ScreenShot
Created | 2023.07.04 11:16 | Machine | s1_win7_x6402 |
Filename | Veekmvhuxdctye.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 34 detected (AIDetectMalware, Noon, malicious, high confidence, DownLoader45, Artemis, Save, confidence, Genus, ModiLoader, Eldorado, Attribute, HighConfidence, score, MalwareX, Static AI, Malicious PE, Leonem, Detected, BScope, Formbook, unsafe, Chgt, F0D1C00G323, CLASSIC, susgen) | ||
md5 | 50da9726e918f94a39afacf32db3e5fe | ||
sha256 | 96bde9151480b20318275c2c0e045dc13486a76cf81465e4e02ad97cf37140b0 | ||
ssdeep | 12288:VPRdmMlUOv2nhg+kX0WmSJXkP4xEMlnXkr:VJddU7nS+FJSiPHMlnXk | ||
imphash | 3017302c71a8b0116bc175d1193f72e4 | ||
impfuzzy | 192:f340G1QTbuuArSUvK9RqooqEopCPbOQ0H:f3Q1WAA9LkPbOQE |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | File has been identified by 34 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The executable uses a known packer |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | mzp_file_format | MZP(Delphi) file format | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (7cnts) ?
Suricata ids
ET DROP Dshield Block Listed Source group 1
PE API
IAT(Import Address Table) Library
kernel32.dll
0x4a11a4 DeleteCriticalSection
0x4a11a8 LeaveCriticalSection
0x4a11ac EnterCriticalSection
0x4a11b0 InitializeCriticalSection
0x4a11b4 VirtualFree
0x4a11b8 VirtualAlloc
0x4a11bc LocalFree
0x4a11c0 LocalAlloc
0x4a11c4 GetVersion
0x4a11c8 GetCurrentThreadId
0x4a11cc InterlockedDecrement
0x4a11d0 InterlockedIncrement
0x4a11d4 VirtualQuery
0x4a11d8 WideCharToMultiByte
0x4a11dc MultiByteToWideChar
0x4a11e0 lstrlenA
0x4a11e4 lstrcpynA
0x4a11e8 LoadLibraryExA
0x4a11ec GetThreadLocale
0x4a11f0 GetStartupInfoA
0x4a11f4 GetProcAddress
0x4a11f8 GetModuleHandleA
0x4a11fc GetModuleFileNameA
0x4a1200 GetLocaleInfoA
0x4a1204 GetCommandLineA
0x4a1208 FreeLibrary
0x4a120c FindFirstFileA
0x4a1210 FindClose
0x4a1214 ExitProcess
0x4a1218 WriteFile
0x4a121c UnhandledExceptionFilter
0x4a1220 RtlUnwind
0x4a1224 RaiseException
0x4a1228 GetStdHandle
user32.dll
0x4a1230 GetKeyboardType
0x4a1234 LoadStringA
0x4a1238 MessageBoxA
0x4a123c CharNextA
advapi32.dll
0x4a1244 RegQueryValueExA
0x4a1248 RegOpenKeyExA
0x4a124c RegCloseKey
oleaut32.dll
0x4a1254 SysFreeString
0x4a1258 SysReAllocStringLen
0x4a125c SysAllocStringLen
kernel32.dll
0x4a1264 TlsSetValue
0x4a1268 TlsGetValue
0x4a126c LocalAlloc
0x4a1270 GetModuleHandleA
advapi32.dll
0x4a1278 RegQueryValueExA
0x4a127c RegOpenKeyExA
0x4a1280 RegCloseKey
