CloseInput
DLLInfo
GetExitCode
GetProcess
ReadBinary
ReadText
ReleaseProcess
Remove
RunConsole
SetProcess
WriteBinary
WriteText
Overview
overview
7Static
static
7SMSConfig.exe
windows7-x64
7SMSConfig.exe
windows10-2004-x64
7TaskUsage.dll
windows7-x64
7TaskUsage.dll
windows10-2004-x64
7alrm.js
windows7-x64
1alrm.js
windows10-2004-x64
1ame.exe
windows7-x64
7ame.exe
windows10-2004-x64
7control.dll
windows7-x64
1control.dll
windows10-2004-x64
1dlldate.exe
windows7-x64
1dlldate.exe
windows10-2004-x64
1fzed.bat
windows7-x64
1fzed.bat
windows10-2004-x64
1hot.dll
windows7-x64
1hot.dll
windows10-2004-x64
3kammi.exe
windows7-x64
1kammi.exe
windows10-2004-x64
1msbt.bat
windows7-x64
7msbt.bat
windows10-2004-x64
7mscmd.exe
windows7-x64
1mscmd.exe
windows10-2004-x64
1mws.exe
windows7-x64
1mws.exe
windows10-2004-x64
1officed.exe
windows7-x64
7officed.exe
windows10-2004-x64
7proxy.exe
windows7-x64
1proxy.exe
windows10-2004-x64
1proxyload.exe
windows7-x64
1proxyload.exe
windows10-2004-x64
1psexec.exe
windows7-x64
7psexec.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
SMSConfig.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SMSConfig.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
TaskUsage.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
TaskUsage.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
alrm.js
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
alrm.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
ame.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
ame.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
control.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
control.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
dlldate.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
dlldate.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
fzed.bat
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
fzed.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
hot.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
hot.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
kammi.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
kammi.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
msbt.bat
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
msbt.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
mscmd.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
mscmd.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
mws.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
mws.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
officed.exe
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
officed.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
proxy.exe
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
proxy.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
proxyload.exe
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
proxyload.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
psexec.exe
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
psexec.exe
Resource
win10v2004-20230220-en
Target
frozenbot6.rar
Size
889KB
MD5
94569dfd1e3c39b0887b15602d1282b4
SHA1
af08375d3ee32787fce75a97f44f00b350442292
SHA256
54b9496d81f182b37f522051eb518a73bbf4846559ce14d5d6f7cc4b7dd4c422
SHA512
c2966ff2d446b27159d9b217ed2186b45ea7af1b483583f8c812419294b25902c2525e6afafa8d4aad44fdcc37b79d84e381486fe71cea4748e64b583d6f3274
SSDEEP
24576:wnVHAQ9/8ZQ5Rpf0Cc/GPi4S4bl8uQTBiQyyC/KIBpbYVI:wtvy6YQ/bl8VEQyyC/ZjEO
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/TaskUsage.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/SMSConfig.exe | upx |
static1/unpack001/TaskUsage.dll | upx |
static1/unpack001/ame.exe | upx |
static1/unpack001/officed.exe | upx |
static1/unpack001/psexec.exe | upx |
static1/unpack001/scon.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/SMSConfig.exe |
unpack001/TaskUsage.dll |
unpack003/out.upx |
unpack001/ame.exe |
unpack004/out.upx |
unpack001/control.dll |
unpack001/dlldate.exe |
unpack001/hot.dll |
unpack001/kammi.exe |
unpack001/mscmd.exe |
unpack001/mws.exe |
unpack001/officed.exe |
unpack001/proxy.exe |
unpack001/proxyload.exe |
unpack001/psexec.exe |
unpack001/scon.exe |
unpack001/sys-mc.dll |
unpack001/teal.dll |
unpack001/winshutoff.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseInput
DLLInfo
GetExitCode
GetProcess
ReadBinary
ReadText
ReleaseProcess
Remove
RunConsole
SetProcess
WriteBinary
WriteText
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
SetStdHandle
CloseHandle
SetFilePointer
GetOEMCP
ExitProcess
TerminateProcess
GetCurrentProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
IsBadWritePtr
IsBadReadPtr
HeapValidate
SetHandleCount
GetFileType
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
GetLastError
SetConsoleCtrlHandler
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
HeapAlloc
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetCPInfo
GetACP
SetEnvironmentVariableA
ntohs
inet_ntoa
sendto
htons
socket
inet_addr
gethostbyname
WSAStartup
WSACleanup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
wsprintfA
ShowWindow
CreateDCA
SelectObject
BitBlt
CreateCompatibleDC
GetDeviceCaps
