HEEnterWindowLoop
HEEnterWindowLoopInNewThread
HESpecifySettings
Overview
overview
7Static
static
7lordpe/16Edit.dll
windows7-x64
7lordpe/16Edit.dll
windows10-2004-x64
7lordpe/LDE...mp.exe
windows7-x64
1lordpe/LDE...mp.exe
windows10-2004-x64
1lordpe/LDE/Genoep.dll
windows7-x64
1lordpe/LDE/Genoep.dll
windows10-2004-x64
1lordpe/LDE...mp.dll
windows7-x64
1lordpe/LDE...mp.dll
windows10-2004-x64
1lordpe/LDS...mp.exe
windows7-x64
1lordpe/LDS...mp.exe
windows10-2004-x64
1lordpe/LDS...ep.dll
windows7-x64
1lordpe/LDS...ep.dll
windows10-2004-x64
1lordpe/LordPE.exe
windows7-x64
7lordpe/LordPE.exe
windows10-2004-x64
7lordpe/Mis...it.exe
windows7-x64
1lordpe/Mis...it.exe
windows10-2004-x64
1lordpe/Mis...it.vbs
windows7-x64
1lordpe/Mis...it.vbs
windows10-2004-x64
1lordpe/Mis...lf.exe
windows7-x64
1lordpe/Mis...lf.exe
windows10-2004-x64
1lordpe/Mis...ck.exe
windows7-x64
1lordpe/Mis...ck.exe
windows10-2004-x64
1lordpe/Mis...op.exe
windows7-x64
7lordpe/Mis...op.exe
windows10-2004-x64
7lordpe/Mis...MD.exe
windows7-x64
1lordpe/Mis...MD.exe
windows10-2004-x64
1lordpe/Mis...xD.exe
windows7-x64
1lordpe/Mis...xD.exe
windows10-2004-x64
1lordpe/Mis...op.dll
windows7-x64
1lordpe/Mis...op.dll
windows10-2004-x64
1lordpe/Mis...ry.dll
windows7-x64
1lordpe/Mis...ry.dll
windows10-2004-x64
1Behavioral task
behavioral1
Sample
lordpe/16Edit.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
lordpe/16Edit.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
lordpe/LDE/Cooldump.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
lordpe/LDE/Cooldump.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
lordpe/LDE/Genoep.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
lordpe/LDE/Genoep.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
lordpe/LDE/IntelliDump.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
lordpe/LDE/IntelliDump.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
lordpe/LDS_Clients/CoolDump1.4/Cooldump.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
lordpe/LDS_Clients/CoolDump1.4/Cooldump.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
lordpe/LDS_Clients/CoolDump1.4/Genoep.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
lordpe/LDS_Clients/CoolDump1.4/Genoep.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
lordpe/LordPE.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
lordpe/LordPE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
lordpe/Misc/16Edit.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
lordpe/Misc/16Edit.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
lordpe/Misc/16Edit.vbs
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
lordpe/Misc/16Edit.vbs
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
lordpe/Misc/LordElf.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
lordpe/Misc/LordElf.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
lordpe/Misc/MetaPuck.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
lordpe/Misc/MetaPuck.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
lordpe/Misc/PESnoop.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
lordpe/Misc/PESnoop.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
lordpe/Misc/RunKMD.exe
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
lordpe/Misc/RunKMD.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
lordpe/Misc/RunVxD.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
lordpe/Misc/RunVxD.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
