DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Overview
overview
3Static
static
3Dssock32.dll
windows7-x64
1Dssock32.dll
windows10-2004-x64
1Tabctl32.dll
windows7-x64
1Tabctl32.dll
windows10-2004-x64
1aenima.exe
windows7-x64
1aenima.exe
windows10-2004-x64
1chk4upg.exe
windows7-x64
1chk4upg.exe
windows10-2004-x64
1comctl32.dll
windows7-x64
1comctl32.dll
windows10-2004-x64
1comdlg32.dll
windows7-x64
1comdlg32.dll
windows10-2004-x64
1smtpc.exe
windows7-x64
1smtpc.exe
windows10-2004-x64
1testserv.exe
windows7-x64
1testserv.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Dssock32.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Dssock32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Tabctl32.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Tabctl32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
aenima.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
aenima.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
chk4upg.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
chk4upg.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
comctl32.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
comctl32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
comdlg32.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
comdlg32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
smtpc.exe
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
smtpc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
testserv.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
testserv.exe
Resource
win10v2004-20240508-en
Target
6a19fabf1d8a937394a323b89a5e163b_JaffaCakes118
Size
487KB
MD5
6a19fabf1d8a937394a323b89a5e163b
SHA1
03a219b73315e19fdced8ff7958ca217a73c2780
SHA256
a54e2a6b72a07afb589609d5ef297660c872a70675a7b60f83c467f55c0983f5
SHA512
5f75e4b3d55c251025beffba64d753e9ed6df1a15881b199ff4689d4f7bcab575674a2a06a060873cf539a6503c95efa690f35c969f8267de6ac52b221c27bbb
SSDEEP
12288:DGpqUHpfQ2DDnUrMl1vL3pQS9QQYaWfLIjVaaAYxe:Ih5QmTUrMl1T3GSmQYPEjIHYU
Checks for missing Authenticode signature.
resource |
---|
unpack001/Dssock32.ocx |
unpack001/Tabctl32.ocx |
unpack001/aenima.exe |
unpack001/chk4upg.exe |
unpack001/comctl32.ocx |
unpack001/comdlg32.ocx |
unpack001/smtpc.exe |
unpack001/testserv.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSASetLastError
send
setsockopt
sendto
accept
recvfrom
recv
WSAIsBlocking
WSACancelBlockingCall
inet_ntoa
WSACleanup
WSAStartup
getsockname
listen
socket
bind
connect
closesocket
getservbyname
ntohs
htons
ioctlsocket
gethostbyaddr
WSAAsyncSelect
gethostname
gethostbyname
WSAGetLastError
inet_addr
ord79
ord107
ord110
ord78
ord2800
ord2948
ord2033
ord1521
ord1538
ord1684
ord512
ord1760
ord866
ord873
ord1429
ord1060
ord1427
ord2128
ord2127
ord2194
ord2121
ord2274
ord2069
ord2051
ord2090
ord2310
ord2283
ord2286
ord2289
ord2119
ord2146
ord2330
ord2125
ord2118
ord1968
ord2201
ord2120
ord2115
ord2114
ord2356
ord2083
ord1977
ord1972
ord2171
ord2173
ord2170
ord1995
ord2096
ord2323
ord1176
ord1566
ord2064
ord1858
ord1994
ord2416
ord1138
ord2953
ord2442
ord1743
ord2234
ord2013
ord2958
ord1720
ord963
ord1164
ord1052
ord1511
ord361
