!This program cannot be run in DOS mode.
`.data
.idata
.didat
@.reloc
api-ms-win-core-winrt-string-l1-1-0.dll
api-ms-win-core-winrt-l1-1-0.dll
ext-ms-win-ntuser-dialogbox-l1-1-0.dll
ext-ms-win-ntuser-gui-l1-1-0.dll
ext-ms-win-ntuser-message-l1-1-0.dll
ext-ms-win-ntuser-windowclass-l1-1-1.dll
ext-ms-win-ntuser-windowclass-l1-1-0.dll
ext-ms-win-ntuser-windowclass-l1-1-2.dll
ext-ms-win-ntuser-window-l1-1-0.dll
ext-ms-win-rtcore-ntuser-cursor-l1-1-0.dll
Exception
ReturnHr
FailFast
RaiseFailFastException
RtlDllShutdownInProgress
internal\sdk\inc\wil\resource.h
WilError_02
WldpIsAllowedEntryPoint
rundll32.pdb
.rdata$brc
.rdata$T$brc
.CRT$XCA
.CRT$XCAA
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIY
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.gfids
.giats
.rdata
.rdata$sxdata
.rdata$zzzdbg
.text$di
.text$mn
.text$x
.text$yd
.tls$ZZZ
.xdata$x
minATL$__a
minATL$__f
minATL$__m
minATL$__z
.didat$2
.didat$3
.didat$4
.didat$6
.didat$7
.data$brc
.idata$5
.00cfg
.idata$2
.idata$3
.idata$4
.idata$6
.didat$5
.rsrc$01
.rsrc$02
SVWQQ3
9~(s2Wj
SSSSSSh
PWWWWWW
\$(Pj"j
SVWj@3
j,Zj"Yf;
\tj/Xf;
SVSSSS
QRPh\l
QRPh|l
QRPh<m
QRPh\m
QRPh|m
WindowsCreateString
WindowsStringHasEmbeddedNull
WindowsIsStringEmpty
RoRegisterActivationFactories
WindowsDeleteString
WindowsGetStringRawBuffer
RoRevokeActivationFactories
MessageBoxW
LoadIconW
PostThreadMessageW
TranslateMessage
DispatchMessageW
GetMessageW
GetClassLongW
SetWindowLongW
GetClassNameW
RegisterClassW
SetClassLongW
GetWindowLongW
DestroyWindow
CreateWindowExW
GetWindow
DefWindowProcW
LoadCursorW
0w`i*w@O-w
)w@*3w
9rv Orv
8rvP"rv`
NvPsNv
uNv0oKv
Qv`pKv
Pv rNv`_Lv0
_vsnwprintf
memcpy_s
_purecall
_XcptFilter
__p__commode
_amsg_exit
__wgetmainargs
__set_app_type
_cexit
__p__fmode
__setusermatherr
_initterm
_wcmdln
msvcrt.dll
__CxxFrameHandler3
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
_controlfp
_except_handler4_common
CoAddRefServerProcess
ReadFile
GetModuleFileNameA
IsWow64Process2
CoReleaseServerProcess
CreateSemaphoreExW
HeapFree
SetLastError
GetCommandLineW
GetCurrentProcess
ReleaseSemaphore
GetModuleHandleExW
CoWaitForMultipleHandles
GetSystemWow64Directory2W
CoUninitialize
CoCreateInstance
EncodePointer
SetErrorMode
SetFilePointer
CoRegisterClassObject
WaitForSingleObject
LocalAlloc
CreateFileW
GetCurrentThreadId
ReleaseMutex
GetSystemDirectoryW
RoOriginateErrorW
CoResumeClassObjects
SetProcessMitigationPolicy
CreateEventW
FormatMessageW
CoInitializeSecurity
GetLastError
AttachConsole
ReleaseSRWLockExclusive
OutputDebugStringW
SetEvent
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
ReleaseSRWLockShared
FreeConsole
HeapSetInformation
RoOriginateError
HeapAlloc
PathCchAppend
LoadStringW
DecodePointer
WriteConsoleW
GetProcAddress
CreateMutexExW
LocalFree
AcquireSRWLockShared
CLSIDFromString
ExitProcess
GetCurrentProcessId
GetProcessHeap
CreateProcessW
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
CoInitializeEx
DebugBreak
CoRevokeClassObject
LoadLibraryExW
IsDebuggerPresent
GetStartupInfoW
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
SearchPathW
