINSDI...ip.dll
windows10-2004-x64
3$PLUGINSDI...ML.dll
windows7-x64
3$PLUGINSDI...ML.dll
windows10-2004-x64
3$TEMP/AwrA...IC.dll
windows7-x64
8$TEMP/AwrA...IC.dll
windows10-2004-x64
8$TEMP/AwrA...ub.exe
windows7-x64
3$TEMP/AwrA...ub.exe
windows10-2004-x64
3$TEMP/AwrA...er.exe
windows7-x64
3$TEMP/AwrA...er.exe
windows10-2004-x64
3$TEMP/Defa...er.dll
windows7-x64
3$TEMP/Defa...er.dll
windows10-2004-x64
3$_21_/Alawar.url
windows7-x64
6$_21_/Alawar.url
windows10-2004-x64
3Alawar.url
windows7-x64
6Alawar.url
windows10-2004-x64
3Behavioral task
behavioral1
Sample
5410cf5aeb64e74e28088f0a2c60e44e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5410cf5aeb64e74e28088f0a2c60e44e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISpcre.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISpcre.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsUnzip.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsUnzip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsisXML.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsisXML.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$TEMP/AwrAskToolbar/ApnIC.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$TEMP/AwrAskToolbar/ApnIC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$TEMP/AwrAskToolbar/ApnStub.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
$TEMP/AwrAskToolbar/ApnStub.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$TEMP/AwrAskToolbar/ApnToolbarInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$TEMP/AwrAskToolbar/ApnToolbarInstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$TEMP/DefaultPackOffer.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$TEMP/DefaultPackOffer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$_21_/Alawar.url
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
$_21_/Alawar.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Alawar.url
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Alawar.url
Resource
win10v2004-20241007-en
Target
5410cf5aeb64e74e28088f0a2c60e44e_JaffaCakes118
Size
15.0MB
MD5
5410cf5aeb64e74e28088f0a2c60e44e
SHA1
d2e28723e2f1beaf4dd437eca93240988f28725f
SHA256
ed8858a1d47fbe78718613ae485d91e5bf8ab265316dc688203ee9865e368710
SHA512
f3f1650e0378e4c2bc21a66c20eebec16fc553154efda3ff33a4b608b06b812f8381bef2406d324f0c3a2514a3270652dee9ef324a5f0b67968c0b219578a844
SSDEEP
393216:FNFfogeWz2paXZ1GwMR94canq57CDN40cUN4SuB/V:FNFf5z2YX3GwMR94cafZL4SS/V
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/AccessControl.dll | acprotect |
static1/unpack001/htmlayout.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/wrapper.dll | aspack_v212_v242 |
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/AccessControl.dll | upx |
static1/unpack001/htmlayout.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/AccessControl.dll |
unpack002/out.upx |
unpack001/$PLUGINSDIR/Dialer.dll |
unpack001/$PLUGINSDIR/NSISdl.dll |
unpack001/$PLUGINSDIR/NSISpcre.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/inetc.dll |
unpack001/$PLUGINSDIR/nsDialogs.dll |
unpack001/$PLUGINSDIR/nsUnzip.dll |
unpack001/$PLUGINSDIR/nsisXML.dll |
unpack001/BASS.DLL |
unpack001/SF2.wrp.exe |
unpack001/ddScores.dll |
unpack001/htmlayout.dll |
unpack003/out.upx |
unpack001/wrapper.dll |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
CloseHandle
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
WideCharToMultiByte
MulDiv
lstrlenA
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
lstrcpynA
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
DispatchMessageW
PeekMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
GetClassInfoW
ExitWindowsEx
FindWindowExW
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
IsWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectW
SetBkMode