ord1516
ord2108
ord2708
ord643
ord681
ord698
ord1803
ord563
ord503
ord1631
ord1661
ord1678
ord659
ord2630
ord1062
ord927
ord830
ord921
ord521
ord2477
ord2461
ord2474
ord2479
ord1200
ord1298
ord2312
ord2296
ord605
ord1187
ord459
ord2425
ord2539
ord939
ord2794
ord2910
ord418
ord1137
ord2216
ord1152
ord650
ord396
ord340
ord1530
ord2949
ord868
ord2077
ord2135
ord2237
ord2324
ord1979
ord2246
ord2318
ord2159
ord2954
ord2437
ord2011
ord1522
ord2109
ord2005
ord652
ord513
ord1100
ord1118
ord1103
ord1115
ord1129
ord1121
ord1089
ord1135
ord1109
ord1110
ord1116
ord1131
ord1105
ord1378
ord1336
ord1892
ord1498
ord1404
ord590
ord437
ord823
ord822
ord329
ord2765
ord2545
ord1305
ord2645
ord247
ord839
ord902
ord468
ord849
ord901
ord371
ord846
ord403
ord434
ord394
ord1470
ord2768
ord875
ord874
ord877
ord838
ord869
ord2946
ord580
ord689
ord2004
ord2106
ord1563
ord1457
ord1512
ord2029
ord1510
ord2647
ord2440
ord2154
ord2453
ord2449
ord1535
ord1145
ord2458
ord1859
ord2397
ord803
ord1792
ord2656
ord1185
ord1208
ord2040
ord2957
ord2030
malloc
_initterm
??2@YAPAXI@Z
__CxxFrameHandler
??3@YAXPAX@Z
_adjust_fdiv
__dllonexit
free
_onexit
TlsSetValue
LocalAlloc
LocalFree
lstrcmpA
Sleep
TlsFree
TlsGetValue
GlobalFree
GlobalAlloc
TlsAlloc
GetModuleFileNameA
GlobalUnlock
GlobalLock
GetVersion
GetDlgItem
SetWindowPos
PostMessageA
LoadBitmapA
wsprintfA
SendMessageA
ShowWindow
DeleteObject
GetObjectA
SysAllocStringByteLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord3346
ord3340
ord2694
ord3580
ord4096
ord3345
ord3906
ord3202
ord651
ord403
ord1043
ord1071
ord1035
ord1084
ord2135
ord1464
ord4973
ord881
ord3827
ord4154
ord4113
ord5023
ord1873
ord4314
ord4375
ord5001
ord3611
ord4133
ord4132
ord4230
ord4124
ord4360
ord4024
ord3997
ord4070
ord4441
ord4380
ord4385
ord4390
ord4156
ord4473
ord4127
ord4060
ord3854
ord3840
ord4202
ord4204
ord4201
ord3892
ord4079
ord4459
ord3898
ord4432
ord2177
ord2963
ord4015
ord5363
ord3578
ord1540
ord3890
ord4657
ord2086
ord4608
ord5643
ord3837
ord3314
ord4296
ord3922
ord2323
ord1785
ord5649
ord3268
ord4510
ord1494
ord2140
ord1850
ord4691
ord2618
ord2755
ord2844
ord3946
ord2851
ord2621
ord2695
ord3581
ord4098
ord5160
ord632
ord2312
ord3452
ord381
ord3838
ord1394
ord569
ord2106
ord1425
ord314
ord481
ord4737
ord4735
ord4739
ord2223
ord2378
ord4403
ord4649
ord2199
ord4685
ord570
ord4677
ord4444
ord4262
ord4268
ord3320
ord2696
ord4435
ord4123
ord4241
ord5296
ord4198
ord2081
ord4448
ord2620
ord2916
ord4498
ord4219
ord4223
ord5648
ord3963
ord2234
ord2197
ord5070
ord3431
ord965
ord4627
ord2097
ord2909
ord4713
ord4715
ord2389
ord3579
ord4165
ord4719
ord4703
ord5053
ord3458
ord2845
ord2960
ord3192
ord721
ord504
ord5630
ord1075
ord1085
ord375
ord5568
ord3620
ord2595
ord5748
ord2894
ord5638
ord1073
ord4999
ord4141
ord4302
ord4462
ord4681
ord3859
ord4312
ord4450
ord5360
ord1539
ord5644
ord4700
ord3919
ord2861
ord4099
ord3907
ord654
ord406
ord1986
ord5405
ord2004
ord2064
ord1989
ord2007
ord1975
ord2072
ord1995
ord3080
ord5273
ord5139
ord4176
ord2707
ord626
ord4953
ord883
ord3804
ord4741
ord760
ord4723
ord4931
ord5647
ord4694
ord4101
ord3134
ord315
ord3724
ord3786
ord4173
ord3630
