occache.dll

Description: Object Control Viewer

Authors: © Microsoft Corporation. All rights reserved.

Version: 11.0.19041.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: a614aee3b36141940b86c07661fed743

File Size: 149.5 KB

Uploaded At: Dec. 1, 2025, 7:35 a.m.

Views: 8

Exported Functions

  • FindControlClose (Ordinal: 1, Address: 0xafb0)
  • FindFirstControl (Ordinal: 2, Address: 0xafd0)
  • FindFirstControlArch (Ordinal: 3, Address: 0xaff0)
  • FindNextControl (Ordinal: 4, Address: 0xb210)
  • FindNextControlArch (Ordinal: 5, Address: 0xb220)
  • GetControlDependentFile (Ordinal: 6, Address: 0xb390)
  • GetControlInfo (Ordinal: 7, Address: 0xb4a0)
  • IsModuleRemovable (Ordinal: 8, Address: 0xc240)
  • ReleaseControlHandle (Ordinal: 9, Address: 0xc670)
  • RemoveControlByHandle2 (Ordinal: 10, Address: 0x72a0)
  • RemoveControlByHandle (Ordinal: 11, Address: 0xc6a0)
  • RemoveControlByName2 (Ordinal: 12, Address: 0x73a0)
  • RemoveControlByName (Ordinal: 13, Address: 0xc6b0)
  • RemoveExpiredControls (Ordinal: 14, Address: 0x2350)
  • SweepControlsByLastAccessDate (Ordinal: 15, Address: 0xc990)
  • DllCanUnloadNow (Ordinal: 16, Address: 0x4020)
  • DllGetClassObject (Ordinal: 17, Address: 0x21e0)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x180014738)
  • RegCreateKeyExA (Address: 0x1800147a0)
  • RegDeleteKeyA (Address: 0x180014778)
  • RegDeleteValueA (Address: 0x180014768)
  • RegEnumKeyA (Address: 0x180014750)
  • RegEnumKeyExA (Address: 0x180014770)
  • RegEnumValueA (Address: 0x180014748)
  • RegOpenCurrentUser (Address: 0x180014780)
  • RegOpenKeyExA (Address: 0x180014790)
  • RegOpenKeyExW (Address: 0x180014730)
  • RegOverridePredefKey (Address: 0x180014788)
  • RegQueryValueA (Address: 0x180014760)
  • RegQueryValueExA (Address: 0x180014740)
  • RegSetValueA (Address: 0x180014798)
  • RegSetValueExA (Address: 0x180014758)
COMCTL32.dll
  • PropertySheetA (Address: 0x1800147b0)
iertutil.dll
  • (Address: 0x180014bc8)
KERNEL32.dll
  • CloseHandle (Address: 0x1800149a0)
  • CompareFileTime (Address: 0x1800148e0)
  • CompareStringA (Address: 0x1800149b8)
  • CreateFileA (Address: 0x180014998)
  • DelayLoadFailureHook (Address: 0x1800147c8)
  • DeleteCriticalSection (Address: 0x1800148b0)
  • DeleteFileA (Address: 0x1800149a8)
  • DisableThreadLibraryCalls (Address: 0x1800148a8)
  • EnterCriticalSection (Address: 0x180014890)
  • FileTimeToLocalFileTime (Address: 0x1800148f0)
  • FileTimeToSystemTime (Address: 0x1800148f8)
  • FindClose (Address: 0x180014910)
  • FindFirstFileA (Address: 0x1800148e8)
  • FindNextFileA (Address: 0x180014978)
  • FlushInstructionCache (Address: 0x180014840)
  • FormatMessageA (Address: 0x180014960)
  • FreeLibrary (Address: 0x180014948)
  • GetCPInfo (Address: 0x180014958)
  • GetCurrentProcess (Address: 0x180014870)
  • GetCurrentProcessId (Address: 0x1800147f8)
  • GetCurrentThread (Address: 0x180014888)
  • GetCurrentThreadId (Address: 0x180014860)
  • GetDateFormatA (Address: 0x180014900)
  • GetDiskFreeSpaceA (Address: 0x180014a08)
  • GetEnvironmentVariableA (Address: 0x180014990)
  • GetFileAttributesA (Address: 0x1800149f8)
  • GetFileTime (Address: 0x1800149d0)
  • GetLastError (Address: 0x180014980)
  • GetLocalTime (Address: 0x1800149e0)
  • GetPrivateProfileStringA (Address: 0x180014970)
  • GetProcAddress (Address: 0x180014940)
  • GetProcessHeap (Address: 0x1800148c0)
  • GetShortPathNameA (Address: 0x180014988)
  • GetSystemDirectoryA (Address: 0x1800149b0)
  • GetSystemTimeAsFileTime (Address: 0x1800147f0)
  • GetThreadContext (Address: 0x180014848)
  • GetTickCount (Address: 0x1800147e8)
  • GetTimeFormatA (Address: 0x180014908)
  • GetVersionExA (Address: 0x1800149c8)
  • GetWindowsDirectoryA (Address: 0x180014a00)
  • GlobalAlloc (Address: 0x180014928)
  • HeapAlloc (Address: 0x1800148b8)
  • HeapFree (Address: 0x1800148c8)
  • InitializeCriticalSection (Address: 0x1800148a0)
  • IsDBCSLeadByte (Address: 0x180014950)
