ScreenShot
Created | 2022.05.19 11:30 | Machine | s1_win7_x6403 |
Filename | 012ad0ea06b8f77deba8c35e8c0088cd.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 28 detected (Zusy, malicious, high confidence, GenericRXAA, Save, Kryptik, Eldorado, Attribute, HighConfidence, kcloud, Wacatac, ZexaF, tq0@aiw8v6kj, ai score=85, R002H07EI22, Manuscrypt, YzY0OgUU4tA1DWaTEg, DropperX, confidence) | ||
md5 | b9f57465b9327dc74ac5c2516d0e9002 | ||
sha256 | b48b29e2b034fb43b4bcaa32474e267393fcfb75eebff377cca8f7eb717dd412 | ||
ssdeep | 6144:rJ3Pyn8z6ptn5Hq+Kupf8ZPFyNMVlX93KEPf:l3P8Hq+KupfKwoXsEPf | ||
imphash | 60e96e281950875c6520bf758d9fd938 | ||
impfuzzy | 192:HB7rTMDUKCsgsvJj9Ko3BmcncBcE2sPfNOAxP:HhTsCS3caqjfNOAxP |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
warning | File has been identified by 28 AntiVirus engines on VirusTotal as malicious |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Foreign language identified in PE resource |
notice | Performs some HTTP requests |
info | Checks amount of memory in system |
Rules (7cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win32_Trojan_Emotet_1_Zero | Win32 Trojan Emotet | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (6cnts) ?
Suricata ids
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x4330b4 GetFileAttributesA
0x4330b8 GetFileTime
0x4330bc ExitProcess
0x4330c0 HeapFree
0x4330c4 HeapAlloc
0x4330c8 VirtualProtect
0x4330cc VirtualAlloc
0x4330d0 GetSystemInfo
0x4330d4 VirtualQuery
0x4330d8 HeapReAlloc
0x4330dc GetCommandLineA
0x4330e0 GetProcessHeap
0x4330e4 GetStartupInfoA
0x4330e8 RtlUnwind
0x4330ec RaiseException
0x4330f0 HeapSize
0x4330f4 TerminateProcess
0x4330f8 UnhandledExceptionFilter
0x4330fc SetUnhandledExceptionFilter
0x433100 IsDebuggerPresent
0x433104 GetStdHandle
0x433108 HeapDestroy
0x43310c HeapCreate
0x433110 VirtualFree
0x433114 FreeEnvironmentStringsA
0x433118 GetEnvironmentStrings
0x43311c FreeEnvironmentStringsW
0x433120 GetEnvironmentStringsW
0x433124 SetHandleCount
0x433128 GetFileType
0x43312c QueryPerformanceCounter
0x433130 GetSystemTimeAsFileTime
0x433134 GetACP
0x433138 GetStringTypeA
0x43313c GetStringTypeW
0x433140 GetTimeZoneInformation
0x433144 GetConsoleCP
0x433148 GetConsoleMode
0x43314c LCMapStringA
0x433150 LCMapStringW
0x433154 SetStdHandle
0x433158 WriteConsoleA
0x43315c GetConsoleOutputCP
0x433160 WriteConsoleW
0x433164 SetEnvironmentVariableA
0x433168 FileTimeToLocalFileTime
0x43316c GetTickCount
0x433170 SetErrorMode
0x433174 FileTimeToSystemTime
0x433178 GetOEMCP
0x43317c GetCPInfo
0x433180 CreateFileA
0x433184 GetFullPathNameA
0x433188 GetVolumeInformationA
0x43318c FindFirstFileA
0x433190 FindClose
0x433194 GetCurrentProcess
0x433198 DuplicateHandle
0x43319c GetFileSize
0x4331a0 SetEndOfFile
0x4331a4 UnlockFile
0x4331a8 LockFile
0x4331ac FlushFileBuffers
0x4331b0 SetFilePointer
0x4331b4 WriteFile
0x4331b8 ReadFile
0x4331bc GetThreadLocale
0x4331c0 GlobalFlags