SetTextColor
SelectObject
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumValueW
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ClearOnFile
ClearOnRegKey
DenyOnFile
DenyOnRegKey
DisableFileInheritance
DisableRegKeyInheritance
EnableFileInheritance
EnableRegKeyInheritance
GetCurrentUserName
GetFileGroup
GetFileOwner
GetRegKeyGroup
GetRegKeyOwner
GrantOnFile
GrantOnRegKey
NameToSid
RevokeOnFile
RevokeOnRegKey
SetFileGroup
SetFileOwner
SetOnFile
SetOnRegKey
SetRegKeyGroup
SetRegKeyOwner
SidToName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryW
FreeLibrary
lstrcpynW
GlobalAlloc
AttemptConnect
AutodialHangup
AutodialOnline
AutodialUnattended
GetConnectedState
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
lstrlenA
lstrcpynA
lstrcatA
GlobalAlloc
GlobalFree
MulDiv
GetTickCount
DeleteFileA
Sleep
lstrcpyA
CreateFileA
lstrcpyW
lstrcpynW
WideCharToMultiByte
MultiByteToWideChar
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
CreateThread
WaitForSingleObject
WriteFile
CloseHandle
IsDebuggerPresent
IsWindowVisible
GetFocus
GetDlgItem
ShowWindow
SetWindowTextA
SetDlgItemTextA
CharPrevA
SetWindowLongW
RegisterWindowMessageW
GetClientRect
GetWindowRect
CreateWindowExW
GetWindowLongW
wsprintfA
CallWindowProcW
DestroyWindow
EnableWindow
FindWindowExW
SendMessageW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
WSAGetLastError
send
closesocket
shutdown
ioctlsocket
htons
socket
WSACleanup
WSAStartup
recv
__WSAFDIsSet
connect
inet_addr
gethostbyname
select
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\projects\NSISpcre\Release\NSISpcre.pdb
GlobalAlloc
WideCharToMultiByte
lstrcpynW
MultiByteToWideChar
GlobalFree
lstrcpyW
EncodePointer
DecodePointer
GetCurrentThreadId
GetCommandLineA
GetLastError
HeapFree
HeapAlloc
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
Sleep
HeapSize
GetProcAddress
GetModuleHandleW
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetModuleFileNameW
RtlUnwind
HeapReAlloc
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
LCMapStringW
GetStringTypeW
wsprintfW
RECheckPattern
REClearAllOptions
REClearOption
REFind
REFindClose
REFindNext
REGetOption
REMatches
REQuoteMeta
REReplace
RESetOption
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyW
lstrcpynW
GetProcAddress
WideCharToMultiByte
lstrcatW
lstrlenW
lstrcmpiW
LoadLibraryW
GetModuleHandleW
MultiByteToWideChar
VirtualAlloc
VirtualProtect
FreeLibrary
wsprintfW
CLSIDFromString
StringFromGUID2
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetOpenW
InternetCrackUrlW
InternetConnectW
HttpEndRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetErrorDlg
InternetCloseHandle
HttpAddRequestHeadersA
InternetQueryOptionW
InternetSetOptionW
InternetSetFilePointer
InternetGetLastResponseInfoW
FtpOpenFileW
FtpCreateDirectoryW
HttpQueryInfoW
HttpSendRequestExW
HttpSendRequestW
InternetWriteFile
InternetReadFile
ord17
MultiByteToWideChar
LCMapStringW
RtlUnwind
GetModuleFileNameW
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapAlloc
HeapFree
GlobalFree
lstrcpyW
lstrcpynW
GlobalAlloc
lstrlenW
WriteFile
ReadFile
lstrcmpW
GetLastError
DeleteFileW
CloseHandle
SleepEx
SetFilePointer
GetTickCount
lstrcatW
GetFileSize
CreateFileW
GetFileAttributesExW
lstrcmpiW
GetProcAddress
LoadLibraryW
MulDiv
GetModuleHandleW
TerminateThread
WaitForSingleObject
CreateThread
CreateFileA
WideCharToMultiByte
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetStringTypeW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
QueryPerformanceCounter
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
SetDlgItemTextW
SetWindowPos
SystemParametersInfoW
GetClientRect
GetWindowRect
SetTimer
LoadIconW
UpdateWindow
DestroyWindow
KillTimer
RedrawWindow
DispatchMessageW
TranslateMessage
GetMessageW
