_CloseProcess
_FindProcess
_KillProcess
_Unload
Overview
overview
7Static
static
3201037d0ab...18.exe
windows7-x64
7201037d0ab...18.exe
windows10-2004-x64
7$1/Tablacu...ff.exe
windows7-x64
1$1/Tablacu...ff.exe
windows10-2004-x64
1$3/$APPDAT...er.exe
windows7-x64
7$3/$APPDAT...er.exe
windows10-2004-x64
7$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$R1/Tablacus.exe
windows7-x64
4$R1/Tablacus.exe
windows10-2004-x64
3$R1/TablacusApp.exe
windows7-x64
1$R1/TablacusApp.exe
windows10-2004-x64
1$R1/script...und.js
windows7-x64
3$R1/script...und.js
windows10-2004-x64
3$R1/script/common.js
windows7-x64
3$R1/script/common.js
windows10-2004-x64
3$R1/script/consts.js
windows7-x64
3$R1/script/consts.js
windows10-2004-x64
3$R1/script...g.html
windows7-x64
1$R1/script...g.html
windows10-2004-x64
1$R1/script/index.html
windows7-x64
1$R1/script/index.html
windows10-2004-x64
1$R1/script/index.js
windows7-x64
3$R1/script/index.js
windows10-2004-x64
3$R1/script...n.html
windows7-x64
1$R1/script...n.html
windows10-2004-x64
1$R1/script...s.html
windows7-x64
1$R1/script...s.html
windows10-2004-x64
1$R1/script/options.js
windows7-x64
3$R1/script/options.js
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
201037d0abd9a98db87dd8c16abcd32c_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
201037d0abd9a98db87dd8c16abcd32c_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$1/TablacusInstallerStuff.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$1/TablacusInstallerStuff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$3/$APPDATA/TablacusApp/uninstaller.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$3/$APPDATA/TablacusApp/uninstaller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
$R1/Tablacus.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$R1/Tablacus.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$R1/TablacusApp.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$R1/TablacusApp.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$R1/script/background.js
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$R1/script/background.js
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
$R1/script/common.js
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$R1/script/common.js
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
$R1/script/consts.js
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$R1/script/consts.js
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
$R1/script/dialog.html
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
$R1/script/dialog.html
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
$R1/script/index.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$R1/script/index.html
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
$R1/script/index.js
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$R1/script/index.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$R1/script/location.html
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
$R1/script/location.html
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
$R1/script/options.html
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$R1/script/options.html
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
$R1/script/options.js
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
$R1/script/options.js
Resource
win10v2004-20240419-en
Target
201037d0abd9a98db87dd8c16abcd32c_JaffaCakes118
Size
551KB
MD5
201037d0abd9a98db87dd8c16abcd32c
SHA1
8fa5f6119b1b9da114f85e27a0df046ed64dfd7c
SHA256
fe22e0a3594bff1aaa8daa3d102e840bde89ea342a3e16dfb1ee298f08e5696f
SHA512
7595f30e20dd8058ce12ed17283aa9915a49c6e07624e257283011a985975850510d12ac55e5150268cf7da13eb16742cc7bf737b91aba63ccbefe5bc514056c
SSDEEP
12288:et9r8hcmTtcNqOQ/3AjTr7vHSujL6Tc8VpSriup858QjJgE85:uZfmJcN0/3YrziThSrHp8KQVgE0
Checks for missing Authenticode signature.
resource |
---|
201037d0abd9a98db87dd8c16abcd32c_JaffaCakes118 |
unpack001/$1/TablacusInstallerStuff.exe |
unpack001/$3/$APPDATA/TablacusApp/uninstaller.exe |
unpack002/$PLUGINSDIR/nsProcess.dll |
unpack001/$PLUGINSDIR/nsProcess.dll |
unpack001/$R1/Tablacus.exe |
unpack001/$R1/TablacusApp.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
MoveFileW
SetFileAttributesW
GetCurrentProcess
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
WaitForSingleObject
CopyFileW
CompareFileTime
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GlobalFree
GlobalAlloc
GetShortPathNameW
SearchPathW
lstrcmpiW
SetFileTime
CloseHandle
ExpandEnvironmentStringsW
lstrcmpW
GlobalUnlock
lstrcpynW
GetDiskFreeSpaceW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
MulDiv
