Flag: Tornado! Hurricane!

OpenRCE Win32 Call Chains Database

 Windows XP SP2 >> USER32 >> xxxInitActivateDlg
MSDN   1. NtUserGetDC   
MSDN   2. FindPwndChild   
MSDN   3. GetWindowTextW    USER32
MSDN   4. SendDlgItemMessageW    USER32
MSDN   5. lstrlenW    KERNEL32
MSDN   6. GetTextExtentPointW    GDI32
MSDN   7. NtUserCallOneParam   
MSDN   8. GetDlgItem    USER32
MSDN   9. NtUserSetFocus   
MSDN   10. __security_check_cookie   

There are 31,325 total registered users.


Recently Created Topics
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23


Recent Forum Posts
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
let 'IDAPython' impo...
bytecod3r
Reverse Engineering ...
bytecod3r
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit