ScreenShot
Created | 2021.06.14 20:42 | Machine | s1_win7_x6401 |
Filename | sdly_taskpop61.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 24 detected (Doina, Artemis, Unsafe, 1K4L0HE, Attribute, HighConfidence, Malicious, Fsysna, VSNTF521, score, CLASSIC, Johnnie, susgen, Genetic) | ||
md5 | bc7522c569863c07247effeed6adda85 | ||
sha256 | 1704f37b457e8947b989c130dc603c67d5d1d1166e2a3138698610d3f2d0bbfc | ||
ssdeep | 98304:l1wpL+zIIQn5PEdqRj0auF2QzjumyCzEpqS:Tw4d85PEuj0GQuZQzS | ||
imphash | d9c9b2207194e3b00f67e3fec7ad5f3e | ||
impfuzzy | 96:l4IFVfbQeryyXHXNZDeHcqSf3f77UIzRJ8YHWpnf9OgKt0YAio8gFHaxX2EFspwf:lrVke1NHfRJFHWpnf9O7+YAKNX21iOmp |
Network IP location
Signature (26cnts)
Level | Description |
---|---|
warning | File has been identified by 24 AntiVirus engines on VirusTotal as malicious |
watch | Attempts to modify browser security settings |
watch | Drops 60 unknown file mime types indicative of ransomware writing encrypted files back to disk |
watch | Network activity contains more than one unique useragent |
watch | Queries information on disks |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An executable file was downloaded by the process sdly_taskpop61.exe |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Checks for known Chinese AV sofware registry keys |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a shortcut to an executable file |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
notice | Foreign language identified in PE resource |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Sends data using the HTTP POST Method |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks amount of memory in system |
info | Collects information to fingerprint the system (MachineGuid |
info | Queries for the computername |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
info | Tries to locate where the browsers are installed |
Rules (16cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win32_Trojan_Emotet_2_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Gen_1_0904B0_Zero | Win32 Trojan Emotet | binaries (download) |
notice | anti_vm_detect | Possibly employs anti-virtualization techniques | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (download) |
info | JPEG_Format_Zero | JPEG Format | binaries (download) |
info | Lnk_Format_Zero | LNK Format | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | PNG_Format_Zero | PNG Format | binaries (download) |
info | Win32_Trojan_Gen_2_0904B0_Zero | Win32 Trojan Gen | binaries (download) |
Network (68cnts) ?
Suricata ids
ET POLICY PE EXE or DLL Windows file download HTTP
ET INFO Packed Executable Download
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO Packed Executable Download
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
PE API
IAT(Import Address Table) Library
SHELL32.dll
0x4ed438 SHCreateDirectoryExW
0x4ed43c SHBrowseForFolderW
0x4ed440 SHGetPathFromIDListW
0x4ed444 None
0x4ed448 ShellExecuteExW
0x4ed44c SHFileOperationW
0x4ed450 ShellExecuteW
0x4ed454 SHChangeNotify
0x4ed458 SHGetSpecialFolderPathW
0x4ed45c Shell_NotifyIconW
WININET.dll
0x4ed65c InternetGetCookieExW
0x4ed660 InternetCrackUrlW
IPHLPAPI.DLL
0x4ed14c GetAdaptersInfo
KERNEL32.dll
0x4ed154 GetSystemDirectoryW
0x4ed158 GetTempPathW
0x4ed15c GetTempFileNameW
0x4ed160 CreateFileW
0x4ed164 Process32FirstW
0x4ed168 Process32NextW
0x4ed16c SleepEx
0x4ed170 OutputDebugStringA
0x4ed174 LocalAlloc
0x4ed178 LocalFree
0x4ed17c WaitForMultipleObjects
0x4ed180 GetStartupInfoW
0x4ed184 Module32FirstW
0x4ed188 Module32NextW
0x4ed18c MapViewOfFile
0x4ed190 UnmapViewOfFile
0x4ed194 CreateFileMappingW
0x4ed198 lstrcmpW
0x4ed19c GetLocalTime
0x4ed1a0 CreateThread
0x4ed1a4 GetSystemWindowsDirectoryW
0x4ed1a8 SetEvent
0x4ed1ac CreateEventW
0x4ed1b0 DeleteFileA
0x4ed1b4 GetFileSize
0x4ed1b8 GetLogicalDrives
0x4ed1bc GetExitCodeThread
0x4ed1c0 WriteConsoleW
0x4ed1c4 SetEnvironmentVariableA
0x4ed1c8 FreeEnvironmentStringsW
0x4ed1cc GetEnvironmentStringsW
0x4ed1d0 GetCommandLineW
0x4ed1d4 GetCommandLineA
0x4ed1d8 GetOEMCP
0x4ed1dc IsValidCodePage
0x4ed1e0 FindFirstFileExW
0x4ed1e4 SetFilePointerEx
0x4ed1e8 OutputDebugStringW
0x4ed1ec GetConsoleMode
0x4ed1f0 GetConsoleCP
0x4ed1f4 GetTimeZoneInformation
0x4ed1f8 EnumSystemLocalesW
0x4ed1fc GetUserDefaultLCID
0x4ed200 VirtualFree
0x4ed204 GetFileType
0x4ed208 SetStdHandle
0x4ed20c GetModuleHandleExW
0x4ed210 FreeLibraryAndExitThread
0x4ed214 ExitThread
0x4ed218 RtlUnwind
0x4ed21c CreateFileA
0x4ed220 lstrcmpiA
0x4ed224 lstrcmpA
0x4ed228 DeviceIoControl
0x4ed22c DosDateTimeToFileTime
0x4ed230 VirtualAlloc
0x4ed234 Thread32Next
0x4ed238 Thread32First
0x4ed23c CreateToolhelp32Snapshot
0x4ed240 FlushInstructionCache
0x4ed244 ReadFile
0x4ed248 SetThreadContext
0x4ed24c GetThreadContext
0x4ed250 ResumeThread
0x4ed254 SuspendThread
0x4ed258 OpenThread
0x4ed25c Sleep
0x4ed260 HeapCreate
0x4ed264 CompareStringW
0x4ed268 FreeResource
0x4ed26c DebugBreak
0x4ed270 VirtualQuery
0x4ed274 MultiByteToWideChar
0x4ed278 IsBadReadPtr
0x4ed27c GetModuleFileNameW
0x4ed280 LoadLibraryExW
0x4ed284 lstrcmpiW
0x4ed288 GetTickCount
0x4ed28c WaitForSingleObject
0x4ed290 SetErrorMode
0x4ed294 SetUnhandledExceptionFilter
0x4ed298 VirtualProtect
0x4ed29c InterlockedDecrement
0x4ed2a0 InterlockedIncrement
0x4ed2a4 GetVersionExW
0x4ed2a8 MoveFileExW
0x4ed2ac FindNextFileW
0x4ed2b0 FindFirstFileW
0x4ed2b4 DeleteFileW
0x4ed2b8 GetFileAttributesW
0x4ed2bc SetFileAttributesW
0x4ed2c0 GetFullPathNameW
0x4ed2c4 RemoveDirectoryW
0x4ed2c8 GetModuleHandleW
0x4ed2cc LoadLibraryW
0x4ed2d0 GetStringTypeW
0x4ed2d4 FlushFileBuffers
0x4ed2d8 LocalFileTimeToFileTime
0x4ed2dc SetFilePointer
0x4ed2e0 WriteFile
0x4ed2e4 ReadConsoleW
0x4ed2e8 GetStdHandle
0x4ed2ec DecodePointer
0x4ed2f0 LockResource
0x4ed2f4 HeapDestroy
0x4ed2f8 lstrlenW
0x4ed2fc lstrcpynW
0x4ed300 HeapAlloc
0x4ed304 HeapReAlloc
0x4ed308 HeapFree
0x4ed30c HeapSize
0x4ed310 GetProcessHeap
0x4ed314 RaiseException
0x4ed318 GetLastError
0x4ed31c InitializeCriticalSectionAndSpinCount
0x4ed320 DeleteCriticalSection
0x4ed324 SetFileTime
0x4ed328 LoadResource
0x4ed32c InitializeSListHead
0x4ed330 QueryPerformanceCounter
0x4ed334 IsProcessorFeaturePresent
0x4ed338 UnhandledExceptionFilter
0x4ed33c SetEndOfFile
0x4ed340 GlobalFree
0x4ed344 GetVersion
0x4ed348 ResetEvent
0x4ed34c InterlockedCompareExchange
0x4ed350 InterlockedExchange
0x4ed354 MulDiv
0x4ed358 GlobalUnlock
0x4ed35c GlobalLock
0x4ed360 ExitProcess
0x4ed364 GlobalAlloc
0x4ed368 CloseHandle
0x4ed36c FindClose
0x4ed370 SizeofResource
0x4ed374 FindResourceW
0x4ed378 FindResourceExW
0x4ed37c GetCurrentThreadId
0x4ed380 GetACP
0x4ed384 IsDebuggerPresent
0x4ed388 GetCPInfo
0x4ed38c GetLocaleInfoW
0x4ed390 LCMapStringW
0x4ed394 GetSystemTimeAsFileTime
0x4ed398 TlsFree
0x4ed39c TlsSetValue
0x4ed3a0 TlsGetValue
0x4ed3a4 TlsAlloc
0x4ed3a8 SwitchToThread
0x4ed3ac InitializeCriticalSection
0x4ed3b0 EnterCriticalSection
0x4ed3b4 EncodePointer
0x4ed3b8 LeaveCriticalSection
0x4ed3bc CopyFileW
0x4ed3c0 WideCharToMultiByte
0x4ed3c4 FreeLibrary
0x4ed3c8 GetProcAddress
0x4ed3cc GetShortPathNameW
0x4ed3d0 OpenProcess
0x4ed3d4 SetLastError
0x4ed3d8 GetProcessId
0x4ed3dc GetCurrentThread
0x4ed3e0 TerminateProcess
0x4ed3e4 GetCurrentProcessId
0x4ed3e8 GetCurrentProcess
0x4ed3ec IsValidLocale
USER32.dll
0x4ed4c0 EnableWindow
0x4ed4c4 KillTimer
0x4ed4c8 SetTimer
0x4ed4cc IsZoomed
0x4ed4d0 MoveWindow
0x4ed4d4 DestroyWindow
0x4ed4d8 GetMessageW
0x4ed4dc PostThreadMessageW
0x4ed4e0 PeekMessageW
0x4ed4e4 GetIconInfo
0x4ed4e8 GetWindow
0x4ed4ec ReleaseDC
0x4ed4f0 GetDC
0x4ed4f4 RegisterWindowMessageW
0x4ed4f8 SetForegroundWindow
0x4ed4fc SetWindowTextW
0x4ed500 UpdateWindow
0x4ed504 GetSystemMetrics
0x4ed508 SetFocus
0x4ed50c IsWindowVisible
0x4ed510 ShowWindow
0x4ed514 SendMessageW
0x4ed518 SetWindowsHookExW
0x4ed51c MessageBoxW
0x4ed520 CharNextW
0x4ed524 DefWindowProcW
0x4ed528 PostQuitMessage
0x4ed52c LoadImageW
0x4ed530 DestroyIcon
0x4ed534 PostMessageW
0x4ed538 MapWindowPoints
0x4ed53c SetWindowPos
0x4ed540 IsWindow
0x4ed544 SystemParametersInfoW
0x4ed548 FindWindowExW
0x4ed54c GetParent
0x4ed550 PtInRect
0x4ed554 IsRectEmpty
0x4ed558 GetCursorPos
0x4ed55c GetWindowRect
0x4ed560 SwitchToThisWindow
0x4ed564 wvsprintfW
0x4ed568 SetCursor
0x4ed56c InflateRect
0x4ed570 OffsetRect
0x4ed574 LoadCursorW
0x4ed578 TranslateMessage
0x4ed57c DispatchMessageW
0x4ed580 CreateWindowExW
0x4ed584 IsChild
0x4ed588 UpdateLayeredWindow
0x4ed58c GetFocus
0x4ed590 GetKeyState
0x4ed594 SetCapture
0x4ed598 ReleaseCapture
0x4ed59c BeginPaint
0x4ed5a0 EndPaint
0x4ed5a4 GetUpdateRect
0x4ed5a8 InvalidateRect
0x4ed5ac GetClientRect
0x4ed5b0 ScreenToClient
0x4ed5b4 GetWindowLongW
0x4ed5b8 SetWindowLongW
0x4ed5bc GetClassNameW
0x4ed5c0 CallWindowProcW
0x4ed5c4 RegisterClassW
0x4ed5c8 RegisterClassExW
0x4ed5cc GetClassInfoExW
0x4ed5d0 GetMenu
0x4ed5d4 SetPropW
0x4ed5d8 GetPropW
0x4ed5dc AdjustWindowRectEx
0x4ed5e0 IntersectRect
0x4ed5e4 RemovePropW
0x4ed5e8 IsIconic
0x4ed5ec SetWindowRgn
0x4ed5f0 MonitorFromWindow
0x4ed5f4 GetMonitorInfoW
0x4ed5f8 CopyRect
0x4ed5fc CharPrevW
0x4ed600 DrawTextW
0x4ed604 SetRect
0x4ed608 DrawIconEx
0x4ed60c CreateCaret
0x4ed610 HideCaret
0x4ed614 ShowCaret
0x4ed618 SetCaretPos
0x4ed61c GetCaretPos
0x4ed620 ClientToScreen
0x4ed624 GetSysColor
0x4ed628 CreateAcceleratorTableW
0x4ed62c InvalidateRgn
0x4ed630 FillRect
0x4ed634 SetLayeredWindowAttributes
0x4ed638 RedrawWindow
0x4ed63c GetWindowTextW
0x4ed640 GetWindowTextLengthW
0x4ed644 GetWindowDC
GDI32.dll
0x4ed09c CreateDCW
0x4ed0a0 CreateSolidBrush
0x4ed0a4 GetDeviceCaps
0x4ed0a8 ExtTextOutW
0x4ed0ac TextOutW
0x4ed0b0 MoveToEx
0x4ed0b4 CreateDIBSection
0x4ed0b8 SetTextColor
0x4ed0bc SetStretchBltMode
0x4ed0c0 SetBkMode
0x4ed0c4 SetBkColor
