Alloc
Call
Copy
Free
Get
Int64Op
Store
Overview
overview
7Static
static
30b1c97101e...18.exe
windows7-x64
70b1c97101e...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/$S...4_.exe
windows7-x64
7$SYSDIR/$S...4_.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/$_8_.dll
windows7-x64
6$TEMP/$_8_.dll
windows10-2004-x64
6Static task
static1
Behavioral task
behavioral1
Sample
0b1c97101ed7451c2c49cfb17698d964_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b1c97101ed7451c2c49cfb17698d964_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$SYSDIR/$SYSDIR/$_14_.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$SYSDIR/$SYSDIR/$_14_.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/$_8_.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/$_8_.dll
Resource
win10v2004-20240910-en
Target
0b1c97101ed7451c2c49cfb17698d964_JaffaCakes118
Size
249KB
MD5
0b1c97101ed7451c2c49cfb17698d964
SHA1
4835992daabd2e5719ca2a0d01189cc2dafedd99
SHA256
7ac0a5e0f4d4c5920e21c84645127808993e997e426a1c99ec8c4e7f10b4a045
SHA512
ba470076853ba1755bb14b0c6a00483c82407d89998136ee9f3d17f7eb0e8b7c09c92b8af5ce0e8452968ca4f423be8a7c49a725ebed64df076f70f69a2dbb16
SSDEEP
6144:Ms5g5w1hOKshbFHiUS/1EnE7dFvpgsxhMnMMpAqmlFy:1FXOLhbFHla19/6sxhnMt
Checks for missing Authenticode signature.
resource |
---|
0b1c97101ed7451c2c49cfb17698d964_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$SYSDIR/$SYSDIR/$_14_.exe |
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/System.dll |
unpack001/$TEMP/$_8_.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
static1/unpack001/$SYSDIR/$SYSDIR/$_14_.exe | nsis_installer_1 |
static1/unpack001/$SYSDIR/$SYSDIR/$_14_.exe | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteValueW
SHGetValueW
GetCurrentProcessId
GetProcAddress
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OpenFile
FreeEnvironmentStringsA
WriteProfileSectionW
EnumResourceLanguagesW
GetDriveTypeW
GetSystemWindowsDirectoryA
OpenSemaphoreA
GetTapeParameters
EndUpdateResourceA
SetNamedPipeHandleState
GetLogicalDriveStringsA
GetExitCodeThread
CreateEventA
GetStartupInfoW
EnumResourceNamesW
SetVolumeLabelW
DebugSetProcessKillOnExit
BuildCommDCBW
GetFullPathNameA
GetNumaNodeProcessorMask
CreateEventW
CreateMutexA
GlobalCompact
FindFirstChangeNotificationW
GetComputerNameW
CreateDirectoryW
FindNextChangeNotification
CreateMutexW
FindNextFileW
WriteProfileSectionA
CreateProcessW
IsBadReadPtr
FindResourceW
GetProcessAffinityMask
AddAtomW
SearchPathW
InterlockedExchange
CreateSemaphoreW
HeapSetInformation
GetPrivateProfileStructW
LockFileEx
GlobalGetAtomNameW
ReleaseMutex
SetFirmwareEnvironmentVariableW
GetStdHandle
HeapCompact
GetNamedPipeInfo
OpenEventW
SetThreadPriorityBoost
FileTimeToSystemTime
ExpandEnvironmentStringsW
IsBadStringPtrA
BuildCommDCBA
GetPrivateProfileIntW
ExitThread
VirtualQueryEx
RaiseException
GetEnvironmentStringsW
CreateMailslotA
EnumResourceLanguagesA
EnumResourceTypesA
GetAtomNameW
GetDiskFreeSpaceExA
MoveFileExW
GetFullPathNameW
GetFileInformationByHandle
BackupWrite
MultiByteToWideChar
DefineDosDeviceW
GetTempPathA
FormatMessageA
FindCloseChangeNotification
GetAtomNameA
GetFileType
MoveFileW
WritePrivateProfileStringW
FindFirstFileW
GetTempFileNameW
QueryDosDeviceW
GlobalAddAtomW
SetThreadPriority
GetNumaAvailableMemoryNode
lstrlenW
CommConfigDialogW
GetCommProperties
AreFileApisANSI
SetFilePointerEx
InterlockedExchangeAdd
HeapUnlock
GetOverlappedResult
GetNumaProcessorNode
SetDefaultCommConfigA
ReadProcessMemory
GetDiskFreeSpaceW
GetCommandLineW
GetCurrentProcess
DeviceIoControl
GlobalFix
FindResourceExW
SetDefaultCommConfigW
GetProfileIntA
GetFirmwareEnvironmentVariableW
GetNamedPipeHandleStateW
GetSystemWindowsDirectoryW
GetPrivateProfileSectionW
CopyFileW
HeapDestroy
HeapQueryInformation
ContinueDebugEvent
GetMailslotInfo
GetShortPathNameW
GetVersion
lstrcpyW
GlobalWire
GetThreadContext
GetCommModemStatus
CreateNamedPipeA
lstrcpynA
FormatMessageW
GetStartupInfoA
UpdateResourceA
GlobalUnfix
WritePrivateProfileStructW
GetThreadTimes
GetVersionExW
SetComputerNameW
GetPrivateProfileStringW
WaitForSingleObject
TransactNamedPipe
VerifyVersionInfoW
HeapSize
OpenSemaphoreW
GetProcessIoCounters
GetSystemTime
SetTapePosition
FlushInstructionCache
DefineDosDeviceA
lstrcmpW
HeapWalk
GetComputerNameA
CloseHandle
GetProfileStringW
GetSystemDirectoryW
ReadFileScatter
OpenFileMappingW
GetWindowsDirectoryW
GlobalUnWire
InterlockedIncrement
GetFileAttributesW
WideCharToMultiByte
HeapReAlloc
FlushFileBuffers
FindClose
GetEnvironmentVariableA
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FindFirstChangeNotificationA
TlsSetValue
SetFileApisToOEM
GetModuleFileNameA
GetVolumeInformationA
GetDefaultCommConfigW
GetProcessPriorityBoost
GetModuleHandleA
SetProcessAffinityMask
lstrcmpiW
MulDiv
GetFileAttributesExA
SetFileAttributesW
CreateDirectoryExW
GetLongPathNameW
GetSystemDirectoryA
GetBinaryTypeW
OpenMutexW
FindAtomW
GetTempPathW
SetupComm
lstrcatA
LocalUnlock
ReadFileEx
GetTapePosition
GetProcessWorkingSetSize
QueryPerformanceFrequency
LocalReAlloc
CreateProcessA
IsBadHugeWritePtr
MapViewOfFile
GlobalFlags
LocalSize
IsBadCodePtr
GetThreadPriorityBoost
GetPriorityClass
GetCurrentDirectoryA
GetProcessTimes
GetThreadPriority
GetVolumeInformationW
ReleaseSemaphore
IsBadStringPtrW
LockFile
SearchPathA
GetProcessVersion
GetCommandLineA
GetLocalTime
LocalAlloc
LockResource
GetWriteWatch
SetThreadExecutionState
DosDateTimeToFileTime
GlobalMemoryStatusEx
CreateThread
ResetEvent
SetCommConfig
LocalCompact
LoadLibraryExW
GetHandleInformation
GetModuleFileNameW
GlobalMemoryStatus
lstrcatW
OpenFileMappingA
GetCompressedFileSizeA
GlobalReAlloc
SetUnhandledExceptionFilter
WritePrivateProfileStringA
DebugActiveProcess
CreateFileMappingW
PulseEvent
GetCurrentThread
GetSystemInfo
GetProfileIntW
GetCurrentDirectoryW
WaitForMultipleObjectsEx
GetNamedPipeHandleStateA
LoadLibraryW
FreeResource
SetTapeParameters
Sleep
lstrcmpiA
GetLogicalDrives
GlobalAddAtomA
SetProcessPriorityBoost
VirtualFreeEx
CallNamedPipeA
GlobalFree
GlobalAlloc
CreateNamedPipeW
SetHandleCount
lstrcpynW
CreateTapePartition
FindNextFileA
GlobalFindAtomA
Beep
CreateFileA
BuildCommDCBAndTimeoutsW
CreateFileW
VirtualAllocEx
MoveFileExA
BackupSeek
HeapAlloc
GlobalFindAtomW
GetCurrentThreadId
SystemTimeToTzSpecificLocalTime
LoadLibraryExA
CommConfigDialogA
EnumResourceNamesA
EnumResourceTypesW
RemoveDirectoryA
FreeLibrary
FlushViewOfFile
CreateMailslotW
GlobalUnlock
EraseTape
BackupRead
UnmapViewOfFile
OutputDebugStringA
BeginUpdateResourceA
FreeLibraryAndExitThread
CreateFileMappingA
GetFileSize
ClearCommBreak
WriteFile
FreeEnvironmentStringsW
FatalExit
GetDiskFreeSpaceA
SetCurrentDirectoryA
DisconnectNamedPipe
LocalFlags
GetDriveTypeA
GetBinaryTypeA
LoadResource
SetEndOfFile
GetFileAttributesExW
SetMessageWaitingIndicator
SetCurrentDirectoryW
VirtualUnlock
GetExitCodeProcess
SetThreadContext
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetLastError
SuspendThread
SetLastError
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetEnvironmentStrings
ExitProcess
InterlockedDecrement
TlsFree
TlsAlloc
TlsGetValue
GetModuleHandleW
HeapFree
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetParent
OffsetRect
IntersectRect
InflateRect
ClientToScreen
GetWindowLongW
GetWindowRect
SetWindowLongA
GetClassNameA
GetClientRect
RemovePropW
SetWindowTextW
PeekMessageW
CreateDialogParamA
SetWindowLongW
SendMessageW
GetWindowLongA
RealGetWindowClassW
MoveWindow
GetDlgItem
BringWindowToTop
GetWindowTextA
CharLowerW
CharUpperW
SetPropW
GetPropW
PostMessageW
GetWindowThreadProcessId
GetWindowTextW
EnumChildWindows
RemovePropA
TranslateMessage
DestroyWindow
DispatchMessageW
RealGetWindowClassA
MsgWaitForMultipleObjects
SetPropA
CreateDialogParamW
SendMessageA
SetActiveWindow
GetPropA
GetClassNameW
VariantClear
SysStringLen
SysFreeString
VariantInit
VarCmp
VariantChangeType
SysAllocString
VariantCopy
DllAction
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