IsDialogMessageW
IsWindowVisible
EnableWindow
CreateDialogParamW
FindWindowExW
wsprintfA
wsprintfW
IsWindow
MessageBoxW
GetParent
SetWindowTextW
SetWindowLongW
GetWindowLongW
SendDlgItemMessageW
ShowWindow
GetDlgItem
PostMessageW
GetWindowTextW
SendMessageW
get
head
post
put
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
MulDiv
lstrlenW
HeapFree
GetProcessHeap
lstrcmpiW
HeapReAlloc
lstrcpynW
GetFileAttributesW
lstrcpyW
GetCurrentDirectoryW
SetCurrentDirectoryW
HeapAlloc
GlobalFree
LoadCursorW
RemovePropW
DrawFocusRect
GetPropW
DrawTextW
GetWindowTextW
GetDlgItem
SetWindowLongW
SetWindowPos
CreateDialogParamW
MapWindowPoints
GetWindowRect
SetCursor
CreateWindowExW
IsWindow
SetTimer
KillTimer
DispatchMessageW
TranslateMessage
GetMessageW
IsDialogMessageW
ShowWindow
wsprintfW
GetClientRect
CharPrevW
CallWindowProcW
SetPropW
DestroyWindow
MapDialogRect
CharNextW
SendMessageW
GetWindowLongW
SetTextColor
SHGetPathFromIDListW
SHBrowseForFolderW
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
CoTaskMemFree
Create
CreateControl
CreateItem
CreateTimer
GetUserData
KillTimer
OnBack
OnChange
OnClick
OnNotify
SelectFileDialog
SelectFolderDialog
SetRTL
SetUserData
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
GetProcessHeap
GetDriveTypeA
InitializeCriticalSection
GetVolumeInformationA
LeaveCriticalSection
InterlockedExchange
GetLastError
EnterCriticalSection
CreateMutexA
ReleaseMutex
CloseHandle
GetFullPathNameA
DosDateTimeToFileTime
SetVolumeLabelA
SetFilePointer
GetLocaleInfoA
SetEndOfFile
SystemTimeToFileTime
SetFileTime
GetFileAttributesA
FileTimeToSystemTime
FindFirstFileA
SetFileAttributesA
HeapFree
GetLocalTime
FindNextFileA
GetFileTime
FileTimeToLocalFileTime
GetVersion
LocalFileTimeToFileTime
GlobalLock
GlobalUnlock
lstrcpyA
CreateDirectoryA
DeleteFileA
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
ReadFile
LoadLibraryA
GetCurrentProcess
HeapAlloc
lstrlenA
CreateFileA
GlobalFree
lstrcmpiA
lstrlenW
MultiByteToWideChar
lstrcpynW
WideCharToMultiByte
GlobalAlloc
lstrcpynA
FindClose
lstrcmpA
HeapReAlloc
InterlockedDecrement
GetCPInfo
RtlUnwind
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
InterlockedIncrement
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
VirtualFree
DeleteCriticalSection
VirtualAlloc
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetStartupInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetEnvironmentVariableW
CharUpperA
wsprintfA
GetWindowTextLengthA
SendMessageA
GetWindowTextA
GetDlgItem
EndDialog
SetWindowTextA
EnableWindow
DialogBoxParamA
SetDlgItemTextA
OemToCharA
CharToOemA
GetSecurityDescriptorGroup
AdjustTokenPrivileges
IsValidSecurityDescriptor
GetSecurityDescriptorSacl
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
LookupPrivilegeValueA
GetSecurityDescriptorControl
GetKernelObjectSecurity
OpenProcessToken
IsValidAcl
GetSecurityDescriptorDacl
Extract
ExtractA
GetPassword
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyW
InterlockedIncrement
GlobalFree
GetLastError
MultiByteToWideChar
lstrlenA
InterlockedDecrement
LocalFree
wsprintfW
OleRun
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
CoInitialize
VariantCopy
VariantInit
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
free
_adjust_fdiv
malloc
_CxxThrowException
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_wtoi
_initterm
??1type_info@@UAE@XZ
appendChild
create
createElement
createElementInNS
createProcessingInstruction
getAttribute
getText
insertBefore
load
loadAndValidate
parentNode
release
removeChild
save
select
setAttribute
setDocumentElement
setText
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\hudson\jobs\AskStub\workspace\AskStub\Release\APNIC.pdb
lstrcmpW
lstrcatW
GetLastError
CloseHandle
GetCurrentProcess
GetProcAddress