kernel32.dll
0x4a1288 lstrcpyA
0x4a128c WriteFile
0x4a1290 WaitForSingleObject
0x4a1294 VirtualQuery
0x4a1298 VirtualProtect
0x4a129c VirtualAlloc
0x4a12a0 Sleep
0x4a12a4 SizeofResource
0x4a12a8 SetThreadLocale
0x4a12ac SetFilePointer
0x4a12b0 SetEvent
0x4a12b4 SetErrorMode
0x4a12b8 SetEndOfFile
0x4a12bc ResetEvent
0x4a12c0 ReadFile
0x4a12c4 MultiByteToWideChar
0x4a12c8 MulDiv
0x4a12cc LockResource
0x4a12d0 LoadResource
0x4a12d4 LoadLibraryExA
0x4a12d8 LoadLibraryA
0x4a12dc LeaveCriticalSection
0x4a12e0 InitializeCriticalSection
0x4a12e4 GlobalUnlock
0x4a12e8 GlobalReAlloc
0x4a12ec GlobalHandle
0x4a12f0 GlobalLock
0x4a12f4 GlobalFree
0x4a12f8 GlobalFindAtomA
0x4a12fc GlobalDeleteAtom
0x4a1300 GlobalAlloc
0x4a1304 GlobalAddAtomA
0x4a1308 GetVersionExA
0x4a130c GetVersion
0x4a1310 GetTickCount
0x4a1314 GetThreadLocale
0x4a1318 GetSystemInfo
0x4a131c GetStringTypeExA
0x4a1320 GetStdHandle
0x4a1324 GetProcAddress
0x4a1328 GetModuleHandleA
0x4a132c GetModuleFileNameA
0x4a1330 GetLocaleInfoA
0x4a1334 GetLocalTime
0x4a1338 GetLastError
0x4a133c GetFullPathNameA
0x4a1340 GetDiskFreeSpaceA
0x4a1344 GetDateFormatA
0x4a1348 GetCurrentThreadId
0x4a134c GetCurrentProcessId
0x4a1350 GetCurrentProcess
0x4a1354 GetCPInfo
0x4a1358 GetACP
0x4a135c FreeResource
0x4a1360 InterlockedExchange
0x4a1364 FreeLibrary
0x4a1368 FormatMessageA
0x4a136c FindResourceA
0x4a1370 EnumCalendarInfoA
0x4a1374 EnterCriticalSection
0x4a1378 DeleteCriticalSection
0x4a137c CreateThread
0x4a1380 CreateFileA
0x4a1384 CreateEventA
0x4a1388 CompareStringA
0x4a138c CloseHandle
version.dll
0x4a1394 VerQueryValueA
0x4a1398 GetFileVersionInfoSizeA
0x4a139c GetFileVersionInfoA
gdi32.dll
0x4a13a4 UnrealizeObject
0x4a13a8 StretchBlt
0x4a13ac SetWindowOrgEx
0x4a13b0 SetViewportOrgEx
0x4a13b4 SetTextColor
0x4a13b8 SetStretchBltMode
0x4a13bc SetROP2
0x4a13c0 SetPixel
0x4a13c4 SetDIBColorTable
0x4a13c8 SetBrushOrgEx
0x4a13cc SetBkMode
0x4a13d0 SetBkColor
0x4a13d4 SelectPalette
0x4a13d8 SelectObject
0x4a13dc SaveDC
0x4a13e0 RestoreDC
0x4a13e4 RectVisible
0x4a13e8 RealizePalette
0x4a13ec PatBlt
0x4a13f0 MoveToEx
0x4a13f4 MaskBlt
0x4a13f8 LineTo
0x4a13fc IntersectClipRect
0x4a1400 GetWindowOrgEx
0x4a1404 GetTextMetricsA
0x4a1408 GetTextExtentPoint32A
0x4a140c GetSystemPaletteEntries
0x4a1410 GetStockObject
0x4a1414 GetPixel
0x4a1418 GetPaletteEntries
0x4a141c GetObjectA
0x4a1420 GetDeviceCaps
0x4a1424 GetDIBits
0x4a1428 GetDIBColorTable
0x4a142c GetDCOrgEx
0x4a1430 GetCurrentPositionEx
0x4a1434 GetClipBox
0x4a1438 GetBrushOrgEx
0x4a143c GetBitmapBits
0x4a1440 ExtTextOutA
0x4a1444 ExcludeClipRect
0x4a1448 DeleteObject
0x4a144c DeleteDC
0x4a1450 CreateSolidBrush
0x4a1454 CreatePenIndirect
0x4a1458 CreatePalette
0x4a145c CreateHalftonePalette
0x4a1460 CreateFontIndirectA
0x4a1464 CreateDIBitmap
0x4a1468 CreateDIBSection
0x4a146c CreateCompatibleDC
0x4a1470 CreateCompatibleBitmap
0x4a1474 CreateBrushIndirect
0x4a1478 CreateBitmap
0x4a147c BitBlt
user32.dll
0x4a1484 CreateWindowExA
0x4a1488 WindowFromPoint
0x4a148c WinHelpA
0x4a1490 WaitMessage
0x4a1494 UpdateWindow
0x4a1498 UnregisterClassA
0x4a149c UnhookWindowsHookEx
0x4a14a0 TranslateMessage
0x4a14a4 TranslateMDISysAccel
0x4a14a8 TrackPopupMenu
0x4a14ac SystemParametersInfoA
0x4a14b0 ShowWindow
0x4a14b4 ShowScrollBar
0x4a14b8 ShowOwnedPopups
0x4a14bc ShowCursor
0x4a14c0 SetWindowsHookExA
0x4a14c4 SetWindowTextA
0x4a14c8 SetWindowPos
0x4a14cc SetWindowPlacement
0x4a14d0 SetWindowLongA
0x4a14d4 SetTimer
0x4a14d8 SetScrollRange
0x4a14dc SetScrollPos
0x4a14e0 SetScrollInfo
0x4a14e4 SetRect
0x4a14e8 SetPropA
0x4a14ec SetParent
0x4a14f0 SetMenuItemInfoA
0x4a14f4 SetMenu
0x4a14f8 SetForegroundWindow
0x4a14fc SetFocus
0x4a1500 SetCursor
0x4a1504 SetClassLongA
0x4a1508 SetCapture
0x4a150c SetActiveWindow
0x4a1510 SendMessageA
0x4a1514 ScrollWindow
0x4a1518 ScreenToClient
0x4a151c RemovePropA
0x4a1520 RemoveMenu
0x4a1524 ReleaseDC
0x4a1528 ReleaseCapture
0x4a152c RegisterWindowMessageA
0x4a1530 RegisterClipboardFormatA
0x4a1534 RegisterClassA
0x4a1538 RedrawWindow
0x4a153c PtInRect
0x4a1540 PostQuitMessage
0x4a1544 PostMessageA
0x4a1548 PeekMessageA
0x4a154c OffsetRect
0x4a1550 OemToCharA
0x4a1554 MessageBoxA
0x4a1558 MapWindowPoints
0x4a155c MapVirtualKeyA
0x4a1560 LoadStringA
0x4a1564 LoadKeyboardLayoutA
0x4a1568 LoadIconA
0x4a156c LoadCursorA
0x4a1570 LoadBitmapA
0x4a1574 KillTimer
0x4a1578 IsZoomed
0x4a157c IsWindowVisible
0x4a1580 IsWindowEnabled
0x4a1584 IsWindow
0x4a1588 IsRectEmpty
0x4a158c IsIconic
0x4a1590 IsDialogMessageA
0x4a1594 IsChild
0x4a1598 InvalidateRect
0x4a159c IntersectRect
0x4a15a0 InsertMenuItemA
0x4a15a4 InsertMenuA
0x4a15a8 InflateRect
0x4a15ac GetWindowThreadProcessId
0x4a15b0 GetWindowTextA
0x4a15b4 GetWindowRect
0x4a15b8 GetWindowPlacement
0x4a15bc GetWindowLongA
0x4a15c0 GetWindowDC
0x4a15c4 GetTopWindow
0x4a15c8 GetSystemMetrics
0x4a15cc GetSystemMenu
0x4a15d0 GetSysColorBrush
0x4a15d4 GetSysColor
0x4a15d8 GetSubMenu
0x4a15dc GetScrollRange
