Import table
advapi32.dll
RegQueryValueExA, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA
kernel32.dll
GetCurrentProcessId, lstrcmpiA, lstrcmpA, InitializeCriticalSection, GetLastError, LeaveCriticalSection, EnterCriticalSection, IsBadReadPtr, GetModuleHandleA, lstrlenA, VirtualQuery, InterlockedDecrement, InterlockedIncrement, CreateProcessA, CreateProcessW, WinExec, ResumeThread, GetCurrentThreadId, WideCharToMultiByte, lstrlenW, GetModuleHandleW, IsDBCSLeadByte, GetTickCount, MultiByteToWideChar, GetModuleFileNameA, CreateRemoteThread, WriteProcessMemory, VirtualAllocEx, VirtualProtect, SetLastError, lstrcatA, GetProcAddress, GetPrivateProfileStringA, GetFileAttributesA, CreateFileA, SetFilePointer, ReadFile, CreateEventA, ResetEvent, WaitForMultipleObjects, GlobalLock, GlobalAlloc, GlobalFree, GlobalUnlock, GlobalHandle, IsBadWritePtr, WaitForSingleObject, ReleaseMutex, CreateMutexA, UnmapViewOfFile, GetCommandLineA, Sleep, CloseHandle, OutputDebugStringA, IsBadCodePtr, lstrcpyA, CreateThread, GetVersion, LoadLibraryA, VirtualFreeEx, lstrcpynA, CreateFileMappingA, FlushViewOfFile, VirtualAlloc, IsBadStringPtrA, SetFileAttributesA, DeleteFileA, CreateDirectoryA, MapViewOfFile, OpenFileMappingA, GetFileSize, SetEndOfFile, FlushFileBuffers, VirtualFree, ExpandEnvironmentStringsA, GetVersionExA
ntdll.dll
LdrUnloadDll, LdrLoadDll, LdrGetProcedureAddress
user32.dll
PostMessageA, CallWindowProcA, GetWindowTextA, IsWindowUnicode, GetWindowThreadProcessId, EnumWindows, DefWindowProcA, GetDlgItemTextA, GetWindowLongA, SetWindowLongA, CharLowerA, SetWindowsHookExW, SendMessageA, IsWindow, GetClassNameA, wvsprintfA, UnhookWindowsHookEx, CallNextHookEx, SetWindowsHookExA, FindWindowA, RegisterWindowMessageA, GetDlgItem, wsprintfA
Export table
DllMain
InstallHook
IsHookActive
RemoveHook