LoadLibraryW
GetVersionExW
WriteFile
lstrlenA
WideCharToMultiByte
GetLocalTime
CreateDirectoryW
GetTempPathW
CreateFileW
GetFileTime
FormatMessageW
GetPrivateProfileStringW
InterlockedDecrement
GetModuleHandleW
FreeLibrary
DeleteFileW
MultiByteToWideChar
GetSystemDefaultLangID
GetStringTypeW
lstrlenW
LocalFree
lstrcmpiW
lstrcpyW
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CreateFileA
IsValidCodePage
LCMapStringA
LCMapStringW
ReadFile
GetStringTypeA
HeapSize
GetConsoleMode
WriteConsoleA
SetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetOEMCP
GetACP
GetCPInfo
SetLastError
GetConsoleCP
SetFilePointer
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
ExitProcess
Sleep
HeapReAlloc
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapDestroy
HeapCreate
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
HeapFree
GetCurrentThreadId
GetCommandLineA
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleA
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
SHGetFolderPathW
CoCreateInstance
CoUninitialize
CoInitialize
SysAllocString
SysFreeString
SHDeleteKeyW
PathFileExistsW
StrStrIW
HttpEndRequestW
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetSetOptionW
InternetCloseHandle
InternetConnectW
InternetCrackUrlW
InternetOpenW
HttpSendRequestExW
HttpQueryInfoW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
UuidCreate
UuidToStringW
RpcStringFreeW
DoCheckInstall
DoCheckOverInstall
DoPostInstall
DoPreCheck
DoPreInstall
GetPayloadPath
VolatileStoreClearMacroData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\hudson\jobs\AskStub\workspace\AskStub\Release\APNStub.pdb
ord224
CertFreeCertificateContext
CertGetNameStringW
IsValidURL
URLDownloadToFileW
SetEnvironmentVariableA
GetStartupInfoW
CompareStringW
CompareStringA
CreateFileA
lstrlenW
GetTempPathW
lstrcatW
DeleteFileW
lstrcpyW
GetTickCount
Sleep
GetModuleFileNameW
GetTempFileNameW
FindFirstFileW
GetNativeSystemInfo
SetFilePointer
GetCurrentProcess
CompareFileTime
CreateDirectoryW
WriteFile
WideCharToMultiByte
GetVersionExW
ReadFile
CreateFileW
MultiByteToWideChar
FlushFileBuffers
GetLastError
FindClose
IsWow64Process
GetSystemInfo
FindNextFileW
CloseHandle
GetSystemTime
FreeLibrary
WaitForSingleObject
LoadLibraryW
FormatMessageW
GetExitCodeProcess
SetLastError
GetProcAddress
LocalFree
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapSize
LCMapStringW
IsValidCodePage
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
GetFullPathNameW
GetModuleHandleA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentDirectoryA
HeapAlloc
RaiseException
GetDriveTypeA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
wsprintfW
MessageBoxW
GetForegroundWindow
ShellExecuteExW
IIDFromString
CoInitializeEx
CoCreateInstance
UuidToStringW
RpcStringFreeW
UuidCreate
InternetOpenW
InternetCrackUrlW
InternetConnectW
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoW
HttpOpenRequestW
HttpAddRequestHeadersA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\hudson\jobs\ToolbarCore_Staging\workspace\build\ToolbarCore\toolbar\ie\src\toolbar\wrapper\Release\externalwrapper.pdb
PathFileExistsW
StrStrIW
StrCmpNIW
SHDeleteValueW
ord159
ord92
ord8
ord205
ord113
ord163
ord160
ord20
ord32
ord118
ord125
ord70
SetEndOfFile
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineW
FileTimeToDosDateTime
GetTempFileNameW
lstrlenA
FindResourceW
LoadResource
WaitForSingleObject
GetTickCount
WriteFile
WideCharToMultiByte
SizeofResource
GetExitCodeProcess
CreateFileW
MultiByteToWideChar
lstrlenW
GetTempPathW
FindFirstFileA
FindClose
GetLocalTime
lstrcmpiW
lstrcatW
CloseHandle
FileTimeToLocalFileTime
GetProcessHeap
LocalFree
lstrcpyW
CreateFileA
SetFilePointer
ReadFile
GetLastError
GetVersionExW
CreateDirectoryW
GetPrivateProfileStringW
