@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DlgProc
GetPasswordDlgProc
WndProc
__DebuggerHookData
__GetExceptDLLinfo
Overview
overview
3Static
static
3Far160/CR-FARK.exe
windows7-x64
Far160/CR-FARK.exe
windows10-2004-x64
Far160/FAR160.exe
windows7-x64
1Far160/FAR160.exe
windows10-2004-x64
1ACE.dll
windows7-x64
3ACE.dll
windows10-2004-x64
3ConsoleVision.js
windows7-x64
3ConsoleVision.js
windows10-2004-x64
3FARIntf.js
windows7-x64
3FARIntf.js
windows10-2004-x64
3asciitvm.js
windows7-x64
3asciitvm.js
windows10-2004-x64
3str2math.js
windows7-x64
3str2math.js
windows10-2004-x64
3ASCIITV.dll
windows7-x64
3ASCIITV.dll
windows10-2004-x64
3ASCIITV.dll
windows7-x64
3ASCIITV.dll
windows10-2004-x64
3CALCULAT.dll
windows7-x64
1CALCULAT.dll
windows10-2004-x64
3CALCULAT.dll
windows7-x64
1CALCULAT.dll
windows10-2004-x64
3CDDIR.exe
windows7-x64
1CDDIR.exe
windows10-2004-x64
1CDDIR.dll
windows7-x64
1CDDIR.dll
windows10-2004-x64
1Far160/ful...50.exe
windows7-x64
1Far160/ful...50.exe
windows10-2004-x64
1Far160/ful...51.exe
windows7-x64
1Far160/ful...51.exe
windows10-2004-x64
1Far160/ful...52.exe
windows7-x64
1Far160/ful...52.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Far160/CR-FARK.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Far160/CR-FARK.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Far160/FAR160.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Far160/FAR160.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
ACE.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ACE.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
ConsoleVision.js
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
ConsoleVision.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
FARIntf.js
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
FARIntf.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
asciitvm.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
asciitvm.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
str2math.js
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
str2math.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ASCIITV.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
ASCIITV.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
ASCIITV.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
ASCIITV.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
CALCULAT.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
CALCULAT.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
CALCULAT.dll
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
CALCULAT.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
CDDIR.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
CDDIR.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
CDDIR.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
CDDIR.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Far160/full/FAR150.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Far160/full/FAR150.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Far160/full/FAR151.exe
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
Far160/full/FAR151.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Far160/full/FAR152.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Far160/full/FAR152.exe
Resource
win10v2004-20240426-en
Target
5ea5313f7a9549797792a62f6da7be92_JaffaCakes118
Size
3.5MB
MD5
5ea5313f7a9549797792a62f6da7be92
SHA1
0d17dfecf6ed7edd456ca307ee273a320adc0fda
SHA256
ac7673e43df24be9e051102352e5138dd0ece4052b87198b6cde9dafd76d5f60
SHA512
87ac19cca4273b4c6d1d5c1e25d7c439b87dddb160cbcf8f358c45e8754a3a85191de7c9c1746f86db12c9d2c06b094f847b57669580f94d668cfc0bfa796559
SSDEEP
98304:3Yhw0rWw6nSi5Ozb8Km0rGpGPv2zjVp5hoJSSpisyen:3YX6nSaMvipmOvv5hUSSp9yen
Checks for missing Authenticode signature.
resource |
---|
unpack001/Far160/FAR160.EXE |
unpack002/ACE.FMT |
unpack004/ASCIITV.DLL |
unpack006/ASCIITV.DLL |
unpack007/CALCULAT.DLL |
unpack008/CALCULAT.DLL |
unpack009/CDDIR.EXE |
unpack009/CDDIR.FMT |
unpack001/Far160/full/FAR150.EXE |
unpack001/Far160/full/FAR151.EXE |
unpack001/Far160/full/FAR152.EXE |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualFree
GetFileType
WaitForSingleObject
GetVolumeInformationA
GetShortPathNameA
GetProcAddress
WriteFile
GetEnvironmentVariableA
LoadResource
GetCurrentDirectoryA
FindResourceA
FindFirstFileA
SetFilePointer
FileTimeToLocalFileTime
CloseHandle
GetModuleFileNameA
SetEnvironmentVariableA
RtlUnwind
RaiseException
GetDriveTypeA
GetCurrentThreadId
GlobalMemoryStatus
GetCommandLineA
GetTickCount
GetFullPathNameA
GetStartupInfoA
CreateFileA
GetLastError
GetLocalTime
GetLogicalDrives
FindClose
ReadFile
GetModuleHandleA
CreateProcessA
DeleteFileA
SetFileAttributesA
SetCurrentDirectoryA
SetConsoleCtrlHandler
DosDateTimeToFileTime
CreateDirectoryA
GetEnvironmentStrings
LocalFileTimeToFileTime
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LockResource
ExitProcess
GetVersionExA
GetVersion
GetFileAttributesA
ExpandEnvironmentStringsA
GetTempPathA
GetStdHandle
FindNextFileA
FileTimeToDosDateTime
SetFileTime
SetHandleCount
SizeofResource
UnhandledExceptionFilter
VirtualAlloc
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontA
UpdateWindow
TranslateMessage
SetWindowLongA
SetTimer
SetDlgItemTextA
RegisterClassA
RedrawWindow
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
KillTimer
IsWindow
IsDlgButtonChecked
InvalidateRect
SendMessageA
GetSysColor
GetParent
GetMessageA
GetDlgItem
EnumThreadWindows
EndDialog
EnableWindow
DispatchMessageA
GetDlgItemTextA
DialogBoxParamA
DestroyWindow
DefWindowProcA
GetWindowLongA
DdeInitializeA
DdeFreeStringHandle
DdeFreeDataHandle
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
OemToCharA
CreateWindowExA
CheckDlgButton
SetWindowTextA
RegQueryValueExA
RegCloseKey
RegSetValueA
RegOpenKeyExA
SHGetSpecialFolderLocation
SHGetPathFromIDList
SHGetMalloc
SHBrowseForFolder
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DlgProc
GetPasswordDlgProc
WndProc
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
DosDateTimeToFileTime
GetFileSize
LocalFileTimeToFileTime
ReadFile
SetFilePointer
CloseHandle
CloseArchive
GetArcItem
GetDefaultCommands
GetFormatName
IsArchive
OpenArchive
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetPluginInfo
OpenPlugin
SetStartupInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetPluginInfo
OpenPlugin
SetStartupInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetPluginInfo
OpenPlugin
SetStartupInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetPluginInfo
OpenPlugin
SetStartupInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleHandleA
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
CloseHandle
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
FindNextFileA
CreateFileA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetVersion
GetVolumeInformationA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
GetModuleFileNameA
MessageBoxA
EnumThreadWindows
CharToOemA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetEnvironmentStrings
DosDateTimeToFileTime
CloseHandle
ExitProcess
GetCommandLineA
GetCurrentThreadId
CreateFileA
GetFileAttributesA
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
EnterCriticalSection
GetStdHandle
GetVersion
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalFileTimeToFileTime
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
GetStartupInfoA
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
CloseArchive
GetArcItem
GetDefaultCommands
GetFormatName
IsArchive
OpenArchive
__DebuggerHookData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualFree
GetFileType
WaitForSingleObject
GetVolumeInformationA
GetShortPathNameA
GetProcAddress
WriteFile
GetEnvironmentVariableA
LoadResource
GetCurrentDirectoryA
FindResourceA
FindFirstFileA
SetFilePointer
FileTimeToLocalFileTime
CloseHandle
GetModuleFileNameA
SetEnvironmentVariableA
RtlUnwind
RaiseException
GetDriveTypeA
GetCurrentThreadId
GlobalMemoryStatus
GetCommandLineA
GetTickCount
GetFullPathNameA
GetStartupInfoA
CreateFileA
GetLastError
GetLocalTime
GetLogicalDrives
FindClose
ReadFile
GetModuleHandleA
CreateProcessA
DeleteFileA
SetFileAttributesA
SetCurrentDirectoryA
SetConsoleCtrlHandler
DosDateTimeToFileTime
CreateDirectoryA
GetEnvironmentStrings
LocalFileTimeToFileTime
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LockResource
ExitProcess
GetVersionExA
GetVersion
GetFileAttributesA
ExpandEnvironmentStringsA
GetTempPathA
GetStdHandle
FindNextFileA
FileTimeToDosDateTime
SetFileTime
