@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Overview
overview
3Static
static
332RTM.exe
windows7-x64
32RTM.exe
windows10-2004-x64
BRC.exe
windows7-x64
1BRC.exe
windows10-2004-x64
1BRC32.exe
windows7-x64
1BRC32.exe
windows10-2004-x64
1BRCC.exe
windows7-x64
1BRCC.exe
windows10-2004-x64
1BRCC32.exe
windows7-x64
1BRCC32.exe
windows10-2004-x64
1GREP.com
windows7-x64
GREP.com
windows10-2004-x64
IMPDEF.exe
windows7-x64
1IMPDEF.exe
windows10-2004-x64
1IMPLIB.exe
windows7-x64
1IMPLIB.exe
windows10-2004-x64
1MAKE.exe
windows7-x64
1MAKE.exe
windows10-2004-x64
1MAKER.exe
windows7-x64
MAKER.exe
windows10-2004-x64
MAKESWAP.exe
windows7-x64
MAKESWAP.exe
windows10-2004-x64
OBJXREF.exe
windows7-x64
1OBJXREF.exe
windows10-2004-x64
1RLINK.exe
windows7-x64
RLINK.exe
windows10-2004-x64
RLINK32.dll
windows7-x64
3RLINK32.dll
windows10-2004-x64
3RTM.exe
windows7-x64
RTM.exe
windows10-2004-x64
RW32CORE.dll
windows7-x64
1RW32CORE.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
32RTM.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32RTM.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
BRC.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
BRC.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
BRC32.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
BRC32.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
BRCC.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
BRCC.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
BRCC32.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
BRCC32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
GREP.com
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
GREP.com
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
IMPDEF.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
IMPDEF.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
IMPLIB.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
IMPLIB.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
MAKE.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
MAKE.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
MAKER.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
MAKER.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
MAKESWAP.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
MAKESWAP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
OBJXREF.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
OBJXREF.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
RLINK.exe
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
RLINK.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
RLINK32.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
RLINK32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
RTM.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
RTM.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
RW32CORE.dll
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
RW32CORE.dll
Resource
win10v2004-20240508-en
Target
83822503c688e30f123747020755c31e_JaffaCakes118
Size
5.2MB
MD5
83822503c688e30f123747020755c31e
SHA1
e272a218fbd6b69f2e34b45fcb964d5926990f04
SHA256
ebbb2a1fe46a0ce39ff5653f864e852ed6f0b96db8877a278173b5581b9e9d5c
SHA512
68dfb25e9fa452906359abbfa78ddfd288bfa091cab4ac7c7df5cee1d108e87f89fa22afbc29b7663a1fc33dd5a74f472b015d01e36460886a7585c118b68f3b
SSDEEP
98304:zFBG8aD58zQC+fTsEMu7cV9bkHlLqu0IzHeT09OBxARFqYp+Drce/v25OyTQGi0H:BNaV8kC+X77cV4dfeA9qs8YsDrcEgOLA
Checks for missing Authenticode signature.
resource |
---|
unpack002/BRC.EXE |
unpack002/BRC32.EXE |
unpack002/BRCC.EXE |
unpack002/BRCC32.EXE |
unpack002/IMPDEF.EXE |
unpack002/IMPLIB.EXE |
unpack002/MAKE.EXE |
unpack002/OBJXREF.EXE |
unpack002/RLINK32.DLL |
unpack002/RW32CORE.DLL |
unpack002/RWRES.DLL |
unpack002/TDUMP.EXE |
unpack002/THUNK.EXE |
unpack002/TLIB.EXE |
unpack002/TOUCH.EXE |
unpack004/H2ASH32.EXE |
unpack004/TASM32.EXE |
unpack004/TDSTRP32.EXE |
unpack004/TLINK32.EXE |
unpack006/JITIME.EXE |
unpack006/TDCON32.EXE |
unpack001/PATCHES/53_PATCH/53PATCH.EXE |
unpack001/PATCHES/53_WIN/TASM32.EXE |
unpack001/phatcode.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleFileNameA
CreateProcessA
EnterCriticalSection
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
ExitProcess
CreateFileA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetCommandLineA
GetCurrentDirectoryA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTimeZoneInformation
GetVersion
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteFile
GetLogicalDrives
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleFileNameA
CreateProcessA
EnterCriticalSection
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
ExitProcess
CreateFileA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetCommandLineA
GetCurrentDirectoryA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTimeZoneInformation
GetVersion
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteFile
GetLogicalDrives
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleFileNameA
CreateProcessA
EnterCriticalSection
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
ExitProcess
CreateFileA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetCommandLineA
GetCurrentDirectoryA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTimeZoneInformation
GetVersion
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteFile
GetLogicalDrives
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetCurrentThreadId
GetStdHandle
GetThreadPriority
DeleteFileA
EnterCriticalSection
ExitProcess
DeleteCriticalSection
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetSystemInfo
CloseHandle
GetVersion
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeThread
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetCurrentThread
CreateFileA
FileTimeToDosDateTime
CreateDirectoryA
GetDriveTypeA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
RaiseException
ReadFile
RemoveDirectoryA
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
SetThreadPriority
SuspendThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteFile
_lclose
_lopen
lstrcmpiA
lstrcpyA
lstrlenA
GetStartupInfoA
CharUpperA
CharToOemA
CharLowerA
OemToCharA
MessageBoxA
LoadStringA
EnumThreadWindows
CharUpperBuffA
@EVENTMGRINIT$QUL
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
GetStartupInfoA
ExitProcess
GetCommandLineA
CloseHandle
GetFileAttributesA
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetEnvironmentStrings
DeleteFileA
GetStdHandle
GetVersion
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
VirtualAlloc
VirtualFree
WriteFile
GetProcAddress
MessageBoxA
GetDesktopWindow
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CloseHandle
GetModuleFileNameA
CreateFileA
FileTimeToDosDateTime
FileTimeToLocalFileTime
DeleteFileA
ExitProcess
FindNextFileA
GetCommandLineA
GetEnvironmentStrings
GetFileAttributesA
GetFileSize
GetFileType
FindClose
FindFirstFileA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetVersion
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
VirtualAlloc
VirtualFree
WriteFile
GetLastError
GetDesktopWindow
MessageBoxA
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
GetCommandLineA
DeleteFileA
DuplicateHandle
CloseHandle
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
CreateProcessA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
EnterCriticalSection
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTimeZoneInformation
GetVersion
GetVolumeInformationA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
SetStdHandle
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteFile
GetModuleFileNameA
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
__GetExceptDLLinfo
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
BindToExe
GetRLinkVersion
GetResObjSize
RemoveFromExe
WriteResObj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetFileAttributesA
LeaveCriticalSection
FindResourceA
GlobalMemoryStatus
GetFileType
FileTimeToSystemTime
FindClose
GetFileTime
EnterCriticalSection
MultiByteToWideChar
LoadLibraryA
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentVariableA
InitializeCriticalSection
LockResource
GlobalReAlloc
RaiseException
MoveFileA
LoadResource
CreateFileA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalAlloc
GlobalFlags
GlobalFree
FindFirstFileA
GetFullPathNameA
ExitProcess
GlobalUnlock
GlobalSize
GetFileSize
FreeLibrary
CloseHandle
FileTimeToLocalFileTime
GetLastError
FreeResource
DeleteFileA
GetLocalTime
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
_lread
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
GlobalLock
MessageBoxA
LoadStringA
IsCharAlphaNumericA
IsCharAlphaA
EnumThreadWindows
CreateIcon
CreateCursor
CharUpperA
CharToOemA
CharNextA
CharLowerA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
ACCELDECOMPHOOK
ACCELKEYFROMBIN
ACCELVERSIONHOOK
BITMAP3COMPOUNDHOOK
BITMAP3LOADHOOK
BITMAP3SAVEHOOK
BITMAP3VERSIONHOOK
BLOCKDECOMPHOOK
CURSOR3COMPOUNDHOOK
CURSOR3CONVERTHOOK
CURSOR3LOADHANDLER
CURSOR3SAVEHOOK
CURSOR3VERSIONHOOK
DIALOG3COMPOUNDHOOK
DIALOGDECOMPHOOK
DIALOGVERSION3HOOK
DLGINITSRCHOOK
DllCanUnloadNow
DllGetClassObject
FONT3VERSIONHOOK
FONTSPECDECOMPHOOK
GENACCELKEY
GENBUTTONSTYLE
GENCOMBOSTYLE
GENCONTROLSTYLE
GENDIALOGSTYLE
GENEDITSTYLE
GENEXSTYLE
GENFFFLAGS
GENFFMASK
GENFFOS
GENFFSUBTYPE
GENFFTYPE
GENLISTBOXSTYLE
GENMENU3COMMAND
GENMENU3OPTSFIELD
GENMENU3TEXTFIELD
GENMENU4COMMAND
GENMENU4STATEFIELD
GENMENU4TYPEFIELD
GENSCROLLBARSTYLE
GENSTATICSTYLE
GENVERSIONRES
GenResVHandle
GenResVHandleNOTNT
ICON3COMPOUNDHOOK
ICON3CONVERTHOOK
ICON3LOADHANDLER
ICON3SAVEHOOK
ICON3VERSIONHOOK
IDELIBMAIN
MENU3COMPOUNDHOOK
MENU3DECOMPHOOK
MENU3LOADHOOK
MENU3OPTSHOOK
MENU3VERSIONHOOK
MENU4HELPIDHOOK
MENU4VERSIONHOOK
MakeAControlName
RC_CONTROLSTYLESRC
RC_CONTROLSTYLESRCA
RC_GENWINSTYLE
VERSIONDECOMPHOOK
__DebuggerHookData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
_flushall
_abort
@_CatchCleanup$qv
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__ErrorMessage
__ExceptionHandler
___debuggerDisableTerminateCallback
__startup
__startupd
GetVersion
GetProcAddress
GetModuleHandleA
__DebuggerHookData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetCommandLineA
GetVersion
GetLastError
DeleteFileA
ExitProcess
GetLocalTime
RtlUnwind
UnhandledExceptionFilter
GetModuleFileNameA
GetACP
GetOEMCP
GetCPInfo
GetStdHandle
GetFileType
GetStartupInfoA
VirtualFree
GetEnvironmentStrings
WriteFile
CloseHandle
SetFilePointer
ReadFile
GetFileAttributesA
GetTimeZoneInformation
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
CreateFileA
SetEndOfFile
SetEnvironmentVariableA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
GetStartupInfoA
ExitProcess
GetCommandLineA
GetCurrentProcessId
CloseHandle
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
DeleteFileA
GetStdHandle
GetVersion
MoveFileA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
GetProcAddress
MessageBoxA
EnumThreadWindows
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
DeleteFileA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetVersion
GetVolumeInformationA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
VirtualAlloc
VirtualFree
WriteFile
CloseHandle
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
DeleteFileA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetStdHandle
ReadFile
SetFilePointer
VirtualAlloc
VirtualFree
WriteFile
CloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleFileNameA
DeleteFileA
DosDateTimeToFileTime
CloseHandle
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
ExitProcess
CreateFileA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentVariableA
GetFileAttributesA
GetFileTime
GetFileType
FindNextFileA
GetCommandLineA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetVersion
LocalFileTimeToFileTime
MoveFileA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetFileTime
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
GetLastError
MessageBoxA
EnumThreadWindows
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetLocalTime
DeleteFileA
ExitProcess
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
CreateFileA
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentVariableA
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetFullPathNameA
FreeLibrary
FileTimeToDosDateTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTimeZoneInformation
GetVersion
LoadLibraryA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
WritePrivateProfileStringA
GetLastError
MessageBoxA
EnumThreadWindows
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetLastError
GetConsoleCursorInfo
ExitProcess
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetCommandLineA
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetProcAddress
GetStartupInfoA
GetStdHandle
GetVersion
RaiseException
GetConsoleScreenBufferInfo
ReadConsoleOutputA
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetConsoleCursorInfo
SetConsoleCursorPosition
SetConsoleMode
SetConsoleScreenBufferSize
SetConsoleWindowInfo
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteConsoleOutputA
WriteFile
ReadConsoleInputA
MessageBoxA
EnumThreadWindows
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
GetACP
GetCommandLineA
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetStdHandle
ReadFile
SetFilePointer
VirtualAlloc
VirtualFree
WriteFile
IsDBCSLeadByteEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE