__GetExceptDLLinfo
___CPPdebugHook
Overview
overview
7Static
static
722f5c3567f...18.exe
windows7-x64
722f5c3567f...18.exe
windows10-2004-x64
7bin/cpau/cpau.exe
windows7-x64
7bin/cpau/cpau.exe
windows10-2004-x64
7bin/k2epac...id.exe
windows7-x64
3bin/k2epac...id.exe
windows10-2004-x64
3bin/k2epac...ib.exe
windows7-x64
3bin/k2epac...ib.exe
windows10-2004-x64
3bin/k2epac...on.dll
windows7-x64
3bin/k2epac...on.dll
windows10-2004-x64
3bin/k2epac...nv.dll
windows7-x64
3bin/k2epac...nv.dll
windows10-2004-x64
3bin/k2epac...em.dll
windows7-x64
3bin/k2epac...em.dll
windows10-2004-x64
3bin/k2epac...ec.dll
windows7-x64
3bin/k2epac...ec.dll
windows10-2004-x64
3bin/k2epac...id.exe
windows7-x64
3bin/k2epac...id.exe
windows10-2004-x64
3bin/k2epac...ib.exe
windows7-x64
3bin/k2epac...ib.exe
windows10-2004-x64
3bin/k2epac...kc.exe
windows7-x64
1bin/k2epac...kc.exe
windows10-2004-x64
1bin/k2epac...kw.exe
windows7-x64
1bin/k2epac...kw.exe
windows10-2004-x64
1bin/regsvr...Ex.exe
windows7-x64
1bin/regsvr...Ex.exe
windows10-2004-x64
1bin/startx/startx.exe
windows7-x64
1bin/startx/startx.exe
windows10-2004-x64
1bin/upx/NEWS.vbs
windows7-x64
1bin/upx/NEWS.vbs
windows10-2004-x64
1bin/upx/upx.vbs
windows7-x64
1bin/upx/upx.vbs
windows10-2004-x64
1Behavioral task
behavioral1
Sample
22f5c3567f7177b19ff30a2540b7e69e_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
22f5c3567f7177b19ff30a2540b7e69e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
bin/cpau/cpau.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
bin/cpau/cpau.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
bin/k2epack/CStubs/lzma_solid.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
bin/k2epack/CStubs/lzma_solid.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
bin/k2epack/CStubs/zlib.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
bin/k2epack/CStubs/zlib.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
bin/k2epack/Plugins/NotifyIcon.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
bin/k2epack/Plugins/NotifyIcon.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
bin/k2epack/Plugins/SetEnv.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
bin/k2epack/Plugins/SetEnv.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
bin/k2epack/Plugins/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
bin/k2epack/Plugins/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bin/k2epack/Plugins/nsExec.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
bin/k2epack/Plugins/nsExec.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
bin/k2epack/WStubs/lzma_solid.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
bin/k2epack/WStubs/lzma_solid.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
bin/k2epack/WStubs/zlib.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
bin/k2epack/WStubs/zlib.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
bin/k2epack/k2epackc.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
bin/k2epack/k2epackc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
bin/k2epack/k2epackw.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
bin/k2epack/k2epackw.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
bin/regsvrex/RegSvrEx.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
bin/regsvrex/RegSvrEx.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
bin/startx/startx.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
bin/startx/startx.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
bin/upx/NEWS.vbs
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
bin/upx/NEWS.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
bin/upx/upx.vbs
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
bin/upx/upx.vbs
Resource
win10v2004-20240611-en
Target
22f5c3567f7177b19ff30a2540b7e69e_JaffaCakes118
Size
1.3MB
MD5
22f5c3567f7177b19ff30a2540b7e69e
SHA1
0c6b22471d83b4b43a791671621cb6b3ca6f0e59
SHA256
387ae43099fee9234854e9c8ebe1b4ae42c22f5b952446334c6335587899deee
SHA512
5aac19abd30db56771b3adb018b2cfc1c1006e71aa540200e26b0992eb6a4fdb49483696892e18bed29cf403518d3ade6fe41119bdfeeff6647adc7ecc877e56
SSDEEP
24576:43ONoT1nTpwetGnhzxgvdrzSYYOITLGd/qFBwjVEkNkMG5GVvJFFHxqB7rsHZXOU:NmT1nTpPGnh2d3KfTs/qvDQ4YL+BHwZB
resource | yara_rule |
---|---|
sample | upx |
static1/unpack001/bin/cpau/cpau.exe | upx |
static1/unpack001/bin/upx/upx.exe | upx |
static1/unpack001/kix2exe.exe | upx |
static1/unpack001/scriptcfg.exe | upx |
static1/unpack001/uninstall.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
22f5c3567f7177b19ff30a2540b7e69e_JaffaCakes118 |
unpack001/bin/cpau/cpau.exe |
unpack002/out.upx |
unpack001/bin/k2epack/CStubs/lzma_solid |
unpack001/bin/k2epack/CStubs/zlib |
unpack001/bin/k2epack/Plugins/NotifyIcon.dll |
unpack001/bin/k2epack/Plugins/SetEnv.dll |
unpack001/bin/k2epack/Plugins/System.dll |
unpack001/bin/k2epack/Plugins/nsExec.dll |
unpack001/bin/k2epack/WStubs/lzma_solid |
unpack001/bin/k2epack/WStubs/zlib |
unpack001/bin/k2epack/k2epackc.exe |
unpack001/bin/k2epack/k2epackw.exe |
unpack001/bin/regsvrex/RegSvrEx.exe |
unpack001/bin/startx/startx.exe |
unpack001/bin/upx/upx.exe |
unpack001/kix2exe.exe |
unpack004/out.upx |
unpack001/out.upx |
unpack001/scriptcfg.exe |
unpack005/out.upx |
unpack001/uninstall.exe |
unpack006/out.upx |
resource | yara_rule |
---|---|
static1/unpack001/out.upx | nsis_installer_2 |
static1/unpack006/out.upx | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetProcAddress
CreateFileA
GetFileSize
GetModuleFileNameA
ExitProcess
GetCurrentProcess
DeleteFileA
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
SetErrorMode
CreateProcessA
GetTempFileNameA
GetTickCount
lstrcpynA
lstrlenA
lstrcatA
GetStdHandle
LoadLibraryA
GetSystemDirectoryA
GetVersion
RemoveDirectoryA
MultiByteToWideChar
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
Sleep
MulDiv
PeekMessageA
DispatchMessageA
wvsprintfA
CharPrevA
MessageBoxIndirectA
SetWindowTextA
CharNextA
ExitWindowsEx
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
InvalidateRect
SendMessageA
SHFileOperationA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetFileInfoA
ShellExecuteA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
ord17
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetProcAddress
GetTickCount
GetFileSize
GetModuleFileNameA
ExitProcess
GetCurrentProcess
DeleteFileA
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
SetErrorMode
CreateProcessA
CreateFileA
GetTempFileNameA
lstrcpynA
lstrlenA
lstrcatA
GetStdHandle
LoadLibraryA
GetSystemDirectoryA
GetVersion
RemoveDirectoryA
MultiByteToWideChar
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
Sleep
MulDiv
PeekMessageA
DispatchMessageA
wvsprintfA
CharPrevA
MessageBoxIndirectA
SetWindowTextA
CharNextA
ExitWindowsEx
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
InvalidateRect
SendMessageA
SHFileOperationA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetFileInfoA
ShellExecuteA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
ord17
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Shell_NotifyIconA
GetProcAddress
lstrcpyA
lstrlenA
lstrcpynA
GlobalAlloc
GlobalFree
GetModuleHandleA
CallWindowProcA
LoadImageA
ShowWindow
GetDlgItem
GetWindowLongA
SetWindowLongA
SendMessageA
FindWindowExA
wsprintfA
KillTimer
IsIconic
OpenIcon
SetTimer
Icon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
SetEnvironmentVariableA
SetEnvVar
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
MultiByteToWideChar
FreeLibrary
wsprintfA
CLSIDFromString
StringFromGUID2
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
lstrcmpiA
ExitProcess
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
lstrcpynA
GetCommandLineA
Sleep
TerminateProcess
lstrcpyA
GlobalReAlloc
GlobalUnlock
GlobalSize
ReadFile
GetModuleHandleA
GetTickCount
GetStartupInfoA
CreatePipe
GetVersionExA
GlobalLock
DeleteFileA
lstrcatA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
CopyFileA
GetTempFileNameA
GlobalFree
GlobalAlloc
GetModuleFileNameA
GetProcAddress
PeekNamedPipe
GetCurrentProcess
FindWindowExA
CharPrevA
OemToCharBuffA
SendMessageA
wsprintfA
CharNextA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Exec
ExecToLog
ExecToStack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetProcAddress
CreateFileA
GetFileSize
GetModuleFileNameA
ExitProcess
GetCurrentProcess
DeleteFileA
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
SetErrorMode
CreateProcessA
GetTempFileNameA
GetTickCount
lstrcpynA
lstrlenA
lstrcatA
LoadLibraryA
GetSystemDirectoryA
GetVersion
RemoveDirectoryA
MultiByteToWideChar
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
Sleep
MulDiv
PeekMessageA
DispatchMessageA
CharPrevA
MessageBoxIndirectA
SetWindowTextA
CharNextA
ExitWindowsEx
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
InvalidateRect
SendMessageA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetFileInfoA
SHFileOperationA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
ord17
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetProcAddress
GetTickCount
GetFileSize
GetModuleFileNameA
ExitProcess
GetCurrentProcess
DeleteFileA
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
SetErrorMode
CreateProcessA
CreateFileA
GetTempFileNameA
lstrcpynA
lstrlenA
lstrcatA
LoadLibraryA
GetSystemDirectoryA
GetVersion
RemoveDirectoryA
MultiByteToWideChar
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
Sleep
MulDiv
PeekMessageA
DispatchMessageA
CharPrevA
MessageBoxIndirectA
SetWindowTextA
CharNextA
ExitWindowsEx
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
InvalidateRect
SendMessageA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetFileInfoA
SHFileOperationA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
ord17
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteObject
GetTextExtentPoint32A
SelectObject
CreateFontIndirectA
CreateCompatibleDC
GetObjectA
DeleteDC
SendMessageA
CharNextExA
wsprintfA
CharPrevA
CharNextA
IsWindow
GetDC
MapDialogRect
DestroyWindow
CreateDialogIndirectParamA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
GetCurrentDirectoryA
SetEndOfFile
GetLocaleInfoW
GetExitCodeProcess
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ResetEvent
CloseHandle
WaitForSingleObject
SetEvent
WaitForMultipleObjects
CreateThread
CreateEventA
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
IsValidCodePage
OpenEventA
SetPriorityClass
GetCurrentProcess
CreateFileMappingA
CreateFileA
GetTempFileNameA
GetTempPathA
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
GetSystemInfo
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GetFileSize
CreateProcessA
SetLastError
GetLastError
GlobalFree
GlobalAlloc
GetFullPathNameA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
VirtualAlloc
VirtualFree
GetProcAddress
RtlUnwind
HeapFree
RaiseException
DeleteFileA
HeapAlloc
HeapReAlloc
ExitProcess
TerminateProcess
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
LCMapStringA
LCMapStringW
GetCPInfo
WriteFile
FlushFileBuffers
HeapDestroy
HeapCreate
IsBadWritePtr
LoadLibraryA
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSize
GetTimeZoneInformation
VirtualProtect
VirtualQuery
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetCurrentDirectoryA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteObject
GetTextExtentPoint32A
SelectObject
CreateFontIndirectA
CreateCompatibleDC
GetObjectA
DeleteDC
SendMessageA
CharNextExA
wsprintfA
CharPrevA
CharNextA
IsWindow
GetDC
MapDialogRect
DestroyWindow
CreateDialogIndirectParamA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
GetCurrentDirectoryA
SetEndOfFile
GetLocaleInfoW
GetExitCodeProcess
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ResetEvent
CloseHandle
WaitForSingleObject
SetEvent
WaitForMultipleObjects
CreateThread
CreateEventA
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
IsValidCodePage
OpenEventA
SetPriorityClass
GetCurrentProcess
CreateFileMappingA
CreateFileA
GetTempFileNameA
GetTempPathA
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
GetSystemInfo
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GetFileSize
CreateProcessA
SetLastError
GetLastError
GlobalFree
GlobalAlloc
GetFullPathNameA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
VirtualAlloc
VirtualFree
GetProcAddress
RtlUnwind
HeapFree
RaiseException
DeleteFileA
HeapAlloc
HeapReAlloc
ExitProcess
TerminateProcess
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
LCMapStringA
LCMapStringW
GetCPInfo
WriteFile
FlushFileBuffers
HeapDestroy
HeapCreate
IsBadWritePtr
LoadLibraryA
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSize
GetTimeZoneInformation
VirtualProtect
VirtualQuery
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetCurrentDirectoryA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\ramakrishna\My Documents\Visual Studio Projects\RegSvrEx\bin\Release\RegSvrEx.pdb
PathFindExtensionW
PathFindFileNameW
GetStdHandle
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleHandleW
WriteFile
FormatMessageA
GetProcAddress
lstrcpyW
GetModuleFileNameW
GetLastError
GetExitCodeProcess
WaitForSingleObject
CloseHandle
LocalFree
SetThreadContext
WriteProcessMemory
VirtualAllocEx
GetThreadContext
CreateProcessW
FreeLibrary
LoadLibraryW
lstrcmpiW
GetCommandLineW
ResumeThread
wsprintfA
LoadStringA
RegCloseKey
RegOverridePredefKey
RegOpenKeyW
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
HeapAlloc
HeapFree
TerminateProcess
GetACP
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GetModuleFileNameA
GlobalFlags
MulDiv
lstrcpynA
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalAlloc
lstrcmpA
GetCurrentThread
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrlenA
GetLastError
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
FormatMessageA
LocalFree
LoadLibraryA
GetProcAddress
FreeLibrary
GetEnvironmentStringsW
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
PostQuitMessage
SetCursor
LoadStringA
GetClassNameA
PtInRect
ClientToScreen
ReleaseDC
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
LoadIconA
PostMessageA
GetClientRect
UpdateWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
SendMessageA
EnableWindow
SetWindowsHookExA
UnregisterClassA
GetDeviceCaps
GetStockObject
DeleteDC
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
DeleteObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
ShellExecuteA
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