Cryptam


Recent document malware detections. This list is delayed by 5 days.

MD5filenamesizeseverityhas_exekey_lenrol
fabd072f3f0e904c126ec38e294451f9 view report nsoftware.IPWorksSNMPWeb.vsix 540781 72 X 0 0
embedded.file nsoftware.IPWorksSNMPWeb.dll 6314a53dc5cb4064d1c18bbe4c02f9b3
nsoftware.IPWorksSNMPWeb.dll.1071595: suspicious.office encrypted document
nsoftware.IPWorksSNMPWeb.dll.78: string.This program cannot be run in DOS mode
nsoftware.IPWorksSNMPWeb.dll.913386: string.CloseHandle
embedded.file nsoftware.IPWorksSNMP.System.dll 047798f030a81dda1cbaebb21b42edba
nsoftware.IPWorksSNMP.System.dll.78: string.This program cannot be run in DOS mode
nsoftware.IPWorksSNMP.System.dll.119796: string.GetProcAddress
nsoftware.IPWorksSNMP.System.dll.119546: string.CloseHandle
nsoftware.IPWorksSNMP.System.dll.114876: string.user32.dll
nsoftware.IPWorksSNMP.System.dll.114617: string./usr/lib/libSystem
d1629f7e52100bfccee2610b6f45c496 view report nsoftware.IPWorksWSWeb.vsix 527152 72 X 0 0
embedded.file nsoftware.IPWorksWS.System.dll b0a78e3709b3a0605162dd0e3834f98f
nsoftware.IPWorksWS.System.dll.78: string.This program cannot be run in DOS mode
nsoftware.IPWorksWS.System.dll.120287: string.GetProcAddress
nsoftware.IPWorksWS.System.dll.120032: string.CloseHandle
nsoftware.IPWorksWS.System.dll.115356: string.user32.dll
nsoftware.IPWorksWS.System.dll.115097: string./usr/lib/libSystem
embedded.file nsoftware.IPWorksWSWeb.dll 4830b9264b157c2371842a5828c30e1a
nsoftware.IPWorksWSWeb.dll.1020719: suspicious.office encrypted document
nsoftware.IPWorksWSWeb.dll.78: string.This program cannot be run in DOS mode
nsoftware.IPWorksWSWeb.dll.834567: string.CloseHandle
82eac0d0fc1a12ed3d7402820d232df0 view report photoalbum.zip 507734 130 X 0 0
embedded.file PhotoAlbum.uwbx 66e5bb4758df23a14b52d5ff7e7538ee
PhotoAlbum.uwbx.78: string.This program cannot be run in DOS mode
PhotoAlbum.uwbx.341956: string.LoadLibraryA
PhotoAlbum.uwbx.341090: string.GetSystemMetrics
PhotoAlbum.uwbx.340666: string.GetProcAddress
PhotoAlbum.uwbx.340620: string.EnterCriticalSection
PhotoAlbum.uwbx.340926: string.KERNEL32
embedded.file PhotoAlbum.wbx 9563f9f851017b2504b2fa22ba5870a9
PhotoAlbum.wbx.78: string.This program cannot be run in DOS mode
PhotoAlbum.wbx.335536: string.LoadLibraryA
PhotoAlbum.wbx.335988: string.GetSystemMetrics
PhotoAlbum.wbx.335610: string.GetProcAddress
PhotoAlbum.wbx.336674: string.URLDownloadToFileA
PhotoAlbum.wbx.335552: string.EnterCriticalSection
PhotoAlbum.wbx.335824: string.KERNEL32
Yara:
gh0st gh0st
5fd6ae0e2bbc5c7c5b1c5b722f76c3a2 view report GameServer_NPK.zip 3547390 1612 X 0 0
embedded.file sock.fne a21ba3b7a85985a7f64186a27f8f85de
sock.fne.78: string.This program cannot be run in DOS mode
sock.fne.31436: string.LoadLibraryA
sock.fne.30856: string.GetModuleHandleA
sock.fne.30824: string.GetCommandLineA
sock.fne.31418: string.GetProcAddress
sock.fne.30738: string.EnterCriticalSection
sock.fne.30898: string.GetEnvironmentVariableA
sock.fne.29896: string.user32.dll
sock.fne.30784: string.KERNEL32
sock.fne.31012: string.ExitProcess
embedded.file GameServer_NPK.exe a44f18e0b20c582b0a81448197012562
GameServer_NPK.exe.78: string.This program cannot be run in DOS mode
GameServer_NPK.exe.2886084: string.LoadLibraryA
GameServer_NPK.exe.2886496: string.GetModuleHandleA
GameServer_NPK.exe.2887250: string.GetCommandLineA
GameServer_NPK.exe.2791920: string.GetSystemMetrics
GameServer_NPK.exe.2886066: string.GetProcAddress
GameServer_NPK.exe.2885244: string.EnterCriticalSection
GameServer_NPK.exe.2887384: string.GetEnvironmentVariableA
GameServer_NPK.exe.2885300: string.CloseHandle
GameServer_NPK.exe.2885782: string.CreateFileA
GameServer_NPK.exe.2891596: string.RegOpenKeyExA
GameServer_NPK.exe.2891668: string.RegDeleteKeyA
GameServer_NPK.exe.2798628: string.user32.dll
GameServer_NPK.exe.2795292: string.KERNEL32
GameServer_NPK.exe.2887268: string.ExitProcess
GameServer_NPK.exe.2888336: string.GetMessageA
GameServer_NPK.exe.2888458: string.CreateWindowExA
embedded.file krnln.fnr 77dd2f3804a2eaf3331f25ee74ad16e6
krnln.fnr.78: string.This program cannot be run in DOS mode
krnln.fnr.899756: string.LoadLibraryA
krnln.fnr.900258: string.GetModuleHandleA
krnln.fnr.900342: string.GetCommandLineA
krnln.fnr.828800: string.GetSystemMetrics
krnln.fnr.899738: string.GetProcAddress
krnln.fnr.900324: string.CreateProcessA
krnln.fnr.901362: string.EnterCriticalSection
krnln.fnr.902010: string.GetEnvironmentVariableA
krnln.fnr.899696: string.CloseHandle
krnln.fnr.899710: string.CreateFileA
krnln.fnr.931916: string.Advapi32.dll
krnln.fnr.906982: string.RegOpenKeyExA
krnln.fnr.907070: string.RegDeleteKeyA
krnln.fnr.841112: string.user32.dll
krnln.fnr.839628: string.KERNEL32
krnln.fnr.900020: string.ExitProcess
krnln.fnr.904066: string.GetMessageA
krnln.fnr.904560: string.CreateWindowExA
embedded.file mumsg.dll 536cb9f2bd31bb423c80fbd73164aaf6
mumsg.dll.78: string.This program cannot be run in DOS mode
mumsg.dll.31446: string.LoadLibraryA
mumsg.dll.31180: string.GetModuleHandleA
mumsg.dll.30628: string.GetCommandLineA
mumsg.dll.31428: string.GetProcAddress
mumsg.dll.30660: string.EnterCriticalSection
mumsg.dll.31200: string.GetEnvironmentVariableA
mumsg.dll.30748: string.CloseHandle
mumsg.dll.31380: string.CreateFileA
mumsg.dll.29856: string.user32.dll
mumsg.dll.31614: string.KERNEL32
mumsg.dll.30802: string.ExitProcess
embedded.file KGGsSet.ini 9afe442dabf1a09631d92207da11ca1c
embedded.file EThread.fne adf4d67f76a0a80e6febe24e33a7ade2
EThread.fne.78: string.This program cannot be run in DOS mode
EThread.fne.61394: string.LoadLibraryA
EThread.fne.61044: string.GetModuleHandleA
EThread.fne.60662: string.GetCommandLineA
EThread.fne.61026: string.GetProcAddress
EThread.fne.60384: string.EnterCriticalSection
EThread.fne.60326: string.CloseHandle
EThread.fne.56484: string.user32.dll
EThread.fne.55588: string.KERNEL32
EThread.fne.60708: string.ExitProcess
embedded.file WzAG.dll f42edc287ad7060a0da78be18ea8d292
WzAG.dll.78: string.This program cannot be run in DOS mode
WzAG.dll.109160: string.LoadLibraryA
WzAG.dll.109542: string.GetModuleHandleA
WzAG.dll.109584: string.GetCommandLineA
WzAG.dll.109142: string.GetProcAddress
WzAG.dll.109844: string.EnterCriticalSection
WzAG.dll.110016: string.CloseHandle
WzAG.dll.110546: string.CreateFileA
WzAG.dll.98148: string.KERNEL32
WzAG.dll.98303: string.ExitProcess
embedded.file ggauth.dll 2b87096d4de154567f486bfe7cb25602
ggauth.dll.78: string.This program cannot be run in DOS mode
ggauth.dll.56018: string.LoadLibraryA
ggauth.dll.55720: string.GetModuleHandleA
ggauth.dll.55294: string.GetCommandLineA
ggauth.dll.56000: string.GetProcAddress
ggauth.dll.55888: string.EnterCriticalSection
ggauth.dll.55740: string.GetEnvironmentVariableA
ggauth.dll.54480: string.user32.dll
ggauth.dll.55200: string.KERNEL32
ggauth.dll.55430: string.ExitProcess
embedded.file spec.fne ed586b64d307c7c23733ea45cc0d588b
spec.fne.78: string.This program cannot be run in DOS mode
spec.fne.47262: string.LoadLibraryA
spec.fne.47412: string.GetModuleHandleA
spec.fne.47380: string.GetCommandLineA
spec.fne.47244: string.GetProcAddress
spec.fne.47606: string.EnterCriticalSection
spec.fne.47454: string.GetEnvironmentVariableA
spec.fne.47696: string.CloseHandle
spec.fne.46492: string.user32.dll
spec.fne.45596: string.KERNEL32
spec.fne.47654: string.ExitProcess
embedded.file KGExDll.Dll c0f30723eb7ec0f829ff4c535ed3b15a
KGExDll.Dll.78: string.This program cannot be run in DOS mode
KGExDll.Dll.2314: string.LoadLibraryA
KGExDll.Dll.118067: string.GetModuleHandleA
KGExDll.Dll.118109: string.GetCommandLineA
KGExDll.Dll.2296: string.GetProcAddress
KGExDll.Dll.118369: string.EnterCriticalSection
KGExDll.Dll.118541: string.CloseHandle
KGExDll.Dll.119071: string.CreateFileA
KGExDll.Dll.2382: string.RegOpenKeyExA
KGExDll.Dll.2352: string.KERNEL32
KGExDll.Dll.2268: string.ExitProcess
KGExDll.Dll.dropped.file exe 5dd66eacb7e44c560b23acd7cdf58f10 / 3866 bytes / @ 4659
KGExDll.Dll.dropped.file exe 1dd9848e1e1ffb80e0dea1770b1f406c / 188520 bytes / @ 8525
KGExDll.Dll.dropped.file exe 57b5cca58937857fb927c88f1714d7f1 / 416331 bytes / @ 197045
embedded.file dp1.fne 60d1a7c5a63b8472a862e1d1b7ff70af
dp1.fne.78: string.This program cannot be run in DOS mode
dp1.fne.93482: string.LoadLibraryA
dp1.fne.92680: string.GetModuleHandleA
dp1.fne.92648: string.GetCommandLineA
dp1.fne.92952: string.GetProcAddress
dp1.fne.92890: string.EnterCriticalSection
dp1.fne.92722: string.GetEnvironmentVariableA
dp1.fne.93632: string.CloseHandle
dp1.fne.91768: string.user32.dll
