occache.dll
Description: Object Control Viewer
Authors: © Microsoft Corporation. All rights reserved.
Version: 11.0.19041.1
Architecture: 64-bit
Operating System: Windows NT
SHA256: a614aee3b36141940b86c07661fed743
File Size: 149.5 KB
Uploaded At: Dec. 1, 2025, 7:35 a.m.
Views: 8
Exported Functions
- FindControlClose (Ordinal: 1, Address: 0xafb0)
- FindFirstControl (Ordinal: 2, Address: 0xafd0)
- FindFirstControlArch (Ordinal: 3, Address: 0xaff0)
- FindNextControl (Ordinal: 4, Address: 0xb210)
- FindNextControlArch (Ordinal: 5, Address: 0xb220)
- GetControlDependentFile (Ordinal: 6, Address: 0xb390)
- GetControlInfo (Ordinal: 7, Address: 0xb4a0)
- IsModuleRemovable (Ordinal: 8, Address: 0xc240)
- ReleaseControlHandle (Ordinal: 9, Address: 0xc670)
- RemoveControlByHandle2 (Ordinal: 10, Address: 0x72a0)
- RemoveControlByHandle (Ordinal: 11, Address: 0xc6a0)
- RemoveControlByName2 (Ordinal: 12, Address: 0x73a0)
- RemoveControlByName (Ordinal: 13, Address: 0xc6b0)
- RemoveExpiredControls (Ordinal: 14, Address: 0x2350)
- SweepControlsByLastAccessDate (Ordinal: 15, Address: 0xc990)
- DllCanUnloadNow (Ordinal: 16, Address: 0x4020)
- DllGetClassObject (Ordinal: 17, Address: 0x21e0)
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x180014738)
- RegCreateKeyExA (Address: 0x1800147a0)
- RegDeleteKeyA (Address: 0x180014778)
- RegDeleteValueA (Address: 0x180014768)
- RegEnumKeyA (Address: 0x180014750)
- RegEnumKeyExA (Address: 0x180014770)
- RegEnumValueA (Address: 0x180014748)
- RegOpenCurrentUser (Address: 0x180014780)
- RegOpenKeyExA (Address: 0x180014790)
- RegOpenKeyExW (Address: 0x180014730)
- RegOverridePredefKey (Address: 0x180014788)
- RegQueryValueA (Address: 0x180014760)
- RegQueryValueExA (Address: 0x180014740)
- RegSetValueA (Address: 0x180014798)
- RegSetValueExA (Address: 0x180014758)
COMCTL32.dll
- PropertySheetA (Address: 0x1800147b0)
iertutil.dll
- (Address: 0x180014bc8)
KERNEL32.dll
- CloseHandle (Address: 0x1800149a0)
- CompareFileTime (Address: 0x1800148e0)
- CompareStringA (Address: 0x1800149b8)
- CreateFileA (Address: 0x180014998)
- DelayLoadFailureHook (Address: 0x1800147c8)
- DeleteCriticalSection (Address: 0x1800148b0)
- DeleteFileA (Address: 0x1800149a8)
- DisableThreadLibraryCalls (Address: 0x1800148a8)
- EnterCriticalSection (Address: 0x180014890)
- FileTimeToLocalFileTime (Address: 0x1800148f0)
- FileTimeToSystemTime (Address: 0x1800148f8)
- FindClose (Address: 0x180014910)
- FindFirstFileA (Address: 0x1800148e8)
- FindNextFileA (Address: 0x180014978)
- FlushInstructionCache (Address: 0x180014840)
- FormatMessageA (Address: 0x180014960)
- FreeLibrary (Address: 0x180014948)
- GetCPInfo (Address: 0x180014958)
- GetCurrentProcess (Address: 0x180014870)
- GetCurrentProcessId (Address: 0x1800147f8)
- GetCurrentThread (Address: 0x180014888)
- GetCurrentThreadId (Address: 0x180014860)
- GetDateFormatA (Address: 0x180014900)
- GetDiskFreeSpaceA (Address: 0x180014a08)
- GetEnvironmentVariableA (Address: 0x180014990)
- GetFileAttributesA (Address: 0x1800149f8)
- GetFileTime (Address: 0x1800149d0)
- GetLastError (Address: 0x180014980)
- GetLocalTime (Address: 0x1800149e0)
- GetPrivateProfileStringA (Address: 0x180014970)
- GetProcAddress (Address: 0x180014940)
- GetProcessHeap (Address: 0x1800148c0)
- GetShortPathNameA (Address: 0x180014988)
- GetSystemDirectoryA (Address: 0x1800149b0)
- GetSystemTimeAsFileTime (Address: 0x1800147f0)
- GetThreadContext (Address: 0x180014848)
- GetTickCount (Address: 0x1800147e8)
- GetTimeFormatA (Address: 0x180014908)
- GetVersionExA (Address: 0x1800149c8)
- GetWindowsDirectoryA (Address: 0x180014a00)
- GlobalAlloc (Address: 0x180014928)
- HeapAlloc (Address: 0x1800148b8)
- HeapFree (Address: 0x1800148c8)
- InitializeCriticalSection (Address: 0x1800148a0)
