Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
3efb7573bca...18.exe
windows7-x64
7efb7573bca...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3$R2/NSIS.L...5_.exe
windows7-x64
1$R2/NSIS.L...5_.exe
windows10-2004-x64
3ComparePSD.dll
windows7-x64
3ComparePSD.dll
windows10-2004-x64
3ComparePSD.exe
windows7-x64
3ComparePSD.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
efb7573bcaa9f9986cd7081b30d0a875_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efb7573bcaa9f9986cd7081b30d0a875_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$R2/NSIS.Library.RegTool.v3.$_5_.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$R2/NSIS.Library.RegTool.v3.$_5_.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ComparePSD.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
ComparePSD.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ComparePSD.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ComparePSD.exe
Resource
win10v2004-20240802-en
Target
efb7573bcaa9f9986cd7081b30d0a875_JaffaCakes118
Size
1.6MB
MD5
efb7573bcaa9f9986cd7081b30d0a875
SHA1
79d7c03955187cfb5343c75c26c37d8029106f38
SHA256
1a72d1bba1660088e46e966811fc6168d9c9fc8cfc0a85640a82023782169803
SHA512
9aa9955c072f9d299fa12f7b719650fed55034e52c949e0c60cb10e1fcc0468f56216bc39c4bcaa169235276cb483cc7e551b4dd11aee021ff604a70ce01f99c
SSDEEP
49152:z02eIFFfP4IInGa29tKdv7PZEL9fEOdrWK:zreIFdP5If29tKdzZo98Odj
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/StartMenu.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$R0 |
unpack001/$R2/NSIS.Library.RegTool.v3.$_5_.exe |
unpack001/ComparePSD.dll |
unpack001/ComparePSD.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
lstrcatA
FindClose
FindNextFileA
MulDiv
GlobalFree
lstrcpynA
GlobalAlloc
lstrcmpiA
FindFirstFileA
lstrcpyA
TranslateMessage
GetMessageA
IsDialogMessageA
PostMessageA
DispatchMessageA
GetWindowLongA
CheckDlgButton
ShowWindow
LoadIconA
GetClientRect
MoveWindow
ScreenToClient
GetWindowRect
ReleaseDC
GetDC
EnableWindow
SetWindowTextA
SendMessageA
IsDlgButtonChecked
GetWindowTextA
DestroyWindow
GetDlgItem
CreateDialogParamA
SetWindowLongA
wsprintfA
CallWindowProcA
GetTextMetricsA
SelectObject
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CoTaskMemFree
Init
Select
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiA
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrcpyA
GetModuleFileNameA
lstrcatA
GlobalUnlock
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateFileMappingA
MapViewOfFileEx
GetLastError
UnmapViewOfFile
InterlockedExchange
CloseHandle
lstrlenA
lstrcpynW
lstrcpynA
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
IsDBCSLeadByte
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
HeapReAlloc
DebugBreak
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
InsertMenuItemA
CharNextA
ReleaseDC
MessageBoxA
LoadImageA
GetDC
SelectObject
BitBlt
DeleteObject
CreateCompatibleDC
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
DragQueryFileA
ShellExecuteA
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
ReleaseStgMedium
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysStringLen
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WaitForSingleObject
CloseHandle
CreateProcessA
GetSystemDirectoryA
FreeLibrary
LoadLibraryExA
MultiByteToWideChar
lstrcmpiA
lstrlenA
SetEndOfFile
GetProcAddress
UnmapViewOfFile
lstrcpyA
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
lstrcatA
GetWindowsDirectoryA
GetShortPathNameA
GetCommandLineA
ExitProcess
GetModuleHandleA
GetModuleFileNameA
SetFilePointer
SetErrorMode
LoadTypeLi
RegisterTypeLi
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
