ScreenShot
Created | 2021.08.07 13:58 | Machine | s1_win7_x6401 |
Filename | vbc.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 39 detected (AIDetect, malware2, malicious, high confidence, DownLoader41, FLJF, GenericRXAA, Unsafe, Save, Remcos, Delf, GQQM, GenKryptik, DPIE, FormBook, score, ai score=100, R06CH0CH621, Static AI, Suspicious PE, susgen, HwUBueAA) | ||
md5 | 442d2d8a7820a1c0c0ba418476d67fb0 | ||
sha256 | be6c146acab77dfb4116c0805a1244c79a5da7393ce8ee582f59ae8c1773e406 | ||
ssdeep | 12288:NlyPhGe3nf8jHmf/3AwhgFn33DdzQwcApa56Q0uGPwNfXA:NAPbaHLwh2nBZ6ouRA | ||
imphash | a09d64195bff556eb90ba4781b170ac7 | ||
impfuzzy | 192:P3Tkk1Q/L/buuArSUvK9Rco1qysmSPOQwF:P3T1qAA9tKPOQS |
Network IP location
Signature (25cnts)
Level | Description |
---|---|
danger | File has been identified by 39 AntiVirus engines on VirusTotal as malicious |
warning | Generates some ICMP traffic |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Creates a thread using CreateRemoteThread in a non-child process indicative of process injection |
watch | Installs itself for autorun at Windows startup |
watch | Manipulates memory of a non-child process indicative of process injection |
watch | Network activity contains more than one unique useragent |
watch | One or more of the buffers contains an embedded PE file |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Sends data using the HTTP POST Method |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Command line console output was observed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The executable uses a known packer |
Rules (38cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Network_Downloader | File Downloader | memory |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
notice | Code_injection | Code injection with CreateRemoteThread in a remote process | memory |
notice | Create_Service | Create a windows service | memory |
notice | Escalate_priviledges | Escalate priviledges | memory |
notice | KeyLogger | Run a KeyLogger | memory |
notice | local_credential_Steal | Steal credential | memory |
notice | Network_DGA | Communication using DGA | memory |
notice | Network_DNS | Communications use DNS | memory |
notice | Network_FTP | Communications over FTP | memory |
notice | Network_HTTP | Communications over HTTP | memory |
notice | Network_P2P_Win | Communications over P2P network | memory |
notice | Network_TCP_Socket | Communications over RAW Socket | memory |
notice | ScreenShot | Take ScreenShot | memory |
notice | Sniff_Audio | Record Audio | memory |
notice | Str_Win32_Http_API | Match Windows Http API call | memory |
notice | Str_Win32_Internet_API | Match Windows Inet API call | memory |
info | anti_dbg | Checks if being debugged | memory |
info | antisb_threatExpert | Anti-Sandbox checks for ThreatExpert | memory |
info | Check_Dlls | (no description) | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerCheck__RemoteAPI | (no description) | memory |
info | DebuggerException__ConsoleCtrl | (no description) | memory |
info | DebuggerException__SetConsoleCtrl | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | win_hook | Affect hook table | memory |
Network (44cnts) ?
