CheatEngine
EngineType
Overview
overview
3Static
static
3emuhaste.exe
windows7-x64
3emuhaste.exe
windows10-2004-x64
3engine/ards.dll
windows7-x64
3engine/ards.dll
windows10-2004-x64
3engine/def...fc.dll
windows7-x64
3engine/def...fc.dll
windows10-2004-x64
3engine/ocarina.dll
windows7-x64
3engine/ocarina.dll
windows10-2004-x64
3engine/password.dll
windows7-x64
3engine/password.dll
windows10-2004-x64
3engine/ps2...hn.dll
windows7-x64
3engine/ps2...hn.dll
windows10-2004-x64
3engine/raw_write.dll
windows7-x64
3engine/raw_write.dll
windows10-2004-x64
3ards.html
windows7-x64
3ards.html
windows10-2004-x64
3default_mf...c.html
windows7-x64
3default_mf...c.html
windows10-2004-x64
3password.html
windows7-x64
3password.html
windows10-2004-x64
3raw_write.html
windows7-x64
3raw_write.html
windows10-2004-x64
3manual/direct.htm
windows7-x64
3manual/direct.htm
windows10-2004-x64
3manual/ind_search.htm
windows7-x64
3manual/ind_search.htm
windows10-2004-x64
3manual/mak_engine.htm
windows7-x64
3manual/mak_engine.htm
windows10-2004-x64
3manual/makeini.htm
windows7-x64
3manual/makeini.htm
windows10-2004-x64
1manual/menu.htm
windows7-x64
3manual/menu.htm
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
emuhaste.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
emuhaste.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
engine/ards.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
engine/ards.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
engine/default_mfc.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
engine/default_mfc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
engine/ocarina.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
engine/ocarina.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
engine/password.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
engine/password.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
engine/ps2par_john.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
engine/ps2par_john.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
engine/raw_write.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
engine/raw_write.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ards.html
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
ards.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
default_mfc/default_mfc.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
default_mfc/default_mfc.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
password.html
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
password.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
raw_write.html
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
raw_write.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
manual/direct.htm
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
manual/direct.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
manual/ind_search.htm
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
manual/ind_search.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
manual/mak_engine.htm
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
manual/mak_engine.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
manual/makeini.htm
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
manual/makeini.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
manual/menu.htm
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
manual/menu.htm
Resource
win10v2004-20240802-en
Target
869afd23569b32a462693ceaae1150db_JaffaCakes118
Size
274KB
MD5
869afd23569b32a462693ceaae1150db
SHA1
675f96fe676836cf3526541503598f81c477d01c
SHA256
dda9101c2475f7cef181ef66b15bbea4b6d4c7674d87ff4b900d996a442f7fb8
SHA512
6b5bbc94691954b1330e41d850c9a703cc52c7f6380c4477cc4d8c04810adf270319f6dc3cea14cadba08e730b2c77a3a3ccb4550c9a2ddd6d03746c78465f6a
SSDEEP
6144:nwVzUsrrXtQ/R7IdoW9OciqBPCMwNiM5VzYf0fAZs:nwdUs6hdWYNqAiMDccf3
Checks for missing Authenticode signature.
resource |
---|
unpack001/emuhaste.exe |
unpack001/engine/ards.dll |
unpack001/engine/default_mfc.dll |
unpack001/engine/ocarina.dll |
unpack001/engine/password.dll |
unpack001/engine/ps2par_john.dll |
unpack001/engine/raw_write.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord3409
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord1288
ord968
ord1011
ord1244
ord1890
ord1012
ord1483
ord7871
ord1448
ord8465
ord2611
ord1929
ord3390
ord895
ord5857
ord10007
ord11154
ord8227
ord2417
ord12535
ord5534
ord2776
ord3743
ord7862
ord2614
ord3431
ord13280
ord2409
ord5821
ord6076
ord2826
ord12694
ord6131
ord1900
ord2219
ord1982
ord4283
ord3988
ord3354
ord3234
ord3254
ord10030
ord1210
ord788
ord3977
ord12868
ord4785
ord10852
ord6970
ord1313
ord310
ord5858
ord5302
ord8228
ord3744
ord7211
ord12430
ord7206
ord5176
ord5238
ord11067
ord13219
ord9475
ord3620
ord2974
ord2973
ord2752
ord5532
ord12531
ord2881
ord2878
ord7349
ord2416
ord14059
ord14061
ord14060
ord14058
ord14062
ord14045
ord13972
ord13973
ord8235
ord11025
ord3395
ord10883
ord13294
ord8070
ord11107
ord6217
ord9994
ord8351
ord2847
ord12644
ord11190
ord11188
ord1496
ord1503
ord1509
ord1507
ord1514
ord4373
ord4410
ord4381
ord4393
ord4389
ord4385
ord4415
ord4406
ord4377
ord4419
ord4398
ord4364
ord4368
ord4401
ord3991
ord13980
ord3984
ord2661
ord13302
ord7074
ord13300
ord6128
ord10672
ord12482
ord5253
ord2338
ord11060
ord3484
ord2945
ord2944
ord2846
ord11103
ord4622
ord4903
ord5095
ord8439
ord4881
ord5123
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9286
ord8305
ord5803
ord11172
ord11180
ord4078
ord7355
ord9449
ord11184
ord11153
ord11787
ord5098
ord9281
ord8304
ord6112
ord888
ord9399
ord6835
ord6678
ord3373
ord3253
ord381
ord316
ord1316
ord946
ord10360
ord8137
ord901
ord5444
ord1296
ord2088
_setmbcp
strstr
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
fclose
__argc
__argv
strtod
isalnum
fwrite
memset
strtol
strtoul
isprint
_ismbblead
_ismbbtrail
malloc
free
fprintf
_fcloseall
strcat_s
_strupr_s
strcpy_s
vsprintf_s
fopen
fread
strncpy
sprintf
__CxxFrameHandler3
ReadProcessMemory
DecodePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
FreeLibrary
EncodePointer
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
VirtualProtectEx
LoadLibraryA
GetProcAddress
GlobalAlloc
GlobalLock
lstrcpyA
GlobalUnlock
GetModuleHandleA
GetFileAttributesA
GetPrivateProfileStringA
OpenProcess
CloseHandle
SetClipboardData
CloseClipboard
GetAsyncKeyState
MessageBeep
GetSystemMetrics
LoadIconW
SetScrollPos
GetScrollPos
OpenClipboard
KillTimer
SetTimer
GetClientRect
IsIconic
SendMessageA
ModifyMenuA
DrawIcon
EnableWindow
EmptyClipboard
CreateSolidBrush
GetSaveFileNameA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenProcess
CloseHandle
WriteProcessMemory
ReadProcessMemory
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetLastError
InterlockedDecrement
GetProcAddress
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
LoadLibraryW
WriteFile
GetModuleFileNameW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
IsProcessorFeaturePresent
CheatEngine
EngineType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord3922
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord5731
ord2512
ord2554
ord4486
ord6375
ord2976
ord4274
ord269
ord826
ord600
ord1578
ord6467
ord1255
ord1116
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
??2@YAPAXI@Z
__CxxFrameHandler
LocalFree
OpenProcess
CloseHandle
WriteProcessMemory
ReadProcessMemory
LocalAlloc
CheatEngine
EngineType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetLastError
InterlockedDecrement
GetProcAddress
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
LoadLibraryW
WriteFile
GetModuleFileNameW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
IsProcessorFeaturePresent
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenProcess
CloseHandle
WriteProcessMemory
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetLastError
InterlockedDecrement
GetProcAddress
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
LoadLibraryW
WriteFile
GetModuleFileNameW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
IsProcessorFeaturePresent
CheatEngine
CheatEngine2
EngineType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEndOfFile
RtlUnwind
GetCommandLineA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapAlloc
HeapFree
RaiseException
HeapSize
HeapReAlloc
ExitProcess
TerminateProcess
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
GetOEMCP
GetCPInfo
GlobalFlags
GetProcessVersion
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
lstrcmpA
GetLastError
SetLastError
GetVersion
lstrcpynA
GetModuleFileNameA
lstrcpyA
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalAlloc
GlobalReAlloc
GlobalLock
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetCurrentThreadId
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
OpenProcess
WriteProcessMemory
ReadProcessMemory
SetHandleCount
CloseHandle
ord17
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
IsWindowEnabled
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
EnableWindow
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
LoadStringA
UnregisterClassA
UnhookWindowsHookEx
DispatchMessageA
SetWindowsHookExA
PeekMessageA
SendMessageA
GetKeyState
CallNextHookEx
RegisterWindowMessageA
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SaveDC
SelectObject
SetTextColor
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
CreateBitmap
GetClipBox
SetBkColor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
CheatEngine
EngineType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenProcess
CloseHandle
WriteProcessMemory
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetLastError
InterlockedDecrement
GetProcAddress
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
LoadLibraryW
WriteFile
GetModuleFileNameW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
IsProcessorFeaturePresent
CheatEngine
EngineType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