lordpe/Misc/SoftSnoop/APISnoop.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
lordpe/Misc/SoftSnoop/APISnoop.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
lordpe/Misc/SoftSnoop/ForceLibrary.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
lordpe/Misc/SoftSnoop/ForceLibrary.dll
Resource
win10v2004-20240419-en
Target
24de19bb3668e013918f062063187a03_JaffaCakes118
Size
346KB
MD5
24de19bb3668e013918f062063187a03
SHA1
091ea9346c4b5c178acf46b616d6a3b3e4f36fa4
SHA256
538c68a47f67c2966fd821a636e2018855f7ec3992289a8de749f0a7a7cd9cb2
SHA512
404c13efadcbefcc970ddf62050fcbb50dd6b01d68903219099a25fd89b979d2316de5e51d90f16acb4ae0813044cb091792a480a4b7018dc0793183fd0daffb
SSDEEP
6144:J72M282UF3MvNIYSGh17pII6jykoBHeqCHsGZHoM+Kcq2M1JZ/u+8JLhuonktgqG:J749U98h68BHeqCHsGZKIhun5h/kt3G
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/lordpe/16Edit.DLL | acprotect |
static1/unpack001/lordpe/LDE/Genoep.dll | acprotect |
static1/unpack001/lordpe/LDS_Clients/CoolDump1.4/Genoep.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/lordpe/16Edit.DLL | upx |
static1/unpack001/lordpe/Misc/PESnoop.exe | upx |
static1/unpack001/lordpe/Misc/SoftSnoop/SoftSnoop.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/lordpe/16Edit.DLL |
unpack002/out.upx |
unpack001/lordpe/LDE/Cooldump.exe |
unpack001/lordpe/LDE/Genoep.dll |
unpack001/lordpe/LDE/IntelliDump.LDE |
unpack001/lordpe/LDS_Clients/CoolDump1.4/Cooldump.exe |
unpack001/lordpe/LDS_Clients/CoolDump1.4/Genoep.dll |
unpack001/lordpe/LordPE.EXE |
unpack001/lordpe/Misc/16Edit.exe |
unpack001/lordpe/Misc/LordElf.exe |
unpack001/lordpe/Misc/MetaPuck.exe |
unpack001/lordpe/Misc/PESnoop.exe |
unpack003/out.upx |
unpack001/lordpe/Misc/RunKMD.exe |
unpack001/lordpe/Misc/RunVxD.exe |
unpack001/lordpe/Misc/SoftSnoop/APISnoop.dll |
unpack001/lordpe/Misc/SoftSnoop/ForceLibrary.dll |
unpack001/lordpe/Misc/SoftSnoop/Plugins/HelloWorld.dll |
unpack001/lordpe/Misc/SoftSnoop/Plugins/MsgHook.dll |
unpack001/lordpe/Misc/SoftSnoop/Plugins/PluginExp3.dll |
unpack001/lordpe/Misc/SoftSnoop/Plugins/TestMe.exe |
unpack001/lordpe/Misc/SoftSnoop/SoftSnoop.exe |
unpack004/out.upx |
unpack001/lordpe/Misc/yPER.exe |
unpack001/lordpe/PROCS.DLL |
unpack001/lordpe/PSAPI.DLL |
unpack001/lordpe/REALIGN.DLL |
unpack001/lordpe/SDK/LordPE/LDS/Examples/CallModMem.EXE |
unpack001/lordpe/SDK/LordPE/LDS/Examples/LDSChat.exe |
unpack001/lordpe/SDK/LordPE/LDS/Examples/LDS_DmpTst.exe |
unpack001/lordpe/SDK/LordPE/LDS/Examples/LDS_LoadDump.exe |
unpack001/lordpe/SDK/LordPE/LDS/Examples/LDS_TaskViewer.exe |
unpack001/lordpe/SDK/LordPE/LDS/Examples/LDS_VerPid.exe |
unpack001/lordpe/SDK/procsDLL/examples/UseProcs1.exe |
unpack001/lordpe/SDK/procsDLL/examples/useprocs2.exe |
unpack001/lordpe/TrapDll.exe |
unpack001/lordpe/il018/il018/iceload.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HEEnterWindowLoop
HEEnterWindowLoopInNewThread
HESpecifySettings
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindOEP
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualQueryEx
CloseHandle
ReadProcessMemory
lstrcpyA
OpenProcess
DisableThreadLibraryCalls
MessageBoxA
GetActiveWindow
wsprintfA
_adjust_fdiv
free
_initterm
malloc
DumpProcessRange
GetLDEName
ShowLDEInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindOEP
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
gmtime
toupper
div
asctime
mktime
_timezone
_except_handler3
strncmp
sprintf
strchr
free
realloc
malloc
strstr
lstrcpynA
lstrcatA
lstrlenA
CreateProcessA
WideCharToMultiByte
lstrlenW
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentProcess
TerminateProcess
VirtualProtectEx
WriteFile
FindClose
FindNextFileA
LoadLibraryA
SetFilePointer
SetThreadPriority
VirtualFree
IsBadReadPtr
lstrcmpiA
ExitProcess
SetFileAttributesA
OutputDebugStringA
lstrcpyA
GetFileAttributesA
ResumeThread
GetCurrentThread
DeleteFileA
GetTempPathA
SetPriorityClass
VirtualQueryEx
lstrcmpA
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentDirectoryA
UnmapViewOfFile
MulDiv
GetStartupInfoA
CreatePipe
WaitForSingleObject
CopyFileA
MapViewOfFile
CreateFileMappingA
SetEndOfFile
WritePrivateProfileStringA
GetPrivateProfileStringA
VirtualUnlock
VirtualLock
GetModuleFileNameA
SetCurrentDirectoryA
GetFileSize
CloseHandle
OpenProcess
ReadProcessMemory
GetModuleHandleA
CreateFileA
GetProcAddress
WriteProcessMemory
GetCurrentProcessId
Sleep
ReadFile
GetPriorityClass
FindFirstFileA
VirtualAlloc
GetCommandLineA
ShowWindow
SetMenuItemInfoA
AppendMenuA
CreatePopupMenu
SetWindowTextA
DestroyIcon
LoadIconA
InvalidateRect
CharLowerA
LoadBitmapA
SetDlgItemTextA
GetDlgItemTextA
GetSysColorBrush
DestroyCursor
SetClassLongA
LoadCursorA
GetParent
EnableWindow
GetWindowTextA
EnableMenuItem
IsIconic
MoveWindow
GetWindowDC
TrackPopupMenu
CheckMenuRadioItem
SetTimer
GetActiveWindow
GetClassInfoA
DialogBoxParamA
FindWindowA
SetForegroundWindow
CheckDlgButton
GetDlgItem
EndDialog
IsDlgButtonChecked
SendDlgItemMessageA
wvsprintfA
GetAsyncKeyState
SetClipboardData
GetWindowRect
SetWindowPos
SetWindowLongA
KillTimer
IsZoomed
DestroyMenu
IsWindowEnabled
CheckRadioButton
SetFocus
GetCursorPos
ScreenToClient
SendMessageA
GetClipboardData
CloseClipboard
CallWindowProcA
MessageBeep
wsprintfA
MessageBoxA
CharUpperA
OpenClipboard
EnumClipboardFormats
EmptyClipboard
GetDeviceCaps
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
DeleteObject
GetSaveFileNameA
GetOpenFileNameA
RegCreateKeyExA
RegSetValueExA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
AdjustTokenPrivileges
RegCloseKey
ShellExecuteA
SHGetFileInfoA
DragFinish
DragAcceptFiles
DragQueryFileA
ImageList_Remove
InitCommonControlsEx
ImageList_Destroy
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
GetProcessPathID
GetModuleHandleList
GetProcessIDList
GetProcessBaseSize
GetNumberOfModules
GetNumberOfProcesses
GetModuleSize
GetModulePath
GetProcessPath
RealignPE
ReBasePEImage
WipeReloc
HEEnterWindowLoop
HESpecifySettings
BindImageEx
ImageRvaToVa
ImageRvaToSection
CheckSumMappedFile
ImageNtHeader
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
ExitProcess
MessageBoxA
GetOpenFileNameA
HESpecifySettings
HEEnterWindowLoop
__getmainargs
__CxxFrameHandler
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpiA
CloseHandle
CreateFileMappingA
CreateFileA
lstrcmpA
UnmapViewOfFile
MapViewOfFile
SetConsoleTitleA
printf
_exit
_XcptFilter
_except_handler3
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_getch
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\VC7\projects\MetaPuck\Release\MetaPuck.pdb
ImageList_Add
ImageList_Create
ImageList_Destroy
ord6
InitCommonControlsEx
ReadFile
CloseHandle
CreateFileA
lstrcpyA
lstrcpynA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetFileType
SetHandleCount
WriteFile
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetUnhandledExceptionFilter
HeapSize
GetCurrentProcess
TerminateProcess
GetProcAddress