Suricata ids
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET MALWARE FormBook CnC Checkin (GET)
ET MALWARE FormBook CnC Checkin (GET)
PE API
IAT(Import Address Table) Library
kernel32.dll
0x49d154 DeleteCriticalSection
0x49d158 LeaveCriticalSection
0x49d15c EnterCriticalSection
0x49d160 InitializeCriticalSection
0x49d164 VirtualFree
0x49d168 VirtualAlloc
0x49d16c LocalFree
0x49d170 LocalAlloc
0x49d174 GetVersion
0x49d178 GetCurrentThreadId
0x49d17c InterlockedDecrement
0x49d180 InterlockedIncrement
0x49d184 VirtualQuery
0x49d188 WideCharToMultiByte
0x49d18c MultiByteToWideChar
0x49d190 lstrlenA
0x49d194 lstrcpynA
0x49d198 LoadLibraryExA
0x49d19c GetThreadLocale
0x49d1a0 GetStartupInfoA
0x49d1a4 GetProcAddress
0x49d1a8 GetModuleHandleA
0x49d1ac GetModuleFileNameA
0x49d1b0 GetLocaleInfoA
0x49d1b4 GetLastError
0x49d1b8 GetCommandLineA
0x49d1bc FreeLibrary
0x49d1c0 FindFirstFileA
0x49d1c4 FindClose
0x49d1c8 ExitProcess
0x49d1cc WriteFile
0x49d1d0 UnhandledExceptionFilter
0x49d1d4 SetFilePointer
0x49d1d8 SetEndOfFile
0x49d1dc RtlUnwind
0x49d1e0 ReadFile
0x49d1e4 RaiseException
0x49d1e8 GetStdHandle
0x49d1ec GetFileSize
user32.dll
0x49d1f4 GetKeyboardType
0x49d1f8 LoadStringA
0x49d1fc MessageBoxA
0x49d200 CharNextA
advapi32.dll
0x49d208 RegQueryValueExA
0x49d20c RegOpenKeyExA
0x49d210 RegCloseKey
oleaut32.dll
0x49d218 SysFreeString
0x49d21c SysReAllocStringLen
0x49d220 SysAllocStringLen
kernel32.dll
0x49d228 TlsSetValue
0x49d22c TlsGetValue
0x49d230 LocalAlloc
0x49d234 GetModuleHandleA
advapi32.dll
0x49d23c RegQueryValueExA
0x49d240 RegOpenKeyExA
0x49d244 RegCloseKey
kernel32.dll
0x49d24c lstrcpyA
0x49d250 lstrcmpiA
0x49d254 lstrcmpA
0x49d258 WriteFile
0x49d25c WaitForSingleObject
0x49d260 VirtualQuery
0x49d264 VirtualProtect
0x49d268 VirtualAlloc
0x49d26c Sleep
0x49d270 SizeofResource
0x49d274 SetThreadLocale
0x49d278 SetFilePointer
0x49d27c SetEvent
0x49d280 SetErrorMode
0x49d284 SetEndOfFile
0x49d288 ResetEvent
0x49d28c ReadFile
0x49d290 MulDiv
0x49d294 LockResource
0x49d298 LoadResource
0x49d29c LoadLibraryA
0x49d2a0 LeaveCriticalSection
0x49d2a4 InitializeCriticalSection
0x49d2a8 GlobalUnlock
0x49d2ac GlobalReAlloc
0x49d2b0 GlobalHandle
0x49d2b4 GlobalLock
0x49d2b8 GlobalFree
0x49d2bc GlobalFindAtomA
0x49d2c0 GlobalDeleteAtom
0x49d2c4 GlobalAlloc
0x49d2c8 GlobalAddAtomA
0x49d2cc GetVersionExA
0x49d2d0 GetVersion
0x49d2d4 GetTickCount
0x49d2d8 GetThreadLocale
0x49d2dc GetSystemInfo
0x49d2e0 GetStringTypeExA
0x49d2e4 GetStdHandle
0x49d2e8 GetProcAddress
0x49d2ec GetModuleHandleA
0x49d2f0 GetModuleFileNameA
0x49d2f4 GetLocaleInfoA
0x49d2f8 GetLocalTime
0x49d2fc GetLastError
0x49d300 GetFullPathNameA
0x49d304 GetDiskFreeSpaceA
0x49d308 GetDateFormatA
0x49d30c GetCurrentThreadId
