_CloseProcess
_FindProcess
_KillProcess
_Unload
Overview
overview
7Static
static
3b6bc36bbe1...18.exe
windows7-x64
7b6bc36bbe1...18.exe
windows10-2004-x64
7$1/Tablacu...ff.exe
windows7-x64
3$1/Tablacu...ff.exe
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$R1/Tablacus.exe
windows7-x64
4$R1/Tablacus.exe
windows10-2004-x64
3$R1/TablacusApp.exe
windows7-x64
1$R1/TablacusApp.exe
windows10-2004-x64
1$R1/script...und.js
windows7-x64
3$R1/script...und.js
windows10-2004-x64
3$R1/script/common.js
windows7-x64
3$R1/script/common.js
windows10-2004-x64
3$R1/script/consts.js
windows7-x64
3$R1/script/consts.js
windows10-2004-x64
3$R1/script...g.html
windows7-x64
1$R1/script...g.html
windows10-2004-x64
1$R1/script/index.html
windows7-x64
1$R1/script/index.html
windows10-2004-x64
1$R1/script/index.js
windows7-x64
3$R1/script/index.js
windows10-2004-x64
3$R1/script...n.html
windows7-x64
1$R1/script...n.html
windows10-2004-x64
1$R1/script...s.html
windows7-x64
1$R1/script...s.html
windows10-2004-x64
1$R1/script/options.js
windows7-x64
3$R1/script/options.js
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
b6bc36bbe134bd1d711e837e59055168_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6bc36bbe134bd1d711e837e59055168_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/TablacusInstallerStuff.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$1/TablacusInstallerStuff.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$R1/Tablacus.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$R1/Tablacus.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$R1/TablacusApp.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$R1/TablacusApp.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$R1/script/background.js
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$R1/script/background.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$R1/script/common.js
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$R1/script/common.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$R1/script/consts.js
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
$R1/script/consts.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$R1/script/dialog.html
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$R1/script/dialog.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$R1/script/index.html
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$R1/script/index.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$R1/script/index.js
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$R1/script/index.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
$R1/script/location.html
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
$R1/script/location.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
$R1/script/options.html
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
$R1/script/options.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
$R1/script/options.js
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
$R1/script/options.js
Resource
win10v2004-20240508-en
Target
b6bc36bbe134bd1d711e837e59055168_JaffaCakes118
Size
449KB
MD5
b6bc36bbe134bd1d711e837e59055168
SHA1
e278b40ee33613a16fc9262e61083af9266744c6
SHA256
4f98f78f2f75cdc7b17931fc0fe66c6dc1a26bf6af26be8ebecc1edd53e80776
SHA512
edb792e7c9f40a510519ba544512987ede5bb426cadcf7ec848c2320e997d0b9fe420c46596fab5edaf1deb257cb879ced8f5337d9276c850c94b8612fbf3573
SSDEEP
12288:QPxaRCQBjHkcNqOQ/3AjTr7vHSujL6TctM3TZ:YIRCQBAcN0/3YrziTx3TZ
Checks for missing Authenticode signature.
resource |
---|
b6bc36bbe134bd1d711e837e59055168_JaffaCakes118 |
unpack001/$1/TablacusInstallerStuff.exe |
unpack001/$PLUGINSDIR/nsProcess.dll |
unpack001/$R1/Tablacus.exe |
unpack001/$R1/TablacusApp.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
MoveFileW
SetFileAttributesW
GetCurrentProcess
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
WaitForSingleObject
CopyFileW
CompareFileTime
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GlobalFree
GlobalAlloc
GetShortPathNameW
SearchPathW
lstrcmpiW
SetFileTime
CloseHandle
ExpandEnvironmentStringsW
lstrcmpW
GlobalUnlock
lstrcpynW
GetDiskFreeSpaceW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
MulDiv
