Threat Database Trojans Trojan.Agent.DFCF

Trojan.Agent.DFCF

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Agent.DFCF
Signature status: No Signature

Known Samples

MD5: c671bfc634c96a8e28f650b08362877f
SHA1: 2a5406d245cf1f2c65b3990fbb4bb7e773b89300
SHA256: 1D8701AD41EFDD09E891746A56F8ABCDD457D6FE4ABC76B6C4466D724F3CB3E7
File Size: 2.40 MB, 2400256 bytes
MD5: 87e575ebefbe82a8dcb4735fe62d49c8
SHA1: ca0c8e12dfdf5b00e7d399841ef51ca6571c60d9
SHA256: 26D35DAB5514132671D904227E1B2306054138B3E84FE04BF6B7AF1C0BFE0505
File Size: 2.64 MB, 2640896 bytes
MD5: 73017a946541104af5903290d4d3f9dd
SHA1: 05c16c847dc8d925448925d84d6c4b4f5c85f6c0
SHA256: 4C9575029ACAFD02ACA98BBD884686F5F2EA903918BE9EA68E853C4BC04260E1
File Size: 3.66 MB, 3655168 bytes
MD5: f8d41b60216a56bfed47690f65c9c315
SHA1: 94a5ef17707691abcb81e5f55bc0ef097d1dab0c
SHA256: E00C7790DA0604D7DF5D7E1BDD800066F989C801FA95D2F568300AA8ABFB75D4
File Size: 2.75 MB, 2751488 bytes
MD5: b959fe2f4d0457a9441d960913881cc1
SHA1: bb2e58a3c61775c2c5e6e5fa48ef46b19fcf7552
SHA256: 1068911710327456774747B9CDD414F6182B9FEC3557EE6C88418BC603C4C128
File Size: 1.90 MB, 1903104 bytes
Show More
MD5: ae9cb7e4b3867729750c576526064373
SHA1: 252989970eb02457378c1127cc3df6d66ade3434
SHA256: D78AE00FB6999A4E5E8C08A305D2F9871A9F1FF4851238FC77AE7827F7135017
File Size: 3.85 MB, 3848192 bytes
MD5: 0656d064b650e0654102976a425bdb9a
SHA1: 53a86da945f5e32652c2eccc74be63fa18253c26
SHA256: 6B4FDD87065548BF0E314F7B4C46197663786143087A6F9FDF3E2E833C03ECBF
File Size: 2.74 MB, 2738688 bytes
MD5: e6c725910a0664e8843aae6df206e28c
SHA1: b62249ba4312f7ea96de843af119e0d5968130dd
SHA256: C4BDEFA5D145A05730541A275E53630400DCFE8B90CA850F86265C2437590B55
File Size: 3.69 MB, 3685888 bytes
MD5: 3f09aecfed3dc2d8f19d7f7aae58ff12
SHA1: 95329d2e579c07dd91043c4ff46353845fc3a11c
SHA256: 28894A42314CED65BB4A75670ED900287FA09AA9D094EFA8BE95D7D28972ECD9
File Size: 4.31 MB, 4314112 bytes
MD5: 7c5b0de62bee7e72b0a264d2bc101364
SHA1: 35e2f0812ac22d80837886567c68ca4f69f3d05a
SHA256: B9B46EC217FE3CA1BB8A67E67D6C88E1510FA5E5C45DF6B3F1C2F3796CD2B133
File Size: 2.56 MB, 2562560 bytes
MD5: 691dec05232963fc279fbe230a50c481
SHA1: ff63b5ef5666ef330522ad105caee39dcd05aad4
SHA256: 8B90665006BC1DA66104A61F723FB95AD5886E58867B5EC752581EDE3C1093B8
File Size: 1.94 MB, 1939968 bytes
MD5: f2fb5cdc54a1e1d5b01f2114f8dc0813
SHA1: 33c85532cc755fa7eab2ca303d0a5897807a272f
SHA256: F5C2B50452F8DFCC87714FBE0BF9F23B96AB6FEF002C179EA40D3B8F90BEC759
File Size: 1.39 MB, 1385984 bytes
MD5: df8827c3eb49dda23bb4fe8ea8e83804
SHA1: 594e7a4d484560235a291404f4e57eaa55732099
SHA256: 4F149E2BCE42A787C34AF36A97851748B9C69D4928EFAEAD0572A92FBFEB5C22
File Size: 1.77 MB, 1766912 bytes
MD5: 7fa4439f492c5e8f3be9f0eacb438aa1
SHA1: 379222cfc560eda0dd365cedb3fa766956dd3310
SHA256: 9DD5E4635506CF8B7525E6DBBDBC85EB9C0C830D75AC5687AA3EA9135639EC0F
File Size: 2.88 MB, 2881536 bytes
MD5: bf96defc1250b44dfd49bf002986f383
SHA1: df3b4fc2d9f8c8999424a30f2a8b89a4016c34c5
SHA256: 0243AB4D718EABD5D24D046508670EF4C4B5715D12D5E92A086226F165EB2AB4
File Size: 3.18 MB, 3181056 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version
  • 83.72.6789.1234
  • 1.0.0.0
Comments Алматы Оптимизатор Процессов для оптимизации рабочих процессов
Company Name
  • Apogees Botulism Group
  • Divine.Injector
  • Hootay Watercolorist Corp.
  • Illiberality Coyness Inc.
  • Impressers Guttiferous Inc.
  • Inveigle Opisthoglyphic LLC
  • Kerseys Pelycology Group
  • Otaxavaxigodakigabe
  • Peakless Crabman LLC
  • Peeked LLC
Show More
  • Prenarial Corp.
  • Shophroth Oscillometries Group
  • Windowwise Turnkey Corp.
  • Тенгри Софт
File Description
  • Antefixal patrolman nympholepsies electrosensitive cascadian scarrier prostitution heister nonperceptiveness.
  • Desegregating whales undergrass madefy tribase.
  • Disperse landways grouses volplanist.
  • Divine.Injector
  • Forsar archiannelida postscripts unofficious hotrods graminivore unseraphical apelike illuminable receipting.
  • Headraces frithles thinkers spirorbis perfervor devonian reciproque rockfalls catalepsis epicyclical.
  • Insapient craniol noyading illustriousness waterloggedness nightglass pacta eyelessness beforetime abscound elijah uncoffined.
  • Obrien giterne gastroduodenoscopy cerebrorachidian unrapacious comolecule genevan bibliophiles.
  • Omesorapoke Elagusezitah Unixikixodumedebixebu Azogojonojuso Ugiqunodimuz Ecoxefunecafapuquzus Ofizuribayeyameq Iqogefayoqilolonab.
  • Pales autoeciously circumesophageal beckoningly bufagin irradiations.
Show More
  • Pancheon godless reabsorbed parthenocarpical calycanthaceae foraying captation otosalpinx unglue prosily conduction banians.
  • Prefills imamate prattfall nonlactescent cessations cutisector burgessdom.
  • Procaines inextensional phytomonadida rentree tastily alison serotypes cyclotron botonee pudder undulates.
  • Тараз
File Version
  • 83.72.6789.1234
  • 9.67.140.63
  • 8.0.718.13
  • 6.86.655.98
  • 5.32.740.62
  • 4.20.676.55
  • 4.9.814.79
  • 4.8.152.66
  • 3.49.358.57
  • 1.81.768.25
Show More
  • 1.79.442.68
  • 1.65.254.41
  • 1.11.255.73
  • 1.0.0.0
Internal Name
  • Chaenomeles Bequest
  • Desudation Hyperkinesia
  • Diapasonal Cowpath
  • Divine.Injector.dll
  • Gemellion Juggler
  • Miserere Octometer
  • Nonsubtile Titrate
  • Overstraightly Blowline
  • Smittlish Spatula
  • Tekkintzi Overcivilized
Show More
  • Trampot Centuriator
  • Ugowolanas
  • Unrushed Phalarica
  • Тараз.dll
Legal Copyright
  • © 2025 Apogees Botulism Group
  • © 2025 Hootay Watercolorist Corp.
  • © 2025 Illiberality Coyness Inc.
  • © 2025 Kerseys Pelycology Group
  • © 2025 Otaxavaxigodakigabe
  • © 2025 Peakless Crabman LLC
  • © 2025 Prenarial Corp.
  • © 2025 Shophroth Oscillometries Group
  • © 2025 Windowwise Turnkey Corp.
  • © 2026 Impressers Guttiferous Inc.
Show More
  • © 2026 Inveigle Opisthoglyphic LLC
  • © 2026 Peeked LLC
  • © Тенгри Софт. Все права защищены. Вдохновлено озером Балхаш
Original Filename
  • Alacovugohucevit
  • BouteriaUnrhythmic.exe
  • Divine.Injector.dll
  • HerniationsMiki.exe
  • InadulteratePhrasally.exe
  • NotencephaloceleOculopupillary.exe
  • OriginantMasterfast.exe
  • OverpositivenessSaturnal.exe
  • SpermationReinstates.exe
  • TidilyStabulation.exe
Show More
  • TryptogenUndisgorged.exe
  • UnderchargingOutcaviled.exe
  • YachtswomanAbjudicate.exe
  • Тараз.dll
Product Name
  • Acukaforuk
  • Batonne Unsynchronous
  • Comparativist Cameral
  • Ditt Timonize
  • Divine.Injector
  • Gelatin Jostlement
  • Liquidised Outhits
  • Pandectist Exhorts
  • Primitivism Datebook
  • Rechabitism Adance
Show More
  • Skaalpund Inculcator
  • Unchronicled Noncolonial
  • Unsnib Inexcommunicable
  • Алматы Оптимизатор Процессов
Product Version
  • 9.67.140.63
  • 8.0.718.13
  • 6.86.655.98
  • 5.32.740.62
  • 4.20.676.55
  • 4.9.814.79
  • 4.8.152.66
  • 3.49.358.57
  • 1.81.768.25
  • 1.79.442.68
Show More
  • 1.65.254.41
  • 1.11.255.73
  • 1.0.0.0
  • 1.0.0

File Traits

  • CryptUnprotectData
  • dll
  • HighEntropy
  • VirtualAllocExNuma
  • WriteProcessMemory
  • x64

Block Information

Total Blocks: 10,024
Potentially Malicious Blocks: 211
Whitelisted Blocks: 9,797
Unknown Blocks: 16

Visual Map

x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x ? ? 0 ? 0 ? 0 ? ? 0 x x 0 ? 0 x 0 0 x x 0 ? 0 x ? 0 x ? 0 x 0 x x x 0 x x x x x x x 0 x x 0 ? ? ? ? ? x 0 0 x x 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x 0 x x x 0 x x 0 x x 0 x x x 0 0 0 0 0 0 0 0 0 0 x x 0 x x x 0 x 0 0 x 0 x x 0 0 x 0 x 0 0 x x x 0 x x 0 x x x 0 0 x x x x 0 x x x 0 x x x x x x x x x x x x x x x x x x x x 0 0 x x 0 0 x x 0 x x x x x x x x x x x x x x x x x x x 0 x 0 x x 0 x x x x x x x 0 x x x x x x 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.DFCF
  • Agent.DFCG
  • Agent.DFD
  • Agent.DFW
  • Agent.FGDS
Show More
  • Agent.FGDT
  • Agent.KOK
  • AgentTesla.P
  • AgentTesla.PA
  • AgentTesla.PAA
  • BypassUAC.AY
  • Filecoder.XI
  • Kryptik.OIB
  • Kryptik.OID
  • Kryptik.OIF
  • Kryptik.PSB
  • Kryptik.YKAC
  • SnakeLogger.C
  • SnakeStealer.A
  • Trojan.Downloader.Gen.GJ
  • XLoader.A

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtFreeVirtualMemory
Show More
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtGdiBitBlt
  • win32u.dll!NtGdiCreateBitmap
  • win32u.dll!NtGdiCreateCompatibleDC
  • win32u.dll!NtGdiCreateDIBitmapInternal
  • win32u.dll!NtGdiCreateSolidBrush
  • win32u.dll!NtGdiDeleteObjectApp
  • win32u.dll!NtGdiExtGetObjectW
  • win32u.dll!NtGdiGetDCforBitmap
  • win32u.dll!NtGdiGetDCObject
  • win32u.dll!NtGdiGetDeviceCaps
  • win32u.dll!NtGdiRestoreDC
  • win32u.dll!NtGdiSaveDC
  • win32u.dll!NtGdiSelectBitmap
  • win32u.dll!NtGdiSetDIBitsToDeviceInternal
  • win32u.dll!NtUserBuildHwndList
  • win32u.dll!NtUserCallTwoParam
  • win32u.dll!NtUserCreateEmptyCursorObject
  • win32u.dll!NtUserCreateWindowEx
  • win32u.dll!NtUserDestroyWindow
  • win32u.dll!NtUserFindExistingCursorIcon
  • win32u.dll!NtUserGetAncestor
  • win32u.dll!NtUserGetClassInfoEx
  • win32u.dll!NtUserGetClassName
  • win32u.dll!NtUserGetDC
  • win32u.dll!NtUserGetGUIThreadInfo
  • win32u.dll!NtUserGetIconInfo
  • win32u.dll!NtUserGetIconSize
  • win32u.dll!NtUserGetImeInfoEx
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetObjectInformation
  • win32u.dll!NtUserGetProcessWindowStation
  • win32u.dll!NtUserGetProp
  • win32u.dll!NtUserGetThreadDesktop
  • win32u.dll!NtUserGetThreadState
  • win32u.dll!NtUserGetWindowCompositionAttribute
  • win32u.dll!NtUserIsNonClientDpiScalingEnabled
  • win32u.dll!NtUserIsTopLevelWindow
  • win32u.dll!NtUserMessageCall
  • win32u.dll!NtUserRegisterClassExWOW
  • win32u.dll!NtUserRegisterWindowMessage
  • win32u.dll!NtUserReleaseDC
  • win32u.dll!NtUserRemoveProp
  • win32u.dll!NtUserSelectPalette
  • win32u.dll!NtUserSetCursorIconData
  • win32u.dll!NtUserSetWindowFNID
  • win32u.dll!NtUserSetWindowLongPtr

2 additional items are not displayed above.

Trending

Most Viewed

Loading...