SetHandleCount
SizeofResource
UnhandledExceptionFilter
VirtualAlloc
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontA
UpdateWindow
TranslateMessage
SetWindowLongA
SetTimer
SetDlgItemTextA
RegisterClassA
RedrawWindow
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
KillTimer
IsWindow
IsDlgButtonChecked
InvalidateRect
SendMessageA
GetSysColor
GetParent
GetMessageA
GetDlgItem
EnumThreadWindows
EndDialog
EnableWindow
DispatchMessageA
GetDlgItemTextA
DialogBoxParamA
DestroyWindow
DefWindowProcA
GetWindowLongA
DdeInitializeA
DdeFreeStringHandle
DdeFreeDataHandle
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
OemToCharA
CreateWindowExA
CheckDlgButton
SetWindowTextA
RegQueryValueExA
RegCloseKey
RegSetValueA
RegOpenKeyExA
SHGetSpecialFolderLocation
SHGetPathFromIDList
SHGetMalloc
SHBrowseForFolder
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DlgProc
GetPasswordDlgProc
WndProc
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualFree
GetFileType
WaitForSingleObject
GetVolumeInformationA
GetShortPathNameA
GetProcAddress
WriteFile
GetEnvironmentVariableA
LoadResource
GetCurrentDirectoryA
FindResourceA
FindFirstFileA
SetFilePointer
FileTimeToLocalFileTime
CloseHandle
GetModuleFileNameA
SetEnvironmentVariableA
RtlUnwind
RaiseException
GetDriveTypeA
GetCurrentThreadId
GlobalMemoryStatus
GetCommandLineA
GetTickCount
GetFullPathNameA
GetStartupInfoA
CreateFileA
GetLastError
GetLocalTime
GetLogicalDrives
FindClose
ReadFile
GetModuleHandleA
CreateProcessA
DeleteFileA
SetFileAttributesA
SetCurrentDirectoryA
SetConsoleCtrlHandler
DosDateTimeToFileTime
CreateDirectoryA
GetEnvironmentStrings
LocalFileTimeToFileTime
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LockResource
ExitProcess
GetVersionExA
GetVersion
GetFileAttributesA
ExpandEnvironmentStringsA
GetTempPathA
GetStdHandle
FindNextFileA
FileTimeToDosDateTime
SetFileTime
SetHandleCount
SizeofResource
UnhandledExceptionFilter
VirtualAlloc
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontA
UpdateWindow
TranslateMessage
SetWindowLongA
SetTimer
SetDlgItemTextA
RegisterClassA
RedrawWindow
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
KillTimer
IsWindow
IsDlgButtonChecked
InvalidateRect
SendMessageA
GetSysColor
GetParent
GetMessageA
GetDlgItem
EnumThreadWindows
EndDialog
EnableWindow
DispatchMessageA
GetDlgItemTextA
DialogBoxParamA
DestroyWindow
DefWindowProcA
GetWindowLongA
DdeInitializeA
DdeFreeStringHandle
DdeFreeDataHandle
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
OemToCharA
CreateWindowExA
CheckDlgButton
SetWindowTextA
RegQueryValueExA
RegCloseKey
RegSetValueA
RegOpenKeyExA
SHGetSpecialFolderLocation
SHGetPathFromIDList
SHGetMalloc
SHBrowseForFolder
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DlgProc
GetPasswordDlgProc
WndProc
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualFree
GetFileType
WaitForSingleObject
GetVolumeInformationA
GetShortPathNameA
GetProcAddress
WriteFile
GetEnvironmentVariableA
LoadResource
GetCurrentDirectoryA
FindResourceA
FindFirstFileA
SetFilePointer
FileTimeToLocalFileTime
CloseHandle
GetModuleFileNameA
SetEnvironmentVariableA
RtlUnwind
RaiseException
GetDriveTypeA
GetCurrentThreadId
GlobalMemoryStatus
GetCommandLineA
GetTickCount
GetFullPathNameA
GetStartupInfoA
CreateFileA
GetLastError
GetLocalTime
GetLogicalDrives
FindClose
ReadFile
GetModuleHandleA
CreateProcessA
DeleteFileA
SetFileAttributesA
SetCurrentDirectoryA
SetConsoleCtrlHandler
DosDateTimeToFileTime
CreateDirectoryA
GetEnvironmentStrings
LocalFileTimeToFileTime
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LockResource
ExitProcess
GetVersionExA
GetVersion
GetFileAttributesA
ExpandEnvironmentStringsA
GetTempPathA
GetStdHandle
FindNextFileA
FileTimeToDosDateTime
SetFileTime
SetHandleCount
SizeofResource
UnhandledExceptionFilter
VirtualAlloc
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontA
UpdateWindow
TranslateMessage
SetWindowLongA
SetTimer
SetDlgItemTextA
RegisterClassA
RedrawWindow
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
KillTimer
IsWindow
IsDlgButtonChecked
InvalidateRect
SendMessageA
GetSysColor
GetParent
GetMessageA
GetDlgItem
EnumThreadWindows
EndDialog
EnableWindow
DispatchMessageA
GetDlgItemTextA
DialogBoxParamA
DestroyWindow
DefWindowProcA
GetWindowLongA
DdeInitializeA
DdeFreeStringHandle
DdeFreeDataHandle
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
OemToCharA
CreateWindowExA
CheckDlgButton
SetWindowTextA
RegQueryValueExA
RegCloseKey
RegSetValueA
RegOpenKeyExA
SHGetSpecialFolderLocation
SHGetPathFromIDList
SHGetMalloc
SHBrowseForFolder
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DlgProc
GetPasswordDlgProc
WndProc
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE