K:\MyProjects\hookdll\TotalInjector\Release\TotalInjector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
PPHUD Free.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PPHUD Free.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
TotalInjector.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
TotalInjector.exe
Resource
win10v2004-20240412-en
General
-
Target
f31ba760b559110c2e58d4d2d8a3e987_JaffaCakes118
-
Size
1.0MB
-
MD5
f31ba760b559110c2e58d4d2d8a3e987
-
SHA1
5df412b928f101714d9f7b69bd5ee9c0c7407084
-
SHA256
829c4566811dc5e9ab7b3fc576cd1c1008f6592bbcda832ecb185407525bfca7
-
SHA512
f349f113bc39ffb1f62a7b25037c53490ee6e3b8a36ce6fce672e603e789f946f68305f72c9f71898d45697c7ed4cd98627624f70c25cfa4d2bcbe3443efc5bd
-
SSDEEP
24576:e0qJa2f8Voqa8/3VbUdeDJpGR3/yvLlayR+Ux38FE:e0H2UVoU/Z9iR3qTldAUy+
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/PPHUD Free.dll unpack001/TotalInjector.exe
Files
-
f31ba760b559110c2e58d4d2d8a3e987_JaffaCakes118.rar
-
PPHUD Free.dll.dll windows:6 windows x86 arch:x86
09e1609c01f9bcb000d5bd77ee322797
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalUnlock
DisableThreadLibraryCalls
CreateThread
GetModuleFileNameA
VirtualProtect
FreeLibraryAndExitThread
GetModuleHandleA
CreateToolhelp32Snapshot
Sleep
Process32Next
CloseHandle
Beep
GetProcAddress
VirtualQuery
GetCurrentProcess
K32GetModuleInformation
GlobalLock
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
GlobalAlloc
QueryPerformanceCounter
QueryPerformanceFrequency
FindClose
FindNextFileA
FindFirstFileA
GetTickCount64
MultiByteToWideChar
GetPrivateProfileStringA
CreateDirectoryA
ResetEvent
SetEvent
WritePrivateProfileStringA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetVolumeInformationA
user32
SetClipboardData
GetClipboardData
SetCursor
GetClientRect
CloseClipboard
GetKeyState
GetAsyncKeyState
CallWindowProcA
OpenClipboard
FindWindowA
SetWindowLongA
EmptyClipboard
advapi32
CryptDestroyHash
CryptAcquireContextA
CryptCreateHash
CryptHashData
GetCurrentHwProfileA
CryptGetHashParam
CryptReleaseContext
shell32
SHGetFolderPathA
msvcp140
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?uncaught_exception@std@@YA_NXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ
?always_noconv@codecvt_base@std@@QBE_NXZ
??Bid@locale@std@@QAEIXZ
?_BADOFF@std@@3_JB
?_Xinvalid_argument@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
wininet
HttpOpenRequestA
InternetConnectA
InternetCheckConnectionA
InternetOpenA
HttpSendRequestA
InternetCloseHandle
InternetReadFile
urlmon
URLDownloadToFileA
imm32
ImmSetCompositionWindow
ImmGetContext
vcruntime140
__std_exception_copy
__vcrt_InitializeCriticalSectionEx
memset
_CxxThrowException
_except_handler4_common
__std_type_info_destroy_list
__std_exception_destroy
strchr
memchr
strstr
_purecall
memcpy
memmove
__std_terminate
__CxxFrameHandler3
api-ms-win-crt-utility-l1-1-0
srand
rand
qsort
api-ms-win-crt-math-l1-1-0
_CIatan2
_libm_sse2_acos_precise
_libm_sse2_cos_precise
_libm_sse2_exp_precise
_libm_sse2_pow_precise
_libm_sse2_sin_precise
fmaxf
_except1
_libm_sse2_sqrt_precise
ceil
floor
_CIfmod
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
_wassert
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_cexit
terminate
_initterm
_initterm_e
_errno
_invalid_parameter_noinfo
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
_lock_file
remove
api-ms-win-crt-stdio-l1-1-0
fsetpos
ungetc
setvbuf
__stdio_common_vsprintf
fgetpos
__stdio_common_vsprintf_s
fgetc
_fseeki64
fputc
ftell
_get_stream_buffer_pointers
fopen
__acrt_iob_func
__stdio_common_vsscanf
fread
_wfopen
fflush
fclose
__stdio_common_vfprintf
fseek
fwrite
api-ms-win-crt-convert-l1-1-0
atof
atoi
strtol
api-ms-win-crt-string-l1-1-0
strncpy
towlower
isprint
isspace
_stricmp
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
Sections
.text Size: 617KB - Virtual size: 617KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 475KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
TInjector.cfg
-
TotalInjector.exe.exe windows:5 windows x86 arch:x86
c24f9cbb524a68693d762d7035eb71a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapQueryInformation
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
HeapCreate
RtlUnwind
SetHandleCount
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
IsProcessorFeaturePresent
GetStringTypeW
HeapSize
CompareStringW
LCMapStringW
GetConsoleCP
GetConsoleMode
WriteConsoleW
GetProcessHeap
CreateFileW
SetEnvironmentVariableA
GetStartupInfoW
HeapSetInformation
GetCommandLineA
CreateThread
ExitThread
ExitProcess
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
GetTimeZoneInformation
RaiseException
DecodePointer
EncodePointer
HeapReAlloc
HeapFree
HeapAlloc
FindResourceExW
SetErrorMode
SearchPathA
GetProfileIntA
GetNumberFormatA
GetWindowsDirectoryA
GetTempPathA
GetTempFileNameA
GetFileTime
GetFileSizeEx
GetFileAttributesA
GetFileAttributesExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
lstrcmpiA
DeleteFileA
GetACP
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
lstrcpyA
GetSystemDirectoryW
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
ReleaseActCtx
CreateActCtxW
WaitForSingleObject
SetThreadPriority
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoA
LoadLibraryExA
lstrcmpA
GetModuleHandleW
InterlockedExchange
GlobalSize
GlobalAlloc
FormatMessageA
LocalFree
lstrlenW
MulDiv
GetModuleFileNameA
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryW
FreeLibrary
lstrcmpW
lstrlenA
ActivateActCtx
DeactivateActCtx
SetLastError
LoadLibraryA
Beep
OpenThread
SetThreadContext
GetThreadContext
SuspendThread
CreateRemoteThread
VirtualAllocEx
ReadFile
GetTickCount
CreateFileA
GetModuleHandleA
ResumeThread
WriteFile
CreateProcessA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetVersionExA
MultiByteToWideChar
WinExec
CopyFileA
GetCurrentProcessId
WriteProcessMemory
ReadProcessMemory
VirtualProtect
VirtualAlloc
GetProcAddress
GetModuleHandleExA
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceW
GetLastError
OpenProcess
GetCurrentProcess
CloseHandle
Sleep
Thread32Next
Thread32First
Process32Next
Process32First
CreateToolhelp32Snapshot
HeapQueryInformation
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
HeapCreate
RtlUnwind
SetHandleCount
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
IsProcessorFeaturePresent
GetStringTypeW
HeapSize
CompareStringW
LCMapStringW
GetConsoleCP
GetConsoleMode
WriteConsoleW
GetProcessHeap
CreateFileW
SetEnvironmentVariableA
GetStartupInfoW
HeapSetInformation
GetCommandLineA
CreateThread
ExitThread
ExitProcess
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
GetTimeZoneInformation
RaiseException
DecodePointer
EncodePointer
HeapReAlloc
HeapFree
HeapAlloc
FindResourceExW
SetErrorMode
SearchPathA
GetProfileIntA
GetNumberFormatA
GetWindowsDirectoryA
GetTempPathA
GetTempFileNameA
GetFileTime
GetFileSizeEx
GetFileAttributesA
GetFileAttributesExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
lstrcmpiA
DeleteFileA
GetACP
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
lstrcpyA
GetSystemDirectoryW
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
ReleaseActCtx
CreateActCtxW
WaitForSingleObject
SetThreadPriority
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoA
LoadLibraryExA
lstrcmpA
GetModuleHandleW
InterlockedExchange
GlobalSize
GlobalAlloc
FormatMessageA
LocalFree
lstrlenW
MulDiv
GetModuleFileNameA
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryW
FreeLibrary
lstrcmpW
lstrlenA
ActivateActCtx
DeactivateActCtx
SetLastError
LoadLibraryA
Beep
OpenThread
SetThreadContext
GetThreadContext
SuspendThread
CreateRemoteThread
VirtualAllocEx
ReadFile
GetTickCount
CreateFileA
GetModuleHandleA
ResumeThread
WriteFile
CreateProcessA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetVersionExA
MultiByteToWideChar
WinExec
CopyFileA
GetCurrentProcessId
WriteProcessMemory
ReadProcessMemory
VirtualProtect
VirtualAlloc
GetProcAddress
GetModuleHandleExA
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceW
GetLastError
OpenProcess
GetCurrentProcess
CloseHandle
Sleep
Thread32Next
Thread32First
Process32Next
Process32First
CreateToolhelp32Snapshot
psapi
GetModuleBaseNameA
GetModuleFileNameExA
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegEnumValueA
user32
GetAsyncKeyState
NotifyWinEvent
MessageBeep
ReleaseCapture
WindowFromPoint
SetCapture
SetWindowRgn
GetSystemMenu
LoadMenuW
DeleteMenu
OffsetRect
CopyImage
DestroyMenu
GetMenuItemInfoA
IntersectRect
InflateRect
RealChildWindowFromPoint
GetSysColorBrush
LoadCursorA
LoadCursorW
SetLayeredWindowAttributes
EnumDisplayMonitors
SystemParametersInfoA
SetRectEmpty
ShowOwnedPopups
SetCursor
GetMessageA
PostQuitMessage
GetCursorPos
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuStringA
AppendMenuA
InsertMenuA
RemoveMenu
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
IsWindowEnabled
ShowWindow
MoveWindow
IsDialogMessageA
CheckDlgButton
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
DestroyWindow
IsZoomed
GetMessageTime
GetMessagePos
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
RedrawWindow
IsWindowVisible
ValidateRect
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
GetWindowRect
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowLongA
SetWindowLongA
SetWindowPos
PtInRect
MapVirtualKeyA
GetKeyNameTextA
ReleaseDC
GetDC
CopyRect
IsWindow
GetClassNameA
MapDialogRect
DestroyCursor
SubtractRect
LoadBitmapW
InvalidateRect
MapVirtualKeyExA
IsCharLowerA
GetDoubleClickTime
EnableWindow
SendMessageA
GetUpdateRect
IsClipboardFormatAvailable
CreateMenu
TranslateMDISysAccel
DrawMenuBar
DefMDIChildProcA
UnionRect
DefFrameProcA
PostThreadMessageA
CharUpperBuffA
CopyIcon
UnpackDDElParam
UpdateWindow
FillRect
DrawStateA
KillTimer
DispatchMessageA
TranslateMessage
PeekMessageA
EnumWindows
GetWindowTextA
GetWindow
GetWindowThreadProcessId
CharUpperA
GetWindowRgn
UnhookWindowsHookEx
LoadIconW
SetTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
MessageBoxA
SetWindowTextA
GetTopWindow
ReuseDDElParam
LoadMenuA
IsRectEmpty
LoadAcceleratorsA
InsertMenuItemA
TranslateAcceleratorA
FrameRect
RegisterClipboardFormatA
LoadImageW
EmptyClipboard
CloseClipboard
SetClipboardData
OpenClipboard
GetNextDlgGroupItem
LoadImageA
GetIconInfo
HideCaret
InvertRect
LockWindowUpdate
BringWindowToTop
SetCursorPos
SetRect
CreateAcceleratorTableA
LoadAcceleratorsW
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
CopyAcceleratorTableA
DrawFocusRect
DrawFrameControl
DrawEdge
DrawIconEx
SetClassLongA
DestroyAcceleratorTable
SetParent
UnregisterClassA
DestroyIcon
WaitMessage
GetMenuDefaultItem
SetMenuDefaultItem
CreatePopupMenu
IsMenu
MonitorFromPoint
UpdateLayeredWindow
EnableScrollBar
SetActiveWindow
gdi32
SetMapMode
GetClipBox
ExcludeClipRect
IntersectClipRect
LineTo
MoveToEx
SetTextAlign
GetLayout
SetLayout
SelectClipRgn
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
BitBlt
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
CreateCompatibleDC
SelectPalette
GetObjectType
CreatePen
SetBkColor
CreateDIBitmap
CreateFontIndirectA
CreateCompatibleBitmap
GetTextMetricsA
GetTextCharsetInfo
SetRectRgn
CombineRgn
DPtoLP
GetTextExtentPoint32A
CreateRoundRectRgn
CreateDIBSection
CreatePolygonRgn
GetBkColor
GetTextColor
CreateEllipticRgn
Polyline
Ellipse
Polygon
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
RealizePalette
GetSystemPaletteEntries
OffsetRgn
GetRgnBox
SetDIBColorTable
StretchBlt
SetPixel
Rectangle
EnumFontFamiliesExA
ExtFloodFill
SetPaletteEntries
LPtoDP
GetWindowOrgEx
GetViewportOrgEx
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
GetTextFaceA
SetPixelV
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateDCA
CopyMetaFileA
GetDeviceCaps
EnumFontFamiliesA
CreateBitmap
SetTextColor
PatBlt
CreateRectRgnIndirect
GetStockObject
GetObjectA
CreateSolidBrush
CreateHatchBrush
DeleteObject
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetDesktopFolder
ShellExecuteA
SHAppBarMessage
DragFinish
SHGetMalloc
DragQueryFileA
SHGetFileInfoA
comctl32
ImageList_GetIconSize
InitCommonControlsEx
shlwapi
PathStripToRootA
PathRemoveFileSpecW
PathFindFileNameA
PathFindExtensionA
PathIsUNCA
ole32
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitializeEx
CoInitialize
CreateStreamOnHGlobal
DoDragDrop
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
OleLockRunning
OleGetClipboard
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
CoTaskMemFree
oleaut32
SysStringLen
VariantTimeToSystemTime
SystemTimeToVariantTime
VarBstrFromDate
SysAllocString
SysFreeString
VariantInit
SysAllocStringLen
VariantChangeType
VariantClear
gdiplus
GdipDrawImageI
GdipGetImageGraphicsContext
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdipFree
GdipAlloc
GdipDeleteGraphics
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusStartup
GdiplusShutdown
oleacc
AccessibleObjectFromWindow
CreateStdAccessibleObject
LresultFromObject
wininet
InternetQueryDataAvailable
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
imm32
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
winmm
PlaySoundA
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