DumpSam
Overview
overview
3Static
static
3Data/pwdum...mp.dll
windows7-x64
3Data/pwdum...mp.dll
windows10-2004-x64
3Data/pwdum...mp.dll
windows7-x64
3Data/pwdum...mp.dll
windows10-2004-x64
3Data/pwdum...xt.dll
windows7-x64
3Data/pwdum...xt.dll
windows10-2004-x64
3Data/pwdum...ce.exe
windows7-x64
1Data/pwdum...ce.exe
windows10-2004-x64
3Data/pwdum...xt.dll
windows7-x64
3Data/pwdum...xt.dll
windows10-2004-x64
3Data/pwdum...ce.exe
windows7-x64
1Data/pwdum...ce.exe
windows10-2004-x64
3lcp.exe
windows7-x64
3lcp.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Data/pwdump2-orig/samdump.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Data/pwdump2-orig/samdump.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Data/pwdump2/samdump.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Data/pwdump2/samdump.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Data/pwdump3/LsaExt.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Data/pwdump3/LsaExt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Data/pwdump3/pwservice.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Data/pwdump3/pwservice.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Data/pwdump3e/LsaExt.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Data/pwdump3e/LsaExt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Data/pwdump3e/pwservice.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Data/pwdump3e/pwservice.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
lcp.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
lcp.exe
Resource
win10v2004-20240802-en
General
-
Target
ba21c196140f0a09e15a7f5528827f39_JaffaCakes118
-
Size
2.4MB
-
MD5
ba21c196140f0a09e15a7f5528827f39
-
SHA1
9b8dae4c010164146382f4da2cd468fdf13c166e
-
SHA256
4658a8f3612528903caa04f9b98d4579e18e5ba76dfdc5d6d97fe318663e6e9e
-
SHA512
e329711a7038a2be699679cc576710a93dcf6ce116acc18e80c1d163c8a4f32cbe5755d012f98ace9a4b06da8025788a662f8b58934624f039bb58fbd7777513
-
SSDEEP
49152:2iXvu66H1fbnc820xORWmbUBZUGXpusKSx10yZ8qrMsK1jIP+wbqpZrf:nOhc82DpgHUGZuLSoyZ8qWkbqDD
Malware Config
Signatures
-
Unsigned PE 7 IoCs
Checks for missing Authenticode signature.
resource unpack001/Data/pwdump2-orig/samdump.dll unpack001/Data/pwdump2/samdump.dll unpack001/Data/pwdump3/LsaExt.dll unpack001/Data/pwdump3/pwservice.exe unpack001/Data/pwdump3e/LsaExt.dll unpack001/Data/pwdump3e/pwservice.exe unpack001/lcp.exe
Files
-
ba21c196140f0a09e15a7f5528827f39_JaffaCakes118.zip
-
Data/pwdump2-orig/samdump.dll.dll windows:4 windows x86 arch:x86
87a7faf73c390855b4cb182febf141a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
FlushFileBuffers
CloseHandle
FreeLibrary
GetLastError
OutputDebugStringA
LoadLibraryA
CreateFileA
GetCPInfo
RtlUnwind
GetCommandLineA
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetProcAddress
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
SetFilePointer
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
VirtualAlloc
SetStdHandle
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
LCMapStringW
advapi32
LsaOpenPolicy
LsaQueryInformationPolicy
RegOpenKeyExA
RegCloseKey
LsaClose
RegEnumKeyA
RegQueryValueExA
Exports
Exports
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Data/pwdump2/samdump.dll.dll windows:4 windows x86 arch:x86
3df6357dd22200d7afe93dd3916df47d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
LsaClose
LsaOpenPolicy
LsaQueryInformationPolicy
RegCloseKey
kernel32
CloseHandle
CreateFileA
ExitProcess
FlushFileBuffers
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
MultiByteToWideChar
OutputDebugStringA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
user32
EnumThreadWindows
MessageBoxA
wsprintfA
Exports
Exports
DumpSam
_DumpSam
___CPPdebugHook
Sections
.text Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Data/pwdump3/LsaExt.dll.dll windows:4 windows x86 arch:x86
41c95b07632bc657717f47e0641622a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
LsaClose
LsaOpenPolicy
LsaQueryInformationPolicy
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegSetValueExA
kernel32
CloseHandle
CreateFileA
ExitProcess
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
user32
EnumThreadWindows
MessageBoxA
wsprintfA
Exports
Exports
GetHash
SetAccessPriv
_GetHash
_SetAccessPriv
___CPPdebugHook
_obfuscate
obfuscate
Sections
.text Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Data/pwdump3/pwservice.exe.exe windows:4 windows x86 arch:x86
bb044c6bc7a934f6572d65c275ce5bf1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
GetLastError
CloseHandle
CreateRemoteThread
WaitForSingleObject
OpenProcess
GetVersionExA
GetVersion
GetExitCodeThread
GetProcAddress
VirtualFreeEx
LoadLibraryA
VirtualAllocEx
GetModuleFileNameA
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
FreeLibrary
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleHandleA
MultiByteToWideChar
SetFilePointer
HeapCreate
VirtualFree
RtlUnwind
WriteFile
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
advapi32
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
SetServiceStatus
lsaext
SetAccessPriv
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Data/pwdump3e/LsaExt.dll.dll windows:4 windows x86 arch:x86
2f46865c7b45c655f1ecb731f63b7105
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
CryptAcquireContextA
CryptCreateHash
CryptDecrypt
CryptDeriveKey
CryptDestroyHash
CryptDestroyKey
CryptEncrypt
CryptHashData
CryptReleaseContext
LookupPrivilegeValueA
LsaClose
LsaOpenPolicy
LsaQueryInformationPolicy
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegSetValueExA
kernel32
CloseHandle
CreateFileA
ExitProcess
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
user32
EnumThreadWindows
MessageBoxA
wsprintfA
Exports
Exports
GetHash
SetAccessPriv
_GetHash
_SetAccessPriv
___CPPdebugHook
_closeCrypto
_initCrypto
_obfuscate
closeCrypto
initCrypto
obfuscate
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Data/pwdump3e/pwservice.exe.exe windows:4 windows x86 arch:x86
e27438dee1c984e5b3ee356ed3682523
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
VirtualAllocEx
CreateRemoteThread
WaitForSingleObject
GetVersionExA
GetVersion
WriteProcessMemory
GetExitCodeThread
CloseHandle
VirtualFreeEx
LoadLibraryA
GetProcAddress
OpenProcess
GetModuleFileNameA
HeapSize
UnhandledExceptionFilter
GetSystemTime
GetDiskFreeSpaceExA
GlobalMemoryStatus
GetTickCount
GetProcessHeap
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
EnterCriticalSection
Sleep
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
RtlUnwind
GetCommandLineA
ExitProcess
RaiseException
HeapFree
HeapAlloc
HeapReAlloc
FreeLibrary
LCMapStringA
LCMapStringW
GetCPInfo
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
TerminateProcess
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleHandleA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
SetFilePointer
IsBadCodePtr
GetACP
GetStringTypeA
GetStringTypeW
IsBadReadPtr
GetOEMCP
SetStdHandle
ReadFile
advapi32
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
SetServiceStatus
lsaext
SetAccessPriv
user32
GetClipboardOwner
GetDesktopWindow
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
PwDump01.txt
-
PwDump02.txt
-
PwDump03.txt
-
Sniff01.txt
-
Sniff02.txt
-
Sniff03.txt
-
file_id.diz
-
lcp.cnt
-
lcp.exe.exe windows:4 windows x86 arch:x86
835b7ab0efa1193fff473437005849fb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AddAccessAllowedAce
AdjustTokenPrivileges
AllocateAndInitializeSid
CloseServiceHandle
CreateServiceA
CryptAcquireContextA
CryptCreateHash
CryptDecrypt
CryptDeriveKey
CryptDestroyHash
CryptDestroyKey
CryptEncrypt
CryptHashData
CryptReleaseContext
DeleteService
FreeSid
GetAce
GetLengthSid
GetUserNameA
InitializeAcl
InitializeSecurityDescriptor
LookupAccountNameA
LookupAccountSidA
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegConnectRegistryA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetKeySecurity
RegSetValueExA
SetSecurityDescriptorDacl
StartServiceA
kernel32
CloseHandle
CompareStringA
ConnectNamedPipe
CreateEventA
CreateFileA
CreateFileMappingA
CreateFileW
CreateNamedPipeA
CreateRemoteThread
CreateThread
DeleteCriticalSection
DeleteFileA
DisconnectNamedPipe
DosDateTimeToFileTime
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTime
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenFile
OpenProcess
OutputDebugStringA
RaiseException
ReadFile
ResetEvent
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetThreadLocale
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
WriteProcessMemory
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
mpr
WNetAddConnection2A
WNetCancelConnection2A
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
comctl32
ImageList_Add
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_Draw
ImageList_DrawEx
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetIcon
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Read
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_SetIconSize
ImageList_Write
ord17
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
BitBlt
CombineRgn
CopyEnhMetaFileA
CreateBitmap
CreateBrushIndirect
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateDIBitmap
CreateFontIndirectA
CreateHalftonePalette
CreatePalette
CreatePenIndirect
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteEnhMetaFile
DeleteObject
Ellipse
ExcludeClipRect
ExtCreatePen
ExtTextOutA
GetBitmapBits
GetBrushOrgEx
GetClipBox
GetCurrentPositionEx
GetDCOrgEx
GetDIBColorTable
GetDIBits
GetDeviceCaps
GetEnhMetaFileBits
GetEnhMetaFileHeader
GetEnhMetaFilePaletteEntries
GetObjectA
GetPaletteEntries
GetPixel
GetRgnBox
GetStockObject
GetSystemPaletteEntries
GetTextExtentPoint32A
GetTextMetricsA
GetWinMetaFileBits
GetWindowOrgEx
IntersectClipRect
LineTo
MaskBlt
MoveToEx
PatBlt
Pie
PlayEnhMetaFile
PolyPolyline
Polyline
RealizePalette
RectVisible
Rectangle
RestoreDC
SaveDC
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetEnhMetaFileBits
SetMapMode
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWinMetaFileBits
SetWindowExtEx
SetWindowOrgEx
StretchBlt
UnrealizeObject
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
SHGetPathFromIDListA
user32
ActivateKeyboardLayout
AdjustWindowRectEx
BeginPaint
CallNextHookEx
CallWindowProcA
CharLowerA
CharLowerBuffA
CharNextA
CharToOemBuffA
CharUpperBuffA
CheckMenuItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateIcon
CreateMenu
CreatePopupMenu
CreateWindowExA
DefFrameProcA
DefMDIChildProcA
DefWindowProcA
DeleteMenu
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageA
DrawEdge
DrawFocusRect
DrawFrameControl
DrawIcon
DrawIconEx
DrawMenuBar
DrawTextA
EmptyClipboard
EnableMenuItem
EnableScrollBar
EnableWindow
EndPaint
EnumClipboardFormats
EnumThreadWindows
EnumWindows
EqualRect
FillRect
FindWindowA
FrameRect
GetActiveWindow
GetCapture
GetCaretPos
GetClassInfoA
GetClassNameA
GetClientRect
GetClipboardData
GetClipboardOwner
GetCursor
GetCursorPos
GetDC
GetDCEx
GetDesktopWindow
GetDlgItem
GetDoubleClickTime
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyNameTextA
GetKeyState
GetKeyboardLayout
GetKeyboardLayoutList
GetKeyboardState
GetKeyboardType
GetLastActivePopup
GetMenu
GetMenuItemCount
GetMenuItemID
GetMenuItemInfoA
GetMenuState
GetMenuStringA
GetMessagePos
GetMessageTime
GetParent
GetPropA
GetScrollInfo
GetScrollPos
GetScrollRange
GetSubMenu
GetSystemMenu
GetSystemMetrics
GetTopWindow
GetWindow
GetWindowDC
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
InflateRect
InsertMenuA
InsertMenuItemA
IntersectRect
InvalidateRect
IsCharAlphaA
IsCharAlphaNumericA
IsChild
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadKeyboardLayoutA
LoadStringA
MapVirtualKeyA
MapWindowPoints
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
OemToCharA
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterHotKey
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
ScrollWindowEx
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetKeyboardState
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowTextA
SetWindowsHookExA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassA
UnregisterHotKey
UpdateWindow
ValidateRect
WaitMessage
WinHelpA
WindowFromPoint
wsprintfA
GetSysColor
oleaut32
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VariantChangeType
VariantClear
VariantCopy
VariantCopyInd
VariantInit
Exports
Exports
@$xp$10TCCalendar
@$xp$16Cspin@TCSpinEdit
@$xp$17TPerformanceGraph
@$xp$18Cspin@TCSpinButton
@$xp$23Cspin@TTimerSpeedButton
@$xp$27Cdiroutl@TCDirectoryOutline
@$xp$7TCGauge
@$xp$9TTrayIcon
@@Browsedictionaryfilesform@Finalize
@@Browsedictionaryfilesform@Initialize
@@Browseresourceoraccountform@Finalize
@@Browseresourceoraccountform@Initialize
@@Browseresourceoraccountthread@Finalize
@@Browseresourceoraccountthread@Initialize
@@Calculationform@Finalize
@@Calculationform@Initialize
@@Ccalendr@Finalize
@@Ccalendr@Initialize
@@Cdiroutl@Finalize
@@Cdiroutl@Initialize
@@Cgauges@Finalize
@@Cgauges@Initialize
@@Cspin@Finalize
@@Cspin@Initialize
@@Distributedsessionsform@Finalize
@@Distributedsessionsform@Initialize
@@Importthread@Finalize
@@Importthread@Initialize
@@Keyboardlayoutform@Finalize
@@Keyboardlayoutform@Initialize
@@Keysequencesform@Finalize
@@Keysequencesform@Initialize
@@Knowncharactersform@Finalize
@@Knowncharactersform@Initialize
@@Perfgrap@Finalize
@@Perfgrap@Initialize
@@Pwdump2form@Finalize
@@Pwdump2form@Initialize
@@Pwdumpform@Finalize
@@Pwdumpform@Initialize
@@Recoverythread@Finalize
@@Recoverythread@Initialize
@@Syskeydisketteform@Finalize
@@Syskeydisketteform@Initialize
@@Syskeyform@Finalize
@@Syskeyform@Initialize
@@Syskeypasswordform@Finalize
@@Syskeypasswordform@Initialize
@@Transliterationform@Finalize
@@Transliterationform@Initialize
@@Trayicon@Finalize
@@Trayicon@Initialize
@@Unitedsessionsform@Finalize
@@Unitedsessionsform@Initialize
@@Vowelsform@Finalize
@@Vowelsform@Initialize
@Cdiroutl@TCDirectoryOutline@
@Cdiroutl@TCDirectoryOutline@$bctr$qqrp18Classes@TComponent
@Cdiroutl@TCDirectoryOutline@APointer
@Cdiroutl@TCDirectoryOutline@AssignCaseProc$qqrv
@Cdiroutl@TCDirectoryOutline@BuildOneLevel$qqrl
@Cdiroutl@TCDirectoryOutline@BuildSubTree$qqrl
@Cdiroutl@TCDirectoryOutline@BuildTree$qqrv
@Cdiroutl@TCDirectoryOutline@Change$qqrv
@Cdiroutl@TCDirectoryOutline@Click$qqrv
@Cdiroutl@TCDirectoryOutline@CreateWnd$qqrv
@Cdiroutl@TCDirectoryOutline@CurDir$qv
@Cdiroutl@TCDirectoryOutline@DriveToInt$qqrc
@Cdiroutl@TCDirectoryOutline@Expand$qqri
@Cdiroutl@TCDirectoryOutline@ForceCase$qqrrx17System@AnsiString
@Cdiroutl@TCDirectoryOutline@GetChildNamed$qqrrx17System@AnsiStringl
@Cdiroutl@TCDirectoryOutline@InvalidIndex
@Cdiroutl@TCDirectoryOutline@Loaded$qqrv
@Cdiroutl@TCDirectoryOutline@RootIndex
@Cdiroutl@TCDirectoryOutline@SetDirectory$qqr17System@AnsiString
@Cdiroutl@TCDirectoryOutline@SetDrive$qqrc
@Cdiroutl@TCDirectoryOutline@SetTextCase$qqr18Cdiroutl@TTextCase
@Cdiroutl@TCDirectoryOutline@WalkTree$qqrrx17System@AnsiString
@Cspin@TCSpinButton@
@Cspin@TCSpinButton@$bctr$qqrp18Classes@TComponent
@Cspin@TCSpinButton@$bdtr$qqrv
@Cspin@TCSpinButton@AdjustSize$qqrrit1
@Cspin@TCSpinButton@BtnClick$qqrp14System@TObject
@Cspin@TCSpinButton@BtnMouseDown$qqrp14System@TObject21Controls@TMouseButton46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%ii
@Cspin@TCSpinButton@CreateButton$qqrv
@Cspin@TCSpinButton@Dispatch$qqrpv
@Cspin@TCSpinButton@GetDownGlyph$qqrv
@Cspin@TCSpinButton@GetUpGlyph$qqrv
@Cspin@TCSpinButton@KeyDown$qqrrus46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%
@Cspin@TCSpinButton@Loaded$qqrv
@Cspin@TCSpinButton@SetBounds$qqriiii
@Cspin@TCSpinButton@SetDownGlyph$qqrp16Graphics@TBitmap
@Cspin@TCSpinButton@SetFocusBtn$qqrp23Cspin@TTimerSpeedButton
@Cspin@TCSpinButton@SetUpGlyph$qqrp16Graphics@TBitmap
@Cspin@TCSpinButton@WMGetDlgCode$qqrr20Messages@TWMNoParams
@Cspin@TCSpinButton@WMKillFocus$qqrr21Messages@TWMKillFocus
@Cspin@TCSpinButton@WMSetFocus$qqrr20Messages@TWMSetFocus
@Cspin@TCSpinButton@WMSize$qqrr16Messages@TWMSize
@Cspin@TCSpinEdit@
@Cspin@TCSpinEdit@$bctr$qqrp18Classes@TComponent
@Cspin@TCSpinEdit@$bdtr$qqrv
@Cspin@TCSpinEdit@CMEnter$qqrr20Messages@TWMNoParams
@Cspin@TCSpinEdit@CMExit$qqrr20Messages@TWMNoParams
@Cspin@TCSpinEdit@CheckValue$qqrl
@Cspin@TCSpinEdit@CreateParams$qqrr22Controls@TCreateParams
@Cspin@TCSpinEdit@CreateWnd$qqrv
@Cspin@TCSpinEdit@Dispatch$qqrpv
@Cspin@TCSpinEdit@DownClick$qqrp14System@TObject
@Cspin@TCSpinEdit@GetChildren$qqrynpqqrp18Classes@TComponent$vp18Classes@TComponent
@Cspin@TCSpinEdit@GetMinHeight$qqrv
@Cspin@TCSpinEdit@GetValue$qqrv
@Cspin@TCSpinEdit@IsValidChar$qqrc
@Cspin@TCSpinEdit@KeyDown$qqrrus46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%
@Cspin@TCSpinEdit@KeyPress$qqrrc
@Cspin@TCSpinEdit@SetEditRect$qqrv
@Cspin@TCSpinEdit@SetValue$qqrl
@Cspin@TCSpinEdit@UpClick$qqrp14System@TObject
@Cspin@TCSpinEdit@WMCut$qqrr20Messages@TWMNoParams
@Cspin@TCSpinEdit@WMPaste$qqrr20Messages@TWMNoParams
@Cspin@TCSpinEdit@WMSize$qqrr16Messages@TWMSize
@Cspin@TTimerSpeedButton@
@Cspin@TTimerSpeedButton@$bctr$qqrp18Classes@TComponent
@Cspin@TTimerSpeedButton@$bdtr$qqrv
@Cspin@TTimerSpeedButton@MouseDown$qqr21Controls@TMouseButton46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%ii
@Cspin@TTimerSpeedButton@MouseUp$qqr21Controls@TMouseButton46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%ii
@Cspin@TTimerSpeedButton@Paint$qqrv
@Cspin@TTimerSpeedButton@TimerExpired$qqrp14System@TObject
@TCCalendar@
@TCCalendar@$bctr$qqrp18Classes@TComponent
@TCCalendar@Change$qqrv
@TCCalendar@ChangeMonth$qqri
@TCCalendar@Click$qqrv
@TCCalendar@DaysPerMonth$qqrii
@TCCalendar@DaysThisMonth$qqrv
@TCCalendar@Dispatch$qqrpv
@TCCalendar@DrawCell$qqriirx11Types@TRect42System@%Set$t14Grids@Grids__3$iuc$0$iuc$2%
@TCCalendar@GetCellText$qqrii
@TCCalendar@GetDateElement$qqri
@TCCalendar@IsLeapYear$qqri
@TCCalendar@NextMonth$qqrv
@TCCalendar@NextYear$qqrv
@TCCalendar@PrevMonth$qqrv
@TCCalendar@PrevYear$qqrv
@TCCalendar@SeTCCalendarDate$qqr16System@TDateTime
@TCCalendar@SelectCell$qqrii
@TCCalendar@SetDateElement$qqrii
@TCCalendar@SetStartOfWeek$qqrs
@TCCalendar@SetUseCurrentDate$qqro
@TCCalendar@StoreCalendarDate$qqrv
@TCCalendar@UpdateCalendar$qqrv
@TCCalendar@WMSize$qqrr16Messages@TWMSize
@TCGauge@
@TCGauge@$bctr$qqrp18Classes@TComponent
@TCGauge@AddProgress$qqrl
@TCGauge@GetPercentDone$qqrv
@TCGauge@Paint$qqrv
@TCGauge@PaintAsBar$qqrp16Graphics@TBitmaprx11Types@TRect
@TCGauge@PaintAsNeedle$qqrp16Graphics@TBitmaprx11Types@TRect
@TCGauge@PaintAsNothing$qqrp16Graphics@TBitmaprx11Types@TRect
@TCGauge@PaintAsPie$qqrp16Graphics@TBitmaprx11Types@TRect
@TCGauge@PaintAsText$qqrp16Graphics@TBitmaprx11Types@TRect
@TCGauge@PaintBackground$qqrp16Graphics@TBitmap
@TCGauge@SeTCGaugeKind$qqr11TCGaugeKind
@TCGauge@SetBackColor$qqr15Graphics@TColor
@TCGauge@SetBorderStyle$qqr22Forms@TFormBorderStyle
@TCGauge@SetForeColor$qqr15Graphics@TColor
@TCGauge@SetMaxValue$qqrl
@TCGauge@SetMinValue$qqrl
@TCGauge@SetProgress$qqrl
@TCGauge@SetShowText$qqro
@TPerformanceGraph@
@TPerformanceGraph@$bctr$qqrp18Classes@TComponent
@TPerformanceGraph@$bdtr$qqrv
@TPerformanceGraph@DataPoint$qqr15Graphics@TColorl
@TPerformanceGraph@DisplayPoints$qqrl
@TPerformanceGraph@FirstY$qqrv
@TPerformanceGraph@GetBandCount$qqrv
@TPerformanceGraph@Initialize$qqrl
@TPerformanceGraph@LastY$qqri
@TPerformanceGraph@NextY$qqri
@TPerformanceGraph@Paint$qqrv
@TPerformanceGraph@PaintBar$qqr15Graphics@TColorll
@TPerformanceGraph@PaintLine$qqr15Graphics@TColorll
@TPerformanceGraph@ReallocHistory$qqrv
@TPerformanceGraph@Replay$qqrv
@TPerformanceGraph@RoundUp$qqrll
@TPerformanceGraph@ScrollGraph$qqrv
@TPerformanceGraph@SetBackColor$qqr15Graphics@TColor
@TPerformanceGraph@SetForeColor$qqr15Graphics@TColor
@TPerformanceGraph@SetGradient$qqrl
@TPerformanceGraph@SetGraphKind$qqr10TGraphKind
@TPerformanceGraph@SetGridSize$qqrl
@TPerformanceGraph@SetGridlines$qqro
@TPerformanceGraph@SetPenWidth$qqrl
@TPerformanceGraph@SetScale$qqrl
@TPerformanceGraph@SetStepSize$qqrl
@TPerformanceGraph@ShiftY$qqrv
@TPerformanceGraph@Update$qqrv
@TTrayIcon@
@TTrayIcon@$bctr$qqrp18Classes@TComponent
@TTrayIcon@$bdtr$qqrv
@TTrayIcon@ApplicationHookProc$qqrr17Messages@TMessage
@TTrayIcon@DoClick$qqrv
@TTrayIcon@DoDblClick$qqrv
@TTrayIcon@DoMessage$qqrr17Messages@TMessage
@TTrayIcon@DoMouseDown$qqr21Controls@TMouseButton46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%ii
@TTrayIcon@DoMouseMove$qqr46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%ii
@TTrayIcon@DoMouseUp$qqr21Controls@TMouseButton46System@%Set$t18Classes@Classes__1$iuc$0$iuc$6%ii
@TTrayIcon@DoOnAnimate$qqrp14System@TObject
@TTrayIcon@EndSession$qqrv
@TTrayIcon@GetAnimate$qqrv
@TTrayIcon@GetAnimateInterval$qqrv
@TTrayIcon@GetHandle$qqrv
@TTrayIcon@Loaded$qqrv
@TTrayIcon@Minimize$qqrv
@TTrayIcon@Notification$qqrp18Classes@TComponent18Classes@TOperation
@TTrayIcon@Restore$qqrv
@TTrayIcon@SetAnimate$qqro
@TTrayIcon@SetAnimateInterval$qqri
@TTrayIcon@SetDefaultIcon$qqrv
@TTrayIcon@SetHide$qqro
@TTrayIcon@SetHint$qqr17System@AnsiString
@TTrayIcon@SetIconIndex$qqri
@TTrayIcon@SetVisible$qqro
@TTrayIcon@ShiftState$qv
@TTrayIcon@ShowMenu$qqrv
@TTrayIcon@Update$qqrv
__GetExceptDLLinfo
___CPPdebugHook
_frmBrowseDictionaryFiles
_frmBrowseResourceOrAccount
_frmCalculation
_frmDistributedSessions
_frmKeySequences
_frmKeyboardLayout
_frmKnownCharacters
_frmPwDump
_frmPwDump2
_frmSyskey
_frmSyskeyDiskette
_frmSyskeyPassword
_frmTransliteration
_frmUnitedSessions
_frmVowels
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 241KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 318KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 84KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
lcp.hlp
-
readme.txt
-
whatsnew.txt
-
words-english-big.dic
-
words-english.dic
-
words-russian-big.dic
-
words-russian.dic