CompareStringW
GetFileAttributesW
CharNextW
api-ms-win-core-com-l1-1-0.dll
api-ms-win-core-file-l1-1-0.dll
api-ms-win-core-libraryloader-l1-2-0.dll
api-ms-win-core-wow64-l1-1-1.dll
api-ms-win-core-synch-l1-1-0.dll
api-ms-win-core-heap-l1-1-0.dll
api-ms-win-core-errorhandling-l1-1-0.dll
api-ms-win-core-processenvironment-l1-1-0.dll
api-ms-win-core-processthreads-l1-1-0.dll
api-ms-win-core-util-l1-1-0.dll
api-ms-win-core-heap-l2-1-0.dll
api-ms-win-core-sysinfo-l1-1-0.dll
api-ms-win-core-winrt-error-l1-1-0.dll
api-ms-win-core-processthreads-l1-1-1.dll
api-ms-win-core-localization-l1-2-0.dll
api-ms-win-core-console-l1-2-0.dll
api-ms-win-core-debug-l1-1-0.dll
api-ms-win-core-handle-l1-1-0.dll
api-ms-win-core-path-l1-1-0.dll
api-ms-win-core-console-l1-1-0.dll
api-ms-win-core-string-l1-1-0.dll
api-ms-win-core-synch-l1-2-0.dll
api-ms-win-core-profile-l1-1-0.dll
api-ms-win-core-string-l2-1-0.dll
Wow64EnableWow64FsRedirection
CreateActCtxW
ActivateActCtx
DeactivateActCtx
ReleaseActCtx
QueryActCtxW
api-ms-win-core-kernel32-private-l1-1-0.dll
api-ms-win-core-sidebyside-l1-1-0.dll
PathIsRelativeW
api-ms-win-downlevel-shlwapi-l1-1-1.dll
SHSetThreadRef
api-ms-win-downlevel-shlwapi-l2-1-1.dll
ImageDirectoryEntryToData
imagehlp.dll
NtQuerySystemInformation
RtlImageNtHeader
RtlWow64IsWowGuestMachineSupported
NtSetInformationProcess
RtlSetSearchPathMode
NtQueryInformationToken
RtlNtStatusToDosError
NtOpenProcessToken
NtClose
NtSetInformationToken
ntdll.dll
malloc
_callnewh
ResolveDelayLoadedAPI
DelayLoadFailureHook
api-ms-win-core-delayload-l1-1-1.dll
api-ms-win-core-delayload-l1-1-0.dll
ApiSetQueryApiSetPresence
api-ms-win-core-apiquery-l1-1-0.dll
memset
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" xmlns:asmv3="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0">
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="x86"
version="5.1.0.0"
type="win32"/>
<description>Rundll32</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
<assembly
xmlns="urn:schemas-microsoft-com:asm.v1"
manifestVersion="1.0"
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="*"
type="win32"
version="5.1.0.0"
/>
<description>Rundll32</description>
</assembly>
wwwwwwwwwq
nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXnnnnnnnnnnnnkkaaaaagddddddddddddddddddddddddiiiXnnnnnnnnnnnnlTUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU!iXnnnnnnnnnnnnl
////////
44((((((( 2222UdXnnnnnnnnnnnnl
:////////
44((((((((( 22UdXnnnnnnnnnnnnj
/////////
44((((((( 22UdXnnnnnnnnnnnnj
:///////
44(((((((( UdXnnnnnnnnnnnnj
:////////
44(((((((( UgXnnnnnnnnnnnnj
////////
444((((((( VaXnnnnnnnnnnnnQ
/////////
44(((((((VaXnnnnnnnnnnnnQ
////////
4((((((VaXnnnnnnnnnnnnh
////////
4(((((VaXnnnnnnnnnnnnh
:////////
44(((WaXnnnnnnnnnnnnP
......
////////
44((WfXnnnnnnnnnnnnP
......
:////////
44WfXnnnnnnnnnnnnF
......
:////////
4W_XnnnnnnnnnnnnF
......
:////////
[_XnnnnnnnnnnnnO
......
/////////
[_XnnnnnnnnnnnnO
......
:////////
[bXnnnnnnnnnnnnE
........
////////
[]XnnnnnnnnnnnnE
......
////////[]XnnnnnnnnnnnnC
.......
://////[]XnnnnnnnnnnnnC
.......
://///[]Xnnnnnnnnnnnn<
......
:////^]Xnnnnnnnnnnnn<
///^]Xnnnnnnnnnnnn;
......
:/^\Xnnnnnnnnnnnn;
.......
^\Xnnnnnnnnnnnn8
......
`\Xnnnnnnnnnnnn8
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn7
......
`ZXnnnnnnnnnnnn7RS
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
W[[^^`eYXnnnnnnnnnnnn,
HHIIIIYcjXnnnnnnnnnnnn+
-Xnnnnnnnnnnnnn+
&Xnnnnnnnnnnnnnn1
%Xnnnnnnnnnnnnnnn1
$Xnnnnnnnnnnnnnnnn"
#Xnnnnnnnnnnnnnnnnn"
'Xnnnnnnnnnnnnnnnnnn!
Xnnnnnnnnnnnnnnnnnnn!(( )))***6600555===>>>GGBInnnnnnnnnnnnnn
Pjnqw~
Gehiqr|
G]ceiqty~
?X\cgiltw}
?MSX]chmqty}
:HNRT\cfiovy}
:BHJQW\cghlouy
0@CDIMWY]agiqry~
+9=ADJLQW\cgilrw{
"46=@CFKRSX_cjknxy
",169>CDJNRX]cekprx}
)*.57;ABHNQR\`eilrx
#&,-489@BIJOWY]chkn
!&*-169=ADLNUT[chj
#',/26;ABHLQW\_e
!&)/46;@BCKQWZ]
%)-169>@CHMRX
#'*-47;>E
#&(-36;
!#(*14
"+0:?GP^d
D?;72-)#!
JF@<83.(%"
RLIB>:5/*&
WSNIC?;61-
_[TPJF@<74
d`\VPLGA=9$
lfb]XSMHB>'
rmic^YUOJD,
xsojeaZVPK0
zvpkga[WQ+
|wqmhEE
iK2%)U+
I/"bH4''99
Q7+<Y@3
T8,@X;1
Q:+BUB/
Q8,RZB1`@@
N. HY7!
O3$dS7"%U9
0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1\1`1h1p1
>">&>,>0>6>:>J>
#0U0^0d0~0
1C1R1_1{1
212M2\2
3&30393C3L3i3|3
7'7/7;7H7X7b7o7y7
<+<5<D<
2!212A2
3J3P3_3h3u3|3
4 565o5w5
6#6(636K6_6i6
7#7*7A7N7U7d7r7
7@8M8i8o8
:!:M:V:h:
;';3;S;j;v;
=(=1=J=
?.?A?I?c?o?
0>0S0p0v0
1Q1{1,262@2H2R2w2~2
373G3S3^3e3v3
5M6c6i6
8I8P8~8
</<Z<_<
='=9=}=
=:>v>{>
>!?>?M?
0#0U0m0
1;1F1X1k1t1|1
1*2F2T2
484K4f4n4
8)8<8X8
9/9P9~9
9>:I:Y:k:
;#;8;Z;o;x;
;#<4<Z<w<~<
=!=?=H=N=V=\=x=
>*>=>_>j>|>
?]?g?m?w?
0%0+080R0]0g0r0
1*10161<1B1H1R1W1]1k1t1
22)232C2S2Y2d2j2v2
3(323B3K3Y3v3
7*7?7N7V7k7t7y7
7L8l8r8x8~8
9+989E9S9`9n9{9
:#:1:;:E:O:\:
;;8;?;a;
<$<(<D<H<P<
0$0,04080<0@0H0L0P0T0\0`0d0h0p0x0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-1
ext-ms-win-ntuser-dialogbox-l1-1-2
ext-ms-win-ntuser-dialogbox-l1-1-3
ntdll.dll
kernelbase.dll
%hs(%d)\%hs!%p:
%hs!%p:
(caller: %p)
%hs(%d) tid(%x) %08X %ws
Msg:[%ws]
CallContext:[%hs]
[%hs(%hs)]
2CONOUT$
rundll32.exe
WLDP.DLL
tlocalserver
RunDLL
requestedRunLevel
Local\SM0:%d:%d:%hs
activatibleClassId
.manifest
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Windows host process (Rundll32)
FileVersion
10.0.17763.1697 (WinBuild.160101.0800)
InternalName
rundll
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
RUNDLL32.EXE
ProductName
Microsoft
Windows
Operating System
ProductVersion
10.0.17763.1697
VarFileInfo
Translation