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetSystemMenu
SetClassLongW
IsWindowEnabled
EnableMenuItem
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
wsprintfW
ScreenToClient
GetWindowRect
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
LoadImageW
SetTimer
SetWindowTextW
PostQuitMessage
ShowWindow
GetDlgItem
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
DrawTextW
EndPaint
CreateDialogParamW
SendMessageTimeoutW
SetForegroundWindow
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
RegDeleteKeyW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryExW
FreeLibrary
WideCharToMultiByte
ReadFile
SetFilePointer
GetFileSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
GetCommandLineW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
MultiByteToWideChar
GetStdHandle
WriteFile
GetACP
HeapFree
HeapAlloc
GetStringTypeW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetFileType
CloseHandle
SetStdHandle
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
OpenProcess
MultiByteToWideChar
lstrlenA
lstrlenW
LoadLibraryA
lstrcmpiW
lstrcpynW
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetVersionExW
GlobalFree
GlobalAlloc
GetWindowThreadProcessId
EnumWindows
wsprintfW
PostMessageW
_CloseProcess
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\cpp\TE\Debug\TE32.pdb
GlobalGetAtomNameW
GlobalFindAtomW
GlobalDeleteAtom
FileTimeToDosDateTime
OutputDebugStringW
MoveFileExW
VerSetConditionMask
VerifyVersionInfoW
CreateMutexW
TerminateProcess
GlobalAlloc
GetThreadLocale
lstrcmpW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
VirtualAlloc
GlobalAddAtomW
LeaveCriticalSection
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
ExitProcess
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapFree
RaiseException
HeapAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
CreateThread
ResumeThread
GetLastError
ExitThread
GetTimeFormatW
GetDateFormatW
GetCurrentDirectoryW
GetModuleHandleW
LoadLibraryExW
OpenProcess
GetVersionExW
GetShortPathNameW
SetFileTime
WriteFile
CreateDirectoryW
GetTickCount
lstrcmpA
WideCharToMultiByte
lstrcmpiA
FreeLibrary
GetProcAddress
LoadLibraryW
GlobalUnlock
GlobalLock
WaitForSingleObject
CreateEventW
GetCurrentThreadId
SetEvent
GetVolumeInformationW
GetCommandLineW
lstrcpyW
FileTimeToSystemTime
InterlockedIncrement
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
FindClose
FindNextFileW
FindFirstFileW
GetModuleFileNameW
GetDriveTypeW
lstrcpynW
GetCurrentProcess
lstrcmpiW
ReleaseMutex
Sleep
lstrcatW
GetNumberFormatW
GetLocaleInfoW
CloseHandle
ReadFile
GetFileSize
CreateFileW
MultiByteToWideChar
GetUserDefaultLCID
lstrlenW
FormatMessageW
LocalFree
InterlockedDecrement
EnterCriticalSection
GetModuleHandleA
AttachThreadInput
SetWindowLongW
GetWindowLongW
SendMessageW
RedrawWindow
GetPropA
GetParent
SetParent
FindWindowExA
GetClientRect
MoveWindow
InvalidateRect
GetMenuItemInfoW
GetMenuItemCount
GetForegroundWindow
GetWindowThreadProcessId
SetForegroundWindow
ShowWindow
SystemParametersInfoW
IsIconic
GetAsyncKeyState
SetWindowsHookExW
TrackPopupMenuEx
UnhookWindowsHookEx
MessageBoxW
GetClassLongW
GetSubMenu
GetSysColorBrush
GetDC
CreatePopupMenu
SetClassLongW
GetSystemMenu
GetWindowDC
GetWindow
GetTopWindow
GetCapture
GetMessagePos
SetMenuDefaultItem
GetMenuDefaultItem
WaitForInputIdle
MapVirtualKeyW
GetMenuItemID
ReleaseDC
GetSysColor
GetSystemMetrics
SetMenuItemInfoW
SetMenuInfo
GetMenuInfo
EndPaint
FillRect
GetIconInfo
MsgWaitForMultipleObjectsEx
SendInput
GetMessageW
SendNotifyMessageW
SetWindowTextW
InsertMenuW
AllowSetForegroundWindow
CopyImage
LoadMenuW
LoadIconW
LoadImageW
CreateWindowExW
BeginPaint
LoadCursorFromFileW
GetWindowTextLengthW
GetWindowTextW
GetClassNameW
GetKeyNameTextW
LoadStringW
MonitorFromPoint
MonitorFromRect
PtInRect
SetRectEmpty
DefWindowProcW
PostQuitMessage
ChangeClipboardChain
SetClipboardViewer
RegisterClipboardFormatW
SendMessageTimeoutW
ShowScrollBar
SetRect
CopyRect
RegisterClassExW
CopyIcon
DrawTextW
UnregisterHotKey
RegisterHotKey
SetWindowPos
CreateMenu
InsertMenuItemW
IsChild
GetFocus
CallNextHookEx
ScreenToClient
SetFocus
GetClassNameA
GetDoubleClickTime
GetCursorPos
CallWindowProcW
ClientToScreen
OffsetRect