wsprintfA
CharNextA
OleInitialize
OleUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiA
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrcpyA
GetModuleFileNameA
lstrcatA
GlobalUnlock
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateFileMappingA
MapViewOfFileEx
GetLastError
UnmapViewOfFile
InterlockedExchange
CloseHandle
lstrlenA
lstrcpynW
lstrcpynA
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
IsDBCSLeadByte
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
HeapReAlloc
DebugBreak
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
InsertMenuItemA
CharNextA
ReleaseDC
MessageBoxA
LoadImageA
GetDC
SelectObject
BitBlt
DeleteObject
CreateCompatibleDC
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
DragQueryFileA
ShellExecuteA
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
ReleaseStgMedium
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysStringLen
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeFormatA
GetDateFormatA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
Sleep
GetACP
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
VirtualFree
HeapCreate
HeapDestroy
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapSize
IsBadReadPtr
IsBadWritePtr
WinExec
FindResourceExA
GetCurrencyFormatA
GetNumberFormatA
GetUserDefaultLangID
LoadLibraryExA
CreateThread
ExitProcess
RaiseException
GetStartupInfoA
GetProcessHeap
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
GetProfileIntA
SetErrorMode
LocalFileTimeToFileTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GlobalFlags
InterlockedIncrement
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
CopyFileA
GlobalSize
GlobalAlloc
FormatMessageA
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetModuleHandleA
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetModuleFileNameA
GetStringTypeExA
lstrlenA
CompareStringW
CompareStringA
lstrlenW
GetVersion
GetLastError
InterlockedExchange
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
LocalAlloc
LocalLock
LocalFree
LocalUnlock
lstrcmpiA
GetEnvironmentVariableA
lstrcpyA
CreateFileA
GetFileInformationByHandle
FileTimeToSystemTime
OpenProcess
FindResourceA
LoadResource
LockResource
SizeofResource
CreateFileMappingA
MapViewOfFileEx
CloseHandle
UnmapViewOfFile
SetEnvironmentVariableA
WideCharToMultiByte
WaitMessage
DestroyCursor
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatA
ShowOwnedPopups
GetMessageA
ValidateRect
PostQuitMessage
SetParent
GetSystemMenu
DeleteMenu
IsRectEmpty
MapVirtualKeyA
GetKeyNameTextA
GetMenuStringA
AppendMenuA
InsertMenuA
RemoveMenu
IsZoomed
GetCursorPos
WindowFromPoint
KillTimer
SetTimer
SetRect
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
GetWindowDC
GrayStringA
DrawTextExA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
DestroyIcon
GetSysColorBrush
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
ScrollWindow
CreateMenu
EnableWindow
DrawEdge
PostThreadMessageA
CharNextA
TrackPopupMenu
SetScrollRange
GetScrollRange
IsWindowVisible
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
FindWindowA
DrawIcon
SetWindowRgn
GetMenuItemInfoA
UnregisterClassA
UnionRect
GetDCEx
SetMenuItemBitmaps
LockWindowUpdate
SetWindowPos
GetDlgItem
ReleaseDC
GetDC
InvalidateRect
GetWindowLongA
InflateRect
SendMessageA
GetParent
LoadBitmapA
EndPaint
FillRect
GetSysColor
IsWindowEnabled
BeginPaint
DrawTextA
GetScrollInfo
SetClassLongA
LoadIconA
DrawIconEx
TranslateMDISysAccel
DrawMenuBar
DefMDIChildProcA
DefFrameProcA
IsCharAlphaNumericA
OpenClipboard
GetClipboardData
CloseClipboard
EmptyClipboard
SetClipboardData
DestroyAcceleratorTable
CreateAcceleratorTableA
LoadMenuIndirectA
IsClipboardFormatAvailable
MapVirtualKeyExA
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
IsMenu
GetWindowRgn
GetIconInfo
LoadImageA
CreateIconIndirect
DrawFrameControl
FrameRect
DrawStateA
GetCursor
GetAsyncKeyState
GetWindowTextA
OffsetRect
GetWindowRect
IsWindow
GetClassInfoA
MapWindowPoints
ReplyMessage
GetKeyState
UpdateWindow
GetWindowThreadProcessId
SetForegroundWindow
EnumWindows
EndDeferWindowPos
GetTabbedTextExtentA
GetClientRect
DeferWindowPos
BeginDeferWindowPos
LoadCursorA
SetWindowLongA
CopyRect
EqualRect
RedrawWindow
PtInRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
IntersectRect
IsIconic
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
CharUpperA
PeekMessageA
TranslateMessage
DispatchMessageA
ScreenToClient
ClientToScreen
SystemParametersInfoA
ReleaseCapture
SetFocus
GetScrollPos
SetScrollPos
ShowScrollBar
SetScrollInfo
EnableScrollBar
SetCapture
DrawFocusRect
SetCursor
GetSystemMetrics
GetClassNameA
SelectPalette
GetDeviceCaps
ExtCreatePen
CreateHatchBrush
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PatBlt
DPtoLP
CreateCompatibleBitmap
GetBkColor
GetTextMetricsA
CopyMetaFileA
CreateDCA
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
GetViewportOrgEx
CreatePatternBrush
LPtoDP
GetCharWidthA
StretchDIBits
GetTextColor
GetRgnBox
CreateEllipticRgn
Ellipse
GetNearestColor
GetBkMode
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextAlign
GetTextFaceA
GetWindowOrgEx
OffsetRgn
GetWindowExtEx
GetViewportExtEx
Rectangle
ExtSelectClipRgn
GetCurrentPositionEx
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
CreateRectRgn
SelectClipRgn
SetTextAlign
IntersectClipRect
ExcludeClipRect
SetMapMode
SetROP2
SetPolyFillMode
RestoreDC
SaveDC
CreateBitmap
GetClipBox
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
GetPixel
CreateSolidBrush
CreateBrushIndirect
GetTextExtentPoint32A
TextOutA
SetBkColor
SetBkMode
SetTextColor
LineTo
MoveToEx
CreatePen
BitBlt
CreateFontIndirectA
GetObjectA
GetStockObject
SetBrushOrgEx
StretchBlt
SetStretchBltMode
CreatePalette
CreatePolygonRgn
CreateRoundRectRgn
FillRgn
RoundRect
SetPixel
SetPixelV
ExtCreateRegion
EnumFontFamiliesA
GetTextCharset
SetDIBits
GetDIBits
RealizePalette
CreateDIBitmap
FrameRgn
PtInRegion
EnumFontFamiliesExA
CreateEllipticRgnIndirect
Polygon
ExtFloodFill
RectVisible
PtVisible
PolyBezier
CreateDIBSection
StartDocA
AlphaBlend
GetOpenFileNameA
GetFileTitleA
ClosePrinter
OpenPrinterA
GetJobA
DocumentPropertiesA
RegDeleteValueA
RegSetValueExA
RegQueryInfoKeyA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
RegSetValueA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
SHGetPathFromIDListA
SHGetFileInfoA
ExtractIconA
DragAcceptFiles
DragQueryPoint
DragQueryFileA
DragFinish
ShellExecuteA
SHGetDesktopFolder
SHGetMalloc
SHBrowseForFolderA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsUNCA
ord8
CoInitialize
RegisterDragDrop
RevokeDragDrop
OleGetClipboard
CoLockObjectExternal
WriteClassStm
OleLoadFromStream
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
OleSaveToStream
CoCreateInstance
OleRun
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
DoDragDrop
CreateStreamOnHGlobal
VariantClear
VariantChangeType
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
SysStringByteLen
SysAllocString
VariantCopy
VarMul
VariantInit
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
VarDateFromStr
VarBstrFromDate
OleCreateFontIndirect
OleCreatePictureIndirect
GetModuleBaseNameA
EnumProcesses
EnumProcessModules
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
PlaySoundA
ImageList_Duplicate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