- IsDBCSLeadByte (Address: 0x180014950)
- LeaveCriticalSection (Address: 0x1800147d0)
- LoadLibraryA (Address: 0x180014898)
- LoadLibraryExA (Address: 0x180014930)
- LocalAlloc (Address: 0x180014920)
- LocalFree (Address: 0x180014918)
- lstrcmpA (Address: 0x1800148d8)
- lstrcmpiA (Address: 0x1800148d0)
- MultiByteToWideChar (Address: 0x180014938)
- QueryPerformanceCounter (Address: 0x180014800)
- RaiseException (Address: 0x1800147d8)
- RaiseFailFastException (Address: 0x1800147e0)
- RemoveDirectoryA (Address: 0x1800149c0)
- ResolveDelayLoadedAPI (Address: 0x1800147c0)
- ResumeThread (Address: 0x180014850)
- SetErrorMode (Address: 0x1800149f0)
- SetFileTime (Address: 0x1800149d8)
- SetLastError (Address: 0x180014828)
- SetThreadContext (Address: 0x180014838)
- SetUnhandledExceptionFilter (Address: 0x180014810)
- Sleep (Address: 0x180014820)
- SuspendThread (Address: 0x180014858)
- SystemTimeToFileTime (Address: 0x1800149e8)
- TerminateProcess (Address: 0x180014808)
- UnhandledExceptionFilter (Address: 0x180014818)
- VerLanguageNameA (Address: 0x180014968)
- VirtualAlloc (Address: 0x180014868)
- VirtualFree (Address: 0x180014878)
- VirtualProtect (Address: 0x180014880)
- VirtualQuery (Address: 0x180014830)
msvcrt.dll
- __C_specific_handler (Address: 0x180014be0)
- _amsg_exit (Address: 0x180014c10)
- _initterm (Address: 0x180014c28)
- _itoa_s (Address: 0x180014bf8)
- _strnicmp (Address: 0x180014c00)
- _ultoa_s (Address: 0x180014bf0)
- _vsnprintf (Address: 0x180014c38)
- _vsnwprintf (Address: 0x180014c08)
- _XcptFilter (Address: 0x180014bd8)
- free (Address: 0x180014c18)
- isalpha (Address: 0x180014c40)
- malloc (Address: 0x180014c20)
- memcpy (Address: 0x180014c30)
- memset (Address: 0x180014c48)
- strncmp (Address: 0x180014be8)
ntdll.dll
- RtlCaptureContext (Address: 0x180014c58)
- RtlLookupFunctionEntry (Address: 0x180014c60)
- RtlVirtualUnwind (Address: 0x180014c68)
SHELL32.dll
- (Address: 0x180014a58)
- (Address: 0x180014a68)
- (Address: 0x180014a48)
- (Address: 0x180014a40)
- (Address: 0x180014a60)
- (Address: 0x180014a28)
- ExtractIconA (Address: 0x180014a50)
- SHBindToParent (Address: 0x180014a18)
- SHChangeNotify (Address: 0x180014a30)
- ShellExecuteA (Address: 0x180014a20)
- SHGetFolderPathA (Address: 0x180014a38)
SHLWAPI.dll
- (Address: 0x180014aa0)
- (Address: 0x180014ac8)
- (Address: 0x180014ad8)
- PathCompactPathA (Address: 0x180014ac0)
- PathFileExistsA (Address: 0x180014ae0)
- PathFindFileNameA (Address: 0x180014ab0)
- PathGetDriveNumberA (Address: 0x180014a80)
- PathGetDriveNumberW (Address: 0x180014a88)
- SHRegGetValueA (Address: 0x180014ab8)
- StrChrA (Address: 0x180014aa8)
- StrCmpNIA (Address: 0x180014a90)
- StrRetToBufW (Address: 0x180014a78)
- StrStrIA (Address: 0x180014a98)
- StrToIntA (Address: 0x180014ad0)
USER32.dll
- CharNextA (Address: 0x180014b80)
- CharPrevA (Address: 0x180014b78)
- CharUpperA (Address: 0x180014af0)
- CheckMenuItem (Address: 0x180014b60)
- CreatePopupMenu (Address: 0x180014b50)
- DestroyIcon (Address: 0x180014ba0)
- DestroyMenu (Address: 0x180014b40)
- DialogBoxParamA (Address: 0x180014bb8)
- EndDialog (Address: 0x180014b98)
- GetClientRect (Address: 0x180014bb0)
- GetDlgItem (Address: 0x180014b90)
- GetSubMenu (Address: 0x180014b30)
- GetWindowLongPtrA (Address: 0x180014b48)
- LoadIconA (Address: 0x180014b00)
- LoadMenuA (Address: 0x180014b28)
- LoadStringA (Address: 0x180014b10)
- MessageBoxA (Address: 0x180014b18)
- PostMessageA (Address: 0x180014af8)
- RegisterClipboardFormatA (Address: 0x180014b20)
- RemoveMenu (Address: 0x180014b38)
- SendDlgItemMessageA (Address: 0x180014b08)
- SendMessageA (Address: 0x180014b88)
- SetDlgItemTextA (Address: 0x180014ba8)
- SetMenuDefaultItem (Address: 0x180014b68)
- SetWindowLongPtrA (Address: 0x180014b58)
- SetWindowTextA (Address: 0x180014b70)