0x49d310 GetCurrentProcessId
0x49d314 GetCPInfo
0x49d318 GetACP
0x49d31c FreeResource
0x49d320 InterlockedExchange
0x49d324 FreeLibrary
0x49d328 FormatMessageA
0x49d32c FindResourceA
0x49d330 EnumCalendarInfoA
0x49d334 EnterCriticalSection
0x49d338 DeleteCriticalSection
0x49d33c CreateThread
0x49d340 CreateFileA
0x49d344 CreateEventA
0x49d348 CompareStringA
0x49d34c CloseHandle
version.dll
0x49d354 VerQueryValueA
0x49d358 GetFileVersionInfoSizeA
0x49d35c GetFileVersionInfoA
gdi32.dll
0x49d364 UnrealizeObject
0x49d368 StretchBlt
0x49d36c SetWindowOrgEx
0x49d370 SetWinMetaFileBits
0x49d374 SetViewportOrgEx
0x49d378 SetTextColor
0x49d37c SetStretchBltMode
0x49d380 SetROP2
0x49d384 SetPixel
0x49d388 SetEnhMetaFileBits
0x49d38c SetDIBColorTable
0x49d390 SetBrushOrgEx
0x49d394 SetBkMode
0x49d398 SetBkColor
0x49d39c SelectPalette
0x49d3a0 SelectObject
0x49d3a4 SaveDC
0x49d3a8 RestoreDC
0x49d3ac Rectangle
0x49d3b0 RectVisible
0x49d3b4 RealizePalette
0x49d3b8 PlayEnhMetaFile
0x49d3bc PatBlt
0x49d3c0 MoveToEx
0x49d3c4 MaskBlt
0x49d3c8 LineTo
0x49d3cc IntersectClipRect
0x49d3d0 GetWindowOrgEx
0x49d3d4 GetWinMetaFileBits
0x49d3d8 GetTextMetricsA
0x49d3dc GetTextExtentPoint32A
0x49d3e0 GetSystemPaletteEntries
0x49d3e4 GetStockObject
0x49d3e8 GetRgnBox
0x49d3ec GetPixel
0x49d3f0 GetPaletteEntries
0x49d3f4 GetObjectA
0x49d3f8 GetEnhMetaFilePaletteEntries
0x49d3fc GetEnhMetaFileHeader
0x49d400 GetEnhMetaFileBits
0x49d404 GetDeviceCaps
0x49d408 GetDIBits
0x49d40c GetDIBColorTable
0x49d410 GetDCOrgEx
0x49d414 GetCurrentPositionEx
0x49d418 GetClipBox
0x49d41c GetBrushOrgEx
0x49d420 GetBitmapBits
0x49d424 ExtTextOutA
0x49d428 ExcludeClipRect
0x49d42c DeleteObject
0x49d430 DeleteEnhMetaFile
0x49d434 DeleteDC
0x49d438 CreateSolidBrush
0x49d43c CreateRectRgn
0x49d440 CreatePenIndirect
0x49d444 CreatePalette
0x49d448 CreateHalftonePalette
0x49d44c CreateFontIndirectA
0x49d450 CreateDIBitmap
0x49d454 CreateDIBSection
0x49d458 CreateCompatibleDC
0x49d45c CreateCompatibleBitmap
0x49d460 CreateBrushIndirect
0x49d464 CreateBitmap
0x49d468 CopyEnhMetaFileA
0x49d46c CombineRgn
0x49d470 BitBlt
user32.dll
0x49d478 CreateWindowExA
0x49d47c WindowFromPoint
0x49d480 WinHelpA
0x49d484 WaitMessage
0x49d488 UpdateWindow
0x49d48c UnregisterClassA
0x49d490 UnhookWindowsHookEx
0x49d494 TranslateMessage
0x49d498 TranslateMDISysAccel
0x49d49c TrackPopupMenu
0x49d4a0 SystemParametersInfoA
0x49d4a4 ShowWindow
0x49d4a8 ShowScrollBar
0x49d4ac ShowOwnedPopups
0x49d4b0 ShowCursor
0x49d4b4 SetWindowsHookExA
0x49d4b8 SetWindowTextA
0x49d4bc SetWindowPos
0x49d4c0 SetWindowPlacement
0x49d4c4 SetWindowLongA
0x49d4c8 SetTimer
0x49d4cc SetScrollRange
0x49d4d0 SetScrollPos
0x49d4d4 SetScrollInfo
0x49d4d8 SetRect
0x49d4dc SetPropA
0x49d4e0 SetParent
0x49d4e4 SetMenuItemInfoA
0x49d4e8 SetMenu
0x49d4ec SetForegroundWindow
0x49d4f0 SetFocus
0x49d4f4 SetCursor
0x49d4f8 SetClassLongA
0x49d4fc SetCapture
0x49d500 SetActiveWindow
0x49d504 SendMessageA
0x49d508 ScrollWindow
0x49d50c ScreenToClient
0x49d510 RemovePropA
0x49d514 RemoveMenu
0x49d518 ReleaseDC
0x49d51c ReleaseCapture
0x49d520 RegisterWindowMessageA
0x49d524 RegisterClipboardFormatA
0x49d528 RegisterClassA
0x49d52c RedrawWindow
0x49d530 PtInRect
0x49d534 PostQuitMessage
0x49d538 PostMessageA
0x49d53c PeekMessageA
0x49d540 OffsetRect
0x49d544 OemToCharA
0x49d548 MessageBoxA
0x49d54c MapWindowPoints
0x49d550 MapVirtualKeyA
0x49d554 LockWindowUpdate
0x49d558 LoadStringA
0x49d55c LoadKeyboardLayoutA
0x49d560 LoadIconA
0x49d564 LoadCursorA
0x49d568 LoadBitmapA
0x49d56c KillTimer
0x49d570 IsZoomed
0x49d574 IsWindowVisible
0x49d578 IsWindowEnabled
0x49d57c IsWindow
0x49d580 IsRectEmpty
0x49d584 IsIconic
0x49d588 IsDialogMessageA
0x49d58c IsChild
0x49d590 InvalidateRect
0x49d594 IntersectRect
0x49d598 InsertMenuItemA
0x49d59c InsertMenuA
0x49d5a0 InflateRect
0x49d5a4 GetWindowThreadProcessId
0x49d5a8 GetWindowTextA
0x49d5ac GetWindowRect
0x49d5b0 GetWindowPlacement
0x49d5b4 GetWindowLongA
0x49d5b8 GetWindowDC
0x49d5bc GetTopWindow
0x49d5c0 GetSystemMetrics
0x49d5c4 GetSystemMenu
0x49d5c8 GetSysColorBrush
0x49d5cc GetSysColor
0x49d5d0 GetSubMenu
0x49d5d4 GetScrollRange
0x49d5d8 GetScrollPos
0x49d5dc GetScrollInfo
0x49d5e0 GetPropA
0x49d5e4 GetParent
0x49d5e8 GetWindow
0x49d5ec GetMessagePos
0x49d5f0 GetMenuStringA
0x49d5f4 GetMenuState
0x49d5f8 GetMenuItemInfoA
0x49d5fc GetMenuItemID
0x49d600 GetMenuItemCount
0x49d604 GetMenu
0x49d608 GetLastActivePopup
0x49d60c GetKeyboardState
0x49d610 GetKeyboardLayoutList
0x49d614 GetKeyboardLayout
0x49d618 GetKeyState
0x49d61c GetKeyNameTextA
0x49d620 GetIconInfo
0x49d624 GetForegroundWindow
0x49d628 GetFocus
0x49d62c GetDlgItem
0x49d630 GetDesktopWindow
0x49d634 GetDCEx
0x49d638 GetDC
0x49d63c GetCursorPos
0x49d640 GetCursor
0x49d644 GetClipboardData
0x49d648 GetClientRect
0x49d64c GetClassNameA
0x49d650 GetClassInfoA
0x49d654 GetCapture
0x49d658 GetActiveWindow
0x49d65c FrameRect
0x49d660 FindWindowA
0x49d664 FillRect
0x49d668 EqualRect
0x49d66c EnumWindows
0x49d670 EnumThreadWindows
0x49d674 EndPaint
0x49d678 EnableWindow
0x49d67c EnableScrollBar
0x49d680 EnableMenuItem
0x49d684 DrawTextA
0x49d688 DrawMenuBar
0x49d68c DrawIconEx
0x49d690 DrawIcon
0x49d694 DrawFrameControl
0x49d698 DrawEdge
0x49d69c DispatchMessageA
0x49d6a0 DestroyWindow
0x49d6a4 DestroyMenu
0x49d6a8 DestroyIcon
0x49d6ac DestroyCursor
0x49d6b0 DeleteMenu
0x49d6b4 DefWindowProcA
0x49d6b8 DefMDIChildProcA
0x49d6bc DefFrameProcA
0x49d6c0 CreatePopupMenu
0x49d6c4 CreateMenu
0x49d6c8 CreateIcon