0x4331c4 TlsFree
0x4331c8 DeleteCriticalSection
0x4331cc LocalReAlloc
0x4331d0 TlsSetValue
0x4331d4 TlsAlloc
0x4331d8 InitializeCriticalSection
0x4331dc GlobalHandle
0x4331e0 GlobalReAlloc
0x4331e4 EnterCriticalSection
0x4331e8 TlsGetValue
0x4331ec LeaveCriticalSection
0x4331f0 LocalAlloc
0x4331f4 InterlockedIncrement
0x4331f8 GlobalGetAtomNameA
0x4331fc GlobalFindAtomA
0x433200 lstrcmpW
0x433204 GetVersionExA
0x433208 InterlockedDecrement
0x43320c GetModuleFileNameW
0x433210 GetCurrentProcessId
0x433214 GlobalAddAtomA
0x433218 CloseHandle
0x43321c WritePrivateProfileStringA
0x433220 FreeResource
0x433224 GetCurrentThread
0x433228 GetCurrentThreadId
0x43322c ConvertDefaultLocale
0x433230 GetModuleFileNameA
0x433234 EnumResourceLanguagesA
0x433238 GetLocaleInfoA
0x43323c LoadLibraryA
0x433240 lstrcmpA
0x433244 FreeLibrary
0x433248 GlobalDeleteAtom
0x43324c GetModuleHandleA
0x433250 SetLastError
0x433254 GlobalFree
0x433258 GlobalAlloc
0x43325c GlobalLock
0x433260 GlobalUnlock
0x433264 FormatMessageA
0x433268 LocalFree
0x43326c FindResourceA
0x433270 LoadResource
0x433274 LockResource
0x433278 SizeofResource
0x43327c MulDiv
0x433280 GetVersion
0x433284 CompareStringA
0x433288 GetLastError
0x43328c InterlockedExchange
0x433290 CompareStringW
0x433294 WideCharToMultiByte
0x433298 lstrlenA
0x43329c MultiByteToWideChar
0x4332a0 GetModuleHandleW
0x4332a4 Sleep
0x4332a8 GetProcAddress
USER32.dll
0x433318 RegisterClipboardFormatA
0x43331c PostThreadMessageA
0x433320 InvalidateRect
0x433324 SetRect
0x433328 IsRectEmpty
0x43332c CopyAcceleratorTableA
0x433330 CharNextA
0x433334 ReleaseCapture
0x433338 SetCapture
0x43333c LoadCursorA
0x433340 GetSysColorBrush
0x433344 ShowWindow
0x433348 MoveWindow
0x43334c SetWindowTextA
0x433350 IsDialogMessageA
0x433354 RegisterWindowMessageA
0x433358 SendDlgItemMessageA
0x43335c WinHelpA
0x433360 IsChild
0x433364 GetCapture
0x433368 GetClassLongA
0x43336c GetClassNameA
0x433370 SetPropA
0x433374 GetPropA
0x433378 RemovePropA
0x43337c SetFocus
0x433380 GetWindowTextA
0x433384 GetForegroundWindow
0x433388 GetTopWindow
0x43338c GetMessageTime
0x433390 GetMessagePos
0x433394 MapWindowPoints
0x433398 SetForegroundWindow
0x43339c UpdateWindow
0x4333a0 GetMenu
0x4333a4 CreateWindowExA
0x4333a8 GetClassInfoExA
0x4333ac GetClassInfoA
0x4333b0 RegisterClassA
0x4333b4 AdjustWindowRectEx
0x4333b8 EqualRect
0x4333bc CopyRect
0x4333c0 PtInRect
0x4333c4 GetDlgCtrlID
0x4333c8 DefWindowProcA
0x4333cc CallWindowProcA
0x4333d0 SetWindowLongA
0x4333d4 OffsetRect
0x4333d8 IntersectRect
0x4333dc SystemParametersInfoA
0x4333e0 GetWindowPlacement
0x4333e4 GetWindowRect
0x4333e8 GetSysColor
0x4333ec EndPaint
0x4333f0 BeginPaint
0x4333f4 GetWindowDC
0x4333f8 ReleaseDC
0x4333fc GetDC
0x433400 ClientToScreen
0x433404 GrayStringA
0x433408 DrawTextExA
0x43340c DrawTextA
0x433410 TabbedTextOutA
0x433414 UnhookWindowsHookEx
0x433418 GetWindowThreadProcessId
0x43341c GetLastActivePopup
0x433420 wsprintfW
0x433424 LoadIconA
0x433428 IsIconic
0x43342c SendMessageA
0x433430 GetSystemMetrics
0x433434 GetClientRect
0x433438 MessageBoxA
0x43343c SetCursor
0x433440 SetWindowsHookExA
0x433444 CallNextHookEx
0x433448 GetMessageA
0x43344c TranslateMessage
0x433450 DispatchMessageA
0x433454 IsWindowVisible
0x433458 GetKeyState
0x43345c PeekMessageA
0x433460 GetCursorPos
0x433464 ValidateRect
0x433468 DestroyMenu
0x43346c UnregisterClassA
0x433470 SetMenuItemBitmaps
0x433474 GetMenuCheckMarkDimensions
0x433478 MessageBeep
0x43347c GetNextDlgGroupItem
0x433480 InvalidateRgn
0x433484 DrawIcon
0x433488 EnableWindow
0x43348c CharUpperA
0x433490 GetSubMenu
0x433494 GetMenuItemCount
0x433498 GetMenuItemID
0x43349c GetMenuState
0x4334a0 PostMessageA
0x4334a4 PostQuitMessage
0x4334a8 SetWindowPos
0x4334ac MapDialogRect
0x4334b0 GetParent
0x4334b4 SetWindowContextHelpId
0x4334b8 GetWindow
0x4334bc EndDialog
0x4334c0 GetNextDlgTabItem
0x4334c4 IsWindowEnabled
0x4334c8 GetDlgItem
0x4334cc GetWindowLongA
0x4334d0 IsWindow
0x4334d4 DestroyWindow
0x4334d8 CreateDialogIndirectParamA
0x4334dc SetActiveWindow
0x4334e0 GetActiveWindow
0x4334e4 GetDesktopWindow
0x4334e8 CheckMenuItem
0x4334ec EnableMenuItem
0x4334f0 ModifyMenuA
0x4334f4 GetFocus
0x4334f8 LoadBitmapA
GDI32.dll
0x433030 DeleteDC
0x433034 GetStockObject
0x433038 ExtSelectClipRgn
0x43303c GetTextColor
0x433040 CreateRectRgnIndirect
0x433044 GetRgnBox
0x433048 GetMapMode
0x43304c ScaleWindowExtEx
0x433050 SetWindowExtEx
0x433054 ScaleViewportExtEx
0x433058 SetViewportExtEx
0x43305c OffsetViewportOrgEx
0x433060 SetViewportOrgEx
0x433064 GetBkColor
0x433068 GetDeviceCaps
0x43306c Escape
0x433070 ExtTextOutA
0x433074 TextOutA
0x433078 RectVisible
0x43307c PtVisible
0x433080 GetWindowExtEx
0x433084 GetViewportExtEx
0x433088 GetObjectA
0x43308c DeleteObject
0x433090 GetClipBox
0x433094 SetMapMode
0x433098 SetTextColor
0x43309c SetBkColor
0x4330a0 RestoreDC
0x4330a4 SaveDC
0x4330a8 CreateBitmap
0x4330ac SelectObject
comdlg32.dll
0x433510 GetFileTitleA
WINSPOOL.DRV
0x433500 DocumentPropertiesA
0x433504 OpenPrinterA
0x433508 ClosePrinter
ADVAPI32.dll
0x433000 RegSetValueExA
0x433004 RegQueryValueA
0x433008 RegEnumKeyA
0x43300c RegDeleteKeyA
0x433010 RegCloseKey
0x433014 RegCreateKeyExA
0x433018 RegOpenKeyExA
0x43301c RegQueryValueExA
0x433020 RegOpenKeyA
COMCTL32.dll
0x433028 InitCommonControlsEx
SHLWAPI.dll
0x433304 PathFindFileNameA
0x433308 PathStripToRootA
0x43330c PathFindExtensionA
0x433310 PathIsUNCA
oledlg.dll
0x43355c None
ole32.dll
0x433518 OleInitialize
0x43351c CoFreeUnusedLibraries
0x433520 OleUninitialize
0x433524 CreateILockBytesOnHGlobal
0x433528 StgCreateDocfileOnILockBytes
0x43352c StgOpenStorageOnILockBytes
0x433530 CoGetClassObject
0x433534 CLSIDFromString
0x433538 CoRevokeClassObject
0x43353c CoTaskMemAlloc
0x433540 CoTaskMemFree
0x433544 CoInitializeSecurity
0x433548 OleIsCurrentClipboard
0x43354c OleFlushClipboard
0x433550 CoRegisterMessageFilter
0x433554 CLSIDFromProgID
OLEAUT32.dll
0x4332b0 SysAllocStringByteLen
0x4332b4 SysStringByteLen
0x4332b8 SysFreeString
0x4332bc VariantInit
0x4332c0 VariantCopy
0x4332c4 VariantClear
0x4332c8 SysAllocStringLen
0x4332cc SafeArrayGetDim
0x4332d0 SafeArrayGetLBound
0x4332d4 SafeArrayGetUBound
0x4332d8 SafeArrayAccessData
0x4332dc SafeArrayUnaccessData
0x4332e0 VariantChangeType
0x4332e4 SysStringLen
0x4332e8 OleCreateFontIndirect
0x4332ec VariantTimeToSystemTime
0x4332f0 SystemTimeToVariantTime
0x4332f4 SafeArrayDestroy
0x4332f8 GetErrorInfo
0x4332fc SysAllocString
EAT(Export Address Table) is none
KERNEL32.dll
0x4330b4 GetFileAttributesA
0x4330b8 GetFileTime
0x4330bc ExitProcess
0x4330c0 HeapFree
0x4330c4 HeapAlloc
0x4330c8 VirtualProtect
0x4330cc VirtualAlloc
0x4330d0 GetSystemInfo
0x4330d4 VirtualQuery
0x4330d8 HeapReAlloc
0x4330dc GetCommandLineA
0x4330e0 GetProcessHeap
0x4330e4 GetStartupInfoA
0x4330e8 RtlUnwind
0x4330ec RaiseException
0x4330f0 HeapSize
0x4330f4 TerminateProcess
0x4330f8 UnhandledExceptionFilter
0x4330fc SetUnhandledExceptionFilter
0x433100 IsDebuggerPresent
0x433104 GetStdHandle
0x433108 HeapDestroy
0x43310c HeapCreate
0x433110 VirtualFree
0x433114 FreeEnvironmentStringsA
0x433118 GetEnvironmentStrings
0x43311c FreeEnvironmentStringsW
0x433120 GetEnvironmentStringsW
0x433124 SetHandleCount
0x433128 GetFileType
0x43312c QueryPerformanceCounter
0x433130 GetSystemTimeAsFileTime
0x433134 GetACP
0x433138 GetStringTypeA
0x43313c GetStringTypeW
0x433140 GetTimeZoneInformation
0x433144 GetConsoleCP
0x433148 GetConsoleMode
0x43314c LCMapStringA
0x433150 LCMapStringW
0x433154 SetStdHandle
0x433158 WriteConsoleA
0x43315c GetConsoleOutputCP
0x433160 WriteConsoleW
0x433164 SetEnvironmentVariableA
0x433168 FileTimeToLocalFileTime
0x43316c GetTickCount
0x433170 SetErrorMode
0x433174 FileTimeToSystemTime
0x433178 GetOEMCP
0x43317c GetCPInfo
0x433180 CreateFileA
0x433184 GetFullPathNameA
0x433188 GetVolumeInformationA
0x43318c FindFirstFileA
0x433190 FindClose
0x433194 GetCurrentProcess
0x433198 DuplicateHandle
0x43319c GetFileSize
0x4331a0 SetEndOfFile
0x4331a4 UnlockFile
0x4331a8 LockFile
0x4331ac FlushFileBuffers
0x4331b0 SetFilePointer
0x4331b4 WriteFile
0x4331b8 ReadFile
0x4331bc GetThreadLocale
0x4331c0 GlobalFlags
0x4331c4 TlsFree
0x4331c8 DeleteCriticalSection
0x4331cc LocalReAlloc
0x4331d0 TlsSetValue
0x4331d4 TlsAlloc
0x4331d8 InitializeCriticalSection
0x4331dc GlobalHandle
0x4331e0 GlobalReAlloc
0x4331e4 EnterCriticalSection
0x4331e8 TlsGetValue
0x4331ec LeaveCriticalSection
0x4331f0 LocalAlloc
0x4331f4 InterlockedIncrement
0x4331f8 GlobalGetAtomNameA
0x4331fc GlobalFindAtomA
0x433200 lstrcmpW
0x433204 GetVersionExA
0x433208 InterlockedDecrement
0x43320c GetModuleFileNameW
0x433210 GetCurrentProcessId
0x433214 GlobalAddAtomA
0x433218 CloseHandle
0x43321c WritePrivateProfileStringA
0x433220 FreeResource
0x433224 GetCurrentThread