GetFileTime
InterlockedDecrement
GetSystemDefaultLangID
FreeLibrary
GetCurrentProcess
GetModuleHandleW
LoadLibraryW
GetProcAddress
GetSystemInfo
SetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
DeleteFileW
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetModuleHandleA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetACP
GetStringTypeW
LCMapStringA
LCMapStringW
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
RaiseException
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetStringTypeA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapReAlloc
VirtualAlloc
GetStartupInfoW
GetCPInfo
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemMetrics
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegQueryValueExW
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathW
CoCreateInstance
OleInitialize
OleUninitialize
CoUninitialize
CoInitialize
SysAllocString
VariantInit
SysFreeString
InternetSetOptionW
HttpSendRequestW
HttpSendRequestExW
InternetCanonicalizeUrlW
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestW
HttpQueryInfoW
InternetConnectW
InternetCrackUrlW
InternetOpenW
HttpEndRequestW
InternetCloseHandle
InternetReadFile
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
UuidToStringW
RpcStringFreeW
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\HBI\Bing\Experiences\BingShareQID\UNIWIN\UniversalInstaller_V1.7\DefaultPackOffer\Release\DefaultPackOffer.pdb
LocalAlloc
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
CompareStringW
GetPrivateProfileIntW
IsWow64Process
GetCurrentProcess
CreateFileW
GetFileInformationByHandle
ReadFile
CloseHandle
GetCurrentDirectoryW
SetDllDirectoryW
SetErrorMode
GetModuleFileNameW
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
InterlockedIncrement
InterlockedDecrement
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetCurrentThreadId
GetCommandLineA
GetLastError
HeapFree
HeapReAlloc
HeapAlloc
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetProcAddress
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointer
FlushFileBuffers
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
FreeLibrary
LoadLibraryW
WriteConsoleW
SetStdHandle
SetEndOfFile
GetProcessHeap
SetUnhandledExceptionFilter
GetVersionExW
LoadLibraryA
InternetCrackUrlW
RegOpenKeyExW
RegQueryValueExW
SHGetFolderPathW
SHGetFolderPathAndSubDirW
PathRemoveBlanksW
PathIsRelativeW
PathCanonicalizeW
PathFileExistsW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CanOfferDefaultPack
CanOfferGCDHP
CanOfferGCDSE
CanOfferIEDHP
CanOfferIEDSE
CanOfferMFDHP
CanOfferMFDSE
CheckBasicSystemRequirements
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
BASS_Apply3D
BASS_ChannelBytes2Seconds
BASS_ChannelGet3DAttributes
BASS_ChannelGet3DPosition
BASS_ChannelGetAttributes
BASS_ChannelGetData
BASS_ChannelGetDevice
BASS_ChannelGetEAXMix
BASS_ChannelGetInfo
BASS_ChannelGetLevel
BASS_ChannelGetPosition
BASS_ChannelIsActive
BASS_ChannelIsSliding
BASS_ChannelPause
BASS_ChannelRemoveDSP
BASS_ChannelRemoveFX
BASS_ChannelRemoveLink
BASS_ChannelRemoveSync
BASS_ChannelResume
BASS_ChannelSeconds2Bytes
BASS_ChannelSet3DAttributes
BASS_ChannelSet3DPosition
BASS_ChannelSetAttributes
BASS_ChannelSetDSP
BASS_ChannelSetEAXMix
BASS_ChannelSetFX
BASS_ChannelSetLink
BASS_ChannelSetPosition
BASS_ChannelSetSync
BASS_ChannelSlideAttributes
BASS_ChannelStop
BASS_ErrorGetCode
BASS_FXGetParameters
BASS_FXSetParameters
BASS_Free
BASS_Get3DFactors
BASS_Get3DPosition
BASS_GetCPU
BASS_GetConfig
BASS_GetDSoundObject
BASS_GetDevice
BASS_GetDeviceDescription
BASS_GetEAXParameters
BASS_GetInfo
BASS_GetVersion
BASS_GetVolume
BASS_Init
BASS_MusicFree
BASS_MusicGetLength
BASS_MusicGetName
BASS_MusicGetVolume
BASS_MusicLoad
BASS_MusicPlay
BASS_MusicPlayEx
BASS_MusicPreBuf