0x49d6cc ClientToScreen
0x49d6d0 ChildWindowFromPoint
0x49d6d4 CheckMenuItem
0x49d6d8 CallWindowProcA
0x49d6dc CallNextHookEx
0x49d6e0 BeginPaint
0x49d6e4 CharNextA
0x49d6e8 CharLowerBuffA
0x49d6ec CharLowerA
0x49d6f0 CharToOemA
0x49d6f4 AdjustWindowRectEx
0x49d6f8 ActivateKeyboardLayout
kernel32.dll
0x49d700 Sleep
oleaut32.dll
0x49d708 SafeArrayPtrOfIndex
0x49d70c SafeArrayGetUBound
0x49d710 SafeArrayGetLBound
0x49d714 SafeArrayCreate
0x49d718 VariantChangeType
0x49d71c VariantCopy
0x49d720 VariantClear
0x49d724 VariantInit
ole32.dll
0x49d72c CoTaskMemAlloc
0x49d730 CoCreateInstance
0x49d734 CoUninitialize
0x49d738 CoInitialize
comctl32.dll
0x49d740 ImageList_SetIconSize
0x49d744 ImageList_GetIconSize
0x49d748 ImageList_Write
0x49d74c ImageList_Read
0x49d750 ImageList_GetDragImage
0x49d754 ImageList_DragShowNolock
0x49d758 ImageList_SetDragCursorImage
0x49d75c ImageList_DragMove
0x49d760 ImageList_DragLeave
0x49d764 ImageList_DragEnter
0x49d768 ImageList_EndDrag
0x49d76c ImageList_BeginDrag
0x49d770 ImageList_Remove
0x49d774 ImageList_DrawEx
0x49d778 ImageList_Draw
0x49d77c ImageList_GetBkColor
0x49d780 ImageList_SetBkColor
0x49d784 ImageList_ReplaceIcon
0x49d788 ImageList_Add
0x49d78c ImageList_SetImageCount
0x49d790 ImageList_GetImageCount
0x49d794 ImageList_Destroy
0x49d798 ImageList_Create
0x49d79c InitCommonControls
shell32.dll
0x49d7a4 ShellExecuteA
comdlg32.dll
0x49d7ac GetOpenFileNameA
EAT(Export Address Table) is none
kernel32.dll
0x49d154 DeleteCriticalSection
0x49d158 LeaveCriticalSection
0x49d15c EnterCriticalSection
0x49d160 InitializeCriticalSection
0x49d164 VirtualFree
0x49d168 VirtualAlloc
0x49d16c LocalFree
0x49d170 LocalAlloc
0x49d174 GetVersion
0x49d178 GetCurrentThreadId
0x49d17c InterlockedDecrement
0x49d180 InterlockedIncrement
0x49d184 VirtualQuery
0x49d188 WideCharToMultiByte
0x49d18c MultiByteToWideChar
0x49d190 lstrlenA
0x49d194 lstrcpynA
0x49d198 LoadLibraryExA
0x49d19c GetThreadLocale
0x49d1a0 GetStartupInfoA
0x49d1a4 GetProcAddress
0x49d1a8 GetModuleHandleA
0x49d1ac GetModuleFileNameA
0x49d1b0 GetLocaleInfoA
0x49d1b4 GetLastError
0x49d1b8 GetCommandLineA
0x49d1bc FreeLibrary
0x49d1c0 FindFirstFileA
0x49d1c4 FindClose
0x49d1c8 ExitProcess
0x49d1cc WriteFile
0x49d1d0 UnhandledExceptionFilter
0x49d1d4 SetFilePointer
0x49d1d8 SetEndOfFile
0x49d1dc RtlUnwind
0x49d1e0 ReadFile
0x49d1e4 RaiseException
0x49d1e8 GetStdHandle
0x49d1ec GetFileSize
user32.dll
0x49d1f4 GetKeyboardType
0x49d1f8 LoadStringA
0x49d1fc MessageBoxA
0x49d200 CharNextA
advapi32.dll
0x49d208 RegQueryValueExA
0x49d20c RegOpenKeyExA
0x49d210 RegCloseKey
oleaut32.dll
0x49d218 SysFreeString
0x49d21c SysReAllocStringLen
0x49d220 SysAllocStringLen
kernel32.dll
0x49d228 TlsSetValue
0x49d22c TlsGetValue
0x49d230 LocalAlloc
0x49d234 GetModuleHandleA
advapi32.dll
0x49d23c RegQueryValueExA
0x49d240 RegOpenKeyExA
0x49d244 RegCloseKey
kernel32.dll
0x49d24c lstrcpyA
0x49d250 lstrcmpiA
0x49d254 lstrcmpA
0x49d258 WriteFile
0x49d25c WaitForSingleObject
0x49d260 VirtualQuery
0x49d264 VirtualProtect
0x49d268 VirtualAlloc
0x49d26c Sleep
0x49d270 SizeofResource
0x49d274 SetThreadLocale
0x49d278 SetFilePointer
0x49d27c SetEvent
0x49d280 SetErrorMode
0x49d284 SetEndOfFile
0x49d288 ResetEvent
0x49d28c ReadFile
0x49d290 MulDiv
0x49d294 LockResource
0x49d298 LoadResource
0x49d29c LoadLibraryA
0x49d2a0 LeaveCriticalSection
0x49d2a4 InitializeCriticalSection
0x49d2a8 GlobalUnlock
0x49d2ac GlobalReAlloc
0x49d2b0 GlobalHandle
0x49d2b4 GlobalLock
0x49d2b8 GlobalFree
0x49d2bc GlobalFindAtomA
0x49d2c0 GlobalDeleteAtom
0x49d2c4 GlobalAlloc
0x49d2c8 GlobalAddAtomA
0x49d2cc GetVersionExA
0x49d2d0 GetVersion
0x49d2d4 GetTickCount
0x49d2d8 GetThreadLocale
0x49d2dc GetSystemInfo
0x49d2e0 GetStringTypeExA
0x49d2e4 GetStdHandle
0x49d2e8 GetProcAddress
0x49d2ec GetModuleHandleA
0x49d2f0 GetModuleFileNameA
0x49d2f4 GetLocaleInfoA
0x49d2f8 GetLocalTime
0x49d2fc GetLastError
0x49d300 GetFullPathNameA
0x49d304 GetDiskFreeSpaceA
0x49d308 GetDateFormatA
0x49d30c GetCurrentThreadId
0x49d310 GetCurrentProcessId
0x49d314 GetCPInfo
0x49d318 GetACP
0x49d31c FreeResource
0x49d320 InterlockedExchange
0x49d324 FreeLibrary
0x49d328 FormatMessageA
0x49d32c FindResourceA
0x49d330 EnumCalendarInfoA
0x49d334 EnterCriticalSection
0x49d338 DeleteCriticalSection
0x49d33c CreateThread
0x49d340 CreateFileA
0x49d344 CreateEventA
0x49d348 CompareStringA
0x49d34c CloseHandle
version.dll
0x49d354 VerQueryValueA
0x49d358 GetFileVersionInfoSizeA
0x49d35c GetFileVersionInfoA
gdi32.dll
0x49d364 UnrealizeObject
0x49d368 StretchBlt
0x49d36c SetWindowOrgEx
0x49d370 SetWinMetaFileBits
0x49d374 SetViewportOrgEx
0x49d378 SetTextColor
0x49d37c SetStretchBltMode
0x49d380 SetROP2
0x49d384 SetPixel
0x49d388 SetEnhMetaFileBits
0x49d38c SetDIBColorTable
0x49d390 SetBrushOrgEx
0x49d394 SetBkMode
0x49d398 SetBkColor
0x49d39c SelectPalette
0x49d3a0 SelectObject
0x49d3a4 SaveDC
0x49d3a8 RestoreDC
0x49d3ac Rectangle
0x49d3b0 RectVisible
0x49d3b4 RealizePalette
0x49d3b8 PlayEnhMetaFile
0x49d3bc PatBlt
0x49d3c0 MoveToEx
0x49d3c4 MaskBlt
0x49d3c8 LineTo
0x49d3cc IntersectClipRect
0x49d3d0 GetWindowOrgEx
0x49d3d4 GetWinMetaFileBits
0x49d3d8 GetTextMetricsA
0x49d3dc GetTextExtentPoint32A
0x49d3e0 GetSystemPaletteEntries
0x49d3e4 GetStockObject
0x49d3e8 GetRgnBox
0x49d3ec GetPixel
0x49d3f0 GetPaletteEntries
0x49d3f4 GetObjectA
0x49d3f8 GetEnhMetaFilePaletteEntries
0x49d3fc GetEnhMetaFileHeader
0x49d400 GetEnhMetaFileBits
0x49d404 GetDeviceCaps
0x49d408 GetDIBits
0x49d40c GetDIBColorTable
0x49d410 GetDCOrgEx
0x49d414 GetCurrentPositionEx
0x49d418 GetClipBox
0x49d41c GetBrushOrgEx
0x49d420 GetBitmapBits
0x49d424 ExtTextOutA
0x49d428 ExcludeClipRect
0x49d42c DeleteObject
0x49d430 DeleteEnhMetaFile
0x49d434 DeleteDC
0x49d438 CreateSolidBrush
0x49d43c CreateRectRgn
0x49d440 CreatePenIndirect
0x49d444 CreatePalette
0x49d448 CreateHalftonePalette
0x49d44c CreateFontIndirectA
0x49d450 CreateDIBitmap
0x49d454 CreateDIBSection
0x49d458 CreateCompatibleDC
0x49d45c CreateCompatibleBitmap
0x49d460 CreateBrushIndirect
0x49d464 CreateBitmap
0x49d468 CopyEnhMetaFileA
0x49d46c CombineRgn
0x49d470 BitBlt
user32.dll
0x49d478 CreateWindowExA
0x49d47c WindowFromPoint
0x49d480 WinHelpA
0x49d484 WaitMessage
0x49d488 UpdateWindow
0x49d48c UnregisterClassA
0x49d490 UnhookWindowsHookEx
0x49d494 TranslateMessage
0x49d498 TranslateMDISysAccel
0x49d49c TrackPopupMenu
0x49d4a0 SystemParametersInfoA
0x49d4a4 ShowWindow
0x49d4a8 ShowScrollBar
0x49d4ac ShowOwnedPopups
0x49d4b0 ShowCursor
0x49d4b4 SetWindowsHookExA
0x49d4b8 SetWindowTextA
0x49d4bc SetWindowPos
0x49d4c0 SetWindowPlacement
0x49d4c4 SetWindowLongA
0x49d4c8 SetTimer
0x49d4cc SetScrollRange
0x49d4d0 SetScrollPos
0x49d4d4 SetScrollInfo
0x49d4d8 SetRect
0x49d4dc SetPropA
0x49d4e0 SetParent
0x49d4e4 SetMenuItemInfoA
0x49d4e8 SetMenu
0x49d4ec SetForegroundWindow
0x49d4f0 SetFocus
0x49d4f4 SetCursor
0x49d4f8 SetClassLongA
0x49d4fc SetCapture
0x49d500 SetActiveWindow
0x49d504 SendMessageA
0x49d508 ScrollWindow
0x49d50c ScreenToClient
0x49d510 RemovePropA
0x49d514 RemoveMenu
0x49d518 ReleaseDC
0x49d51c ReleaseCapture
0x49d520 RegisterWindowMessageA
0x49d524 RegisterClipboardFormatA
0x49d528 RegisterClassA
0x49d52c RedrawWindow
0x49d530 PtInRect
0x49d534 PostQuitMessage
0x49d538 PostMessageA
0x49d53c PeekMessageA
0x49d540 OffsetRect
0x49d544 OemToCharA
0x49d548 MessageBoxA
0x49d54c MapWindowPoints
0x49d550 MapVirtualKeyA
0x49d554 LockWindowUpdate
0x49d558 LoadStringA
0x49d55c LoadKeyboardLayoutA
0x49d560 LoadIconA
0x49d564 LoadCursorA
0x49d568 LoadBitmapA
0x49d56c KillTimer
0x49d570 IsZoomed
0x49d574 IsWindowVisible
0x49d578 IsWindowEnabled
0x49d57c IsWindow
0x49d580 IsRectEmpty
0x49d584 IsIconic
0x49d588 IsDialogMessageA
0x49d58c IsChild
0x49d590 InvalidateRect
0x49d594 IntersectRect
0x49d598 InsertMenuItemA
0x49d59c InsertMenuA
0x49d5a0 InflateRect
0x49d5a4 GetWindowThreadProcessId
0x49d5a8 GetWindowTextA
0x49d5ac GetWindowRect
0x49d5b0 GetWindowPlacement
0x49d5b4 GetWindowLongA
0x49d5b8 GetWindowDC
0x49d5bc GetTopWindow
0x49d5c0 GetSystemMetrics
0x49d5c4 GetSystemMenu
0x49d5c8 GetSysColorBrush
0x49d5cc GetSysColor
0x49d5d0 GetSubMenu
0x49d5d4 GetScrollRange
0x49d5d8 GetScrollPos
0x49d5dc GetScrollInfo
0x49d5e0 GetPropA
