GetDllOEPNow
GetOEPNow
ShortFinderName
Overview
overview
7Static
static
7Force.dll
windows7-x64
1Force.dll
windows10-2004-x64
3Help_chs.chm
windows7-x64
1Help_chs.chm
windows10-2004-x64
1Help_cz.chm
windows7-x64
1Help_cz.chm
windows10-2004-x64
1Help_dan.chm
windows7-x64
1Help_dan.chm
windows10-2004-x64
1Help_de.chm
windows7-x64
1Help_de.chm
windows10-2004-x64
1Help_eng.chm
windows7-x64
1Help_eng.chm
windows10-2004-x64
1Help_esp.chm
windows7-x64
1Help_esp.chm
windows10-2004-x64
1Help_gr.chm
windows7-x64
1Help_gr.chm
windows10-2004-x64
1Help_idn.chm
windows7-x64
1Help_idn.chm
windows10-2004-x64
1Help_jp.chm
windows7-x64
1Help_jp.chm
windows10-2004-x64
1Help_pr.chm
windows7-x64
1Help_pr.chm
windows10-2004-x64
1Help_ukr.chm
windows7-x64
1Help_ukr.chm
windows10-2004-x64
1QUnpack.dll
windows7-x64
3QUnpack.dll
windows10-2004-x64
3QuickUnpackRules.sys
windows7-x64
1QuickUnpackRules.sys
windows10-2004-x64
1VB Decompiler.exe
windows7-x64
5VB Decompiler.exe
windows10-2004-x64
5VB.Decompi...FF.exe
windows7-x64
5VB.Decompi...FF.exe
windows10-2004-x64
5Behavioral task
behavioral1
Sample
Force.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Force.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Help_chs.chm
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Help_chs.chm
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Help_cz.chm
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Help_cz.chm
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Help_dan.chm
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Help_dan.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Help_de.chm
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Help_de.chm
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Help_eng.chm
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Help_eng.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Help_esp.chm
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Help_esp.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Help_gr.chm
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Help_gr.chm
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Help_idn.chm
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Help_idn.chm
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
Help_jp.chm
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Help_jp.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Help_pr.chm
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Help_pr.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Help_ukr.chm
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
Help_ukr.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
QUnpack.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
QUnpack.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
QuickUnpackRules.sys
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
QuickUnpackRules.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
VB Decompiler.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
VB Decompiler.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
VB.Decompiler.Pro.v10.0.KEYGEN-FFF.exe
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
VB.Decompiler.Pro.v10.0.KEYGEN-FFF.exe
Resource
win10v2004-20240426-en
Target
VB Decompiler Pro v11.5 Crack By GautamGreat.zip
Size
22.6MB
MD5
300e54ee9d02cbae7b18ef5a08b22a88
SHA1
f5f1d96c3ce47f5e213c0921de8f7ee1da26090e
SHA256
ebccf0d3810e9ffc52b93acb9e0992ec77439a2d877420d2181a74ac96df276b
SHA512
b6c1d398cfe1ce5ecb08f377af946cb10e5e6ef2254434be2157fd974fb12e61cb3c857942a643ceff645c1185e8ee50400aa2c1a746bf07b3ab79c99247d4c5
SSDEEP
393216:/5IRchkD5gMdmLeZ3Epfodg7bmZ94qPZ5qlF0iAYB:/5iGkD5LtEVo26Z9jUEYB
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/plugins/LangeFree.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/plugins/LangeFree.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Force.dll |
unpack001/QUnpack.dll |
unpack001/QuickUnpackRules.sys |
unpack001/VB.Decompiler.Pro.v10.0.KEYGEN-FFF.exe |
unpack001/plugins sdk/asm/fasm/DecompilerPlugin.DLL |
unpack001/plugins sdk/asm/masm/SaveRTF.dll |
unpack001/plugins/LangeFree.dll |
unpack001/plugins/Priority.dll |
unpack001/plugins/ShowRef.dll |
unpack001/plugins/createmap.dll |
unpack001/version.dll |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
ReadProcessMemory
SuspendThread
CreateProcessA
GetFileSize
VirtualFree
VirtualAlloc
SetFilePointer
CloseHandle
ReadFile
CreateFileA
DisableThreadLibraryCalls
WaitForInputIdle
GetDllOEPNow
GetOEPNow
ShortFinderName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\E\QuickUnpack\_Release\QUnpack.pdb
ImageNtHeader
ImageRvaToVa
CheckSumMappedFile
GetMappedFileNameA
SetThreadContext
SetProcessAffinityMask
IsBadReadPtr
MulDiv
FreeResource
WriteProcessMemory
ReadProcessMemory
SetFilePointer
SwitchToThread
CreateProcessA
GetTempFileNameA
QueryDosDeviceA
GetLogicalDriveStringsA
GetExitCodeProcess
VirtualProtectEx
Sleep
VirtualFree
VirtualAlloc
VirtualQueryEx
VirtualFreeEx
VirtualAllocEx
GetCurrentProcessId
GetProcessId
GetThreadContext
ResumeThread
TerminateProcess
DeleteFileA
GetVersionExA
Module32Next
Module32First
DeviceIoControl
GetCurrentThread
GetLastError
lstrcmpiA
CreateThread
DisableThreadLibraryCalls
WaitForSingleObject
lstrcmpA
ExitProcess
UnmapViewOfFile
GetCurrentProcess
DuplicateHandle
MapViewOfFile
CreateFileMappingA
ReadFile
GetFileSize
SetCurrentDirectoryA
WriteFile
CreateFileA
GetCurrentDirectoryA
GetModuleHandleA
FreeLibrary
GetProcAddress
LoadLibraryA
FindClose
FindNextFileA
FindFirstFileA
SetHandleCount
GetModuleFileNameA
GlobalUnlock
GlobalLock
GlobalAlloc
FindResourceA
GlobalFree
MultiByteToWideChar
LocalFree
FormatMessageA
SetLastError
lstrcmpW
CompareStringA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
InterlockedExchange
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
InterlockedDecrement
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationA
GetFullPathNameA
GlobalFlags
FileTimeToSystemTime
GetModuleHandleW
InterlockedIncrement
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTickCount
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetCommandLineA
RtlUnwind
HeapReAlloc
RaiseException
VirtualProtect
GetSystemInfo
VirtualQuery
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStdHandle
InitializeCriticalSectionAndSpinCount
HeapCreate
HeapDestroy
LoadResource
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
LockResource
SizeofResource
WideCharToMultiByte
lstrlenA
OpenProcess
Thread32Next
SuspendThread
OpenThread
CloseHandle
Thread32First
CreateToolhelp32Snapshot
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
MoveWindow
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
CheckMenuItem
EnableMenuItem
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
GetWindowThreadProcessId
UnregisterClassA
ValidateRect
GetCursorPos
TranslateMessage
GetMessageA
MapDialogRect
SetWindowContextHelpId
CharUpperA
GetSysColorBrush
MessageBeep
SetRect
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
WinHelpA
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
GetFocus
IsWindowVisible
UpdateWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
LoadIconA
PostThreadMessageA
SendDlgItemMessageA
IsChild
SetWindowsHookExA
GetSubMenu
GetMenu
LoadBitmapA
GetDC
MessageBoxA
PostQuitMessage
ModifyMenuA
GetSysColor
SetForegroundWindow
ShowWindow
CloseClipboard
SetClipboardData
EmptyClipboard
CallNextHookEx
GetClassLongA
GetMessagePos
GetClassNameA
OpenClipboard
EnableWindow
AnimateWindow
GetDlgItem
SetPropA
GetWindowLongA
GetParent
SetCursor
LoadCursorA
ReleaseCapture
PtInRect
ClientToScreen
GetWindowRect
SetCapture
InvalidateRect
GetCapture
SendMessageA
RemovePropA
SetWindowLongA
CallWindowProcA
GetPropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetMapMode
CreateRectRgnIndirect
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ScaleWindowExtEx
GetStockObject
CreateBitmap
GetDeviceCaps
DeleteDC
TextOutA
SetBkColor
SelectObject
GetObjectA
DeleteObject
SetTextColor
GetBkColor
GetTextColor
GetRgnBox
SetMapMode
GetViewportExtEx
ExtSelectClipRgn
RestoreDC
SaveDC
GetClipBox
GetWindowExtEx
PtVisible
RectVisible
ExtTextOutA
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
CreateServiceA
StartServiceA
RegOpenKeyExA
RegQueryValueExA
CoFreeUnusedLibraries
OleUninitialize
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleInitialize
CoTaskMemFree
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
SysAllocString
SysFreeString
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
OleCreateFontIndirect
SysStringLen
ord17
StrToIntA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ord8
LresultFromObject
CreateStdAccessibleObject
OpenPrinterA
ClosePrinter
DocumentPropertiesA
UnPack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\E\QuickUnpack\Engine\i386\QUnpack32.pdb
ZwSetInformationThread
KeQueryActiveProcessors
ZwQueryInformationProcess
IoFreeMdl
MmUnmapLockedPages
ZwYieldExecution
IofCompleteRequest
MmMapLockedPagesSpecifyCache
MmBuildMdlForNonPagedPool
IoAllocateMdl
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
memmove
PsGetCurrentProcessId
PsGetCurrentThreadId
KeTickCount
RtlUnwind
KeBugCheckEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
TMethodImplementationIntercept
dbkFCallWrapperAddr
madTraceProcess
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateFileW
LocalAlloc
WideCharToMultiByte
_lwrite
lstrlenW
DialogBoxParamA
EndDialog
MessageBoxW
SetDlgItemTextW
InitCommonControls
VBDecompilerPluginAuthor
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
IsBadCodePtr
CreateFileA
WideCharToMultiByte
WriteFile
lstrcatA
lstrcpyA
lstrlenA
RtlZeroMemory
CloseHandle
SendMessageA
GetSaveFileNameA
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MessageBoxA
wsprintfA
RtlZeroMemory
lstrcpyA
CloseHandle
CreateDirectoryA
CreateFileA
CreateProcessA
GetEnvironmentVariableA
GetModuleFileNameA
IsBadCodePtr
ReadFile
RtlMoveMemory
lstrcatA
SetFilePointer
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrlenA
SHFileOperationA
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
VBDecompilerPluginAuthor
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
MessageBoxA
PostMessageW
MessageBoxA
EndDialog
DialogBoxParamW
CheckRadioButton
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
GetStartupInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
SetThreadPriority
GetThreadPriority
GetCurrentThread
FreeLibrary
VBDecompilerPluginAuthor
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegQueryValueExA
ImageList_Destroy
InitCommonControlsEx
Arc
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectA
CreateHatchBrush
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
ExtFloodFill
GetCurrentObject
GetCurrentPositionEx
GetDeviceCaps
GetDIBits
GetObjectA
GetPixel
GetStockObject
GetTextExtentPoint32A
GetTextMetricsA
LineTo
MoveToEx
Pie
Polygon
Polyline
RoundRect
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBits
SetPixelV
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
StretchBlt
TextOutA
CloseHandle
CreateFileA
CreateThread
EnterCriticalSection
EnumResourceNamesA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetFileType
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStringTypeA
GetTickCount
GetVersionExA
GetVolumeInformationA
GlobalAlloc
GlobalFree
GlobalReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
ReadFile
SetEndOfFile
SetErrorMode
SetFilePointer
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WideCharToMultiByte
WriteFile
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
ProgIDFromCLSID
CoTaskMemAlloc
GetActiveObject
SafeArrayCreate
SysAllocStringByteLen
SysFreeString
SysStringByteLen
VariantClear
VariantCopy
ShellExecuteA
BeginPaint
CallWindowProcA
CharLowerBuffA
CharNextA
CharUpperBuffA
CheckRadioButton
ClientToScreen
CreateDialogIndirectParamA
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyWindow
DispatchMessageA
EnableWindow
EndPaint
FillRect
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetMenu
GetMenuItemInfoA
GetMessageA
GetSysColor
GetSysColorBrush
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
IsDialogMessageA
IsWindow
LoadCursorA
LoadIconA
LoadImageA
MapDialogRect
MessageBeep
MessageBoxA
PeekMessageA
PostMessageA
RedrawWindow
RegisterClassExA
ReleaseDC
ScreenToClient
SendMessageA
SetCursor
SetFocus
SetForegroundWindow
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
DialogBoxParamA
DrawTextA
EnumWindows
GetFocus
IsWindowEnabled
KillTimer
RegisterClassA
SetTimer
VBDecompilerPluginAuthor
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
VBDecompilerPluginAuthor
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
VBDecompilerPluginAuthor
VBDecompilerPluginLoad
VBDecompilerPluginName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Program\Dot Net\FRXView\FRXView\obj\Release\FRXView.pdb
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetLastError
GetACP
CreateThread
CompareStringW
LocalFree
CloseHandle
TlsAlloc
WideCharToMultiByte
GetTickCount
MultiByteToWideChar
LoadLibraryW
LoadLibraryA
GetSystemDirectoryW
GetVersion
VirtualFree
RaiseException
GetStartupInfoW
ExitProcess
SwitchToThread
InitializeCriticalSection
VirtualAlloc
WriteFile
RtlUnwind
GetSystemInfo
GetCommandLineW
GetProcAddress
DeleteCriticalSection
TlsGetValue
GetStdHandle
GetVersionExW
TlsSetValue
GetModuleHandleW
FreeLibrary
LocalAlloc
GetCurrentThreadId
UnhandledExceptionFilter
TlsFree
VirtualQuery
SetThreadLocale
Sleep
SysFreeString
GetFileVersionInfoA
GetFileVersionInfoByHandle
GetFileVersionInfoExW
GetFileVersionInfoSizeA
GetFileVersionInfoSizeExW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerFindFileA
VerFindFileW
VerInstallFileA
VerInstallFileW
VerLanguageNameA
VerLanguageNameW
VerQueryValueA
VerQueryValueW
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