0x4a15e0 GetScrollPos
0x4a15e4 GetScrollInfo
0x4a15e8 GetPropA
0x4a15ec GetParent
0x4a15f0 GetWindow
0x4a15f4 GetMenuStringA
0x4a15f8 GetMenuState
0x4a15fc GetMenuItemInfoA
0x4a1600 GetMenuItemID
0x4a1604 GetMenuItemCount
0x4a1608 GetMenu
0x4a160c GetLastActivePopup
0x4a1610 GetKeyboardState
0x4a1614 GetKeyboardLayoutList
0x4a1618 GetKeyboardLayout
0x4a161c GetKeyState
0x4a1620 GetKeyNameTextA
0x4a1624 GetIconInfo
0x4a1628 GetForegroundWindow
0x4a162c GetFocus
0x4a1630 GetDesktopWindow
0x4a1634 GetDCEx
0x4a1638 GetDC
0x4a163c GetCursorPos
0x4a1640 GetCursor
0x4a1644 GetClientRect
0x4a1648 GetClassNameA
0x4a164c GetClassInfoA
0x4a1650 GetCapture
0x4a1654 GetActiveWindow
0x4a1658 FrameRect
0x4a165c FindWindowA
0x4a1660 FillRect
0x4a1664 EqualRect
0x4a1668 EnumWindows
0x4a166c EnumThreadWindows
0x4a1670 EndPaint
0x4a1674 EnableWindow
0x4a1678 EnableScrollBar
0x4a167c EnableMenuItem
0x4a1680 DrawTextA
0x4a1684 DrawMenuBar
0x4a1688 DrawIconEx
0x4a168c DrawIcon
0x4a1690 DrawFrameControl
0x4a1694 DrawFocusRect
0x4a1698 DrawEdge
0x4a169c DispatchMessageA
0x4a16a0 DestroyWindow
0x4a16a4 DestroyMenu
0x4a16a8 DestroyIcon
0x4a16ac DestroyCursor
0x4a16b0 DeleteMenu
0x4a16b4 DefWindowProcA
0x4a16b8 DefMDIChildProcA
0x4a16bc DefFrameProcA
0x4a16c0 CreatePopupMenu
0x4a16c4 CreateMenu
0x4a16c8 CreateIcon
0x4a16cc ClientToScreen
0x4a16d0 CheckMenuItem
0x4a16d4 CallWindowProcA
0x4a16d8 CallNextHookEx
0x4a16dc BeginPaint
0x4a16e0 CharNextA
0x4a16e4 CharLowerA
0x4a16e8 CharUpperBuffA
0x4a16ec CharToOemA
0x4a16f0 AdjustWindowRectEx
0x4a16f4 ActivateKeyboardLayout
kernel32.dll
0x4a16fc Sleep
oleaut32.dll
0x4a1704 SafeArrayPtrOfIndex
0x4a1708 SafeArrayPutElement
0x4a170c SafeArrayGetElement
0x4a1710 SafeArrayUnaccessData
0x4a1714 SafeArrayAccessData
0x4a1718 SafeArrayGetUBound
0x4a171c SafeArrayGetLBound
0x4a1720 SafeArrayCreate
0x4a1724 VariantChangeType
0x4a1728 VariantCopyInd
0x4a172c VariantCopy
0x4a1730 VariantClear
0x4a1734 VariantInit
ole32.dll
0x4a173c CoUninitialize
0x4a1740 CoInitialize
oleaut32.dll
0x4a1748 GetErrorInfo
0x4a174c SysFreeString
comctl32.dll
0x4a1754 ImageList_SetIconSize
0x4a1758 ImageList_GetIconSize
0x4a175c ImageList_Write
0x4a1760 ImageList_Read
0x4a1764 ImageList_GetDragImage
0x4a1768 ImageList_DragShowNolock
0x4a176c ImageList_SetDragCursorImage
0x4a1770 ImageList_DragMove
0x4a1774 ImageList_DragLeave
0x4a1778 ImageList_DragEnter
0x4a177c ImageList_EndDrag
0x4a1780 ImageList_BeginDrag
0x4a1784 ImageList_Remove
0x4a1788 ImageList_DrawEx
0x4a178c ImageList_Draw
0x4a1790 ImageList_GetBkColor
0x4a1794 ImageList_SetBkColor
0x4a1798 ImageList_ReplaceIcon
0x4a179c ImageList_Add
0x4a17a0 ImageList_SetImageCount
0x4a17a4 ImageList_GetImageCount
0x4a17a8 ImageList_Destroy
0x4a17ac ImageList_Create
0x4a17b0 InitCommonControls
Kernel32
0x4a17b8 GetProcAddress
ntdll
0x4a17c0 RtlMoveMemory
0x4a17c4 NtProtectVirtualMemory
uRL
0x4a17cc AutodialHookCallback
ntdll
0x4a17d4 NtQueryInformationFile
0x4a17d8 NtOpenFile
0x4a17dc NtClose
0x4a17e0 NtReadFile
ntdll
0x4a17e8 RtlDosPathNameToNtPathName_U
EAT(Export Address Table) is none
kernel32.dll
0x4a11a4 DeleteCriticalSection
0x4a11a8 LeaveCriticalSection
0x4a11ac EnterCriticalSection
0x4a11b0 InitializeCriticalSection
0x4a11b4 VirtualFree
0x4a11b8 VirtualAlloc
0x4a11bc LocalFree
0x4a11c0 LocalAlloc
0x4a11c4 GetVersion
0x4a11c8 GetCurrentThreadId
0x4a11cc InterlockedDecrement
0x4a11d0 InterlockedIncrement
0x4a11d4 VirtualQuery
0x4a11d8 WideCharToMultiByte
0x4a11dc MultiByteToWideChar
0x4a11e0 lstrlenA
0x4a11e4 lstrcpynA
0x4a11e8 LoadLibraryExA
0x4a11ec GetThreadLocale
0x4a11f0 GetStartupInfoA
0x4a11f4 GetProcAddress
0x4a11f8 GetModuleHandleA
0x4a11fc GetModuleFileNameA
0x4a1200 GetLocaleInfoA
0x4a1204 GetCommandLineA
0x4a1208 FreeLibrary
0x4a120c FindFirstFileA
0x4a1210 FindClose
0x4a1214 ExitProcess
0x4a1218 WriteFile
0x4a121c UnhandledExceptionFilter
0x4a1220 RtlUnwind
0x4a1224 RaiseException
0x4a1228 GetStdHandle
user32.dll
0x4a1230 GetKeyboardType
0x4a1234 LoadStringA
0x4a1238 MessageBoxA
0x4a123c CharNextA
advapi32.dll
0x4a1244 RegQueryValueExA
0x4a1248 RegOpenKeyExA
0x4a124c RegCloseKey
oleaut32.dll
0x4a1254 SysFreeString
0x4a1258 SysReAllocStringLen
0x4a125c SysAllocStringLen
kernel32.dll
0x4a1264 TlsSetValue
0x4a1268 TlsGetValue
0x4a126c LocalAlloc
0x4a1270 GetModuleHandleA
advapi32.dll
0x4a1278 RegQueryValueExA
0x4a127c RegOpenKeyExA
0x4a1280 RegCloseKey
kernel32.dll
0x4a1288 lstrcpyA
0x4a128c WriteFile
0x4a1290 WaitForSingleObject
0x4a1294 VirtualQuery
0x4a1298 VirtualProtect
0x4a129c VirtualAlloc
0x4a12a0 Sleep
0x4a12a4 SizeofResource
0x4a12a8 SetThreadLocale
0x4a12ac SetFilePointer
0x4a12b0 SetEvent
0x4a12b4 SetErrorMode
0x4a12b8 SetEndOfFile
0x4a12bc ResetEvent
0x4a12c0 ReadFile
0x4a12c4 MultiByteToWideChar
0x4a12c8 MulDiv
0x4a12cc LockResource
0x4a12d0 LoadResource
0x4a12d4 LoadLibraryExA
0x4a12d8 LoadLibraryA
0x4a12dc LeaveCriticalSection
0x4a12e0 InitializeCriticalSection
0x4a12e4 GlobalUnlock
0x4a12e8 GlobalReAlloc
0x4a12ec GlobalHandle
0x4a12f0 GlobalLock
0x4a12f4 GlobalFree
0x4a12f8 GlobalFindAtomA
0x4a12fc GlobalDeleteAtom
0x4a1300 GlobalAlloc
0x4a1304 GlobalAddAtomA
0x4a1308 GetVersionExA
0x4a130c GetVersion
0x4a1310 GetTickCount
0x4a1314 GetThreadLocale
0x4a1318 GetSystemInfo
0x4a131c GetStringTypeExA
0x4a1320 GetStdHandle
0x4a1324 GetProcAddress
0x4a1328 GetModuleHandleA
0x4a132c GetModuleFileNameA
0x4a1330 GetLocaleInfoA
0x4a1334 GetLocalTime
0x4a1338 GetLastError
0x4a133c GetFullPathNameA
0x4a1340 GetDiskFreeSpaceA
0x4a1344 GetDateFormatA
0x4a1348 GetCurrentThreadId
0x4a134c GetCurrentProcessId
0x4a1350 GetCurrentProcess
0x4a1354 GetCPInfo
0x4a1358 GetACP
0x4a135c FreeResource
0x4a1360 InterlockedExchange
0x4a1364 FreeLibrary
0x4a1368 FormatMessageA
0x4a136c FindResourceA
0x4a1370 EnumCalendarInfoA
0x4a1374 EnterCriticalSection
0x4a1378 DeleteCriticalSection
0x4a137c CreateThread
0x4a1380 CreateFileA
0x4a1384 CreateEventA
0x4a1388 CompareStringA
0x4a138c CloseHandle
version.dll
0x4a1394 VerQueryValueA
0x4a1398 GetFileVersionInfoSizeA
0x4a139c GetFileVersionInfoA
gdi32.dll
0x4a13a4 UnrealizeObject
0x4a13a8 StretchBlt
0x4a13ac SetWindowOrgEx
0x4a13b0 SetViewportOrgEx
0x4a13b4 SetTextColor
0x4a13b8 SetStretchBltMode
0x4a13bc SetROP2
0x4a13c0 SetPixel
0x4a13c4 SetDIBColorTable
0x4a13c8 SetBrushOrgEx
0x4a13cc SetBkMode
0x4a13d0 SetBkColor
0x4a13d4 SelectPalette
0x4a13d8 SelectObject
0x4a13dc SaveDC
0x4a13e0 RestoreDC
0x4a13e4 RectVisible
0x4a13e8 RealizePalette
0x4a13ec PatBlt
0x4a13f0 MoveToEx
0x4a13f4 MaskBlt
0x4a13f8 LineTo
0x4a13fc IntersectClipRect
0x4a1400 GetWindowOrgEx
0x4a1404 GetTextMetricsA
0x4a1408 GetTextExtentPoint32A
0x4a140c GetSystemPaletteEntries
0x4a1410 GetStockObject
0x4a1414 GetPixel
0x4a1418 GetPaletteEntries
0x4a141c GetObjectA
0x4a1420 GetDeviceCaps
0x4a1424 GetDIBits
0x4a1428 GetDIBColorTable
0x4a142c GetDCOrgEx
0x4a1430 GetCurrentPositionEx
0x4a1434 GetClipBox
0x4a1438 GetBrushOrgEx
0x4a143c GetBitmapBits
0x4a1440 ExtTextOutA
0x4a1444 ExcludeClipRect
0x4a1448 DeleteObject
0x4a144c DeleteDC
0x4a1450 CreateSolidBrush
0x4a1454 CreatePenIndirect
0x4a1458 CreatePalette
0x4a145c CreateHalftonePalette
0x4a1460 CreateFontIndirectA
0x4a1464 CreateDIBitmap
0x4a1468 CreateDIBSection
0x4a146c CreateCompatibleDC
0x4a1470 CreateCompatibleBitmap
0x4a1474 CreateBrushIndirect
0x4a1478 CreateBitmap
0x4a147c BitBlt
user32.dll
0x4a1484 CreateWindowExA
0x4a1488 WindowFromPoint
0x4a148c WinHelpA
0x4a1490 WaitMessage
0x4a1494 UpdateWindow
0x4a1498 UnregisterClassA
0x4a149c UnhookWindowsHookEx
0x4a14a0 TranslateMessage
0x4a14a4 TranslateMDISysAccel
0x4a14a8 TrackPopupMenu
0x4a14ac SystemParametersInfoA
0x4a14b0 ShowWindow
0x4a14b4 ShowScrollBar
0x4a14b8 ShowOwnedPopups
0x4a14bc ShowCursor
0x4a14c0 SetWindowsHookExA
0x4a14c4 SetWindowTextA
0x4a14c8 SetWindowPos
0x4a14cc SetWindowPlacement
0x4a14d0 SetWindowLongA
0x4a14d4 SetTimer
0x4a14d8 SetScrollRange
0x4a14dc SetScrollPos
0x4a14e0 SetScrollInfo
0x4a14e4 SetRect
0x4a14e8 SetPropA
0x4a14ec SetParent
0x4a14f0 SetMenuItemInfoA
0x4a14f4 SetMenu
0x4a14f8 SetForegroundWindow
0x4a14fc SetFocus
0x4a1500 SetCursor
0x4a1504 SetClassLongA
0x4a1508 SetCapture
0x4a150c SetActiveWindow
0x4a1510 SendMessageA
0x4a1514 ScrollWindow
0x4a1518 ScreenToClient
0x4a151c RemovePropA
0x4a1520 RemoveMenu
0x4a1524 ReleaseDC
0x4a1528 ReleaseCapture
0x4a152c RegisterWindowMessageA
0x4a1530 RegisterClipboardFormatA
0x4a1534 RegisterClassA
0x4a1538 RedrawWindow
0x4a153c PtInRect
0x4a1540 PostQuitMessage
0x4a1544 PostMessageA
0x4a1548 PeekMessageA
0x4a154c OffsetRect
0x4a1550 OemToCharA
0x4a1554 MessageBoxA
0x4a1558 MapWindowPoints
0x4a155c MapVirtualKeyA
0x4a1560 LoadStringA
0x4a1564 LoadKeyboardLayoutA
0x4a1568 LoadIconA
0x4a156c LoadCursorA
0x4a1570 LoadBitmapA
0x4a1574 KillTimer
0x4a1578 IsZoomed
0x4a157c IsWindowVisible
0x4a1580 IsWindowEnabled
0x4a1584 IsWindow
0x4a1588 IsRectEmpty
0x4a158c IsIconic
0x4a1590 IsDialogMessageA
0x4a1594 IsChild
0x4a1598 InvalidateRect
0x4a159c IntersectRect
0x4a15a0 InsertMenuItemA
0x4a15a4 InsertMenuA
0x4a15a8 InflateRect
0x4a15ac GetWindowThreadProcessId
0x4a15b0 GetWindowTextA
0x4a15b4 GetWindowRect
0x4a15b8 GetWindowPlacement
0x4a15bc GetWindowLongA
0x4a15c0 GetWindowDC
0x4a15c4 GetTopWindow
0x4a15c8 GetSystemMetrics
0x4a15cc GetSystemMenu
0x4a15d0 GetSysColorBrush
0x4a15d4 GetSysColor
0x4a15d8 GetSubMenu
0x4a15dc GetScrollRange
0x4a15e0 GetScrollPos
0x4a15e4 GetScrollInfo
0x4a15e8 GetPropA
0x4a15ec GetParent
0x4a15f0 GetWindow
0x4a15f4 GetMenuStringA
0x4a15f8 GetMenuState
0x4a15fc GetMenuItemInfoA
0x4a1600 GetMenuItemID
0x4a1604 GetMenuItemCount
0x4a1608 GetMenu
0x4a160c GetLastActivePopup
0x4a1610 GetKeyboardState
0x4a1614 GetKeyboardLayoutList
0x4a1618 GetKeyboardLayout
0x4a161c GetKeyState
0x4a1620 GetKeyNameTextA
0x4a1624 GetIconInfo
0x4a1628 GetForegroundWindow
0x4a162c GetFocus
0x4a1630 GetDesktopWindow
0x4a1634 GetDCEx
0x4a1638 GetDC
0x4a163c GetCursorPos
0x4a1640 GetCursor
0x4a1644 GetClientRect
0x4a1648 GetClassNameA
0x4a164c GetClassInfoA
0x4a1650 GetCapture
0x4a1654 GetActiveWindow
0x4a1658 FrameRect
0x4a165c FindWindowA
0x4a1660 FillRect
0x4a1664 EqualRect
0x4a1668 EnumWindows
0x4a166c EnumThreadWindows
0x4a1670 EndPaint
0x4a1674 EnableWindow
0x4a1678 EnableScrollBar
0x4a167c EnableMenuItem
0x4a1680 DrawTextA
0x4a1684 DrawMenuBar
0x4a1688 DrawIconEx
0x4a168c DrawIcon
0x4a1690 DrawFrameControl
0x4a1694 DrawFocusRect
0x4a1698 DrawEdge
0x4a169c DispatchMessageA
0x4a16a0 DestroyWindow
0x4a16a4 DestroyMenu
0x4a16a8 DestroyIcon
0x4a16ac DestroyCursor
0x4a16b0 DeleteMenu
0x4a16b4 DefWindowProcA
0x4a16b8 DefMDIChildProcA
0x4a16bc DefFrameProcA
0x4a16c0 CreatePopupMenu
0x4a16c4 CreateMenu
0x4a16c8 CreateIcon
0x4a16cc ClientToScreen
0x4a16d0 CheckMenuItem
0x4a16d4 CallWindowProcA
0x4a16d8 CallNextHookEx
0x4a16dc BeginPaint
0x4a16e0 CharNextA
0x4a16e4 CharLowerA
0x4a16e8 CharUpperBuffA
0x4a16ec CharToOemA
0x4a16f0 AdjustWindowRectEx
0x4a16f4 ActivateKeyboardLayout
kernel32.dll
0x4a16fc Sleep
oleaut32.dll
0x4a1704 SafeArrayPtrOfIndex
0x4a1708 SafeArrayPutElement
0x4a170c SafeArrayGetElement
0x4a1710 SafeArrayUnaccessData
0x4a1714 SafeArrayAccessData
0x4a1718 SafeArrayGetUBound
0x4a171c SafeArrayGetLBound
0x4a1720 SafeArrayCreate
0x4a1724 VariantChangeType
0x4a1728 VariantCopyInd
0x4a172c VariantCopy
0x4a1730 VariantClear
0x4a1734 VariantInit
ole32.dll
0x4a173c CoUninitialize
0x4a1740 CoInitialize
oleaut32.dll
0x4a1748 GetErrorInfo
0x4a174c SysFreeString
comctl32.dll
0x4a1754 ImageList_SetIconSize
0x4a1758 ImageList_GetIconSize
0x4a175c ImageList_Write
0x4a1760 ImageList_Read
0x4a1764 ImageList_GetDragImage
0x4a1768 ImageList_DragShowNolock
0x4a176c ImageList_SetDragCursorImage
0x4a1770 ImageList_DragMove
0x4a1774 ImageList_DragLeave
0x4a1778 ImageList_DragEnter
0x4a177c ImageList_EndDrag
0x4a1780 ImageList_BeginDrag
0x4a1784 ImageList_Remove
0x4a1788 ImageList_DrawEx
0x4a178c ImageList_Draw
0x4a1790 ImageList_GetBkColor
0x4a1794 ImageList_SetBkColor
0x4a1798 ImageList_ReplaceIcon
0x4a179c ImageList_Add
0x4a17a0 ImageList_SetImageCount
0x4a17a4 ImageList_GetImageCount
0x4a17a8 ImageList_Destroy
0x4a17ac ImageList_Create
0x4a17b0 InitCommonControls
Kernel32
0x4a17b8 GetProcAddress
ntdll
0x4a17c0 RtlMoveMemory
0x4a17c4 NtProtectVirtualMemory
uRL
0x4a17cc AutodialHookCallback
ntdll
0x4a17d4 NtQueryInformationFile
0x4a17d8 NtOpenFile
0x4a17dc NtClose
0x4a17e0 NtReadFile
ntdll
0x4a17e8 RtlDosPathNameToNtPathName_U
EAT(Export Address Table) is none