0x49d5e4 GetParent
0x49d5e8 GetWindow
0x49d5ec GetMessagePos
0x49d5f0 GetMenuStringA
0x49d5f4 GetMenuState
0x49d5f8 GetMenuItemInfoA
0x49d5fc GetMenuItemID
0x49d600 GetMenuItemCount
0x49d604 GetMenu
0x49d608 GetLastActivePopup
0x49d60c GetKeyboardState
0x49d610 GetKeyboardLayoutList
0x49d614 GetKeyboardLayout
0x49d618 GetKeyState
0x49d61c GetKeyNameTextA
0x49d620 GetIconInfo
0x49d624 GetForegroundWindow
0x49d628 GetFocus
0x49d62c GetDlgItem
0x49d630 GetDesktopWindow
0x49d634 GetDCEx
0x49d638 GetDC
0x49d63c GetCursorPos
0x49d640 GetCursor
0x49d644 GetClipboardData
0x49d648 GetClientRect
0x49d64c GetClassNameA
0x49d650 GetClassInfoA
0x49d654 GetCapture
0x49d658 GetActiveWindow
0x49d65c FrameRect
0x49d660 FindWindowA
0x49d664 FillRect
0x49d668 EqualRect
0x49d66c EnumWindows
0x49d670 EnumThreadWindows
0x49d674 EndPaint
0x49d678 EnableWindow
0x49d67c EnableScrollBar
0x49d680 EnableMenuItem
0x49d684 DrawTextA
0x49d688 DrawMenuBar
0x49d68c DrawIconEx
0x49d690 DrawIcon
0x49d694 DrawFrameControl
0x49d698 DrawEdge
0x49d69c DispatchMessageA
0x49d6a0 DestroyWindow
0x49d6a4 DestroyMenu
0x49d6a8 DestroyIcon
0x49d6ac DestroyCursor
0x49d6b0 DeleteMenu
0x49d6b4 DefWindowProcA
0x49d6b8 DefMDIChildProcA
0x49d6bc DefFrameProcA
0x49d6c0 CreatePopupMenu
0x49d6c4 CreateMenu
0x49d6c8 CreateIcon
0x49d6cc ClientToScreen
0x49d6d0 ChildWindowFromPoint
0x49d6d4 CheckMenuItem
0x49d6d8 CallWindowProcA
0x49d6dc CallNextHookEx
0x49d6e0 BeginPaint
0x49d6e4 CharNextA
0x49d6e8 CharLowerBuffA
0x49d6ec CharLowerA
0x49d6f0 CharToOemA
0x49d6f4 AdjustWindowRectEx
0x49d6f8 ActivateKeyboardLayout
kernel32.dll
0x49d700 Sleep
oleaut32.dll
0x49d708 SafeArrayPtrOfIndex
0x49d70c SafeArrayGetUBound
0x49d710 SafeArrayGetLBound
0x49d714 SafeArrayCreate
0x49d718 VariantChangeType
0x49d71c VariantCopy
0x49d720 VariantClear
0x49d724 VariantInit
ole32.dll
0x49d72c CoTaskMemAlloc
0x49d730 CoCreateInstance
0x49d734 CoUninitialize
0x49d738 CoInitialize
comctl32.dll
0x49d740 ImageList_SetIconSize
0x49d744 ImageList_GetIconSize
0x49d748 ImageList_Write
0x49d74c ImageList_Read
0x49d750 ImageList_GetDragImage
0x49d754 ImageList_DragShowNolock
0x49d758 ImageList_SetDragCursorImage
0x49d75c ImageList_DragMove
0x49d760 ImageList_DragLeave
0x49d764 ImageList_DragEnter
0x49d768 ImageList_EndDrag
0x49d76c ImageList_BeginDrag
0x49d770 ImageList_Remove
0x49d774 ImageList_DrawEx
0x49d778 ImageList_Draw
0x49d77c ImageList_GetBkColor
0x49d780 ImageList_SetBkColor
0x49d784 ImageList_ReplaceIcon
0x49d788 ImageList_Add
0x49d78c ImageList_SetImageCount
0x49d790 ImageList_GetImageCount
0x49d794 ImageList_Destroy
0x49d798 ImageList_Create
0x49d79c InitCommonControls
shell32.dll
0x49d7a4 ShellExecuteA
comdlg32.dll
0x49d7ac GetOpenFileNameA
EAT(Export Address Table) is none