  • LeaveCriticalSection (Address: 0x1800147d0)
  • LoadLibraryA (Address: 0x180014898)
  • LoadLibraryExA (Address: 0x180014930)
  • LocalAlloc (Address: 0x180014920)
  • LocalFree (Address: 0x180014918)
  • lstrcmpA (Address: 0x1800148d8)
  • lstrcmpiA (Address: 0x1800148d0)
  • MultiByteToWideChar (Address: 0x180014938)
  • QueryPerformanceCounter (Address: 0x180014800)
  • RaiseException (Address: 0x1800147d8)
  • RaiseFailFastException (Address: 0x1800147e0)
  • RemoveDirectoryA (Address: 0x1800149c0)
  • ResolveDelayLoadedAPI (Address: 0x1800147c0)
  • ResumeThread (Address: 0x180014850)
  • SetErrorMode (Address: 0x1800149f0)
  • SetFileTime (Address: 0x1800149d8)
  • SetLastError (Address: 0x180014828)
  • SetThreadContext (Address: 0x180014838)
  • SetUnhandledExceptionFilter (Address: 0x180014810)
  • Sleep (Address: 0x180014820)
  • SuspendThread (Address: 0x180014858)
  • SystemTimeToFileTime (Address: 0x1800149e8)
  • TerminateProcess (Address: 0x180014808)
  • UnhandledExceptionFilter (Address: 0x180014818)
  • VerLanguageNameA (Address: 0x180014968)
  • VirtualAlloc (Address: 0x180014868)
  • VirtualFree (Address: 0x180014878)
  • VirtualProtect (Address: 0x180014880)
  • VirtualQuery (Address: 0x180014830)
msvcrt.dll
  • __C_specific_handler (Address: 0x180014be0)
  • _amsg_exit (Address: 0x180014c10)
  • _initterm (Address: 0x180014c28)
  • _itoa_s (Address: 0x180014bf8)
  • _strnicmp (Address: 0x180014c00)
  • _ultoa_s (Address: 0x180014bf0)
  • _vsnprintf (Address: 0x180014c38)
  • _vsnwprintf (Address: 0x180014c08)
  • _XcptFilter (Address: 0x180014bd8)
  • free (Address: 0x180014c18)
  • isalpha (Address: 0x180014c40)
  • malloc (Address: 0x180014c20)
  • memcpy (Address: 0x180014c30)
  • memset (Address: 0x180014c48)
  • strncmp (Address: 0x180014be8)
ntdll.dll
  • RtlCaptureContext (Address: 0x180014c58)
  • RtlLookupFunctionEntry (Address: 0x180014c60)
  • RtlVirtualUnwind (Address: 0x180014c68)
SHELL32.dll
  • (Address: 0x180014a58)
  • (Address: 0x180014a68)
  • (Address: 0x180014a48)
  • (Address: 0x180014a40)
  • (Address: 0x180014a60)
  • (Address: 0x180014a28)
  • ExtractIconA (Address: 0x180014a50)
  • SHBindToParent (Address: 0x180014a18)
  • SHChangeNotify (Address: 0x180014a30)
  • ShellExecuteA (Address: 0x180014a20)
  • SHGetFolderPathA (Address: 0x180014a38)
SHLWAPI.dll
  • (Address: 0x180014aa0)
  • (Address: 0x180014ac8)
  • (Address: 0x180014ad8)
  • PathCompactPathA (Address: 0x180014ac0)
  • PathFileExistsA (Address: 0x180014ae0)
  • PathFindFileNameA (Address: 0x180014ab0)
  • PathGetDriveNumberA (Address: 0x180014a80)
  • PathGetDriveNumberW (Address: 0x180014a88)
  • SHRegGetValueA (Address: 0x180014ab8)
  • StrChrA (Address: 0x180014aa8)
  • StrCmpNIA (Address: 0x180014a90)
  • StrRetToBufW (Address: 0x180014a78)
  • StrStrIA (Address: 0x180014a98)
  • StrToIntA (Address: 0x180014ad0)
USER32.dll
  • CharNextA (Address: 0x180014b80)
  • CharPrevA (Address: 0x180014b78)
  • CharUpperA (Address: 0x180014af0)
  • CheckMenuItem (Address: 0x180014b60)
  • CreatePopupMenu (Address: 0x180014b50)
  • DestroyIcon (Address: 0x180014ba0)
  • DestroyMenu (Address: 0x180014b40)
  • DialogBoxParamA (Address: 0x180014bb8)
  • EndDialog (Address: 0x180014b98)
  • GetClientRect (Address: 0x180014bb0)
  • GetDlgItem (Address: 0x180014b90)
  • GetSubMenu (Address: 0x180014b30)
  • GetWindowLongPtrA (Address: 0x180014b48)
  • LoadIconA (Address: 0x180014b00)
  • LoadMenuA (Address: 0x180014b28)
  • LoadStringA (Address: 0x180014b10)
  • MessageBoxA (Address: 0x180014b18)
  • PostMessageA (Address: 0x180014af8)
  • RegisterClipboardFormatA (Address: 0x180014b20)
  • RemoveMenu (Address: 0x180014b38)
  • SendDlgItemMessageA (Address: 0x180014b08)
  • SendMessageA (Address: 0x180014b88)
  • SetDlgItemTextA (Address: 0x180014ba8)
  • SetMenuDefaultItem (Address: 0x180014b68)
  • SetWindowLongPtrA (Address: 0x180014b58)
  • SetWindowTextA (Address: 0x180014b70)