ord3784
ord421
ord1647
ord3714
ord5370
ord3656
ord3028
ord615
ord362
ord810
ord4952
ord3684
ord5550
ord978
ord979
ord665
ord731
ord3335
ord2510
ord2317
ord483
ord2557
ord1786
ord1387
ord5389
ord1456
ord3049
ord3523
ord2795
ord1097
ord762
ord3098
ord5241
ord2635
ord1366
ord3945
ord2860
ord2744
ord2617
ord2843
ord2754
ord2358
ord3952
ord5637
ord265
ord2176
ord3738
ord5200
ord1633
ord2548
ord2801
ord2792
ord5299
ord4206
ord5301
ord3524
ord5352
ord5461
ord2451
ord4961
ord1400
ord3010
ord5341
ord957
ord2434
ord1395
ord3530
ord5560
ord763
ord836
ord486
ord974
ord485
ord4742
ord4740
ord706
ord4736
ord5121
ord4724
ord1426
ord3110
ord2115
ord3158
ord426
ord3185
ord729
ord1882
ord1875
ord1881
ord3844
ord1868
ord4111
ord4110
ord4046
ord671
ord733
ord711
ord1370
ord988
ord269
ord1367
ord1046
ord5681
ord1042
ord1369
ord328
ord999
ord1000
ord1105
__CxxFrameHandler
_mbslen
_itoa
memmove
_mbsncpy
_mbsicmp
modf
wcslen
_ftol
mbstowcs
wcstombs
_mbsrev
_EH_prolog
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
??1type_info@@UAE@XZ
MulDiv
lstrlenA
Sleep
LoadResource
LockResource
FindResourceA
GetPrivateProfileStringA
GetModuleFileNameA
SizeofResource
lstrcpyA
lstrcmpiA
lstrcmpA
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
LocalAlloc
GlobalReAlloc
LocalUnlock
LocalFree
LocalLock
GetVersion
CharNextA
ScreenToClient
GetSystemMetrics
GetSysColor
EnableWindow
InvalidateRect
IsWindow
SetWindowPos
GetClientRect
ClientToScreen
PtInRect
FillRect
GetWindowRect
DrawTextA
ReleaseDC
GetDC
EqualRect
LockWindowUpdate
MessageBoxA
MessageBeep
CharUpperA
SendMessageA
GetCursorPos
DestroyCursor
SetCursor
LoadCursorA
CreateAcceleratorTableA
GetFocus
GetParent
GetDlgItem
MoveWindow
GetClassNameA
DrawIcon
GetKeyState
ShowWindow
WinHelpA
IntersectRect
SetWindowTextA
SetRectEmpty
GetWindowDC
wsprintfA
CallWindowProcA
SetWindowLongA
DrawFocusRect
UpdateWindow
GrayStringA
CopyRect
OffsetRect
DeleteObject
SetBkMode
SetTextColor
SelectObject
RealizePalette
SelectPalette
SetBkColor
TextOutA
CreatePen
CreateRectRgn
LineTo
MoveToEx
GetTextColor
DeleteDC
SetTextAlign
GetTextExtentPoint32A
GetCharWidthA
GetCurrentPositionEx
GetStockObject
CreateCompatibleDC
GetObjectA
CreateFontIndirectA
BitBlt
StretchBlt
GetOutlineTextMetricsA
PlayMetaFile
SetViewportOrgEx
RestoreDC
SetMapMode
SaveDC
SetViewportExtEx
CreateSolidBrush
StretchDIBits
IntersectClipRect
GetPaletteEntries
GetSystemPaletteEntries
CreateBitmap
CombineRgn
OffsetRgn
FrameRgn
FillRgn
SetBrushOrgEx
UnrealizeObject
SelectClipRgn
GetDeviceCaps
CreateDCA
CreatePolygonRgn
CreateCompatibleBitmap
CreateICA
EnumFontFamiliesA
GetDIBits
RegCloseKey
RegQueryValueA
RegOpenKeyA
CoTaskMemFree
CoGetMalloc
SysStringLen
SysAllocString
LoadTypeLi
SysFreeString
SysReAllocString
LoadRegTypeLi
VariantInit
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
ord618
ord616
ord631
ord648
ord652
ord689
ord690
ord100
ord187
ord199
ord519
ord520
ord537
ord571
ord581
ord594
ord593
ord598
ord595
ord600
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
ord631
ord652
ord685
ord689
ord100
ord187
ord199
ord520
ord581
ord598
ord595
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
