Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
8Static
static
3Bonus Game...om.exe
windows7-x64
3Bonus Game...om.exe
windows10-2004-x64
3Bonus Game...65.exe
windows7-x64
6Bonus Game...65.exe
windows10-2004-x64
6Bonus Game...er.exe
windows7-x64
7Bonus Game...er.exe
windows10-2004-x64
7Bonus Game...ni.exe
windows7-x64
3Bonus Game...ni.exe
windows10-2004-x64
3Bonus Game...eo.exe
windows7-x64
3Bonus Game...eo.exe
windows10-2004-x64
3Bonus Game...ps.exe
windows7-x64
3Bonus Game...ps.exe
windows10-2004-x64
3Bonus Game...io.exe
windows7-x64
3Bonus Game...io.exe
windows10-2004-x64
3Bonus Game...pa.exe
windows7-x64
3Bonus Game...pa.exe
windows10-2004-x64
3Bonus Game...an.exe
windows7-x64
3Bonus Game...an.exe
windows10-2004-x64
3Bonus Game...ez.exe
windows7-x64
3Bonus Game...ez.exe
windows10-2004-x64
3Bonus Game...ed.exe
windows7-x64
3Bonus Game...ed.exe
windows10-2004-x64
3Bonus Game...an.exe
windows7-x64
3Bonus Game...an.exe
windows10-2004-x64
3Bonus Game...an.exe
windows7-x64
3Bonus Game...an.exe
windows10-2004-x64
3Secret Mis...up.exe
windows7-x64
3Secret Mis...up.exe
windows10-2004-x64
8Static task
static1
Behavioral task
behavioral1
Sample
Bonus Games/Backgammon-BGroom.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Bonus Games/Backgammon-BGroom.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Bonus Games/Backgammon-Play65.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Bonus Games/Backgammon-Play65.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Bonus Games/Bingo-Liner.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Bonus Games/Bingo-Liner.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Bonus Games/Casino-Bellini.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Bonus Games/Casino-Bellini.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Bonus Games/Casino-Cameo.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Bonus Games/Casino-Cameo.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Bonus Games/Casino-Craps.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Bonus Games/Casino-Craps.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Bonus Games/Casino-Del-Rio.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Bonus Games/Casino-Del-Rio.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Bonus Games/Casino-Europa.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Bonus Games/Casino-Europa.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Bonus Games/Casino-Titan.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Bonus Games/Casino-Titan.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Bonus Games/Casino-Tropez.exe
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Bonus Games/Casino-Tropez.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Bonus Games/Casino-Vegas-Red.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Bonus Games/Casino-Vegas-Red.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Bonus Games/Poker-Ocean.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Bonus Games/Poker-Ocean.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Bonus Games/Poker-Titan.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Bonus Games/Poker-Titan.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Secret Mission Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Secret Mission Setup.exe
Resource
win10v2004-20240802-en
Target
bbf98078340dff9fae540f89a9cd6400_JaffaCakes118
Size
2.9MB
MD5
bbf98078340dff9fae540f89a9cd6400
SHA1
b89db7f53d6b88e99dbc18f4780474bf42353ec1
SHA256
dc575c936196c59981a5b9b095868a2044d362d845bdaf085865ae6724ce95ca
SHA512
a860eca32f3e634013d4eb4a75bcd4dfa13deafef874353a74e8d3ef562b2b3eadd1e7b1492fc1d60eea078ad5903ad7f3ba7de897a436c700b62c1dda0cb8af
SSDEEP
49152:FvZhHV+BnX9hULT1DGLoC+ZqyRM1vs9IU1DGLo3ZCpXkAoHS2U9HcXTm/vF:Fz1+BXIGff0aOGDpXku79
Checks for missing Authenticode signature.
resource |
---|
unpack001/Bonus Games/Casino-Bellini.exe |
unpack001/Bonus Games/Casino-Cameo.exe |
unpack001/Bonus Games/Casino-Craps.exe |
unpack001/Bonus Games/Casino-Del-Rio.exe |
unpack001/Bonus Games/Casino-Europa.exe |
unpack001/Bonus Games/Casino-Titan.exe |
unpack001/Bonus Games/Casino-Tropez.exe |
unpack001/Bonus Games/Casino-Vegas-Red.exe |
unpack001/Bonus Games/Poker-Ocean.exe |
unpack001/Bonus Games/Poker-Titan.exe |
unpack001/Secret Mission Setup.exe |
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\BG\app\release\debug\setup.pdb
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
InternetReadFile
InternetOpenA
Netbios
FreeLibrary
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
FreeResource
InterlockedDecrement
SetThreadPriority
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GetCurrentThread
InterlockedIncrement
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
lstrcatA
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapReAlloc
ExitThread
CreateThread
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
lstrcmpW
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
SetLastError
GlobalFree
SizeofResource
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
ResetEvent
SetEvent
CreateEventA
SuspendThread
ResumeThread
CreateProcessA
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
GetCurrentProcessId
Sleep
Process32Next
GetComputerNameA
GetSystemTimeAsFileTime
GetLocalTime
FormatMessageA
LocalFree
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
GetTempPathA
DeleteFileA
CreateDirectoryA
GetModuleFileNameA
CopyFileA
SetCurrentDirectoryA
GetCurrentProcess
SetPriorityClass
CreateFileA
CloseHandle
DeviceIoControl
FindResourceA
LoadResource
LockResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapAlloc
CharNextA
IsRectEmpty
CopyAcceleratorTableA
InvalidateRect
InvalidateRgn
SetCapture
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsWindow
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
GetMenu
GetSysColor
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
SetMenuItemBitmaps
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
wsprintfA
GetMenuState
GetMenuItemID
DestroyMenu
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMenuItemCount
GetSubMenu
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
GetLastActivePopup
ValidateRect
LoadIconA
EnumWindows
GetWindowThreadProcessId
LoadImageA
PostQuitMessage
SetForegroundWindow
PostThreadMessageA
MessageBoxA
UnregisterClassA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
GetSystemMetrics
SetRect
EnableWindow
UpdateWindow
GetClientRect
GetWindowRect
IsIconic
PostMessageA
SendMessageA
DrawIcon
CharUpperA
AdjustWindowRectEx
ExtSelectClipRgn
DeleteDC
GetStockObject
SetViewportExtEx
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetMapMode
GetRgnBox
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
CreateSolidBrush
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ScaleViewportExtEx
GetFileTitleA
OpenPrinterA
ClosePrinter
DocumentPropertiesA
RegDeleteValueA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
ord17
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
ord8
CLSIDFromProgID
CoTaskMemAlloc
CLSIDFromString
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoRegisterMessageFilter
OleFlushClipboard
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
OleInitialize
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
OleCreateFontIndirect
SysFreeString
WSACleanup
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
LocalFree
SetEnvironmentVariableA
SetEndOfFile
GetLocaleInfoW
SetStdHandle
lstrlenW
MultiByteToWideChar
GetOEMCP
GetCurrentThreadId
IsBadCodePtr
IsBadReadPtr
IsValidCodePage
GetLastError
IsValidLocale
lstrcmpiA
lstrlenA
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
CloseHandle
CompareStringA
CompareStringW
WriteFile
DeleteFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
FindResourceA
LoadLibraryExA
CreateDirectoryA
CreateFileA
TerminateProcess
OpenProcess
GetStringTypeA
Sleep
GetModuleFileNameA
GetTempPathA
CreateProcessA
SetLastError
GetFileType
GetFileAttributesA
VerifyVersionInfoA
GetProcAddress
GetModuleHandleA
CopyFileA
SetCurrentDirectoryA
SetHandleCount
HeapAlloc
FreeEnvironmentStringsW
GetCurrentDirectoryA
GetEnvironmentStrings
GetExitCodeProcess
WaitForSingleObject
SetFileAttributesA
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
GetProcessHeap
HeapFree
GetCurrentProcess
HeapCreate
GetCPInfo
LCMapStringW
InterlockedIncrement
InterlockedDecrement
LCMapStringA
ExitThread
lstrcpynA
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
GetVersionExA
IsDBCSLeadByte
GetTimeZoneInformation
MoveFileExA
GetCurrentProcessId
GetThreadLocale
ReadFile
GetFileSize
CreateThread
LoadLibraryA
MoveFileA
GetSystemTimeAsFileTime
Process32Next
Process32First
CreateToolhelp32Snapshot
FindClose
FindNextFileA
FindFirstFileA
GetCommandLineA
RemoveDirectoryA
GetStartupInfoA
SetEvent
ResetEvent
WaitForMultipleObjects
CreateEventA
RtlUnwind
GetLocaleInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
GetACP
InterlockedExchange
GetEnvironmentStringsW
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
CreateWindowExA
RegisterClassExA
DefWindowProcA
PostQuitMessage
UnregisterClassA
LoadCursorA
wsprintfA
GetClassInfoExA
SetWindowLongA
GetWindowLongA
PostMessageA
SetWindowTextA
MoveWindow
SetWindowPos
GetWindowRect
InvalidateRect
GetDlgItem
MessageBoxA
ShowWindow
ScreenToClient
SendMessageA
GetActiveWindow
CharNextA
DialogBoxParamA
CreateIconFromResource
GetClientRect
GetSystemMetrics
CallWindowProcA
EndDialog
DestroyWindow
GetParent
GetWindow
SystemParametersInfoA
MapWindowPoints
SHFileOperationA
ShellExecuteA
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
GetUserNameA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
InternetCloseHandle
HttpQueryInfoA
InternetConnectA
InternetOpenA
InternetReadFile
InternetSetOptionA
InternetQueryOptionA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoInitializeEx
CoCreateInstance
VariantInit
VariantClear
SysAllocStringLen
LoadRegTypeLi
LoadTypeLi
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
SysStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
send
select
connect
__WSAFDIsSet
shutdown
closesocket
recv
WSAStartup
socket
gethostbyname
WSAGetLastError
htons
InternetOpenUrlA
InternetQueryDataAvailable
InternetCloseHandle
InternetSetFilePointer
InternetOpenA
InternetReadFile
HttpQueryInfoA
FormatMessageA
GetProcAddress
LoadLibraryA
WritePrivateProfileStringA
GetSystemTime
LockResource
LoadResource
SizeofResource
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
HeapCreate
GetVersionExA
GetEnvironmentVariableA
IsBadWritePtr
VirtualAlloc
VirtualFree
GetOEMCP
GetACP
GetCPInfo
SetLastError
LocalFree
TlsAlloc
HeapSize
TerminateProcess
GetSystemTimeAsFileTime
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RaiseException
ExitThread
TlsGetValue
TlsSetValue
CreateThread
GetLocalTime
GetTimeZoneInformation
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
GetVolumeInformationA
ExpandEnvironmentStringsA
GetPrivateProfileStringA
GetModuleFileNameA
MultiByteToWideChar
MulDiv
CreateDirectoryA
GetLastError
DeleteFileA
CreateFileA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileSize
CloseHandle
SetFilePointer
WriteFile
SetEndOfFile
MoveFileA
WaitForMultipleObjects
Sleep
lstrcpyA
lstrcpynA
FindResourceA
FreeEnvironmentStringsA
GetCurrentProcess
FlushInstructionCache
OutputDebugStringA
DebugBreak
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
lstrcmpiA
GetTempPathA
lstrlenA
SetHandleCount
GetStdHandle
GetFileType
ReadFile
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
LCMapStringA
LCMapStringW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SendDlgItemMessageA
MessageBeep
SetFocus
wsprintfA
GetDC
ReleaseDC
RedrawWindow
DrawTextA
GetWindowTextLengthA
GetWindowTextA
CopyRect
OffsetRect
ScreenToClient
ChildWindowFromPointEx
FlashWindow
IsIconic
IsWindowVisible
SetActiveWindow
PostQuitMessage
MapWindowPoints
LoadMenuA
LoadImageA
SetWindowTextA
GetDlgItem
GetSysColor
GetSysColorBrush
GetMenu
AdjustWindowRectEx
CreateWindowExA
GetWindowLongA
GetDesktopWindow
SetDlgItemTextA
GetDlgItemTextA
EnableWindow
SetWindowLongA
KillTimer
ClientToScreen
GetWindowRect
PtInRect
GetDlgCtrlID
GetParent
ReleaseCapture
SetCapture
GetCapture
SystemParametersInfoA
SetTimer
IsWindowEnabled
DrawEdge
GetSystemMetrics
InflateRect
DrawFocusRect
EndPaint
GetClientRect
FillRect
BeginPaint
IsWindow
CallWindowProcA
CreateDialogParamA
InvalidateRect
UpdateWindow
LoadStringA
CharNextA
wvsprintfA
DestroyWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
DefWindowProcA
SetWindowPos
IsMenu
GetSubMenu
GetMenuItemCount
SetMenuDefaultItem
SendMessageA
EnableMenuItem
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
ShowWindow
IsDialogMessageA
RegisterWindowMessageA
DestroyIcon
DestroyMenu
GetWindow
EndPath
BeginPath
RestoreDC
TextOutA
GetBkColor
SaveDC
GetTextMetricsA
CreateDIBitmap
CreateDIBSection
StrokeAndFillPath
MoveToEx
LineTo
ExtTextOutA
GetDeviceCaps
DeleteObject
GetStockObject
SetTextColor
SetBkMode
SetBkColor
CreateSolidBrush
DeleteDC
BitBlt
GetObjectA
SelectObject
CreateFontIndirectA
CreateCompatibleDC
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegCreateKeyExA
RegQueryValueExA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderLocation
CoInitialize
CoCreateInstance
CoUninitialize
InitCommonControlsEx
ImageList_AddMasked
ImageList_Draw
ImageList_GetIconSize
_TrackMouseEvent
ImageList_Create
ImageList_Destroy
ImageList_Add
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