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetFileSize
lstrcatA
VirtualQuery
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
lstrlenA
GetModuleHandleA
GetEnvironmentStringsW
LoadBitmapA
SendDlgItemMessageA
LoadIconA
EndDialog
SetTimer
SendMessageA
SetMenuItemInfoA
CheckDlgButton
SetDlgItemTextA
GetDlgItem
SetWindowLongA
IsDlgButtonChecked
GetDlgItemTextA
CharUpperA
GetClassInfoA
CallWindowProcA
GetDlgCtrlID
GetParent
MessageBoxA
LoadCursorA
DialogBoxParamA
RegisterClassA
GetSystemMetrics
CreateWindowExA
LoadMenuA
SetMenu
ShowWindow
UpdateWindow
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyAcceleratorTable
PostQuitMessage
DefWindowProcA
DestroyMenu
MoveWindow
GetWindowRect
GetClientRect
wsprintfA
wvsprintfA
KillTimer
DeleteObject
GetSaveFileNameA
GetOpenFileNameA
DragFinish
DragAcceptFiles
DragQueryFileA
CoUninitialize
CoInitialize
CoCreateInstance
SysAllocString
VariantChangeType
__getmainargs
ImageNtHeader
ImageRvaToVa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrlenA
_lwrite
lstrcmpiA
lstrcpyA
ExitProcess
DeviceIoControl
CloseHandle
GetVersion
GetCommandLineA
lstrcpynA
CreateFileA
wsprintfA
StartServiceA
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ControlService
_strnicmp
toupper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineA
lstrlenA
ExitProcess
DeviceIoControl
CloseHandle
CreateFileA
lstrcpyA
lstrcpynA
_lwrite
getchar
strncat
_stricmp
_strnicmp
toupper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TlsFree
GlobalFree
GetProcAddress
TlsAlloc
TlsSetValue
GlobalAlloc
TlsGetValue
lstrcmpiA
VirtualProtect
GetModuleHandleA
SendMessageA
MessageBoxA
FindWindowA
_except_handler3
free
_initterm
_strnicmp
strstr
_adjust_fdiv
malloc
RetTrapProc
TrappedApiCall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetThreadContext
GetModuleHandleA
GetVersion
GlobalFree
ReadProcessMemory
GlobalAlloc
OpenProcess
CloseHandle
SetThreadContext
SuspendThread
Sleep
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetProcAddress
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
_initterm
malloc
_adjust_fdiv
_stricmp
free
ForceLibrary
ForceLibraryDBG
PerformCleanup
TrapEntry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
GetProcAddress
_initterm
free
malloc
_adjust_fdiv
StartSSPlugin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CheckDlgButton
DialogBoxParamA
EndDialog
IsDlgButtonChecked
GetModuleHandleA
GetProcAddress
WriteProcessMemory
lstrcmpiA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartSSPlugin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
MessageBoxA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSSApi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UnmapViewOfFile
lstrcmpiA
MapViewOfFile
CloseHandle
Sleep
CreateFileMappingA
GetFileSize
CreateFileA
lstrcpyA
SetFilePointer
SetEndOfFile
ValidatePE
WipeReloc
RealignPE
ImageNtHeader
printf
__setusermatherr
_initterm
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_controlfp
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
lstrcpynA
CloseHandle
OpenProcess
GetVersion
lstrcpyA
GetProcAddress
LoadLibraryA
_except_handler3
strstr
_strupr
free
_initterm
malloc
_adjust_fdiv
GetModuleHandleEx
GetModuleHandleList
GetModulePath
GetModuleSize
GetNumberOfModules
GetNumberOfProcesses
GetProcessBaseSize
GetProcessIDList
GetProcessPath
GetProcessPathID
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
_stricmp
RtlUnwind
sprintf
atoi
NtStopProfile