0x4ed0c8 ExtSelectClipRgn
0x4ed0cc SelectClipRgn
0x4ed0d0 RestoreDC
0x4ed0d4 RoundRect
0x4ed0d8 SaveDC
0x4ed0dc GetTextMetricsW
0x4ed0e0 GetObjectW
0x4ed0e4 LineTo
0x4ed0e8 GetClipBox
0x4ed0ec GetCharABCWidthsW
0x4ed0f0 CreateRectRgnIndirect
0x4ed0f4 CombineRgn
0x4ed0f8 CreateRoundRectRgn
0x4ed0fc SetDIBitsToDevice
0x4ed100 StretchBlt
0x4ed104 SelectObject
0x4ed108 GetTextExtentPoint32W
0x4ed10c GetStockObject
0x4ed110 GetDIBits
0x4ed114 DeleteObject
0x4ed118 SetWindowOrgEx
0x4ed11c BitBlt
0x4ed120 CreateCompatibleBitmap
0x4ed124 CreateCompatibleDC
0x4ed128 CreateFontIndirectW
0x4ed12c CreatePen
0x4ed130 DeleteDC
0x4ed134 Rectangle
ADVAPI32.dll
0x4ed000 OpenThreadToken
0x4ed004 GetTokenInformation
0x4ed008 EqualSid
0x4ed00c AllocateAndInitializeSid
0x4ed010 FreeSid
0x4ed014 RegCloseKey
0x4ed018 RegOpenKeyExW
0x4ed01c RegQueryValueExW
0x4ed020 CloseServiceHandle
0x4ed024 OpenSCManagerW
0x4ed028 OpenServiceW
0x4ed02c QueryServiceStatus
0x4ed030 RegCreateKeyExW
0x4ed034 RegDeleteKeyW
0x4ed038 RegDeleteValueW
0x4ed03c RegEnumKeyExW
0x4ed040 RegQueryInfoKeyW
0x4ed044 RegSetValueExW
0x4ed048 AdjustTokenPrivileges
0x4ed04c LookupPrivilegeValueW
0x4ed050 RegCreateKeyW
0x4ed054 GetUserNameW
0x4ed058 SetTokenInformation
0x4ed05c CreateWellKnownSid
0x4ed060 GetLengthSid
0x4ed064 DuplicateTokenEx
0x4ed068 RegQueryValueExA
0x4ed06c RegOpenKeyExA
0x4ed070 RegEnumKeyExA
0x4ed074 OpenProcessToken
ole32.dll
0x4ed750 OleLockRunning
0x4ed754 CreateStreamOnHGlobal
0x4ed758 CoCreateInstance
0x4ed75c CLSIDFromString
0x4ed760 CLSIDFromProgID
0x4ed764 CoInitialize
0x4ed768 CoInitializeSecurity
0x4ed76c CoCreateGuid
0x4ed770 CoTaskMemFree
0x4ed774 CoTaskMemRealloc
0x4ed778 CoTaskMemAlloc
0x4ed77c CoUninitialize
OLEAUT32.dll
0x4ed400 SafeArrayPutElement
0x4ed404 SysAllocString
0x4ed408 SysFreeString
0x4ed40c VariantChangeType
0x4ed410 SysAllocStringLen
0x4ed414 VariantInit
0x4ed418 VarUI4FromStr
0x4ed41c VariantClear
0x4ed420 SafeArrayCreate
SHLWAPI.dll
0x4ed464 PathFileExistsW
0x4ed468 StrStrIW
0x4ed46c wnsprintfW
0x4ed470 PathCombineW
0x4ed474 PathIsDirectoryW
0x4ed478 PathRemoveFileSpecW
0x4ed47c SHDeleteKeyW
0x4ed480 PathFindExtensionW
0x4ed484 PathFindFileNameW
0x4ed488 PathAppendW
0x4ed48c PathCanonicalizeW
0x4ed490 SHGetValueW
0x4ed494 StrStrIA
0x4ed498 SHGetValueA
0x4ed49c SHSetValueA
0x4ed4a0 StrCmpNIW
0x4ed4a4 StrTrimA
0x4ed4a8 SHSetValueW
0x4ed4ac StrCmpIW
0x4ed4b0 AssocQueryStringW
COMCTL32.dll
0x4ed07c None
0x4ed080 InitCommonControlsEx
0x4ed084 _TrackMouseEvent
PSAPI.DLL
0x4ed428 EnumProcessModules
0x4ed42c GetModuleFileNameExW
0x4ed430 EnumProcesses
VERSION.dll
0x4ed64c VerQueryValueW
0x4ed650 GetFileVersionInfoW
0x4ed654 GetFileVersionInfoSizeW
gdiplus.dll
0x4ed684 GdipDrawPath
0x4ed688 GdiplusStartup
0x4ed68c GdiplusShutdown
0x4ed690 GdipAlloc
0x4ed694 GdipFree
0x4ed698 GdipGetImageEncoders
0x4ed69c GdipGetImageEncodersSize
0x4ed6a0 GdipDrawImageRectRectI
0x4ed6a4 GdipDrawImagePointsI
0x4ed6a8 GdipFillPath
0x4ed6ac GdipGraphicsClear
0x4ed6b0 GdipSetInterpolationMode
0x4ed6b4 GdipBitmapUnlockBits
0x4ed6b8 GdipBitmapLockBits
0x4ed6bc GdipCloneBitmapAreaI
0x4ed6c0 GdipCreateHBITMAPFromBitmap
0x4ed6c4 GdipCreateBitmapFromScan0
0x4ed6c8 GdipCreateBitmapFromFile
0x4ed6cc GdipCreateBitmapFromStream
0x4ed6d0 GdipGetImageGraphicsContext
0x4ed6d4 GdipSaveImageToFile
0x4ed6d8 GdipCreateTexture
0x4ed6dc GdipAddPathArcI
0x4ed6e0 GdipClosePathFigure
0x4ed6e4 GdipDrawImageRectI
0x4ed6e8 GdipGetPropertyItem
0x4ed6ec GdipGetPropertyItemSize
0x4ed6f0 GdipImageSelectActiveFrame
0x4ed6f4 GdipImageGetFrameCount
0x4ed6f8 GdipImageGetFrameDimensionsList
0x4ed6fc GdipImageGetFrameDimensionsCount
0x4ed700 GdipGetImageHeight
0x4ed704 GdipGetImageWidth
0x4ed708 GdipDrawEllipseI
0x4ed70c GdipCloneImage
0x4ed710 GdipDeletePen
0x4ed714 GdipCreatePen1
0x4ed718 None
0x4ed71c GdipCloneBrush
0x4ed720 GdipDeleteBrush
0x4ed724 GdipCreateSolidFill
0x4ed728 GdipLoadImageFromStream
0x4ed72c GdipDeletePath
0x4ed730 GdipCreatePath
0x4ed734 GdipFillEllipseI
0x4ed738 GdipSetSmoothingMode
0x4ed73c GdipDeleteGraphics
0x4ed740 GdipCreateFromHDC
0x4ed744 GdipDisposeImage
0x4ed748 GdipLoadImageFromStreamICM
urlmon.dll
0x4ed784 URLDownloadToCacheFileA
Secur32.dll
0x4ed4b8 GetUserNameExW
WINMM.dll
0x4ed668 timeGetTime
CRYPT32.dll
0x4ed08c CryptBinaryToStringW
0x4ed090 CryptStringToBinaryW
0x4ed094 CertGetNameStringW
WINTRUST.dll
0x4ed670 WTHelperProvDataFromStateData
0x4ed674 WinVerifyTrust
MSIMG32.dll
0x4ed3f4 GradientFill
0x4ed3f8 AlphaBlend
IMM32.dll
0x4ed13c ImmSetCompositionWindow
0x4ed140 ImmGetContext
0x4ed144 ImmReleaseContext
dbghelp.dll
0x4ed67c MakeSureDirectoryPathExists
EAT(Export Address Table) is none
SHELL32.dll
0x4ed438 SHCreateDirectoryExW
0x4ed43c SHBrowseForFolderW
0x4ed440 SHGetPathFromIDListW
0x4ed444 None
0x4ed448 ShellExecuteExW
0x4ed44c SHFileOperationW
0x4ed450 ShellExecuteW
0x4ed454 SHChangeNotify
0x4ed458 SHGetSpecialFolderPathW
0x4ed45c Shell_NotifyIconW
WININET.dll
0x4ed65c InternetGetCookieExW
0x4ed660 InternetCrackUrlW
IPHLPAPI.DLL
0x4ed14c GetAdaptersInfo
KERNEL32.dll
0x4ed154 GetSystemDirectoryW
0x4ed158 GetTempPathW
0x4ed15c GetTempFileNameW
0x4ed160 CreateFileW
0x4ed164 Process32FirstW
0x4ed168 Process32NextW
0x4ed16c SleepEx
0x4ed170 OutputDebugStringA
0x4ed174 LocalAlloc
0x4ed178 LocalFree
0x4ed17c WaitForMultipleObjects
0x4ed180 GetStartupInfoW
0x4ed184 Module32FirstW
0x4ed188 Module32NextW
0x4ed18c MapViewOfFile
0x4ed190 UnmapViewOfFile
0x4ed194 CreateFileMappingW
0x4ed198 lstrcmpW
0x4ed19c GetLocalTime
0x4ed1a0 CreateThread
0x4ed1a4 GetSystemWindowsDirectoryW
0x4ed1a8 SetEvent
0x4ed1ac CreateEventW
0x4ed1b0 DeleteFileA
0x4ed1b4 GetFileSize
0x4ed1b8 GetLogicalDrives
0x4ed1bc GetExitCodeThread
0x4ed1c0 WriteConsoleW
0x4ed1c4 SetEnvironmentVariableA
0x4ed1c8 FreeEnvironmentStringsW
0x4ed1cc GetEnvironmentStringsW
0x4ed1d0 GetCommandLineW
0x4ed1d4 GetCommandLineA
0x4ed1d8 GetOEMCP
0x4ed1dc IsValidCodePage
0x4ed1e0 FindFirstFileExW
0x4ed1e4 SetFilePointerEx
0x4ed1e8 OutputDebugStringW
0x4ed1ec GetConsoleMode
0x4ed1f0 GetConsoleCP
0x4ed1f4 GetTimeZoneInformation
0x4ed1f8 EnumSystemLocalesW
0x4ed1fc GetUserDefaultLCID
0x4ed200 VirtualFree
0x4ed204 GetFileType
0x4ed208 SetStdHandle
0x4ed20c GetModuleHandleExW
0x4ed210 FreeLibraryAndExitThread
0x4ed214 ExitThread
0x4ed218 RtlUnwind
0x4ed21c CreateFileA
0x4ed220 lstrcmpiA
0x4ed224 lstrcmpA
0x4ed228 DeviceIoControl
0x4ed22c DosDateTimeToFileTime
0x4ed230 VirtualAlloc
0x4ed234 Thread32Next
0x4ed238 Thread32First
0x4ed23c CreateToolhelp32Snapshot
0x4ed240 FlushInstructionCache
0x4ed244 ReadFile
0x4ed248 SetThreadContext
0x4ed24c GetThreadContext
0x4ed250 ResumeThread
0x4ed254 SuspendThread
0x4ed258 OpenThread
0x4ed25c Sleep
0x4ed260 HeapCreate
0x4ed264 CompareStringW
0x4ed268 FreeResource
0x4ed26c DebugBreak
0x4ed270 VirtualQuery
0x4ed274 MultiByteToWideChar
0x4ed278 IsBadReadPtr
0x4ed27c GetModuleFileNameW
0x4ed280 LoadLibraryExW
0x4ed284 lstrcmpiW
0x4ed288 GetTickCount
0x4ed28c WaitForSingleObject
0x4ed290 SetErrorMode
0x4ed294 SetUnhandledExceptionFilter
0x4ed298 VirtualProtect
0x4ed29c InterlockedDecrement
0x4ed2a0 InterlockedIncrement
0x4ed2a4 GetVersionExW
0x4ed2a8 MoveFileExW
0x4ed2ac FindNextFileW
0x4ed2b0 FindFirstFileW
0x4ed2b4 DeleteFileW
0x4ed2b8 GetFileAttributesW
0x4ed2bc SetFileAttributesW
0x4ed2c0 GetFullPathNameW
0x4ed2c4 RemoveDirectoryW
0x4ed2c8 GetModuleHandleW
0x4ed2cc LoadLibraryW
0x4ed2d0 GetStringTypeW
0x4ed2d4 FlushFileBuffers
0x4ed2d8 LocalFileTimeToFileTime
0x4ed2dc SetFilePointer
0x4ed2e0 WriteFile
0x4ed2e4 ReadConsoleW
0x4ed2e8 GetStdHandle
0x4ed2ec DecodePointer
0x4ed2f0 LockResource
0x4ed2f4 HeapDestroy
0x4ed2f8 lstrlenW
0x4ed2fc lstrcpynW
0x4ed300 HeapAlloc
0x4ed304 HeapReAlloc
0x4ed308 HeapFree
0x4ed30c HeapSize
0x4ed310 GetProcessHeap
0x4ed314 RaiseException
0x4ed318 GetLastError
0x4ed31c InitializeCriticalSectionAndSpinCount
0x4ed320 DeleteCriticalSection
0x4ed324 SetFileTime
0x4ed328 LoadResource
0x4ed32c InitializeSListHead
0x4ed330 QueryPerformanceCounter
0x4ed334 IsProcessorFeaturePresent
0x4ed338 UnhandledExceptionFilter
0x4ed33c SetEndOfFile
0x4ed340 GlobalFree
0x4ed344 GetVersion
0x4ed348 ResetEvent
0x4ed34c InterlockedCompareExchange
0x4ed350 InterlockedExchange
0x4ed354 MulDiv
0x4ed358 GlobalUnlock
0x4ed35c GlobalLock
0x4ed360 ExitProcess
0x4ed364 GlobalAlloc
0x4ed368 CloseHandle
0x4ed36c FindClose
0x4ed370 SizeofResource
0x4ed374 FindResourceW
0x4ed378 FindResourceExW
0x4ed37c GetCurrentThreadId
0x4ed380 GetACP
0x4ed384 IsDebuggerPresent
0x4ed388 GetCPInfo
0x4ed38c GetLocaleInfoW
0x4ed390 LCMapStringW
0x4ed394 GetSystemTimeAsFileTime
0x4ed398 TlsFree
0x4ed39c TlsSetValue
0x4ed3a0 TlsGetValue
0x4ed3a4 TlsAlloc
0x4ed3a8 SwitchToThread
0x4ed3ac InitializeCriticalSection
0x4ed3b0 EnterCriticalSection
0x4ed3b4 EncodePointer
0x4ed3b8 LeaveCriticalSection
0x4ed3bc CopyFileW
0x4ed3c0 WideCharToMultiByte
0x4ed3c4 FreeLibrary
0x4ed3c8 GetProcAddress
0x4ed3cc GetShortPathNameW
0x4ed3d0 OpenProcess
0x4ed3d4 SetLastError
0x4ed3d8 GetProcessId
0x4ed3dc GetCurrentThread
0x4ed3e0 TerminateProcess
0x4ed3e4 GetCurrentProcessId
0x4ed3e8 GetCurrentProcess
0x4ed3ec IsValidLocale
USER32.dll
0x4ed4c0 EnableWindow
0x4ed4c4 KillTimer
0x4ed4c8 SetTimer
0x4ed4cc IsZoomed
0x4ed4d0 MoveWindow
0x4ed4d4 DestroyWindow
0x4ed4d8 GetMessageW
0x4ed4dc PostThreadMessageW
0x4ed4e0 PeekMessageW
0x4ed4e4 GetIconInfo
0x4ed4e8 GetWindow
0x4ed4ec ReleaseDC
0x4ed4f0 GetDC
0x4ed4f4 RegisterWindowMessageW
0x4ed4f8 SetForegroundWindow
0x4ed4fc SetWindowTextW
0x4ed500 UpdateWindow
0x4ed504 GetSystemMetrics
0x4ed508 SetFocus
0x4ed50c IsWindowVisible
0x4ed510 ShowWindow
0x4ed514 SendMessageW
0x4ed518 SetWindowsHookExW
0x4ed51c MessageBoxW
0x4ed520 CharNextW
0x4ed524 DefWindowProcW
0x4ed528 PostQuitMessage
0x4ed52c LoadImageW
0x4ed530 DestroyIcon
0x4ed534 PostMessageW
0x4ed538 MapWindowPoints
0x4ed53c SetWindowPos
0x4ed540 IsWindow
0x4ed544 SystemParametersInfoW
0x4ed548 FindWindowExW
0x4ed54c GetParent
0x4ed550 PtInRect
0x4ed554 IsRectEmpty
0x4ed558 GetCursorPos
0x4ed55c GetWindowRect
0x4ed560 SwitchToThisWindow
0x4ed564 wvsprintfW
0x4ed568 SetCursor
0x4ed56c InflateRect
0x4ed570 OffsetRect
0x4ed574 LoadCursorW
0x4ed578 TranslateMessage
0x4ed57c DispatchMessageW
0x4ed580 CreateWindowExW
0x4ed584 IsChild
0x4ed588 UpdateLayeredWindow
0x4ed58c GetFocus
0x4ed590 GetKeyState
0x4ed594 SetCapture
0x4ed598 ReleaseCapture
0x4ed59c BeginPaint
0x4ed5a0 EndPaint
0x4ed5a4 GetUpdateRect
0x4ed5a8 InvalidateRect
0x4ed5ac GetClientRect
0x4ed5b0 ScreenToClient
0x4ed5b4 GetWindowLongW
0x4ed5b8 SetWindowLongW
0x4ed5bc GetClassNameW
0x4ed5c0 CallWindowProcW
0x4ed5c4 RegisterClassW
0x4ed5c8 RegisterClassExW
0x4ed5cc GetClassInfoExW
0x4ed5d0 GetMenu
0x4ed5d4 SetPropW
0x4ed5d8 GetPropW
0x4ed5dc AdjustWindowRectEx
0x4ed5e0 IntersectRect
0x4ed5e4 RemovePropW
0x4ed5e8 IsIconic
0x4ed5ec SetWindowRgn
0x4ed5f0 MonitorFromWindow
0x4ed5f4 GetMonitorInfoW
0x4ed5f8 CopyRect
0x4ed5fc CharPrevW
0x4ed600 DrawTextW
0x4ed604 SetRect
0x4ed608 DrawIconEx
0x4ed60c CreateCaret
0x4ed610 HideCaret
0x4ed614 ShowCaret
0x4ed618 SetCaretPos
0x4ed61c GetCaretPos
0x4ed620 ClientToScreen
0x4ed624 GetSysColor
0x4ed628 CreateAcceleratorTableW
0x4ed62c InvalidateRgn
0x4ed630 FillRect
0x4ed634 SetLayeredWindowAttributes
0x4ed638 RedrawWindow
0x4ed63c GetWindowTextW
0x4ed640 GetWindowTextLengthW
0x4ed644 GetWindowDC
GDI32.dll
0x4ed09c CreateDCW
0x4ed0a0 CreateSolidBrush
0x4ed0a4 GetDeviceCaps
0x4ed0a8 ExtTextOutW
0x4ed0ac TextOutW
0x4ed0b0 MoveToEx
0x4ed0b4 CreateDIBSection
0x4ed0b8 SetTextColor
0x4ed0bc SetStretchBltMode
0x4ed0c0 SetBkMode
0x4ed0c4 SetBkColor
0x4ed0c8 ExtSelectClipRgn
0x4ed0cc SelectClipRgn
0x4ed0d0 RestoreDC
0x4ed0d4 RoundRect
0x4ed0d8 SaveDC
0x4ed0dc GetTextMetricsW
0x4ed0e0 GetObjectW
0x4ed0e4 LineTo
0x4ed0e8 GetClipBox
0x4ed0ec GetCharABCWidthsW
0x4ed0f0 CreateRectRgnIndirect
0x4ed0f4 CombineRgn
0x4ed0f8 CreateRoundRectRgn
0x4ed0fc SetDIBitsToDevice
0x4ed100 StretchBlt
0x4ed104 SelectObject
0x4ed108 GetTextExtentPoint32W
0x4ed10c GetStockObject
0x4ed110 GetDIBits
0x4ed114 DeleteObject
0x4ed118 SetWindowOrgEx
0x4ed11c BitBlt
0x4ed120 CreateCompatibleBitmap
0x4ed124 CreateCompatibleDC
0x4ed128 CreateFontIndirectW
0x4ed12c CreatePen
0x4ed130 DeleteDC
0x4ed134 Rectangle
ADVAPI32.dll
0x4ed000 OpenThreadToken
0x4ed004 GetTokenInformation
0x4ed008 EqualSid
0x4ed00c AllocateAndInitializeSid
0x4ed010 FreeSid
0x4ed014 RegCloseKey
0x4ed018 RegOpenKeyExW
0x4ed01c RegQueryValueExW
0x4ed020 CloseServiceHandle
0x4ed024 OpenSCManagerW
0x4ed028 OpenServiceW
0x4ed02c QueryServiceStatus
0x4ed030 RegCreateKeyExW
0x4ed034 RegDeleteKeyW
0x4ed038 RegDeleteValueW
0x4ed03c RegEnumKeyExW
0x4ed040 RegQueryInfoKeyW
0x4ed044 RegSetValueExW
0x4ed048 AdjustTokenPrivileges
0x4ed04c LookupPrivilegeValueW
0x4ed050 RegCreateKeyW
0x4ed054 GetUserNameW
0x4ed058 SetTokenInformation
0x4ed05c CreateWellKnownSid
0x4ed060 GetLengthSid
0x4ed064 DuplicateTokenEx
0x4ed068 RegQueryValueExA
0x4ed06c RegOpenKeyExA
0x4ed070 RegEnumKeyExA
0x4ed074 OpenProcessToken
ole32.dll
0x4ed750 OleLockRunning
0x4ed754 CreateStreamOnHGlobal
0x4ed758 CoCreateInstance
0x4ed75c CLSIDFromString
0x4ed760 CLSIDFromProgID
0x4ed764 CoInitialize
0x4ed768 CoInitializeSecurity
0x4ed76c CoCreateGuid
0x4ed770 CoTaskMemFree
0x4ed774 CoTaskMemRealloc
0x4ed778 CoTaskMemAlloc
0x4ed77c CoUninitialize
OLEAUT32.dll
0x4ed400 SafeArrayPutElement
0x4ed404 SysAllocString
0x4ed408 SysFreeString
0x4ed40c VariantChangeType
0x4ed410 SysAllocStringLen
0x4ed414 VariantInit
0x4ed418 VarUI4FromStr
0x4ed41c VariantClear
0x4ed420 SafeArrayCreate
SHLWAPI.dll
0x4ed464 PathFileExistsW
0x4ed468 StrStrIW
0x4ed46c wnsprintfW
0x4ed470 PathCombineW
0x4ed474 PathIsDirectoryW
0x4ed478 PathRemoveFileSpecW
0x4ed47c SHDeleteKeyW
0x4ed480 PathFindExtensionW
0x4ed484 PathFindFileNameW
0x4ed488 PathAppendW
0x4ed48c PathCanonicalizeW
0x4ed490 SHGetValueW
0x4ed494 StrStrIA
0x4ed498 SHGetValueA
0x4ed49c SHSetValueA
0x4ed4a0 StrCmpNIW
0x4ed4a4 StrTrimA
0x4ed4a8 SHSetValueW
0x4ed4ac StrCmpIW
0x4ed4b0 AssocQueryStringW
COMCTL32.dll
0x4ed07c None
0x4ed080 InitCommonControlsEx
0x4ed084 _TrackMouseEvent
PSAPI.DLL
0x4ed428 EnumProcessModules
0x4ed42c GetModuleFileNameExW
0x4ed430 EnumProcesses
VERSION.dll
0x4ed64c VerQueryValueW
0x4ed650 GetFileVersionInfoW
0x4ed654 GetFileVersionInfoSizeW
gdiplus.dll
0x4ed684 GdipDrawPath
0x4ed688 GdiplusStartup
0x4ed68c GdiplusShutdown
0x4ed690 GdipAlloc
0x4ed694 GdipFree
0x4ed698 GdipGetImageEncoders
0x4ed69c GdipGetImageEncodersSize
0x4ed6a0 GdipDrawImageRectRectI
0x4ed6a4 GdipDrawImagePointsI
0x4ed6a8 GdipFillPath
0x4ed6ac GdipGraphicsClear
0x4ed6b0 GdipSetInterpolationMode
0x4ed6b4 GdipBitmapUnlockBits
0x4ed6b8 GdipBitmapLockBits
0x4ed6bc GdipCloneBitmapAreaI
0x4ed6c0 GdipCreateHBITMAPFromBitmap
0x4ed6c4 GdipCreateBitmapFromScan0
0x4ed6c8 GdipCreateBitmapFromFile
0x4ed6cc GdipCreateBitmapFromStream
0x4ed6d0 GdipGetImageGraphicsContext
0x4ed6d4 GdipSaveImageToFile
0x4ed6d8 GdipCreateTexture
0x4ed6dc GdipAddPathArcI
0x4ed6e0 GdipClosePathFigure
0x4ed6e4 GdipDrawImageRectI
0x4ed6e8 GdipGetPropertyItem
0x4ed6ec GdipGetPropertyItemSize
0x4ed6f0 GdipImageSelectActiveFrame
0x4ed6f4 GdipImageGetFrameCount
0x4ed6f8 GdipImageGetFrameDimensionsList
0x4ed6fc GdipImageGetFrameDimensionsCount
0x4ed700 GdipGetImageHeight
0x4ed704 GdipGetImageWidth
0x4ed708 GdipDrawEllipseI
0x4ed70c GdipCloneImage
0x4ed710 GdipDeletePen
0x4ed714 GdipCreatePen1
0x4ed718 None
0x4ed71c GdipCloneBrush
0x4ed720 GdipDeleteBrush
0x4ed724 GdipCreateSolidFill
0x4ed728 GdipLoadImageFromStream
0x4ed72c GdipDeletePath
0x4ed730 GdipCreatePath
0x4ed734 GdipFillEllipseI
0x4ed738 GdipSetSmoothingMode
0x4ed73c GdipDeleteGraphics
0x4ed740 GdipCreateFromHDC
0x4ed744 GdipDisposeImage
0x4ed748 GdipLoadImageFromStreamICM
urlmon.dll
0x4ed784 URLDownloadToCacheFileA
Secur32.dll
0x4ed4b8 GetUserNameExW
WINMM.dll
0x4ed668 timeGetTime
CRYPT32.dll
0x4ed08c CryptBinaryToStringW
0x4ed090 CryptStringToBinaryW
0x4ed094 CertGetNameStringW
WINTRUST.dll
0x4ed670 WTHelperProvDataFromStateData
0x4ed674 WinVerifyTrust
MSIMG32.dll
0x4ed3f4 GradientFill
0x4ed3f8 AlphaBlend
IMM32.dll
0x4ed13c ImmSetCompositionWindow
0x4ed140 ImmGetContext
0x4ed144 ImmReleaseContext
dbghelp.dll
0x4ed67c MakeSureDirectoryPathExists
EAT(Export Address Table) is none