BASS_MusicSetAmplify
BASS_MusicSetPanSep
BASS_MusicSetPositionScaler
BASS_MusicSetVolume
BASS_Pause
BASS_RecordFree
BASS_RecordGetDevice
BASS_RecordGetDeviceDescription
BASS_RecordGetInfo
BASS_RecordGetInput
BASS_RecordGetInputName
BASS_RecordInit
BASS_RecordSetDevice
BASS_RecordSetInput
BASS_RecordStart
BASS_SampleCreate
BASS_SampleCreateDone
BASS_SampleFree
BASS_SampleGetInfo
BASS_SampleLoad
BASS_SamplePlay
BASS_SamplePlay3D
BASS_SamplePlay3DEx
BASS_SamplePlayEx
BASS_SampleSetInfo
BASS_SampleStop
BASS_Set3DFactors
BASS_Set3DPosition
BASS_SetConfig
BASS_SetDevice
BASS_SetEAXParameters
BASS_SetVolume
BASS_Start
BASS_Stop
BASS_StreamCreate
BASS_StreamCreateFile
BASS_StreamCreateFileUser
BASS_StreamCreateURL
BASS_StreamFree
BASS_StreamGetFilePosition
BASS_StreamGetLength
BASS_StreamGetTags
BASS_StreamPlay
BASS_StreamPreBuf
BASS_Update
_
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
timeGetTime
Direct3DCreate8
DirectXFileCreate
DirectInput8Create
BASS_ChannelSetAttributes
BASS_SetConfig
BASS_GetConfig
BASS_Start
BASS_ErrorGetCode
BASS_Init
BASS_GetVersion
BASS_Free
BASS_Stop
BASS_Pause
BASS_ChannelStop
BASS_MusicPlayEx
BASS_ChannelSlideAttributes
BASS_SampleLoad
BASS_SamplePlay
BASS_SamplePlayEx
BASS_MusicLoad
BASS_MusicPlay
?ddGetScoresResponse@@YAPADXZ
?ddSendScoreThread@@YAJPBD@Z
?GetLocalizedString@@YAABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@ABV12@@Z
?GetCurrentLanguage@@YAABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@XZ
?ddGetScoreThread@@YAJPBD@Z
?ddIsUseOnlineScore@@YAHXZ
?ddGetBuild@@YAPBDXZ
?ddSetPassword@@YAJPBD@Z
?ddSetBuild@@YAJPBD@Z
WriteConsoleA
SetStdHandle
InitializeCriticalSection
GetStringTypeW
OutputDebugStringA
FindClose
FindNextFileA
FindFirstFileA
GetModuleHandleA
GetLastError
GetVolumeInformationA
SetCurrentDirectoryW
GetCurrentDirectoryW
GetCurrentDirectoryA
Sleep
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
GetVersionExA
InterlockedIncrement
HeapValidate
GetProcessHeap
InterlockedDecrement
GetConsoleOutputCP
CloseHandle
WriteConsoleW
CreateFileA
WriteFile
GetFileSize
MapViewOfFile
CreateFileMappingA
CreateFileW
WideCharToMultiByte
UnmapViewOfFile
GetUserDefaultLCID
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetLocaleInfoA
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
HeapSize
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
FlushFileBuffers
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoW
SetEndOfFile
ReadFile
LCMapStringW
MultiByteToWideChar
LCMapStringA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CreateDirectoryW
GetCommandLineA
HeapFree
HeapAlloc
GetStartupInfoA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
MessageBoxA
FindWindowA
SetForegroundWindow
SetActiveWindow
SetFocus
SetCursor
ShowCursor
PeekMessageA
TranslateMessage
DispatchMessageA
GetMessageA
WaitMessage
LoadIconA
RegisterClassA
CreateWindowExA
UpdateWindow
DefWindowProcA
SendMessageA
GetDesktopWindow
PostQuitMessage
GetKeyState
SetWindowPos
GetClientRect
ShowWindow
RegQueryValueExA
GetUserNameA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
SHGetFolderPathW
ShellExecuteA
?GetRegistrationInformation@@YGXPAD@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Work\DDLibs\ddScores\Release\ddScores.pdb
GetVolumeInformationA
GetCurrentDirectoryA
GetLastError
CreateThread
SetEndOfFile
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
CloseHandle
MultiByteToWideChar
ReadFile
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
Sleep
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
SetFilePointer
LCMapStringA
LCMapStringW
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
FlushFileBuffers
CreateFileA
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
timeGetTime
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