0x433228 GetCurrentThreadId
0x43322c ConvertDefaultLocale
0x433230 GetModuleFileNameA
0x433234 EnumResourceLanguagesA
0x433238 GetLocaleInfoA
0x43323c LoadLibraryA
0x433240 lstrcmpA
0x433244 FreeLibrary
0x433248 GlobalDeleteAtom
0x43324c GetModuleHandleA
0x433250 SetLastError
0x433254 GlobalFree
0x433258 GlobalAlloc
0x43325c GlobalLock
0x433260 GlobalUnlock
0x433264 FormatMessageA
0x433268 LocalFree
0x43326c FindResourceA
0x433270 LoadResource
0x433274 LockResource
0x433278 SizeofResource
0x43327c MulDiv
0x433280 GetVersion
0x433284 CompareStringA
0x433288 GetLastError
0x43328c InterlockedExchange
0x433290 CompareStringW
0x433294 WideCharToMultiByte
0x433298 lstrlenA
0x43329c MultiByteToWideChar
0x4332a0 GetModuleHandleW
0x4332a4 Sleep
0x4332a8 GetProcAddress
USER32.dll
0x433318 RegisterClipboardFormatA
0x43331c PostThreadMessageA
0x433320 InvalidateRect
0x433324 SetRect
0x433328 IsRectEmpty
0x43332c CopyAcceleratorTableA
0x433330 CharNextA
0x433334 ReleaseCapture
0x433338 SetCapture
0x43333c LoadCursorA
0x433340 GetSysColorBrush
0x433344 ShowWindow
0x433348 MoveWindow
0x43334c SetWindowTextA
0x433350 IsDialogMessageA
0x433354 RegisterWindowMessageA
0x433358 SendDlgItemMessageA
0x43335c WinHelpA
0x433360 IsChild
0x433364 GetCapture
0x433368 GetClassLongA
0x43336c GetClassNameA
0x433370 SetPropA
0x433374 GetPropA
0x433378 RemovePropA
0x43337c SetFocus
0x433380 GetWindowTextA
0x433384 GetForegroundWindow
0x433388 GetTopWindow
0x43338c GetMessageTime
0x433390 GetMessagePos
0x433394 MapWindowPoints
0x433398 SetForegroundWindow
0x43339c UpdateWindow
0x4333a0 GetMenu
0x4333a4 CreateWindowExA
0x4333a8 GetClassInfoExA
0x4333ac GetClassInfoA
0x4333b0 RegisterClassA
0x4333b4 AdjustWindowRectEx
0x4333b8 EqualRect
0x4333bc CopyRect
0x4333c0 PtInRect
0x4333c4 GetDlgCtrlID
0x4333c8 DefWindowProcA
0x4333cc CallWindowProcA
0x4333d0 SetWindowLongA
0x4333d4 OffsetRect
0x4333d8 IntersectRect
0x4333dc SystemParametersInfoA
0x4333e0 GetWindowPlacement
0x4333e4 GetWindowRect
0x4333e8 GetSysColor
0x4333ec EndPaint
0x4333f0 BeginPaint
0x4333f4 GetWindowDC
0x4333f8 ReleaseDC
0x4333fc GetDC
0x433400 ClientToScreen
0x433404 GrayStringA
0x433408 DrawTextExA
0x43340c DrawTextA
0x433410 TabbedTextOutA
0x433414 UnhookWindowsHookEx
0x433418 GetWindowThreadProcessId
0x43341c GetLastActivePopup
0x433420 wsprintfW
0x433424 LoadIconA
0x433428 IsIconic
0x43342c SendMessageA
0x433430 GetSystemMetrics
0x433434 GetClientRect
0x433438 MessageBoxA
0x43343c SetCursor
0x433440 SetWindowsHookExA
0x433444 CallNextHookEx
0x433448 GetMessageA
0x43344c TranslateMessage
0x433450 DispatchMessageA
0x433454 IsWindowVisible
0x433458 GetKeyState
0x43345c PeekMessageA
0x433460 GetCursorPos
0x433464 ValidateRect
0x433468 DestroyMenu
0x43346c UnregisterClassA
0x433470 SetMenuItemBitmaps
0x433474 GetMenuCheckMarkDimensions
0x433478 MessageBeep
0x43347c GetNextDlgGroupItem
0x433480 InvalidateRgn
0x433484 DrawIcon
0x433488 EnableWindow
0x43348c CharUpperA
0x433490 GetSubMenu
0x433494 GetMenuItemCount
0x433498 GetMenuItemID
0x43349c GetMenuState
0x4334a0 PostMessageA
0x4334a4 PostQuitMessage
0x4334a8 SetWindowPos
0x4334ac MapDialogRect
0x4334b0 GetParent
0x4334b4 SetWindowContextHelpId
0x4334b8 GetWindow
0x4334bc EndDialog
0x4334c0 GetNextDlgTabItem
0x4334c4 IsWindowEnabled
0x4334c8 GetDlgItem
0x4334cc GetWindowLongA
0x4334d0 IsWindow
0x4334d4 DestroyWindow
0x4334d8 CreateDialogIndirectParamA
0x4334dc SetActiveWindow
0x4334e0 GetActiveWindow
0x4334e4 GetDesktopWindow
0x4334e8 CheckMenuItem
0x4334ec EnableMenuItem
0x4334f0 ModifyMenuA
0x4334f4 GetFocus
0x4334f8 LoadBitmapA
GDI32.dll
0x433030 DeleteDC
0x433034 GetStockObject
0x433038 ExtSelectClipRgn
0x43303c GetTextColor
0x433040 CreateRectRgnIndirect
0x433044 GetRgnBox
0x433048 GetMapMode
0x43304c ScaleWindowExtEx
0x433050 SetWindowExtEx
0x433054 ScaleViewportExtEx
0x433058 SetViewportExtEx
0x43305c OffsetViewportOrgEx
0x433060 SetViewportOrgEx
0x433064 GetBkColor
0x433068 GetDeviceCaps
0x43306c Escape
0x433070 ExtTextOutA
0x433074 TextOutA
0x433078 RectVisible
0x43307c PtVisible
0x433080 GetWindowExtEx
0x433084 GetViewportExtEx
0x433088 GetObjectA
0x43308c DeleteObject
0x433090 GetClipBox
0x433094 SetMapMode
0x433098 SetTextColor
0x43309c SetBkColor
0x4330a0 RestoreDC
0x4330a4 SaveDC
0x4330a8 CreateBitmap
0x4330ac SelectObject
comdlg32.dll
0x433510 GetFileTitleA
WINSPOOL.DRV
0x433500 DocumentPropertiesA
0x433504 OpenPrinterA
0x433508 ClosePrinter
ADVAPI32.dll
0x433000 RegSetValueExA
0x433004 RegQueryValueA
0x433008 RegEnumKeyA
0x43300c RegDeleteKeyA
0x433010 RegCloseKey
0x433014 RegCreateKeyExA
0x433018 RegOpenKeyExA
0x43301c RegQueryValueExA
0x433020 RegOpenKeyA
COMCTL32.dll
0x433028 InitCommonControlsEx
SHLWAPI.dll
0x433304 PathFindFileNameA
0x433308 PathStripToRootA
0x43330c PathFindExtensionA
0x433310 PathIsUNCA
oledlg.dll
0x43355c None
ole32.dll
0x433518 OleInitialize
0x43351c CoFreeUnusedLibraries
0x433520 OleUninitialize
0x433524 CreateILockBytesOnHGlobal
0x433528 StgCreateDocfileOnILockBytes
0x43352c StgOpenStorageOnILockBytes
0x433530 CoGetClassObject
0x433534 CLSIDFromString
0x433538 CoRevokeClassObject
0x43353c CoTaskMemAlloc
0x433540 CoTaskMemFree
0x433544 CoInitializeSecurity
0x433548 OleIsCurrentClipboard
0x43354c OleFlushClipboard
0x433550 CoRegisterMessageFilter
0x433554 CLSIDFromProgID
OLEAUT32.dll
0x4332b0 SysAllocStringByteLen
0x4332b4 SysStringByteLen
0x4332b8 SysFreeString
0x4332bc VariantInit
0x4332c0 VariantCopy
0x4332c4 VariantClear
0x4332c8 SysAllocStringLen
0x4332cc SafeArrayGetDim
0x4332d0 SafeArrayGetLBound
0x4332d4 SafeArrayGetUBound
0x4332d8 SafeArrayAccessData
0x4332dc SafeArrayUnaccessData
0x4332e0 VariantChangeType
0x4332e4 SysStringLen
0x4332e8 OleCreateFontIndirect
0x4332ec VariantTimeToSystemTime
0x4332f0 SystemTimeToVariantTime
0x4332f4 SafeArrayDestroy
0x4332f8 GetErrorInfo
0x4332fc SysAllocString
EAT(Export Address Table) is none