ImageList_Create
ImageList_Remove
ImageList_AddMasked
ImageList_Draw
ImageList_Destroy
ImageList_SetBkColor
ImageList_SetOverlayImage
ImageList_DrawEx
ord16
ImageList_GetIconSize
ImageList_GetIcon
ImageList_ReplaceIcon
ord17
ImageList_Add
lstrcmpA
GetProcAddress
GlobalSize
GetFileSize
ReadFile
CloseHandle
IsDBCSLeadByte
lstrcmpiA
FindResourceA
LoadResource
LockResource
GetLastError
GetLocaleInfoA
LoadLibraryA
GetWindowsDirectoryA
MultiByteToWideChar
GetModuleFileNameA
lstrcatA
OpenFile
DeleteCriticalSection
GetVersion
InitializeCriticalSection
GetProcessHeap
DisableThreadLibraryCalls
GetDateFormatA
GetTimeFormatA
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrcpynA
EnterCriticalSection
GetVersionExA
InterlockedDecrement
InterlockedIncrement
FreeLibrary
HeapFree
WideCharToMultiByte
HeapAlloc
lstrlenW
lstrlenA
HeapReAlloc
IsBadWritePtr
lstrcpyA
LeaveCriticalSection
CompareStringA
CreateAcceleratorTableA
VkKeyScanA
GetMessagePos
MessageBeep
TranslateMessage
CharUpperA
EndDialog
RedrawWindow
SetCursor
RegisterWindowMessageA
GetClipboardFormatNameA
DispatchMessageA
PeekMessageA
EqualRect
DialogBoxParamA
UpdateWindow
InvalidateRect
SetCapture
GetWindowTextA
GetCursorPos
ScreenToClient
GetDC
ReleaseDC
IsRectEmpty
GetAsyncKeyState
ClientToScreen
GetWindowRect
MapVirtualKeyA
CreateWindowExA
GetSysColorBrush
GetParent
PtInRect
IntersectRect
GetActiveWindow
OffsetRect
SetWindowRgn
IsWindowVisible
BeginPaint
EndPaint
GetNextDlgTabItem
SetWindowPos
WinHelpA
SetParent
GetWindow
IsDialogMessageA
UnregisterClassA
SetRect
CharNextA
KillTimer
MessageBoxA
UnhookWindowsHookEx
CallNextHookEx
SetTimer
SetWindowLongA
SetFocus
SetActiveWindow
CheckRadioButton
DestroyIcon
DrawIcon
LoadCursorA
DestroyWindow
GetWindowDC
wsprintfA
RegisterClipboardFormatA
SetCursorPos
IsChild
PostMessageA
DrawEdge
GetSysColor
FrameRect
FillRect
InflateRect
DrawTextA
GetClientRect
CallWindowProcA
GetKeyState
GetCapture
ReleaseCapture
GetClassInfoA
RegisterClassA
LoadIconA
GetSystemMetrics
CopyImage
MapDialogRect
GetWindowLongA
GetFocus
EnableWindow
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
SetDlgItemInt
GetDlgItemInt
IsDlgButtonChecked
SendDlgItemMessageA
CheckDlgButton
LoadStringA
DefWindowProcA
SendMessageA
IsWindowEnabled
CreateDialogIndirectParamA
SetWindowsHookExA
ShowWindow
ReleaseStgMedium
DoDragDrop
RegisterDragDrop
RevokeDragDrop
CreateStreamOnHGlobal
CreateOleAdviseHolder
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueA
RegEnumKeyExA
SafeArrayCopy
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayPutElement
SafeArrayCreate
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayDestroy
VariantCopy
SafeArrayUnaccessData
GetErrorInfo
OleCreatePropertyFrame
OleCreateFontIndirect
SetErrorInfo
LoadRegTypeLi
CreateErrorInfo
UnRegisterTypeLi
LoadTypeLi
LoadTypeLibEx
OleLoadPicture
SysAllocStringLen
RegisterTypeLi
SysAllocStringByteLen
SysStringLen
SysStringByteLen
OleCreatePictureIndirect
VariantCopyInd
OleTranslateColor
SysFreeString
VariantInit
VariantChangeType
VariantClear
SysAllocString
SafeArrayRedim
GetOpenFileNameA
Rectangle
SetBkColor
CreateICA
GetViewportExtEx