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetSystemMenu
SetClassLongW
IsWindowEnabled
EnableMenuItem
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
wsprintfW
ScreenToClient
GetWindowRect
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
LoadImageW
SetTimer
SetWindowTextW
PostQuitMessage
ShowWindow
GetDlgItem
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
DrawTextW
EndPaint
CreateDialogParamW
SendMessageTimeoutW
SetForegroundWindow
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
RegDeleteKeyW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
SetFilePointer
GetProcAddress
CloseHandle
GetFileSize
CreateFileW
WideCharToMultiByte
LoadLibraryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetCommandLineA
GetCommandLineW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
MultiByteToWideChar
GetACP
HeapFree
HeapAlloc
GetStringTypeW
LCMapStringW
GetFileType
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
HeapReAlloc
WriteConsoleW
DecodePointer
RegSetValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
MoveFileW
SetFileAttributesW
GetCurrentProcess
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
WaitForSingleObject
CopyFileW
CompareFileTime
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GlobalFree
GlobalAlloc
GetShortPathNameW
SearchPathW
lstrcmpiW
SetFileTime
CloseHandle
ExpandEnvironmentStringsW
lstrcmpW
GlobalUnlock
lstrcpynW
GetDiskFreeSpaceW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
MulDiv
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetSystemMenu
SetClassLongW
IsWindowEnabled
EnableMenuItem
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
wsprintfW
ScreenToClient
GetWindowRect
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
LoadImageW
SetTimer
SetWindowTextW
PostQuitMessage
ShowWindow
GetDlgItem
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
DrawTextW
EndPaint
CreateDialogParamW
SendMessageTimeoutW
SetForegroundWindow
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
RegDeleteKeyW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
OpenProcess
MultiByteToWideChar
lstrlenA
lstrlenW
LoadLibraryA
lstrcmpiW
lstrcpynW
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetVersionExW
GlobalFree
GlobalAlloc
GetWindowThreadProcessId
EnumWindows
wsprintfW
PostMessageW
_CloseProcess
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
OpenProcess
MultiByteToWideChar
lstrlenA
lstrlenW
LoadLibraryA
lstrcmpiW
lstrcpynW
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetVersionExW
GlobalFree
GlobalAlloc
GetWindowThreadProcessId
EnumWindows
wsprintfW
PostMessageW
_CloseProcess
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\cpp\TE\Debug\TE32.pdb
GlobalGetAtomNameW
GlobalFindAtomW
GlobalDeleteAtom
FileTimeToDosDateTime
OutputDebugStringW
MoveFileExW
VerSetConditionMask
VerifyVersionInfoW
CreateMutexW
TerminateProcess
GlobalAlloc
GetThreadLocale
lstrcmpW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
VirtualAlloc
GlobalAddAtomW
LeaveCriticalSection
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
ExitProcess
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapFree
RaiseException
HeapAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
CreateThread
ResumeThread
GetLastError
ExitThread
GetTimeFormatW
GetDateFormatW
GetCurrentDirectoryW
GetModuleHandleW
LoadLibraryExW
OpenProcess
GetVersionExW
GetShortPathNameW
SetFileTime
WriteFile
CreateDirectoryW
GetTickCount
lstrcmpA
WideCharToMultiByte
lstrcmpiA
FreeLibrary
GetProcAddress
LoadLibraryW
GlobalUnlock
GlobalLock
WaitForSingleObject
CreateEventW
GetCurrentThreadId
SetEvent
GetVolumeInformationW
GetCommandLineW
lstrcpyW
FileTimeToSystemTime
InterlockedIncrement
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
FindClose
FindNextFileW
FindFirstFileW
GetModuleFileNameW
GetDriveTypeW
lstrcpynW
GetCurrentProcess
lstrcmpiW
ReleaseMutex
Sleep
lstrcatW
GetNumberFormatW
GetLocaleInfoW
CloseHandle
ReadFile
GetFileSize
CreateFileW
MultiByteToWideChar
GetUserDefaultLCID
lstrlenW
FormatMessageW
LocalFree
InterlockedDecrement
EnterCriticalSection
GetModuleHandleA
AttachThreadInput
SetWindowLongW
GetWindowLongW
SendMessageW
RedrawWindow
GetPropA
GetParent
SetParent
FindWindowExA
GetClientRect
MoveWindow
InvalidateRect
GetMenuItemInfoW
GetMenuItemCount
GetForegroundWindow
GetWindowThreadProcessId
SetForegroundWindow
ShowWindow
SystemParametersInfoW
IsIconic
GetAsyncKeyState
SetWindowsHookExW
TrackPopupMenuEx
UnhookWindowsHookEx
MessageBoxW
GetClassLongW
GetSubMenu
GetSysColorBrush
GetDC
CreatePopupMenu
SetClassLongW
GetSystemMenu
GetWindowDC
GetWindow
GetTopWindow
GetCapture
GetMessagePos
SetMenuDefaultItem
GetMenuDefaultItem
WaitForInputIdle
MapVirtualKeyW
GetMenuItemID
ReleaseDC
GetSysColor
GetSystemMetrics
SetMenuItemInfoW
SetMenuInfo
GetMenuInfo
EndPaint
FillRect
GetIconInfo
MsgWaitForMultipleObjectsEx
SendInput
GetMessageW
SendNotifyMessageW
SetWindowTextW
InsertMenuW
AllowSetForegroundWindow
CopyImage
LoadMenuW
LoadIconW
LoadImageW
CreateWindowExW
BeginPaint
LoadCursorFromFileW
GetWindowTextLengthW
GetWindowTextW
GetClassNameW
GetKeyNameTextW
LoadStringW
MonitorFromPoint
MonitorFromRect
PtInRect
SetRectEmpty
DefWindowProcW
PostQuitMessage
ChangeClipboardChain
SetClipboardViewer
RegisterClipboardFormatW
SendMessageTimeoutW
ShowScrollBar
SetRect
CopyRect
RegisterClassExW
CopyIcon
DrawTextW
UnregisterHotKey
RegisterHotKey
SetWindowPos
CreateMenu
InsertMenuItemW
IsChild
GetFocus
CallNextHookEx
ScreenToClient
SetFocus
GetClassNameA
GetDoubleClickTime
GetCursorPos
CallWindowProcW
ClientToScreen
OffsetRect
GetKeyState
GetWindowRect
IsWindowVisible
SetCursor
LoadCursorW
SetCapture
ReleaseCapture
SetScrollInfo
FindWindowW
FindWindowExW
WindowFromPoint
PeekMessageW
TranslateMessage
DispatchMessageW
RegisterWindowMessageW
GetKeyboardState
SetKeyboardState
CreateIconIndirect
PostMessageW
KillTimer
EndMenu
DestroyCursor
SetCursorPos
DestroyWindow
EnableMenuItem
DrawIconEx
RemoveMenu
DeleteMenu
SetMenuItemBitmaps
IsMenu
BringWindowToTop
OpenIcon
IsZoomed
IsWindow
DestroyIcon
SetTimer
DestroyMenu
DrawIcon
keybd_event
mouse_event
GetMonitorInfoW
DeleteObject
LineTo
BitBlt
Rectangle
CreatePen
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
SelectObject
GetObjectW
SetTextColor
SetBkColor
SetBkMode
GetTextExtentPoint32W
DeleteDC
MoveToEx
CreateFontIndirectW
GetOpenFileNameW
ChooseColorW
FindTextW
GetSaveFileNameW
ChooseFontW
ReplaceTextW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
ord256
SHGetSettings
SHGetFolderLocation
ord189
ord645
ord644
ShellExecuteW
SHGetFileInfoW
ord2
ord88
ExtractIconExW
SHEmptyRecycleBinW
Shell_NotifyIconW
ord4
SHChangeNotify
DragFinish
DragAcceptFiles
SHFreeNameMappings
ShellExecuteExW
ord16
CommandLineToArgvW
SHGetDataFromIDListW
ord152
SHFileOperationW
ord162
ord18
ord23
ord21
DragQueryFileW
ord17
ord153
SHGetDesktopFolder
SHBindToParent
ord25
ReleaseStgMedium
CoCreateInstance
StringFromGUID2
StringFromCLSID
CoMarshalInterThreadInterfaceInStream
CoCreateGuid
OleSetClipboard
OleGetClipboard
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CoGetInterfaceAndReleaseStream
CoUninitialize
CoInitialize
CLSIDFromProgID
CLSIDFromString
CreateBindCtx
RegisterDragDrop
RevokeDragDrop
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysAllocStringLen
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysReAllocStringLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayGetUBound
SafeArrayGetLBound
SysReAllocString
GetActiveObject
SafeArrayDestroy
SysAllocString
ImageList_LoadImageW
ImageList_Duplicate
ImageList_Create
ImageList_GetIcon
ImageList_GetBkColor
ImageList_Replace
ImageList_GetImageCount
ImageList_AddMasked
ImageList_Add
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_Copy
ImageList_SetOverlayImage
ImageList_SetImageCount
ImageList_DrawEx
ImageList_Draw
ImageList_SetIconSize
ImageList_Remove
ImageList_Destroy
ord17
PathFileExistsW
PathIsSameRootW
AssocQueryStringW
ord172
StrCmpLogicalW
StrChrIW
StrRChrW
PathMatchSpecW
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathGetDriveNumberW
PathIsRootW
PathSearchAndQualifyW
PathCreateFromUrlW
PathUnquoteSpacesW
StrFormatKBSizeW
StrFormatByteSizeW
StrChrW
PathAppendW
StrRetToBSTR
StrCmpNIW
ord8
ord9
ord10
ord219
ord174
StrToIntExW
ord256
ord12
PathQuoteSpacesW
GdipFree
GdipAlloc
GdipDisposeImage
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapSetPixel
GdipBitmapGetPixel
GdipCreateHICONFromBitmap
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromResource
GdipCreateBitmapFromHICON
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipImageRotateFlip
GdipGetImageThumbnail
GdipGetImagePixelFormat
GdipGetImageRawFormat
GdipGetImageHeight
GdipGetImageWidth
GdipSaveImageToStream
GdipSaveImageToFile
GdipCloneImage
CoInternetSetFeatureEnabled
URLDownloadToFileW
CreateFormatEnumerator
ImmSetOpenStatus
ImmGetVirtualKey
ImmGetContext
ImmReleaseContext
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
SHGetFolderPathW
DecodePointer
WriteConsoleW
CreateThread
ExpandEnvironmentStringsW
CloseHandle
GetProcAddress
LoadLibraryExW
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetStdHandle
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetStringTypeW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