RtlUnicodeToOemN
_chkstk
DbgPrint
NtCreateProfile
RtlMultiByteToUnicodeN
NtAllocateVirtualMemory
RtlAdjustPrivilege
NtSetIntervalProfile
NtStartProfile
NtQueryInformationProcess
NtWriteFile
NtSetInformationProcess
RtlNtStatusToDosError
NtQueryVirtualMemory
NtQuerySystemInformation
LocalAlloc
MultiByteToWideChar
GetLastError
RaiseException
LoadLibraryA
FreeLibrary
GetProcAddress
InterlockedExchange
OpenFileMappingA
MapViewOfFile
DisableThreadLibraryCalls
CreateFileA
UnmapViewOfFile
GetProcessHeap
HeapAlloc
CloseHandle
lstrcpyA
GetProcessWorkingSetSize
lstrlenA
SetLastError
LocalFree
GetSystemInfo
ReadProcessMemory
WideCharToMultiByte
SetProcessWorkingSetSize
EmptyWorkingSet
EnumDeviceDrivers
EnumProcessModules
EnumProcesses
GetDeviceDriverBaseNameA
GetDeviceDriverBaseNameW
GetDeviceDriverFileNameA
GetDeviceDriverFileNameW
GetMappedFileNameA
GetMappedFileNameW
GetModuleBaseNameA
GetModuleBaseNameW
GetModuleFileNameExA
GetModuleFileNameExW
GetModuleInformation
GetProcessMemoryInfo
GetWsChanges
InitializeProcessForWsWatch
QueryWorkingSet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageRvaToVa
ImageNtHeader
CloseHandle
DisableThreadLibraryCalls
SetEndOfFile
SetFilePointer
CreateFileA
GlobalFree
GlobalAlloc
LockResource
LoadResource
FindResourceA
malloc
_except_handler3
free
_initterm
div
_adjust_fdiv
ReBasePEImage
RealignPE
TruncateFile
ValidatePE
WipeReloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateProcessA
ExitProcess
GetCurrentProcessId
Sleep
SuspendThread
TerminateProcess
lstrcpynA
FindWindowA
MessageBoxA
SendMessageA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ShellExecuteA
GetOpenFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrlenA
GetCurrentProcessId
GetModuleHandleA
ExitProcess
SendMessageA
EndDialog
wsprintfA
GetDlgItem
DialogBoxParamA
FindWindowA
MessageBoxA
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetStdHandle
ReadConsoleA
_lwrite
lstrlenA
wsprintfA
GetNumberOfProcesses
GetProcessIDList
GetProcessPath
GetProcessBaseSize
GetNumberOfModules
GetModuleHandleList
GetModulePath
GetModuleSize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoA
GetModuleHandleA
GetModuleFileNameA
wsprintfA
MessageBoxA
GetModuleHandleEx
GetProcessPathID
_initterm
_adjust_fdiv
__p__commode
__setusermatherr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
__p__fmode
_controlfp
__set_app_type
_except_handler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
WriteFile
SetFilePointer
FreeLibrary
CreateFileA
CloseHandle
CreateFileMappingA
GetCurrentThread
MapViewOfFile
UnmapViewOfFile
GetCommandLineA
SetThreadPriority
LoadLibraryA
OutputDebugStringA
MessageBoxA
wsprintfA
ImageRvaToVa
ImageNtHeader
strstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateToolbarEx
ord17
GetSaveFileNameA
GetOpenFileNameA
UpdateWindow
TranslateMessage
TranslateAcceleratorA
ShowWindow
SetFocus
SetDlgItemTextA
SendMessageA
RegisterClassExA
PostQuitMessage
MoveWindow
LoadIconA
LoadCursorA
LoadAcceleratorsA
IsDialogMessage
GetWindowTextLengthA
GetWindowRect
GetMessageA
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
EndDialog
EnableWindow
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateDialogParamA
lstrlenA
lstrcpyA
WritePrivateProfileStringA
VirtualFree
VirtualAlloc
ReadFile
LoadLibraryA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetCommandLineA
FreeLibrary
ExitProcess
CreateProcessA
CreateFileA
CloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