_CloseProcess
_FindProcess
_KillProcess
_Unload
Overview
overview
7Static
static
38b150e33b2...18.exe
windows7-x64
78b150e33b2...18.exe
windows10-2004-x64
7$3/DjvuApp.exe
windows7-x64
6$3/DjvuApp.exe
windows10-2004-x64
6$APPDATA/D...er.exe
windows7-x64
7$APPDATA/D...er.exe
windows10-2004-x64
7$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$APPDATA/D...ew.exe
windows7-x64
1$APPDATA/D...ew.exe
windows10-2004-x64
1$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
8b150e33b26ac19529d1a8fd7b9038bd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b150e33b26ac19529d1a8fd7b9038bd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$3/DjvuApp.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$3/DjvuApp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$APPDATA/DjvuApp/DjvuApp/$APPDATA/DjvuApp/uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$APPDATA/DjvuApp/DjvuApp/$APPDATA/DjvuApp/uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$APPDATA/DjvuApp/DjvuApp/WinDjView.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$APPDATA/DjvuApp/DjvuApp/WinDjView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20241007-en
Target
8b150e33b26ac19529d1a8fd7b9038bd_JaffaCakes118
Size
3.1MB
MD5
8b150e33b26ac19529d1a8fd7b9038bd
SHA1
48e1b5c611cb6f69973aa6764b41f581b00e0060
SHA256
8205f034444dbed99ff0e975568b2ff26d7b00e96df2e5d1dbb617a26eec330b
SHA512
d5fe039dd1b29d1d666ab4a68eea45e9afaa9cafe57e3f81b35994a9aa88ead21acd1973e36fc08f81b608891e3dcf393627d09e6579983974e39c97de753c43
SSDEEP
98304:PKnE+TbRLtu4ICsYq2e4zUJiFIlyh67vCzOi:mEObRLtu4fs2VUYilly
Checks for missing Authenticode signature.
resource |
---|
8b150e33b26ac19529d1a8fd7b9038bd_JaffaCakes118 |
unpack001/$3/DjvuApp.exe |
unpack001/$APPDATA/DjvuApp/DjvuApp/$APPDATA/DjvuApp/uninstaller.exe |
unpack002/$PLUGINSDIR/nsProcess.dll |
unpack001/$APPDATA/DjvuApp/DjvuApp/WinDjView.exe |
unpack001/$PLUGINSDIR/nsProcess.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
MoveFileW
SetFileAttributesW
GetCurrentProcess
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
WaitForSingleObject
CopyFileW
CompareFileTime
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GlobalFree
GlobalAlloc
GetShortPathNameW
SearchPathW
lstrcmpiW
SetFileTime
CloseHandle
ExpandEnvironmentStringsW
lstrcmpW
GlobalUnlock
lstrcpynW
GetDiskFreeSpaceW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
MulDiv
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetSystemMenu
SetClassLongW
IsWindowEnabled
EnableMenuItem
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
wsprintfW
ScreenToClient
GetWindowRect
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
LoadImageW
SetTimer
SetWindowTextW
PostQuitMessage
ShowWindow
GetDlgItem
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
DrawTextW
EndPaint
CreateDialogParamW
SendMessageTimeoutW
SetForegroundWindow
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
RegDeleteKeyW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExpandEnvironmentStringsForUserW
AssocQueryStringW
SystemFunction036
RegQueryValueExA
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
SHGetFolderPathW
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
Sleep
GetModuleFileNameW
WaitForSingleObject
LoadLibraryW
CreateThread
GetProcAddress
FreeLibrary
SleepEx
GetCurrentProcess
MultiByteToWideChar
IsWow64Process
InitializeSListHead
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetStringTypeW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
GetLastError
LoadLibraryExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapReAlloc
HeapFree
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetACP
GetProcessHeap
GetFileType
CloseHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
HeapSize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
MoveFileW
SetFileAttributesW
GetCurrentProcess
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
WaitForSingleObject
CopyFileW
CompareFileTime
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GlobalFree
GlobalAlloc
GetShortPathNameW
SearchPathW
lstrcmpiW
SetFileTime
CloseHandle
ExpandEnvironmentStringsW
lstrcmpW
GlobalUnlock
lstrcpynW
GetDiskFreeSpaceW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
MulDiv
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetSystemMenu
SetClassLongW
IsWindowEnabled
EnableMenuItem
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
wsprintfW
ScreenToClient
GetWindowRect
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
LoadImageW
SetTimer
SetWindowTextW
PostQuitMessage
ShowWindow
GetDlgItem
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
DrawTextW
EndPaint
CreateDialogParamW
SendMessageTimeoutW
SetForegroundWindow
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
RegDeleteKeyW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
OpenProcess
MultiByteToWideChar
lstrlenA
lstrlenW
LoadLibraryA
lstrcmpiW
lstrcpynW
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetVersionExW
GlobalFree
GlobalAlloc
GetWindowThreadProcessId
EnumWindows
wsprintfW
PostMessageW
_CloseProcess
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
PathStripPathW
PathCanonicalizeW
PathRemoveBackslashW
PathAppendW
PathRemoveFileSpecW
PathIsRelativeW
PathIsURLW
PathFileExistsW
PathFindFileNameW
PathFindExtensionW
PathRemoveExtensionW
PathRenameExtensionW
PathIsUNCW
PathStripToRootW
UrlUnescapeW
StrFormatKBSizeW
AreFileApisANSI
GetSystemTimeAsFileTime
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDriveTypeW
RtlLookupFunctionEntry
RtlUnwindEx
RtlPcToFileHeader
HeapQueryInformation
SetStdHandle
GetFileType
GetSystemInfo
VirtualAlloc
VirtualQuery
GetStdHandle
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetStringTypeW
IsValidCodePage
GetOEMCP
GetCPInfo
IsValidLocale
EnumSystemLocalesW
LCMapStringW
GetConsoleCP
GetConsoleMode
IsDebuggerPresent
SetFilePointerEx
GetTimeZoneInformation
OutputDebugStringW
WriteConsoleW
SizeofResource
LockResource
LoadResource
FindResourceW
GetLocaleInfoW
GetLastError
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CloseHandle
GetFullPathNameW
CreateEventW
ResetEvent
GetCurrentThread
GetThreadPriority
SetThreadPriority
WaitForSingleObject
SetEvent
GetACP
GetTickCount
FindFirstFileW
FindClose
FindNextFileW
GlobalAlloc
GlobalLock
WideCharToMultiByte
GlobalUnlock
GetTempPathW
GetTempFileNameW
CreateFileW
CreateFileMappingW
GetVersionExW
MultiByteToWideChar
LoadLibraryW
GetProcAddress
FreeLibrary
GetCurrentProcessId
lstrlenW
lstrcpyW
lstrcmpiW
GetCurrentThreadId
MulDiv
GetModuleHandleW
FreeResource
GetCommandLineW
SearchPathW
GetProfileIntW
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
FindResourceExW
GetCurrentDirectoryW
SetErrorMode
LocalFileTimeToFileTime
GetFileSizeEx
GetFileAttributesExW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
CompareStringW
FileTimeToSystemTime
FileTimeToLocalFileTime
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
VirtualProtect
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CompareStringA
lstrcmpA
ResumeThread
GetProfileStringW
ExitThread
CreateThread
CopyFileW
IsProcessorFeaturePresent
WaitForMultipleObjects
HeapReAlloc
HeapAlloc
GlobalFlags
GetThreadLocale
GetStringTypeExW
MoveFileW
GetCurrentProcess
DuplicateHandle
WriteFile
UnlockFile
SetFilePointer
SetEndOfFile
ReadFile
LockFile
GetVolumeInformationW
GetShortPathNameW
GetFileSize
FlushFileBuffers
DeleteFileW
GetUserDefaultLCID
SystemTimeToFileTime
ReplaceFileW
SetFileTime
GetDiskFreeSpaceW
GlobalGetAtomNameW
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
GlobalFindAtomW
lstrcmpW
GlobalDeleteAtom
LoadLibraryExW
GetModuleHandleExW
GetSystemDirectoryW
EncodePointer
OutputDebugStringA
SetLastError
FormatMessageW
LocalFree
GlobalSize
Sleep
GlobalFree
GetFullPathNameA
InitializeCriticalSection
CreateDirectoryW
GetFileTime
GetFileAttributesW
ExitProcess
lstrcpynW
GetModuleFileNameW
GlobalAddAtomW
DecodePointer
HeapSize
RaiseException
GetProcessHeap
HeapFree
ReadConsoleW
GetWindowRgn
SubtractRect
GetUpdateRect
TranslateMDISysAccel
DefMDIChildProcW
DefFrameProcW
CharUpperBuffW
SetMenuDefaultItem
CopyIcon
GetDoubleClickTime
SetClassLongPtrW
SetCursorPos
DestroyAcceleratorTable
CreateAcceleratorTableW
GetKeyboardState
ToUnicodeEx
RegisterClipboardFormatW
MapVirtualKeyExW
IsCharLowerW
GetKeyboardLayout
MonitorFromPoint
UpdateLayeredWindow
IsMenu
DrawStateW
EnumDisplayMonitors
SetLayeredWindowAttributes
IsClipboardFormatAvailable
WaitMessage
LockWindowUpdate
GetMenuDefaultItem
NotifyWinEvent
HideCaret
EnableScrollBar
GetIconInfo
GetNextDlgGroupItem
CreateMenu
CopyAcceleratorTableW
PostThreadMessageW
GetTabbedTextExtentW
DrawIcon
GetSystemMenu
CopyImage
GetSysColorBrush
PostQuitMessage
TranslateMessage
GetMessageW
ShowOwnedPopups
RealChildWindowFromPoint
DestroyCursor
CharUpperW
DestroyIcon
InsertMenuItemW
CreatePopupMenu
TranslateAcceleratorW
LoadAcceleratorsW
GetMenuItemInfoW
FillRect
EndPaint
BeginPaint
GetWindowDC
GetDesktopWindow
GetActiveWindow
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamW
SendDlgItemMessageA
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
IsDialogMessageW
SetWindowTextW
ScrollWindowEx
CheckDlgButton
MapVirtualKeyW
GetKeyNameTextW
GetMonitorInfoW
MonitorFromWindow
WinHelpW
GetLastActivePopup
GetClassNameW
GetClassLongPtrW
SetWindowLongW
MapWindowPoints
MessageBoxW
GetWindowTextLengthW
GetWindowTextW
RemovePropW
GetPropW
SetPropW
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
ScrollWindow
GetForegroundWindow
SetActiveWindow
TrackPopupMenu
GetMenu
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPlacement
GetWindowPlacement
SetWindowPos
DestroyWindow
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
RegisterWindowMessageW
RemoveMenu
GetMenuState
GetMenuStringW
SetDlgItemTextW
MoveWindow
MapDialogRect
ShowWindow
CreateWindowExW
GetDlgItem
UnregisterClassW
FrameRect
SetParent
GetAsyncKeyState
ReleaseDC
GetDC
DrawIconEx
SetWindowRgn
AdjustWindowRectEx
SetScrollInfo
CallNextHookEx
SetFocus
UnhookWindowsHookEx
SetWindowsHookExW
IsWindowEnabled
LoadStringW
GetComboBoxInfo
GetCapture
SetRect
SetRectEmpty
DrawEdge
DrawFrameControl
DrawFocusRect
RedrawWindow
SetWindowLongPtrW
GetWindowLongPtrW
SetMenu
DestroyMenu
DrawMenuBar
AppendMenuW
ReuseDDElParam
UnpackDDElParam
IsIconic
IsZoomed
LoadImageW
BringWindowToTop
GetWindowLongW
GetWindow
GetTopWindow
GetWindowThreadProcessId
SystemParametersInfoW
SetForegroundWindow
LoadIconW
GetKeyState
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ShowCursor
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
IsWindow
IsWindowVisible
EqualRect
UnionRect
MessageBeep
IsChild
WindowFromPoint
GetScrollInfo
KillTimer
PostMessageW
ClientToScreen
TrackMouseEvent
ReleaseCapture
SetCapture
SetCursor
LoadCursorW
ScreenToClient
GetCursorPos
UpdateWindow
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetParent
InvalidateRect
SetTimer
IsRectEmpty
GetSysColor
InflateRect
GetFocus
InvertRect
OffsetRect
IntersectRect
DeleteMenu
GetMenuItemCount
InsertMenuW
GetMenuItemID
TrackPopupMenuEx
CheckMenuItem
ModifyMenuW
CopyRect
EnableMenuItem
GetSubMenu
LoadMenuW
PtInRect
LoadBitmapW
GetClientRect
GetSystemMetrics
GetWindowRect
SendMessageW
EnableWindow
ValidateRect
CreateHatchBrush
CreatePen
CreatePatternBrush
CreateSolidBrush
ExcludeClipRect
GetClipBox
GetCurrentPositionEx
GetObjectType
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
LineTo
RestoreDC
SaveDC
SelectClipRgn
ExtSelectClipRgn
SelectPalette
SetBkMode
SetMapMode
SetLayout
GetLayout
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextCharacterExtra
SetTextAlign
MoveToEx
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetViewportOrgEx
SetRectRgn
CreateFontW
GetCharWidthW
CreateRectRgnIndirect
CreateEllipticRgn
Ellipse
LPtoDP
GetROP2
GetBkMode
GetTextMetricsW
GetNearestColor
GetPolyFillMode
GetStretchBltMode
GetTextAlign
GetTextColor
GetWindowOrgEx
GetTextFaceW
EnumFontFamiliesExW
CreatePalette
GetNearestPaletteIndex
GetPaletteEntries
GetSystemPaletteEntries
RealizePalette
CreateDIBitmap
EnumFontFamiliesW
GetTextCharsetInfo
StretchBlt
SetDIBColorTable
CreatePolygonRgn
GetRgnBox
OffsetRgn
CreateRoundRectRgn
RoundRect
FrameRgn
PtInRegion
SetPixelV
ExtFloodFill
SetPaletteEntries
FillRgn
GetBoundsRect
CreateBitmap
OffsetWindowOrgEx
PatBlt
SetTextColor
SetBkColor
CopyMetaFileW
GdiFlush
DPtoLP
Polygon
SetPixel
Polyline
Arc
StretchDIBits
CreateCompatibleDC
CreateDIBSection
EndPath
ExtTextOutW
GetTextExtentPoint32W
BeginPath
SelectObject
CreateFontIndirectW
DeleteDC
CreateCompatibleBitmap
CombineRgn
GetPixel
CreateRectRgn
Rectangle
GetStockObject
Escape
TextOutW
RectVisible
PtVisible
EndDoc
EndPage
StartPage
AbortDoc
StartDocW
CreateDCW
GetObjectW
BitBlt
GetDeviceCaps
GetBkColor
DeleteObject
CreateICW
GetOpenFileNameW
GetSaveFileNameW
DocumentPropertiesW
DeviceCapabilitiesW
OpenPrinterW
ClosePrinter
GetPrinterW
EnumPrintersW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegOpenKeyExW
RegEnumValueW
RegCreateKeyExW
RegEnumKeyW
SetFileSecurityW
GetFileSecurityW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyW
RegSetValueExW
RegQueryValueExW
RegSetValueW
RegQueryValueW
SHAddToRecentDocs
ShellExecuteW
SHFileOperationW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetMalloc
DragAcceptFiles
SHChangeNotify
ShellExecuteExW
DragQueryFileW
DragFinish
SHGetFileInfoW
ExtractIconW
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHAppBarMessage
ImageList_Draw
ImageList_GetIconSize
ImageList_AddMasked
ord17
IsThemeBackgroundPartiallyTransparent
GetWindowTheme
GetThemeSysColor
GetCurrentThemeName
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemePartSize
IsAppThemed
DrawThemeParentBackground
DrawThemeText
GetThemeColor
OleDuplicateData
ReleaseStgMedium
CoCreateGuid
CoCreateInstance
CoInitialize
CoDisconnectObject
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
RevokeDragDrop
RegisterDragDrop
DoDragDrop
OleLockRunning
CoLockObjectExternal
CoInitializeEx
CoUninitialize
CreateStreamOnHGlobal
StringFromCLSID
CoTaskMemAlloc
CoTaskMemFree
OleGetClipboard
LoadTypeLi
VarBstrFromDate
VariantCopy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
SysAllocString
VariantChangeType
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
OleLoadPicture
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
InternetCanonicalizeUrlW
InternetOpenW
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetSetFilePointer
InternetWriteFile
InternetQueryDataAvailable
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetSetOptionExW
InternetQueryOptionW
InternetCrackUrlW
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipDrawImageI
GdipDeleteGraphics
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePaletteSize
GdipGetImagePalette
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusStartup
GdipFree
GdipAlloc
GdiplusShutdown
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
PlaySoundW
TransparentBlt
AlphaBlend
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
OpenProcess
MultiByteToWideChar
lstrlenA
lstrlenW
LoadLibraryA
lstrcmpiW
lstrcpynW
FreeLibrary
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetVersionExW
GlobalFree
GlobalAlloc
GetWindowThreadProcessId
EnumWindows
wsprintfW
PostMessageW
_CloseProcess
_FindProcess
_KillProcess
_Unload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