??0ddScoreTable@@QAE@ABV0@@Z
??0ddScoreTable@@QAE@XZ
??1ddScoreTable@@QAE@XZ
??4ddScoreTable@@QAEAAV0@ABV0@@Z
?AddScore@ddScoreTable@@QAEJJ@Z
?AddScoreEx@ddScoreTable@@QAEJPBD0@Z
?DebugPrint@ddScoreTable@@QAEXXZ
?EditedRecord@ddScoreTable@@QAE_NXZ
?FirstRecord@ddScoreTable@@QAEJXZ
?GetCurrentLanguage@@YAABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@XZ
?GetLocalizedString@@YAABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@ABV12@@Z
?GetScore@ddScoreTable@@QAEJXZ
?GetScoreEx@ddScoreTable@@QAEPADPAD@Z
?MinScore@ddScoreTable@@QAEJXZ
?NextRecord@ddScoreTable@@QAEJXZ
?SetLanguage@@YAJABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
?SetSize@ddScoreTable@@QAEXK@Z
?clear@ddScoreTable@@QAEXXZ
?count@ddScoreTable@@QAEHXZ
?ddActivation@@YAJPBD@Z
?ddActivationResponse@@YAPADXZ
?ddActivationThread@@YAJPBD@Z
?ddDebugPrint@@YAJXZ
?ddGetAdapterInfo@@YAXPAUIDirect3D8@@PAD1@Z
?ddGetBuild@@YAPBDXZ
?ddGetHardwareID@@YAXPAD@Z
?ddGetLives@@YAHXZ
?ddGetProcessorInfo@@YAXPAKPAD@Z
?ddGetScore@@YAJPBD@Z
?ddGetScoreThread@@YAJPBD@Z
?ddGetScores@@YAHXZ
?ddGetScoresResponse@@YAPADXZ
?ddGetVersion@@YAPBDXZ
?ddInitGame@@YAXHH@Z
?ddIsUseOnlineScore@@YAHXZ
?ddScoresLoadParams@@YAJPBD@Z
?ddScoresLoadParamsEncrypted@@YAJPBD@Z
?ddScoresSaveParams@@YAJPBD@Z
?ddScoresSaveParamsEncrypted@@YAJPBD@Z
?ddSendScore@@YAJPBD@Z
?ddSendScoreResponse@@YAPADXZ
?ddSendScoreThread@@YAJPBD@Z
?ddSetAddActivationURL@@YAJPBD@Z
?ddSetAgent@@YAJPBD@Z
?ddSetBufferSize@@YAJK@Z
?ddSetBuild@@YAJPBD@Z
?ddSetGetScoreURL@@YAJPBD@Z
?ddSetHomeSite@@YAJPBD@Z
?ddSetLives@@YAXH@Z
?ddSetPassword@@YAJPBD@Z
?ddSetScores@@YAXH@Z
?ddSetSendScoreURL@@YAJPBD@Z
?ddSetVersion@@YAJPBD@Z
?load@ddScoreTable@@QAEJPBD@Z
?parse@ddScoreTable@@QAEJPBD@Z
?save@ddScoreTable@@QAEJPBD@Z
?trim@ddScoreTable@@QAEXH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HTMLayoutAppendMasterCSS
HTMLayoutAttachEventHandler
HTMLayoutAttachEventHandlerEx
HTMLayoutCallBehaviorMethod
HTMLayoutClassNameA
HTMLayoutClassNameW
HTMLayoutClearAttributes
HTMLayoutClipboardCopy
HTMLayoutCloneElement
HTMLayoutCombineURL
HTMLayoutControlGetType
HTMLayoutControlGetValue
HTMLayoutControlSetValue
HTMLayoutCreateElement
HTMLayoutDataReady
HTMLayoutDataReadyAsync
HTMLayoutDeclareElementType
HTMLayoutDeleteElement
HTMLayoutDetachElement
HTMLayoutDetachEventHandler
HTMLayoutDialog
HTMLayoutElementGetExpando
HTMLayoutElementSetExpando
HTMLayoutEnumElementStyles
HTMLayoutEnumResources
HTMLayoutEnumerate
HTMLayoutFindElement
HTMLayoutGetAttributeByName
HTMLayoutGetAttributeCount
HTMLayoutGetCharacterRect
HTMLayoutGetChildrenCount
HTMLayoutGetElementByUID
HTMLayoutGetElementHtml
HTMLayoutGetElementHwnd
HTMLayoutGetElementIndex
HTMLayoutGetElementInnerText
HTMLayoutGetElementInnerText16
HTMLayoutGetElementLocation
HTMLayoutGetElementState
HTMLayoutGetElementText
HTMLayoutGetElementType
HTMLayoutGetElementUID
HTMLayoutGetFocusElement
HTMLayoutGetGraphin
HTMLayoutGetMinHeight
HTMLayoutGetMinWidth
HTMLayoutGetNthAttribute
HTMLayoutGetNthChild
HTMLayoutGetParentElement
HTMLayoutGetRootElement
HTMLayoutGetScrollInfo
HTMLayoutGetSelectedHTML
HTMLayoutGetStyleAttribute
HTMLayoutHidePopup
HTMLayoutHttpRequest
HTMLayoutInit
HTMLayoutInsertElement
HTMLayoutIsElementEnabled
HTMLayoutIsElementVisible
HTMLayoutLoadFile
HTMLayoutLoadHtml
HTMLayoutLoadHtmlEx
HTMLayoutMoveElement
HTMLayoutParseValue
HTMLayoutPostEvent
HTMLayoutProc
HTMLayoutProcND
HTMLayoutProcW
HTMLayoutProcessUIEvent
HTMLayoutRangeAdvancePos
HTMLayoutRangeCreate
HTMLayoutRangeFromPositions
HTMLayoutRangeFromSelection
HTMLayoutRangeInsertHtml
HTMLayoutRangeIsEmpty
HTMLayoutRangeRelease
HTMLayoutRangeReplace
HTMLayoutRangeToHtml
HTMLayoutRender
HTMLayoutRenderElement
HTMLayoutRequestElementData
HTMLayoutScrollToView
HTMLayoutSelectElements
HTMLayoutSelectElementsW
HTMLayoutSelectParent
HTMLayoutSelectParentW
HTMLayoutSelectionExist
HTMLayoutSendEvent
HTMLayoutSetAttributeByName
HTMLayoutSetCSS
HTMLayoutSetCallback
HTMLayoutSetCapture
HTMLayoutSetDataLoader
HTMLayoutSetElementHtml
HTMLayoutSetElementInnerText
HTMLayoutSetElementInnerText16
HTMLayoutSetElementState
HTMLayoutSetHttpHeaders
HTMLayoutSetMasterCSS
HTMLayoutSetMediaType
HTMLayoutSetMode
HTMLayoutSetOption
HTMLayoutSetScrollPos
HTMLayoutSetStyleAttribute
HTMLayoutSetTimer
HTMLayoutSetTimerEx
HTMLayoutSetupDebugOutput
HTMLayoutShowPopup
HTMLayoutShowPopupAt
HTMLayoutSortElements
HTMLayoutSwapElements
HTMLayoutTraverseUIEvent
HTMLayoutUpdateElement
HTMLayoutUpdateElementEx
HTMLayoutUpdateView
HTMLayoutUpdateWindow
HTMLayoutVisitElements
HTMLayoutWindowAttachEventHandler
HTMLayoutWindowDetachEventHandler
HTMLayout_UnuseElement
HTMLayout_UseElement
HTMLiteAdvanceFocus
HTMLiteCreateInstance
HTMLiteDestroyInstance
HTMLiteFindElement
HTMLiteGetDocumentMinHeight
HTMLiteGetDocumentMinWidth
HTMLiteGetRootElement
HTMLiteGetTag
HTMLiteLoadHtmlFromFile
HTMLiteLoadHtmlFromMemory
HTMLiteMeasure
HTMLiteRender
HTMLiteRenderOnBitmap
HTMLiteSetCallback
HTMLiteSetDataReady
HTMLiteSetDataReadyAsync
HTMLiteSetMediaType
HTMLiteSetTag
HTMLiteTraverseUIEvent
HTMPrintCreateInstance
HTMPrintDestroyInstance
HTMPrintGetDocumentHeight
HTMPrintGetDocumentMinWidth
HTMPrintGetRootElement
HTMPrintGetTag
HTMPrintLoadHtmlFromFile
HTMPrintLoadHtmlFromMemory
HTMPrintMeasure
HTMPrintRender
HTMPrintSetDataReady
HTMPrintSetHyperlinkAreaCallback
HTMPrintSetLoadDataCallback
HTMPrintSetMediaType
HTMPrintSetNextPageCallback
HTMPrintSetTag
ValueBinaryData
ValueBinaryDataSet
ValueClear
ValueCopy
ValueElementsCount
ValueFloatData
ValueFloatDataSet
ValueFromString
ValueGetValueOfKey
ValueInit
ValueInt64Data
ValueInt64DataSet
ValueIntData
ValueIntDataSet
ValueInvoke
ValueNthElementKey
ValueNthElementValue
ValueNthElementValueSet
ValueSetValueToKey
ValueStringData
ValueStringDataSet
ValueToString
ValueType
_ValueEnumElements@12
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
??0INIFile@@QAE@PBD_N@Z
??0INIFile@@QAE@PB_W_N@Z
??1INIFile@@QAE@XZ
?DllGetRegInfo@@YAXPAD@Z
?DllSetRegKey@@YAPADXZ
?ReadInteger@INIFile@@QAEHPBD0H@Z
?ReadInteger@INIFile@@QAEHPB_W0H@Z
?ReadString@INIFile@@QAE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@PBD00@Z
?SetConnection@@YAXPAX@Z
?StartWrapper@@YAHXZ
?WriteValue@INIFile@@QAEXPB_W00_N@Z
?WriteValue@INIFile@@QAEXPB_W0ABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@_N@Z
?WriteValue@INIFile@@QAEXPB_W0H_N@Z
?add_to_mem_store@@YAXPB_WPAXI@Z
?add_to_mem_store@PluginAPI@@YAXPB_WPAXI@Z
?banner_clicked@@YA_NXZ
?banner_clicked@PluginAPI@@YA_NXZ
?debugLog@@YAXPBD@Z
?get@INIFile@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@PBD0@Z
?get@INIFile@@QBE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@PB_W0@Z
?getACP@INIFile@@QBE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@PB_W0@Z
?getAsUTF8@INIFile@@QBE?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@PB_W0@Z
?get_cache_path@PluginAPI@@YAPB_WXZ
?get_game_id@PluginAPI@@YAHXZ
?get_initial_page@@YAHXZ
?get_initial_page@PluginAPI@@YAHXZ
?get_locale@PluginAPI@@YAPBDXZ
?get_partner_id@PluginAPI@@YAHXZ
?get_protocol_version@PluginAPI@@YAPBDXZ
?get_stats_url@PluginAPI@@YAPBDXZ
?get_user_id@PluginAPI@@YAHXZ
?get_user_id_token@PluginAPI@@YAPBD_N@Z
?handle_hyperlink@@YAXPB_W@Z
?handle_hyperlink@PluginAPI@@YAXPB_W@Z
?is_game_to_start@@YA_NXZ
?is_game_to_start@PluginAPI@@YA_NXZ
?set@INIFile@@QAE_NPBD00_N@Z
?set@INIFile@@QAE_NPB_W00_N@Z
?write@INIFile@@QAE_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
?write_to_log@PluginAPI@@YAXPB_W@Z
DllGetAxml
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE