christoph281 | 01.11.2008 19:34 | editionen:
hab mal etwas zuarbeit gemacht die bestimmt weiterhilft.
hab folgende dateien aus der logdatei überprüft. Code:
C:\WINXP\System32\smss.exe
C:\WINXP\system32\winlogon.exe
C:\WINXP\system32\services.exe
C:\WINXP\system32\lsass.exe
C:\WINXP\system32\svchost.exe
C:\WINXP\System32\svchost.exe
C:\WINXP\system32\spoolsv.exe
C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
C:\Programme\G DATA\AntiVirus\AVK\AVKService.exe
C:\Programme\G DATA\AntiVirus\AVK\AVKWCtl.exe
C:\WINXP\system32\svchost.exe
C:\WINXP\System32\svchost.exe
C:\WINXP\System32\svchost.exe
C:\WINXP\System32\PAStiSvc.exe
C:\WINXP\system32\svchost.exe
C:\WINXP\system32\WgaTray.exe
C:\WINXP\Explorer.EXE
C:\WINXP\Mixer.exe
C:\Programme\HP\HP Software Update\HPWuSchd2.exe
C:\Programme\G DATA\AntiVirus\AVKTray\AVKTray.exe
C:\WINXP\system32\ctfmon.exe
C:\Programme\MSN Messenger\MsnMsgr.Exe
C:\Programme\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINXP\system32\wuauclt.exe
C:\Programme\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Programme\HP\Digital Imaging\bin\hpqbam08.exe
C:\Programme\HP\Digital Imaging\bin\hpqgpc01.exe
C:\Programme\Internet Explorer\IEXPLORE.EXE
C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Programme\HP\Digital Imaging\Smart Web Printing\hpswp_clipbook.exe
C:\WINXP\system32\G5M2yb6i.exe
C:\Programme\G DATA\AntiVirus\AVK\AVK.exe
C:\WINXP\system32\taskmgr.exe
C:\Programme\Internet Explorer\IEXPLORE.EXE
C:\Programme\Trend Micro\HijackThis\HijackThis.exe überprüfung von VirusTotal - Free Online Virus and Malware Scan hat bei folgenden dateien schadsoftware erkannt
bei datei: Code:
C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
ANALYSEPROTOKOLL: Code:
Datei AVKProxy.exe empfangen 2008.11.01 19:20:11 (CET)Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.11.1.0 2008.11.01 -
AntiVir 7.9.0.10 2008.10.31 -
Authentium 5.1.0.4 2008.11.01 -
Avast 4.8.1248.0 2008.11.01 -
AVG 8.0.0.161 2008.11.01 -
BitDefender 7.2 2008.11.01 -
CAT-QuickHeal 9.50 2008.11.01 -
ClamAV 0.94.1 2008.11.01 -
DrWeb 4.44.0.09170 2008.11.01 -
eSafe 7.0.17.0 2008.10.30 -
eTrust-Vet 31.6.6185 2008.11.01 -
Ewido 4.0 2008.11.01 -
F-Prot 4.4.4.56 2008.11.01 -
F-Secure 8.0.14332.0 2008.11.01 -
Fortinet 3.117.0.0 2008.10.31 -
GData 19 2008.11.01 -
Ikarus T3.1.1.44.0 2008.11.01 -
K7AntiVirus 7.10.514 2008.11.01 -
Kaspersky 7.0.0.125 2008.11.01 -
McAfee 5420 2008.11.01 -
Microsoft 1.4005 2008.11.01 -
NOD32 3575 2008.10.31 -
Norman 5.80.02 2008.10.31 -
Panda 9.0.0.4 2008.11.01 Suspicious file
PCTools 4.4.2.0 2008.11.01 -
Prevx1 V2 2008.11.01 -
Rising 21.01.52.00 2008.11.01 -
SecureWeb-Gateway 6.7.6 2008.11.01 -
Sophos 4.35.0 2008.11.01 -
Sunbelt 3.1.1767.2 2008.10.31 -
Symantec 10 2008.11.01 -
TheHacker 6.3.1.1.135 2008.10.31 -
TrendMicro 8.700.0.1004 2008.10.31 -
VBA32 3.12.8.9 2008.11.01 suspected of Win32.BrokenEmbeddedSignature (paranoid heuristics)
ViRobot 2008.10.31.1446 2008.10.31 -
VirusBuster 4.5.11.0 2008.10.31 -
weitere Informationen
File size: 724040 bytes
MD5...: 0600a9dda3dc6bd67c9b3400ee5695da
SHA1..: 68b441472f0b19c688fe1e0ea070e5c2963db47d
SHA256: ad20b11b68377cfaa7524463218fe5f63fc81301e89019afa94956318c998f32
SHA512: bf542399c9002ba45a86c07f7730d3c223a2c889529afc8b7356d4176c7118aa<BR>78bf025645635d23d134112583456e96e5ba2350acd579e42b7109eee94f749a
PEiD..: -
TrID..: File type identification<BR>Windows Screen Saver (51.1%)<BR>Win32 Executable Generic (33.2%)<BR>Generic Win/DOS Executable (7.8%)<BR>DOS Executable Generic (7.8%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x459417<BR>timedatestamp.....: 0x48aa1191 (Tue Aug 19 00:19:29 2008)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 4 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x762f0 0x76400 6.60 9cc31873957e1c8b9c8550a7402884df<BR>.rdata 0x78000 0x1c63b 0x1c800 4.77 e318baba62217027aebc1ef317572b7d<BR>.data 0x95000 0x76fc 0x4e00 4.80 af0b936c19561fb69736fc22d4f8a05c<BR>.rsrc 0x9d000 0x177c0 0x17800 4.49 d6ecde0a775dfb186e5b0b5293d8e044<BR><BR>( 9 imports ) <BR>> WS2_32.dll: -, -, -, -, -, -, -, -, WSACreateEvent, WSAEventSelect, WSAEnumNetworkEvents, -, -, -, -, -, -, -, -, -, -, -<BR>> VERSION.dll: GetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA<BR>> PSAPI.DLL: EnumProcesses<BR>> KERNEL32.dll: InterlockedDecrement, lstrlenA, OutputDebugStringA, CreateEventA, CloseHandle, SetEvent, ResetEvent, WaitForSingleObject, GetTickCount, GetLastError, lstrlenW, RaiseException, InterlockedIncrement, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, lstrcmpiA, EnterCriticalSection, LeaveCriticalSection, GetCurrentThreadId, GetModuleHandleW, IsDBCSLeadByte, FreeLibrary, LoadLibraryExA, GetWindowsDirectoryA, GetCommandLineA, GetCurrentProcessId, LoadLibraryA, DeleteFileA, CopyFileA, GetTempPathA, IsBadStringPtrA, IsBadWritePtr, IsBadReadPtr, Sleep, TerminateThread, MoveFileA, FindClose, FindNextFileA, FindFirstFileA, SetLastError, ReleaseMutex, CreateMutexA, CreateDirectoryA, WideCharToMultiByte, WriteFile, SetFilePointer, ReadFile, GetFileSize, GetTimeZoneInformation, CreateFileA, OutputDebugStringW, GetShortPathNameW, LocalFree, DuplicateHandle, GetCurrentProcess, OpenProcess, MoveFileExA, GetVersionExA, TerminateProcess, HeapFree, HeapAlloc, GetProcessHeap, GetExitCodeProcess, DeleteFileW, MoveFileExW, WaitForMultipleObjects, ResumeThread, OpenEventA, SwitchToThread, CreateProcessA, SuspendThread, HeapDestroy, HeapReAlloc, HeapSize, GetStringTypeA, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, LCMapStringW, LCMapStringA, GetStartupInfoA, FindResourceExA, FindResourceA, LoadResource, LockResource, SizeofResource, DeleteCriticalSection, InitializeCriticalSection, MultiByteToWideChar, GetTimeFormatA, GetStringTypeW, HeapCreate, VirtualFree, ExitProcess, GetStdHandle, SetHandleCount, GetFileType, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetStdHandle, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, InitializeCriticalSectionAndSpinCount, GetLocaleInfoW, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileW, SetEndOfFile, CompareStringA, CompareStringW, SetEnvironmentVariableA, GetSystemTimeAsFileTime, RtlUnwind, RemoveDirectoryA, CreateThread, ExitThread, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, VirtualQuery, GetSystemInfo, VirtualAlloc, VirtualProtect, GetDateFormatA<BR>> USER32.dll: CharLowerA, LoadStringW, MsgWaitForMultipleObjects, DispatchMessageA, TranslateMessage, PeekMessageA, CharNextA, PostThreadMessageA, CharNextW, GetMessageA, MessageBoxA, wsprintfA<BR>> ADVAPI32.dll: OpenSCManagerA, CryptDecrypt, CryptEncrypt, CryptDestroyKey, CryptCreateHash, CryptHashData, CryptDeriveKey, CryptDestroyHash, CryptReleaseContext, CryptAcquireContextA, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, AllocateAndInitializeSid, FreeSid, EqualSid, OpenProcessToken, GetTokenInformation, SetEntriesInAclA, SetSecurityInfo, LookupPrivilegeValueA, AdjustTokenPrivileges, ControlService, DeleteService, CreateServiceA, ChangeServiceConfig2A, StartServiceCtrlDispatcherA, RegisterServiceCtrlHandlerA, RegEnumKeyExA, RegisterEventSourceA, ReportEventA, DeregisterEventSource, RegQueryInfoKeyA, RegCreateKeyA, SetServiceStatus, RegSetValueExA, OpenServiceA, CloseServiceHandle, RegQueryValueExA, RegOpenKeyExA, RegCreateKeyExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA<BR>> ole32.dll: CreateStreamOnHGlobal, OleRun, CoCreateInstance, CoInitialize, CoUninitialize, CLSIDFromProgID, CLSIDFromString, CoTaskMemAlloc, CoTaskMemRealloc, CoRevokeClassObject, CoRegisterClassObject, CoTaskMemFree, CoInitializeSecurity, CoInitializeEx, StringFromGUID2, CoReleaseMarshalData, CoUnmarshalInterface, CoMarshalInterface<BR>> SHELL32.dll: SHGetFolderPathA<BR>> OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -<BR><BR>( 42 exports ) <BR>__0CAuthError@ASAPSDK@@QAE@ABV01@@Z, __0CAuthError@ASAPSDK@@QAE@W4e_ASAPErrors@1@ABVasapstring@1@@Z, __0CCommError@ASAPSDK@@QAE@ABV01@@Z, __0CCommError@ASAPSDK@@QAE@W4e_ASAPErrors@1@ABVasapstring@1@@Z, __0CException@ASAPSDK@@QAE@ABV01@@Z, __0CException@ASAPSDK@@QAE@W4e_ASAPErrors@1@ABVasapstring@1@@Z, __0CGeneralError@ASAPSDK@@QAE@ABV01@@Z, __0CGeneralError@ASAPSDK@@QAE@W4e_ASAPErrors@1@ABVasapstring@1@@Z, __0CLogicError@ASAPSDK@@QAE@ABV01@@Z, __0CLogicError@ASAPSDK@@QAE@W4e_ASAPErrors@1@ABVasapstring@1@@Z, __0CMessageError@ASAPSDK@@QAE@ABV01@@Z, __0CMessageError@ASAPSDK@@QAE@W4e_ASAPErrors@1@ABVasapstring@1@@Z, __0asapstring@ASAPSDK@@QAE@ABV01@@Z, __0asapstring@ASAPSDK@@QAE@PBD@Z, __0asapstring@ASAPSDK@@QAE@XZ, __1CAuthError@ASAPSDK@@UAE@XZ, __1CCommError@ASAPSDK@@UAE@XZ, __1CException@ASAPSDK@@UAE@XZ, __1CGeneralError@ASAPSDK@@UAE@XZ, __1CLogicError@ASAPSDK@@UAE@XZ, __1CMessageError@ASAPSDK@@UAE@XZ, __1asapstring@ASAPSDK@@UAE@XZ, __4CAuthError@ASAPSDK@@QAEAAV01@ABV01@@Z, __4CCommError@ASAPSDK@@QAEAAV01@ABV01@@Z, __4CException@ASAPSDK@@QAEAAV01@ABV01@@Z, __4CGeneralError@ASAPSDK@@QAEAAV01@ABV01@@Z, __4CLogicError@ASAPSDK@@QAEAAV01@ABV01@@Z, __4CMessageError@ASAPSDK@@QAEAAV01@ABV01@@Z, __4asapstring@ASAPSDK@@QAEXABV01@@Z, __4asapstring@ASAPSDK@@QAEXPBD@Z, __Basapstring@ASAPSDK@@QAEPBDXZ, ___7CAuthError@ASAPSDK@@6B@, ___7CCommError@ASAPSDK@@6B@, ___7CException@ASAPSDK@@6B@, ___7CGeneralError@ASAPSDK@@6B@, ___7CLogicError@ASAPSDK@@6B@, ___7CMessageError@ASAPSDK@@6B@, ___7asapstring@ASAPSDK@@6B@, _Attach@asapstring@ASAPSDK@@QAEXPAD@Z, _Detach@asapstring@ASAPSDK@@QAEPADXZ, DeallocString, DuplicateString<BR> bei datei: Code:
C:\Programme\G DATA\AntiVirus\AVK\AVKWCtl.exe ANALYSEPROTOKOLL: Code:
Datei AVKWCtl.exe empfangen 2008.11.01 19:50:58 (CET)Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.11.1.0 2008.11.01 -
AntiVir 7.9.0.10 2008.10.31 -
Authentium 5.1.0.4 2008.11.01 -
Avast 4.8.1248.0 2008.11.01 -
AVG 8.0.0.161 2008.11.01 -
BitDefender 7.2 2008.11.01 -
CAT-QuickHeal 9.50 2008.11.01 -
ClamAV 0.94.1 2008.11.01 -
DrWeb 4.44.0.09170 2008.11.01 -
eSafe 7.0.17.0 2008.10.30 -
eTrust-Vet 31.6.6185 2008.11.01 -
Ewido 4.0 2008.11.01 -
F-Prot 4.4.4.56 2008.11.01 -
F-Secure 8.0.14332.0 2008.11.01 -
Fortinet 3.117.0.0 2008.10.31 -
GData 19 2008.11.01 -
Ikarus T3.1.1.44.0 2008.11.01 -
K7AntiVirus 7.10.514 2008.11.01 -
Kaspersky 7.0.0.125 2008.11.01 -
McAfee 5420 2008.11.01 -
Microsoft 1.4005 2008.11.01 -
NOD32 3575 2008.10.31 -
Norman 5.80.02 2008.10.31 -
Panda 9.0.0.4 2008.11.01 -
PCTools 4.4.2.0 2008.11.01 EICAR_Test_File
Prevx1 V2 2008.11.01 -
Rising 21.01.52.00 2008.11.01 -
SecureWeb-Gateway 6.7.6 2008.11.01 -
Sophos 4.35.0 2008.11.01 -
Sunbelt 3.1.1767.2 2008.10.31 -
Symantec 10 2008.11.01 -
TheHacker 6.3.1.1.135 2008.10.31 -
TrendMicro 8.700.0.1004 2008.10.31 -
VBA32 3.12.8.9 2008.11.01 suspected of Win32.BrokenEmbeddedSignature (paranoid heuristics)
ViRobot 2008.10.31.1446 2008.10.31 -
VirusBuster 4.5.11.0 2008.10.31 -
weitere Informationen
File size: 1185496 bytes
MD5...: f1498b86a7da9ad5c3bdd0f604d617da
SHA1..: bd3c486dbcd9e3c558584fad0ab45a274734d2e1
SHA256: f97b5c8dfc81a96ceb3e928d1971928458acb3d3ed9f816d96416f29a010ecce
SHA512: 978a14015a618114dee09525409bf9c01ffb99c397cfd65f2e100e4150099c5e<BR>df2a76ae4e8de2cfa9c498fb3992373258d801978cc3829742e3be26d7f364d2
PEiD..: -
TrID..: File type identification<BR>Win64 Executable Generic (59.6%)<BR>Win32 Executable MS Visual C++ (generic) (26.2%)<BR>Win32 Executable Generic (5.9%)<BR>Win32 Dynamic Link Library (generic) (5.2%)<BR>Generic Win/DOS Executable (1.3%)
PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x49507f<BR>timedatestamp.....: 0x48a303a4 (Wed Aug 13 15:54:12 2008)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 4 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0xc2a7e 0xc3000 6.46 b9cf58a7506761cb438eaf5eda32835c<BR>.rdata 0xc4000 0x23492 0x24000 4.81 a1ec85deb3b7f1a26828fd315a883b19<BR>.data 0xe8000 0xced0 0x9000 5.16 8c34c00c6382b832f5e504db2481265a<BR>.rsrc 0xf5000 0x2ced0 0x2d000 4.63 4e41a22c6c5418a40f55bc957ed2356c<BR><BR>( 7 imports ) <BR>> KERNEL32.dll: CreateProcessW, OutputDebugStringA, FileTimeToSystemTime, FileTimeToLocalFileTime, OpenEventW, CreateEventW, DebugBreak, SetThreadPriority, CreateFileA, GetVolumeInformationA, ReadFile, SetFilePointer, WriteFile, VirtualAlloc, CreateFileW, GetShortPathNameW, DeviceIoControl, GetFileInformationByHandle, GetFileType, CancelIo, GetOverlappedResult, GetFileSize, SetFileAttributesW, GetFileAttributesW, CreateDirectoryW, RemoveDirectoryW, FindNextFileW, SetLastError, GetLogicalDrives, GetDriveTypeW, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, LocalFree, LocalAlloc, OpenProcess, GetEnvironmentStringsW, GetShortPathNameA, GetWindowsDirectoryW, ExpandEnvironmentStringsW, DeleteFileA, SetFileAttributesA, GetFileAttributesA, SetErrorMode, SetEnvironmentVariableA, CompareStringW, CompareStringA, FlushFileBuffers, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetLocaleInfoW, GetExitCodeProcess, GetConsoleMode, GetConsoleCP, GetTickCount, QueryPerformanceCounter, GetStartupInfoA, SetHandleCount, GetCommandLineA, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetStringTypeW, GetStringTypeA, IsValidLocale, EnumSystemLocalesA, GetUserDefaultLCID, LCMapStringW, LCMapStringA, GetDateFormatA, GetTimeFormatA, GetTimeZoneInformation, IsValidCodePage, GetOEMCP, GetSystemDirectoryW, ResetEvent, ResumeThread, WaitForMultipleObjects, FormatMessageW, HeapAlloc, SetEvent, TerminateThread, GetCommandLineW, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, OutputDebugStringW, Sleep, GetModuleHandleW, LoadLibraryExW, FindResourceW, LoadResource, SizeofResource, GetCurrentThreadId, FreeLibrary, GetVersionExW, GetModuleFileNameW, GetTempFileNameW, LoadLibraryA, WideCharToMultiByte, ReleaseMutex, WaitForSingleObject, CloseHandle, CreateMutexW, CreateMutexA, lstrcmpiW, GetProcessHeap, HeapFree, FindFirstFileW, FindClose, GetLastError, DeleteCriticalSection, InitializeCriticalSection, LeaveCriticalSection, EnterCriticalSection, RaiseException, LoadLibraryW, InterlockedIncrement, GetTempPathW, DeleteFileW, CopyFileW, lstrlenA, GetCPInfo, HeapSize, GetModuleFileNameA, GetStdHandle, ExitProcess, FatalAppExitA, VirtualFree, HeapCreate, HeapDestroy, GetCurrentThread, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetStartupInfoW, CreateThread, ExitThread, VirtualQuery, GetSystemInfo, GetModuleHandleA, VirtualProtect, GetSystemTimeAsFileTime, HeapReAlloc, RtlUnwind, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetVersionExA, GetThreadLocale, GetLocaleInfoA, GetACP, InterlockedExchange, MultiByteToWideChar, lstrlenW, InterlockedDecrement, GetProcAddress, SetConsoleCtrlHandler<BR>> USER32.dll: InsertMenuW, PostThreadMessageW, DestroyIcon, GetSystemMetrics, GetMenuStringW, GetMenuItemID, GetSubMenu, GetMenuState, GetMenuItemCount, DestroyMenu, CreatePopupMenu, GetMessageW, SetUserObjectSecurity, GetUserObjectSecurity, CloseWindowStation, UnregisterClassA, CloseDesktop, EnableMenuItem, DispatchMessageW, PeekMessageW, TranslateMessage, MessageBoxW, CharNextW, LoadStringW, SetMenuDefaultItem, DestroyWindow, LoadImageW, CharLowerW, OpenWindowStationW, GetProcessWindowStation, SetProcessWindowStation, OpenDesktopW<BR>> ADVAPI32.dll: DeregisterEventSource, ControlService, CloseServiceHandle, OpenServiceW, OpenSCManagerW, RegDeleteKeyA, RegDeleteValueA, RegSetValueExA, RegCreateKeyExA, RegQueryValueExA, RegOpenKeyExA, LogonUserW, CreateProcessAsUserW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, AddAccessAllowedAce, InitializeSecurityDescriptor, GetSecurityDescriptorDacl, GetAclInformation, InitializeAcl, AddAce, GetAce, SetSecurityDescriptorDacl, GetTokenInformation, GetLengthSid, CopySid, StartServiceCtrlDispatcherW, RegisterServiceCtrlHandlerW, RegisterEventSourceW, ReportEventW, CreateServiceW, ChangeServiceConfig2W, QueryServiceConfigW, RegCreateKeyW, RegEnumValueW, RegEnumKeyExW, RegQueryInfoKeyW, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, SetServiceStatus, DeleteService<BR>> SHELL32.dll: SHGetMalloc, SHGetSpecialFolderLocation, SHGetFileInfoA, SHGetDesktopFolder, ExtractIconExW, ShellExecuteExW, SHGetFolderPathW<BR>> ole32.dll: CoTaskMemAlloc, CoRevokeClassObject, CoTaskMemFree, CoCreateInstance, CoInitializeEx, CoSetProxyBlanket, CoUninitialize, CoInitializeSecurity, WriteClassStm, OleSaveToStream, StringFromGUID2, OleRun, CLSIDFromProgID, CLSIDFromString, StgCreateDocfile, StgOpenStorage, OleLoadFromStream, CoInitialize, ReadClassStm, CoRegisterClassObject, CoCreateInstanceEx, CoFreeUnusedLibraries, CoGetObject, CoTaskMemRealloc<BR>> OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -<BR>> COMCTL32.dll: ImageList_ReplaceIcon, ImageList_Destroy, ImageList_Write, ImageList_Create<BR><BR>( 0 exports ) <BR> |