GetKeyState
GetWindowRect
IsWindowVisible
SetCursor
LoadCursorW
SetCapture
ReleaseCapture
SetScrollInfo
FindWindowW
FindWindowExW
WindowFromPoint
PeekMessageW
TranslateMessage
DispatchMessageW
RegisterWindowMessageW
GetKeyboardState
SetKeyboardState
CreateIconIndirect
PostMessageW
KillTimer
EndMenu
DestroyCursor
SetCursorPos
DestroyWindow
EnableMenuItem
DrawIconEx
RemoveMenu
DeleteMenu
SetMenuItemBitmaps
IsMenu
BringWindowToTop
OpenIcon
IsZoomed
IsWindow
DestroyIcon
SetTimer
DestroyMenu
DrawIcon
keybd_event
mouse_event
GetMonitorInfoW
DeleteObject
LineTo
BitBlt
Rectangle
CreatePen
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
SelectObject
GetObjectW
SetTextColor
SetBkColor
SetBkMode
GetTextExtentPoint32W
DeleteDC
MoveToEx
CreateFontIndirectW
GetOpenFileNameW
ChooseColorW
FindTextW
GetSaveFileNameW
ChooseFontW
ReplaceTextW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
ord256
SHGetSettings
SHGetFolderLocation
ord189
ord645
ord644
ShellExecuteW
SHGetFileInfoW
ord2
ord88
ExtractIconExW
SHEmptyRecycleBinW
Shell_NotifyIconW
ord4
SHChangeNotify
DragFinish
DragAcceptFiles
SHFreeNameMappings
ShellExecuteExW
ord16
CommandLineToArgvW
SHGetDataFromIDListW
ord152
SHFileOperationW
ord162
ord18
ord23
ord21
DragQueryFileW
ord17
ord153
SHGetDesktopFolder
SHBindToParent
ord25
ReleaseStgMedium
CoCreateInstance
StringFromGUID2
StringFromCLSID
CoMarshalInterThreadInterfaceInStream
CoCreateGuid
OleSetClipboard
OleGetClipboard
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CoGetInterfaceAndReleaseStream
CoUninitialize
CoInitialize
CLSIDFromProgID
CLSIDFromString
CreateBindCtx
RegisterDragDrop
RevokeDragDrop
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysAllocStringLen
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysReAllocStringLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayGetUBound
SafeArrayGetLBound
SysReAllocString
GetActiveObject
SafeArrayDestroy
SysAllocString
ImageList_LoadImageW
ImageList_Duplicate
ImageList_Create
ImageList_GetIcon
ImageList_GetBkColor
ImageList_Replace
ImageList_GetImageCount
ImageList_AddMasked
ImageList_Add
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_Copy
ImageList_SetOverlayImage
ImageList_SetImageCount
ImageList_DrawEx
ImageList_Draw
ImageList_SetIconSize
ImageList_Remove
ImageList_Destroy
ord17
PathFileExistsW
PathIsSameRootW
AssocQueryStringW
ord172
StrCmpLogicalW
StrChrIW
StrRChrW
PathMatchSpecW
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathGetDriveNumberW
PathIsRootW
PathSearchAndQualifyW
PathCreateFromUrlW
PathUnquoteSpacesW
StrFormatKBSizeW
StrFormatByteSizeW
StrChrW
PathAppendW
StrRetToBSTR
StrCmpNIW
ord8
ord9
ord10
ord219
ord174
StrToIntExW
ord256
ord12
PathQuoteSpacesW
GdipFree
GdipAlloc
GdipDisposeImage
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapSetPixel
GdipBitmapGetPixel
GdipCreateHICONFromBitmap
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromResource
GdipCreateBitmapFromHICON
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipImageRotateFlip
GdipGetImageThumbnail
GdipGetImagePixelFormat
GdipGetImageRawFormat
GdipGetImageHeight
GdipGetImageWidth
GdipSaveImageToStream
GdipSaveImageToFile
GdipCloneImage
CoInternetSetFeatureEnabled
URLDownloadToFileW
CreateFormatEnumerator
ImmSetOpenStatus
ImmGetVirtualKey
ImmGetContext
ImmReleaseContext
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AssocQueryStringW
GetMessageW
DispatchMessageW
GetForegroundWindow
TranslateAcceleratorW
TranslateMessage
GetClassNameA
GetWindowRect
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
ShellExecuteExW
SHGetFolderPathW
HeapReAlloc
FlushFileBuffers
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
HeapSize
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
CreateThread
ExpandEnvironmentStringsW
GetCurrentProcess
CreateFileW
MultiByteToWideChar
CloseHandle
IsWow64Process
GetProcAddress
LoadLibraryExW
WaitForSingleObject
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
ExitProcess
GetModuleHandleExW
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
HeapFree
HeapAlloc
GetStringTypeW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetFileType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