TextOutA
CreateRectRgn
GetNearestColor
CreatePalette
GetBitmapBits
CreateDIBitmap
RealizePalette
GetDIBits
SelectPalette
GetPaletteEntries
CopyMetaFileA
CopyEnhMetaFileA
GetObjectA
DeleteObject
SetViewportOrgEx
SetWindowOrgEx
SetViewportExtEx
SetWindowExtEx
SetMapMode
SelectObject
CreateSolidBrush
GetDeviceCaps
SelectClipRgn
ExcludeClipRect
GetClipRgn
CreateRectRgnIndirect
GetClipBox
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
PatBlt
CreatePatternBrush
CreateBitmap
CreateDCA
LPtoDP
GetWindowExtEx
StretchBlt
GetStockObject
SetTextColor
SetBkMode
GetTextExtentPoint32A
DLLGetDocumentation
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
HeapReAlloc
GetLastError
InterlockedDecrement
GetLocaleInfoA
InterlockedIncrement
FindResourceA
lstrcmpA
GetWindowsDirectoryA
DeleteCriticalSection
GetVersion
InitializeCriticalSection
GetProcessHeap
DisableThreadLibraryCalls
GlobalAlloc
LoadLibraryA
GetProcAddress
lstrlenA
lstrcpyA
lstrcatA
lstrcmpiA
GlobalLock
WriteProfileStringA
GlobalUnlock
GlobalFree
GetProfileStringA
LoadResource
LockResource
lstrcpynA
OpenFile
HeapFree
WideCharToMultiByte
HeapAlloc
lstrlenW
FreeLibrary
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
MultiByteToWideChar
PtInRect
IsDialogMessageA
IsChild
GetClientRect
GetParent
CreateDialogIndirectParamA
BeginPaint
WinHelpA
EnableWindow
SendMessageA
CharNextA
GetDlgItem
MessageBoxA
GetWindowLongA
GetWindowRect
CreateWindowExA
SetWindowLongA
ShowWindow
DialogBoxParamA
GetDesktopWindow
IsWindowEnabled
EndPaint
SetParent
IsWindowVisible
SetDlgItemInt
EqualRect
GetFocus
SetWindowRgn
SetWindowPos
CharUpperA
RegisterClipboardFormatA
GetWindow
SetDlgItemTextA
GetDlgItemTextA
GetDlgItemInt
DestroyWindow
SetFocus
GetNextDlgTabItem
GetKeyState
wsprintfA
GetActiveWindow
GetWindowThreadProcessId
LoadCursorA
RegisterClassA
GetDC
ReleaseDC
LoadIconA
DrawIcon
GetSystemMetrics
LoadStringA
DefWindowProcA
UnregisterClassA
OffsetRect
EndDialog
IntersectRect
CreateOleAdviseHolder
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
ReleaseStgMedium
RegDeleteKeyA
RegQueryValueA
RegOpenKeyA
RegEnumKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
CreateErrorInfo
VariantChangeType
LoadRegTypeLi
OleCreatePropertyFrame
LoadTypeLi
OleLoadPicture
VariantClear
VariantInit
GetErrorInfo
OleTranslateColor
SysStringLen
SysAllocStringLen
LoadTypeLibEx
RegisterTypeLi
UnRegisterTypeLi
SysFreeString
SysAllocString
SetErrorInfo
CommDlgExtendedError
PrintDlgA
ChooseFontA
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetSystemPaletteEntries
GetDIBits
StretchDIBits
LPtoDP
GetWindowExtEx
GetViewportExtEx
SetWindowOrgEx
SetViewportOrgEx
SetWindowExtEx
SetViewportExtEx
SetMapMode
CreateRectRgnIndirect
EnumFontFamiliesA
CreateDCA
GetObjectA
GetDeviceCaps
DeleteDC
DeleteObject
SelectObject
CreateBitmap
CreateCompatibleDC
DLLGetDocumentation
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
ord652
ord685
ord100
ord199
ord520
ord595
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
ord616
ord648
ord652
ord669
ord100
ord187
ord189
ord188
ord190
ord199
ord571
ord581
ord598
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