dp1.fne.90828: string.KERNEL32
dp1.fne.92938: string.ExitProcess
embedded.file ggsrvdll.dll 88183f83b4a7c9e73ca5cbdc10e3cd93
ggsrvdll.dll.78: string.This program cannot be run in DOS mode
ggsrvdll.dll.34842: string.LoadLibraryA
ggsrvdll.dll.34986: string.GetModuleHandleA
ggsrvdll.dll.34954: string.GetCommandLineA
ggsrvdll.dll.34824: string.GetProcAddress
ggsrvdll.dll.35194: string.EnterCriticalSection
ggsrvdll.dll.35028: string.GetEnvironmentVariableA
ggsrvdll.dll.35840: string.CloseHandle
ggsrvdll.dll.34124: string.user32.dll
ggsrvdll.dll.34856: string.KERNEL32
ggsrvdll.dll.35242: string.ExitProcess
embedded.file GameServer.pdb aed49f897e6cf257b3c9b827fb53f832
GameServer.pdb.1659170: string.LoadLibraryA
GameServer.pdb.1656622: string.GetModuleHandleA
GameServer.pdb.1651282: string.GetCommandLineA
GameServer.pdb.1550537: string.GetSystemMetrics
GameServer.pdb.1659282: string.GetProcAddress
GameServer.pdb.1664110: string.EnterCriticalSection
GameServer.pdb.1663774: string.CloseHandle
GameServer.pdb.1660910: string.CreateFileA
GameServer.pdb.1693474: string.RegOpenKeyExA
GameServer.pdb.1693018: string.RegDeleteKeyA
GameServer.pdb.1646605: string.KERNEL32
GameServer.pdb.1651170: string.ExitProcess
GameServer.pdb.1679302: string.GetMessageA
GameServer.pdb.1678434: string.CreateWindowExA
embedded.file odbcdb.run 76bebf8b874d1a7940df294db4f153df
odbcdb.run.78: string.This program cannot be run in DOS mode
odbcdb.run.127022: string.LoadLibraryA
odbcdb.run.126930: string.GetModuleHandleA
odbcdb.run.127182: string.GetCommandLineA
odbcdb.run.111392: string.GetSystemMetrics
odbcdb.run.126912: string.GetProcAddress
odbcdb.run.126758: string.EnterCriticalSection
odbcdb.run.127492: string.GetEnvironmentVariableA
odbcdb.run.126590: string.CloseHandle
odbcdb.run.129696: string.RegOpenKeyExA
odbcdb.run.114088: string.user32.dll
odbcdb.run.112788: string.KERNEL32
odbcdb.run.127224: string.ExitProcess
odbcdb.run.128108: string.GetMessageA
odbcdb.run.128878: string.CreateWindowExA
embedded.file CashShopItem.ini f862b8d01c72389a55bdb5dfb68b80a7
Yara:
gh0st
e9ad9152703a0d4b1e2054942a0cec5d view report vbaProject.bin 895488 72 X 0 0
729954: exploit.office embedded Visual Basic write to file Scripting.FileSystemObject
459175: exploit.office embedded Visual Basic execute shell command Wscript.Shell
847636: exploit.office embedded Visual Basic accessing file OpenTextFile
835832: suspicious.office Visual Basic macro
711114: string.vbs On Error Resume Next
45cf4369fbef09f8c714e016b5c6f67d view report Cheate Book 2007.zip 3460508 80 X 0 0
embedded.file setup.exe 961f1e36acf369a2968938ad17e39de4
setup.exe.78: string.This program cannot be run in DOS mode
setup.exe.5036: string.LoadLibraryA
setup.exe.5296: string.GetModuleHandleA
setup.exe.5018: string.GetProcAddress
setup.exe.5052: string.CloseHandle
setup.exe.5078: string.CreateFileA
setup.exe.5314: string.KERNEL32
setup.exe.4934: string.ExitProcess
67e158dc695e3ea69639492c1b98890f view report nsoftware.IPWorksWS.vsix 524669 72 X 0 0
embedded.file nsoftware.IPWorksWS.dll af992be57db0d87a9faa47eab7b2384f
nsoftware.IPWorksWS.dll.1022453: suspicious.office encrypted document
nsoftware.IPWorksWS.dll.78: string.This program cannot be run in DOS mode
nsoftware.IPWorksWS.dll.836246: string.CloseHandle
embedded.file nsoftware.IPWorksWS.System.dll b0a78e3709b3a0605162dd0e3834f98f
nsoftware.IPWorksWS.System.dll.78: string.This program cannot be run in DOS mode
nsoftware.IPWorksWS.System.dll.120287: string.GetProcAddress
nsoftware.IPWorksWS.System.dll.120032: string.CloseHandle
nsoftware.IPWorksWS.System.dll.115356: string.user32.dll
nsoftware.IPWorksWS.System.dll.115097: string./usr/lib/libSystem
deac2b14c237bb4a044c7ad0b6b7b0a0 view report /1/1/5/154ddcbbe83b8f3e5b0583c66830d8bdfde0bf3ee1fe20522a56134dbbd04b40.file 141587 100 X 0 0
embedded.file G0PR0 +.exe eb096d053227a8457a6ae4372ea0b3f7
G0PR0 +.exe.150896: exploit.office cmd.exe shell command
G0PR0 +.exe.78: string.This program cannot be run in DOS mode
G0PR0 +.exe.191068: string.GetCommandLineA
G0PR0 +.exe.190964: string.GetProcAddress
G0PR0 +.exe.190312: string.CreateProcessA
G0PR0 +.exe.190698: string.EnterCriticalSection
G0PR0 +.exe.190274: string.CloseHandle
G0PR0 +.exe.190606: string.KERNEL32
G0PR0 +.exe.156979: string.ExitProcess
3f63272bf8d605e04401dfca10f4e256 view report /1/f/8/f85f3c824d8129092a4ced649ae321539be9903e410ec884da78415fdee05d16.file 6794531 80 X 0 0
embedded.file Internet.Download.Manager.v6.30.2.exe 24727e8432b44723ec4504ed0ad6de54
Internet.Download.Manager.v6.30.2.exe.78: string.This program cannot be run in DOS mode
Internet.Download.Manager.v6.30.2.exe.38620: string.LoadLibraryA
Internet.Download.Manager.v6.30.2.exe.38636: string.GetModuleHandleA
Internet.Download.Manager.v6.30.2.exe.39532: string.GetSystemMetrics
Internet.Download.Manager.v6.30.2.exe.38602: string.GetProcAddress
Internet.Download.Manager.v6.30.2.exe.38012: string.CloseHandle
Internet.Download.Manager.v6.30.2.exe.35256: string.KERNEL32
Internet.Download.Manager.v6.30.2.exe.38334: string.ExitProcess
0f380144daef34510eadc63ec842aae0 view report =?UTF-8?B?0JDQutGC0YPQsNC70YzQvdC1INCf0L7Qu9C+0LbQtdC90L3RjyDQstCw0LPQvtC90ZbQsi54bHNt?= 1685221 72 X 0 0
embedded.file vbaProject.bin 6b423403e87099112e28cf8be5d144e5
vbaProject.bin.979202: exploit.office embedded Visual Basic write to file Scripting.FileSystemObject
vbaProject.bin.918689: exploit.office embedded Visual Basic execute shell command Wscript.Shell
vbaProject.bin.979255: exploit.office embedded Visual Basic accessing file OpenTextFile
vbaProject.bin.1386706: suspicious.office Visual Basic macro
vbaProject.bin.97485: string.vbs On Error Resume Next
Yara:
office_vb_dropper
016dfd8e6bd76ce4f9d04aeba88b2903 view report /1/8/a/8ab5b911528fd6551d349357bb9ab13fcab1376cd6f54dc4d27596c07fff2830.file 4108151 182 X 0 0
embedded.file Foxit_Reader.exe 654af68e9819729b4eb2dceb8511af00
Foxit_Reader.exe.3069396: suspicious.office DDE Excel execution
Foxit_Reader.exe.78: string.This program cannot be run in DOS mode
Foxit_Reader.exe.3023460: string.LoadLibraryA
Foxit_Reader.exe.3024178: string.GetModuleHandleA
Foxit_Reader.exe.3025330: string.GetCommandLineA
Foxit_Reader.exe.2598192: string.GetSystemMetrics
Foxit_Reader.exe.3023442: string.GetProcAddress
Foxit_Reader.exe.3023806: string.CreateProcessA
Foxit_Reader.exe.3024550: string.EnterCriticalSection
Foxit_Reader.exe.3025486: string.GetEnvironmentVariableA
Foxit_Reader.exe.3023306: string.CloseHandle
Foxit_Reader.exe.3023404: string.CreateFileA
Foxit_Reader.exe.3031098: string.RegOpenKeyExA
Foxit_Reader.exe.3031150: string.RegDeleteKeyA
Foxit_Reader.exe.2627064: string.user32.dll
Foxit_Reader.exe.2614816: string.KERNEL32
Foxit_Reader.exe.3025348: string.ExitProcess
Foxit_Reader.exe.3027186: string.GetMessageA
Foxit_Reader.exe.3027542: string.CreateWindowExA
Foxit_Reader.exe.dropped.file pdf 10c80869dd6c777617608564fdf3f8fd / 2334338 bytes / @ 753918
Foxit_Reader.exe.dropped.file pdf 343ad8c24d117e96596af907a93c33df / 949632 bytes / @ 3088256
Yara:
gh0st
0b8e021928341ae986948baa1d2f3b14 view report Gehaltsliste_2017.docm 88488 36 X 0 0
embedded.file vbaProject.bin 39cd436bbec33ffb6576de672f9360cf
vbaProject.bin.2751: exploit.office embedded Visual Basic write to file Scripting.FileSystemObject
vbaProject.bin.19226: suspicious.office Visual Basic macro
vbaProject.bin.2989: string.vbs CreateObject
embedded.file activeX2.xml 259f55ffccc8989e84b5b2b508ea63f4
activeX2.xml.56: suspicious.office activeX
embedded.file activeX1.xml 0e04f952d5687f2714baaf692d9e1a8e
activeX1.xml.56: suspicious.office activeX
78a2863b8a80e8aae329fbba83b89005 view report /home/softsec/pc/virusTotal-uploader/510000160900007025/78a2863b8a80e8aae329fbba83b89005.zip 1994475 150 X 0 0
embedded.file BaiduDS_setup.exe c38508e9dfde42324f6f1c3dd70101c1
BaiduDS_setup.exe.80: string.This program must be run under Win32
BaiduDS_setup.exe.40412: string.LoadLibraryA
BaiduDS_setup.exe.39732: string.GetModuleHandleA
BaiduDS_setup.exe.39768: string.GetCommandLineA
BaiduDS_setup.exe.40550: string.GetProcAddress
BaiduDS_setup.exe.40840: string.CreateProcessA
BaiduDS_setup.exe.39552: string.EnterCriticalSection
BaiduDS_setup.exe.40722: string.GetEnvironmentVariableA
BaiduDS_setup.exe.39962: string.CloseHandle
BaiduDS_setup.exe.39948: string.CreateFileA
BaiduDS_setup.exe.40142: string.RegOpenKeyExA
BaiduDS_setup.exe.39974: string.user32.dll
BaiduDS_setup.exe.33352: string.shell32.dll
BaiduDS_setup.exe.39934: string.ExitProcess
BaiduDS_setup.exe.41080: string.CreateWindowExA
26ee1f42dae06f6307ccccff7a47253d view report update94d563d1564001.zip 2690898 330 X 0 0
embedded.file wget.exe f32c24bf1d676f29ee8585985e407d0b
wget.exe.78: string.This program cannot be run in DOS mode
wget.exe.308434: string.GetModuleHandleA
wget.exe.308326: string.GetCommandLineA
wget.exe.308454: string.GetProcAddress
wget.exe.308250: string.CreateProcessA
wget.exe.308198: string.CloseHandle
wget.exe.252321: string.KERNEL32
wget.exe.308284: string.ExitProcess
embedded.file libeay32.dll 35d6f70090d5fc580610e9ec1007c02a
libeay32.dll.78: string.This program cannot be run in DOS mode
libeay32.dll.2021132: string.LoadLibraryA
libeay32.dll.2020958: string.GetModuleHandleA
libeay32.dll.2020978: string.GetProcAddress
libeay32.dll.2020800: string.EnterCriticalSection
libeay32.dll.2020762: string.CloseHandle
libeay32.dll.1507053: string.KERNEL32
embedded.file libssl32.dll 310b46da423357863e476861866cfaad
libssl32.dll.78: string.This program cannot be run in DOS mode
libssl32.dll.407906: string.GetModuleHandleA
libssl32.dll.407926: string.GetProcAddress
libssl32.dll.407866: string.EnterCriticalSection
libssl32.dll.415312: string.KERNEL32
embedded.file findhash.exe 336551278928c4051e71bf4e56a79238
findhash.exe.78: string.This program cannot be run in DOS mode
findhash.exe.10980: string.GetModuleHandleA
findhash.exe.11000: string.GetProcAddress
findhash.exe.11444: string.KERNEL32
findhash.exe.10938: string.ExitProcess
embedded.file openssl.exe eda82cc4b64ed3ddb00187b6572b9f8f
openssl.exe.78: string.This program cannot be run in DOS mode
openssl.exe.2711570: string.LoadLibraryA
openssl.exe.2711378: string.GetModuleHandleA
openssl.exe.2711398: string.GetProcAddress
openssl.exe.2711206: string.EnterCriticalSection
openssl.exe.2711138: string.CloseHandle
openssl.exe.2328557: string.KERNEL32
openssl.exe.2711230: string.ExitProcess
fcd84e1c315eb3383ea675f0d367cd24 view report Amibroker520_3.zip 7377879 170 X 0 0
embedded.file AmiBroker520_3.exe cbd5c0d01a800ed2d3051d2c291e1ef4
AmiBroker520_3.exe.80: string.This program must be run under Win32
AmiBroker520_3.exe.40994: string.LoadLibraryA
AmiBroker520_3.exe.40264: string.GetModuleHandleA
AmiBroker520_3.exe.40300: string.GetCommandLineA
AmiBroker520_3.exe.41132: string.GetProcAddress
AmiBroker520_3.exe.41448: string.CreateProcessA
AmiBroker520_3.exe.40084: string.EnterCriticalSection
AmiBroker520_3.exe.41304: string.GetEnvironmentVariableA
AmiBroker520_3.exe.40494: string.CloseHandle
AmiBroker520_3.exe.40480: string.CreateFileA
AmiBroker520_3.exe.40674: string.RegOpenKeyExA
AmiBroker520_3.exe.40506: string.user32.dll
AmiBroker520_3.exe.33788: string.shell32.dll
AmiBroker520_3.exe.40466: string.ExitProcess
AmiBroker520_3.exe.41688: string.CreateWindowExA
embedded.file Brokey.dll 2fe82e23285525bc7231074a12d09af0
Brokey.dll.78: string.This program cannot be run in DOS mode
Brokey.dll.3380: string.KERNEL32