CloseAllBrwsrs
GuardKeyName
GuardRegRoot
HdnBrwsr
InitBrwsrAddOn
dcdFile
dcdFile2
encdFile
encdFile2
Overview
overview
7Static
static
3376bb56004...18.exe
windows7-x64
7376bb56004...18.exe
windows10-2004-x64
7$PLUGINSDIR/cnclb.dll
windows7-x64
3$PLUGINSDIR/cnclb.dll
windows10-2004-x64
3$PROGRAMFI...fx.dll
windows7-x64
3$PROGRAMFI...fx.dll
windows10-2004-x64
3$SYSDIR/$R0.dll
windows7-x64
6$SYSDIR/$R0.dll
windows10-2004-x64
6uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDIR/cnclb.dll
windows7-x64
3$PLUGINSDIR/cnclb.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
376bb5600406a6cebcd96f40844199a7_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
376bb5600406a6cebcd96f40844199a7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/cnclb.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/cnclb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PROGRAMFILES/Mozilla Firefox/components/adproFfx.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PROGRAMFILES/Mozilla Firefox/components/adproFfx.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$SYSDIR/$R0.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$SYSDIR/$R0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/cnclb.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/cnclb.dll
Resource
win10v2004-20241007-en
Target
376bb5600406a6cebcd96f40844199a7_JaffaCakes118
Size
286KB
MD5
376bb5600406a6cebcd96f40844199a7
SHA1
a6d8e449b41fa2c0da32cf6f1bdb3edc92ee9148
SHA256
69a83791b5f35458b318ae4edb3d4b9bc0297c2af63daa2531185fcb811680c7
SHA512
b98048ca92d0ae4a98e2a03b82dcfe5d5b46847c66182248fc68d1cd5a326b48b34b43ae478f1d822948eafc18724cdda4f384ea9d2ca6f1e7190cce996f3a4c
SSDEEP
6144:cxDEMYOxEVqQ/YaWY4H1hnSKtadWwBzdORdwI6OXwh6GMYOxEVqQ/YaWp:0YAEk4Yco1FadzBziGIZXPYAEk4Yd
Checks for missing Authenticode signature.
resource |
---|
376bb5600406a6cebcd96f40844199a7_JaffaCakes118 |
unpack001/$PLUGINSDIR/cnclb.dll |
unpack001/$PROGRAMFILES/Mozilla Firefox/components/adproFfx.dll |
unpack001/$SYSDIR/$R0.dll |
unpack001/uninstall.exe |
unpack002/$PLUGINSDIR/cnclb.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
static1/unpack001/uninstall.exe | nsis_installer_1 |
static1/unpack001/uninstall.exe | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
GlobalAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
MultiByteToWideChar
GetLastError
CloseHandle
CreateFileA
ReadFile
WriteFile
GetFileSize
GetTickCount
lstrcpyA
CreateThread
GetVolumeInformationA
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetStartupInfoA
GetFileType
GetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetSystemTimeAsFileTime
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
Sleep
RaiseException
GetCurrentProcessId
SetHandleCount
GetCurrentThreadId
QueryPerformanceCounter
UnhandledExceptionFilter
GetEnvironmentStringsW
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
IsBadWritePtr
VirtualFree
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
LocalFree
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
ExitProcess
HeapCreate
GetModuleFileNameA
PostMessageA
FindWindowExA
GetDesktopWindow
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OleRun
CoCreateInstance
StrTrimA
PathRenameExtensionA
CloseAllBrwsrs
GuardKeyName
GuardRegRoot
HdnBrwsr
InitBrwsrAddOn
dcdFile
dcdFile2
encdFile
encdFile2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\advlp\bin\Release\adproFfx.pdb
NS_GetComponentManager
NS_Free
NS_Alloc
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
lstrcmpiA
lstrcpynA
lstrcpyA
GetModuleFileNameA
lstrcatA
IsDBCSLeadByte
InterlockedIncrement
InterlockedDecrement
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetVersionExA
GetModuleHandleA
LockResource
FindResourceExA
GetProcAddress
LoadLibraryA
FlushFileBuffers
SetStdHandle
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CloseHandle
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LoadLibraryExA
TlsAlloc
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
GetCPInfo
GetOEMCP
WriteFile
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCurrentProcess
TerminateProcess
IsBadWritePtr
VirtualFree
HeapCreate
GetCommandLineA
GetCurrentThreadId
ExitProcess
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
LocalFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
CharNextA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
CoUninitialize
CoCreateGuid
CoCreateInstance
OleRun
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
StringFromGUID2
CLSIDFromString
CoInitialize
VariantClear
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VariantInit
PR_AtomicIncrement
PR_AtomicDecrement
PathFindExtensionA
StrCmpNA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
NSGetModule
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetAdaptersInfo
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
lstrcpynA
IsDBCSLeadByte
OutputDebugStringA
Sleep
GetTickCount
lstrcatA
HeapFree
GetProcessHeap
FlushInstructionCache
GetCurrentProcess
HeapAlloc
GetCurrentThreadId
CompareStringA
CompareStringW
GetEnvironmentVariableA
CloseHandle
ResumeThread
WaitForSingleObject
CreateThread
SetEnvironmentVariableA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileA
CreateDirectoryA
ReleaseMutex
SetEvent
ResetEvent
CreateMutexA
CreateEventA
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrcmpA
FileTimeToSystemTime
FileTimeToLocalFileTime
WriteFile
lstrcpyA
CreateProcessA
GetVolumeInformationA
lstrlenW
GetEnvironmentStrings
GetModuleFileNameA
SetStdHandle
SetFilePointer
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
lstrcmpiA
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TerminateProcess
SetUnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
GetDateFormatA
GetTimeFormatA
IsBadReadPtr
GetCommandLineA
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
ExitProcess
LocalFree
HeapSize
HeapReAlloc
HeapDestroy
lstrlenA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FlushFileBuffers
GetModuleHandleA
GetFileTime
GetSysColor
ShowWindow
UnregisterClassA
CharNextA
ShowWindowAsync
PostThreadMessageA
KillTimer
SetTimer
GetWindowLongA
MoveWindow
GetWindowRect
IsWindow
OffsetRect
SendInput
GetCursorPos
SetWindowPos
DefWindowProcA
CreateAcceleratorTableA
GetParent
GetClassNameA
SetWindowLongA
CallWindowProcA
DestroyWindow
GetClassInfoExA
RedrawWindow
GetDlgItem
SetFocus
GetFocus
IsChild
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
GetWindowTextLengthA
GetWindowTextA
SendMessageA
SetWindowTextA
MsgWaitForMultipleObjects
RegisterWindowMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetDesktopWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
wsprintfA
SelectObject
StretchBlt
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
GetObjectA
GetStockObject
CreateSolidBrush
DeleteObject
GetDIBColorTable
RegQueryInfoKeyA
RegQueryValueExA
RegEnumKeyExA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
SHGetFileInfoA
SHGetSpecialFolderPathA
ord165
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
CoTaskMemFree
StringFromCLSID
CoUninitialize
CoInitialize
StringFromGUID2
CoCreateInstance
CLSIDFromString
OleRun
CLSIDFromProgID
CoCreateGuid
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
LoadTypeLi
RegisterTypeLi
DispCallFunc
LoadRegTypeLi
UnRegisterTypeLi
SysStringLen
VariantCopy
GetErrorInfo
VarUI4FromStr
VariantClear
VarCmp
VariantInit
VarBstrCmp
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SysAllocStringLen
OleCreateFontIndirect
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayCopy
SafeArrayDestroy
SafeArrayUnlock
SafeArrayLock
SafeArrayGetDim
SHCopyKeyA
StrCmpNA
StrToIntA
PathFindExtensionA
CoInternetCreateSecurityManager
GdiplusShutdown
AlphaBlend
TransparentBlt
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
GlobalAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
MultiByteToWideChar
GetLastError
CloseHandle
CreateFileA
ReadFile
WriteFile
GetFileSize
GetTickCount
lstrcpyA
CreateThread
GetVolumeInformationA
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetStartupInfoA
GetFileType
GetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetSystemTimeAsFileTime
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
Sleep
RaiseException
GetCurrentProcessId
SetHandleCount
GetCurrentThreadId
QueryPerformanceCounter
UnhandledExceptionFilter
GetEnvironmentStringsW
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
IsBadWritePtr
VirtualFree
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
LocalFree
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
ExitProcess
HeapCreate
GetModuleFileNameA
PostMessageA
FindWindowExA
GetDesktopWindow
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OleRun
CoCreateInstance
StrTrimA
PathRenameExtensionA
CloseAllBrwsrs
GuardKeyName
GuardRegRoot
HdnBrwsr
InitBrwsrAddOn
dcdFile
dcdFile2
encdFile
encdFile2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