CreateDIBSection
DeleteDC
DeleteObject
GetDIBColorTable
CloseHandle
TerminateProcess
Process32Next
Process32First
CreateFileA
CreateToolhelp32Snapshot
OpenProcess
lstrcmpiA
lstrcpyA
WinExec
WriteFile
ShellExecuteA
Capture
Echo_byte
Echo_data
Hidemirc
KeyOff
MouseOff
ProcessGet
ProcessKill
Runhidden
Showmirc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@WndListDlg$qpvuiuil
@WndProc$qpvuiuil
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CharUpperBuffA
MessageBoxA
WinHelpA
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateThread
DeleteCriticalSection
DeleteFileA
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FlushFileBuffers
FreeConsole
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetTimeZoneInformation
GetVersionExA
GetVersion
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalFileTimeToFileTime
MoveFileA
MultiByteToWideChar
OutputDebugStringA
ReadConsoleInputA
ReadFile
SearchPathA
SetConsoleCtrlHandler
SetConsoleMode
SetConsoleTitleA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteFile
WSAStartup
WSACleanup
gethostname
inet_addr
gethostbyname
gethostbyaddr
ioctlsocket
WSAGetLastError
send
recv
accept
select
listen
ntohs
getsockname
closesocket
bind
htonl
setsockopt
connect
socket
htons
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
CoInitialize
CoUninitialize
OleInitialize
OleUninitialize
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectA
CreateSolidBrush
DeleteDC
DeleteObject
GetObjectA
GetTextMetricsA
SelectObject
SetBkColor
SetTextColor
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
BringWindowToTop
CharUpperA
CreateDialogIndirectParamA
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawIconEx
EnableWindow
EndDialog
FillRect
FindWindowA
GetClassNameA
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemInt
GetDlgItemTextA
GetIconInfo
GetMenuItemInfoA
GetMessageA
GetParent
GetSubMenu
GetSysColorBrush
GetWindowDC
GetWindowRect
GetWindowTextA
InsertMenuItemA
IsIconic
KillTimer
LoadCursorA
LoadIconA
LoadMenuA
MessageBoxA
PeekMessageA
PostQuitMessage
RegisterClassExA
RegisterHotKey
RegisterWindowMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetDlgItemTextA
SetForegroundWindow
SetMenuItemInfoA
SetRect
SetTimer
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
TranslateMessage
UnregisterClassA
UnregisterHotKey
AllocConsole
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FlushFileBuffers
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentThread
GetEnvironmentStrings
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetVersion
GetWindowsDirectoryA
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalFileTimeToFileTime
MoveFileExA
MultiByteToWideChar
ReadConsoleInputA
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SetConsoleCtrlHandler
SetConsoleMode
SetConsoleTitleA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetLastError
SetPriorityClass
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteFile
InitCommonControlsEx
GetOpenFileNameA
GetSaveFileNameA
WSACleanup
WSAStartup
gethostname
getservbyport
gethostbyname
gethostbyaddr
getpeername
getsockname
recv
send
ntohs
recvfrom
sendto
accept
listen
bind
connect
htons
shutdown
setsockopt
inet_ntoa
closesocket
socket
select
__WSAFDIsSet
WSAGetLastError
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaStrI4
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaLateIdCall
__vbaEnd
__vbaFreeVarList
__vbaPut3
_adj_fdiv_m64
__vbaPut4
ord621
__vbaFreeObjList
ord516
_adj_fprem1
ord518
__vbaStrCat
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaExitProc
__vbaForEachCollObj
ord595
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
ord599
__vbaFpR4
ord520
__vbaFpR8
__vbaBoolVarNull
_CIsin
ord631
__vbaVargVarMove
ord632
__vbaNextEachCollObj
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
ord527
__vbaStrCmp
ord529
__vbaVarTstEq
__vbaPrintObj
__vbaI2I4
DllFunctionCall
_adj_fpatan
__vbaR4Var
ord568
EVENT_SINK_Release
ord600
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
__vbaPrintFile
__vbaInputFile
ord606
_adj_fprem
_adj_fdivr_m64
ord607
ord608
ord531
__vbaFPException
__vbaInStrVar
__vbaStrVarVal
__vbaVarCat
ord535
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaInStr
__vbaNew2
ord648
ord570
ord571
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaI4Str
__vbaFreeStrList
ord576
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
ord579
__vbaI4Var
__vbaStrToAnsi
__vbaVarDup
ord613
__vbaFpI4
__vbaVarCopy
ord617
_CIatan
__vbaStrMove
__vbaCastObj
ord619
_allmul
_CItan
__vbaFPInt
_CIexp
__vbaFreeStr
__vbaFreeObj
ord580
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
do_ShowWindow
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetProcessHeap
lstrlenA
lstrcpyA
HeapAlloc
wsprintfA
DLLInfo
Decrypt
Encpass
Encrypt
LoadDll
UnloadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetEnvironmentStringsA
RtlUnwind
_fdopen
_open_osfhandle
atoi
fclose
_cexit
malloc
memcpy
printf
raise
rand
setbuf
strcpy
strlen
LibMain
b1ll
b1tch
bill
bitch
hex2raw
l1ck
lick
raw2hex
rnd
s3e
s4w
saw
see
symmetric
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