Overview
overview
5Static
static
5Cracks.rar
windows7-x64
3Cracks.rar
windows10-2004-x64
3V1 (01.02....me.dll
windows7-x64
1V1 (01.02....me.dll
windows10-2004-x64
1V1 (01.02....me.ini
windows7-x64
1V1 (01.02....me.ini
windows10-2004-x64
1V1 (01.02....er.exe
windows7-x64
1V1 (01.02....er.exe
windows10-2004-x64
1V1 (01.02....DM.exe
windows7-x64
3V1 (01.02....DM.exe
windows10-2004-x64
3V2 (08.02....me.dll
windows7-x64
1V2 (08.02....me.dll
windows10-2004-x64
1V2 (08.02....me.ini
windows7-x64
1V2 (08.02....me.ini
windows10-2004-x64
1V2 (08.02....er.exe
windows7-x64
1V2 (08.02....er.exe
windows10-2004-x64
1V2 (08.02....DM.exe
windows7-x64
3V2 (08.02....DM.exe
windows10-2004-x64
3V3 (02.03....me.dll
windows7-x64
1V3 (02.03....me.dll
windows10-2004-x64
1V3 (02.03....me.ini
windows7-x64
1V3 (02.03....me.ini
windows10-2004-x64
1V3 (02.03....er.exe
windows7-x64
1V3 (02.03....er.exe
windows10-2004-x64
1V3 (02.03....DM.exe
windows7-x64
3V3 (02.03....DM.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Cracks.rar
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Cracks.rar
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
V1 (01.02.2015)/3dmgame.dll
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
V1 (01.02.2015)/3dmgame.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
V1 (01.02.2015)/3dmgame.ini
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
V1 (01.02.2015)/3dmgame.ini
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
V1 (01.02.2015)/Launcher.exe
Resource
win7-20230705-en
Behavioral task
behavioral8
Sample
V1 (01.02.2015)/Launcher.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
V1 (01.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe
Resource
win7-20230703-en
Behavioral task
behavioral10
Sample
V1 (01.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
V2 (08.02.2015)/3dmgame.dll
Resource
win7-20230703-en
Behavioral task
behavioral12
Sample
V2 (08.02.2015)/3dmgame.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
V2 (08.02.2015)/3dmgame.ini
Resource
win7-20230703-en
Behavioral task
behavioral14
Sample
V2 (08.02.2015)/3dmgame.ini
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
V2 (08.02.2015)/Launcher.exe
Resource
win7-20230703-en
Behavioral task
behavioral16
Sample
V2 (08.02.2015)/Launcher.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
V2 (08.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe
Resource
win7-20230703-en
Behavioral task
behavioral18
Sample
V2 (08.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
V3 (02.03.2015)/3dmgame.dll
Resource
win7-20230703-en
Behavioral task
behavioral20
Sample
V3 (02.03.2015)/3dmgame.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
V3 (02.03.2015)/3dmgame.ini
Resource
win7-20230703-en
Behavioral task
behavioral22
Sample
V3 (02.03.2015)/3dmgame.ini
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
V3 (02.03.2015)/Launcher.exe
Resource
win7-20230705-en
Behavioral task
behavioral24
Sample
V3 (02.03.2015)/Launcher.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
V3 (02.03.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe
Resource
win7-20230703-en
Behavioral task
behavioral26
Sample
V3 (02.03.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe
Resource
win10v2004-20230703-en
General
-
Target
Cracks.rar
-
Size
3.0MB
-
MD5
390d039e5951a642e2342c17f6f9857a
-
SHA1
869b414fc25f3ad3ee30fc426fd790517436d364
-
SHA256
06d28cc280dd732386109df526fe7b91e3e521baae918a7b7e73cce8f31c82ab
-
SHA512
28e1f71753898b97aa77072515e5c6f3232ce7bbee389b602726ac0124344d235370b5604f5573dc59e5f7d98519e40347ba0c1d368eb97faf1832616d750bdb
-
SSDEEP
49152:VFXAy1HYP4/mW6gmuYPvuGU9WC+fK3KG89Hw9Rt5/ZztnUYPTjaVMKvu7+GHM:Qy1Hce6FuyuGU9Wy6RQ9vhZztnRqVMKJ
Malware Config
Signatures
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack001/V1 (01.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe autoit_exe static1/unpack001/V2 (08.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe autoit_exe static1/unpack001/V3 (02.03.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe autoit_exe -
Unsigned PE 9 IoCs
Checks for missing Authenticode signature.
resource unpack001/V1 (01.02.2015)/3dmgame.dll unpack001/V1 (01.02.2015)/Launcher.exe unpack001/V1 (01.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe unpack001/V2 (08.02.2015)/3dmgame.dll unpack001/V2 (08.02.2015)/Launcher.exe unpack001/V2 (08.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe unpack001/V3 (02.03.2015)/3dmgame.dll unpack001/V3 (02.03.2015)/Launcher.exe unpack001/V3 (02.03.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe
Files
-
Cracks.rar.rar
-
V1 (01.02.2015)/3dmgame.dll.dll windows x64
4494230761600cc31b74c7b661a443be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualProtectEx
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
SuspendThread
ResumeThread
EnterCriticalSection
SetEnvironmentVariableW
GetVersionExW
DisableThreadLibraryCalls
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
CreateThread
VirtualAlloc
GetProcAddress
FlushInstructionCache
SetThreadPriority
LeaveCriticalSection
Sleep
InitializeCriticalSection
VirtualFree
GetModuleHandleW
GetCurrentProcess
VirtualQuery
GetThreadContext
CreateFileA
FlushConsoleInputBuffer
LoadLibraryW
FreeLibrary
GlobalMemoryStatus
GetStdHandle
GetFileType
MultiByteToWideChar
GetVersion
GetLastError
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetCurrentThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
DecodePointer
EncodePointer
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetProcessWindowStation
GetUserObjectInformationW
GetMessageW
UnregisterClassW
PostMessageW
FindWindowExA
TranslateMessage
RegisterClassExW
ShowWindow
CreateWindowExW
MessageBoxW
MessageBoxExW
DefWindowProcW
DispatchMessageW
GetDesktopWindow
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
msvcr100
fclose
_malloc_crt
_initterm
_initterm_e
_encoded_null
_amsg_exit
__C_specific_handler
__CppXcptFilter
__crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
feof
ftell
_fileno
_setmode
fwrite
??3@YAXPEAX@Z
memset
wcsstr
_wfopen
_access
??_U@YAPEAX_K@Z
sprintf
strtoul
strchr
malloc
free
isspace
printf
_snprintf
fflush
__iob_func
memmove
_wassert
fseek
fgets
fopen
fread
ferror
_errno
_strnicmp
atoi
isxdigit
tolower
isupper
strncmp
_gmtime64
fputs
signal
strstr
memcpy
_time64
strncpy
realloc
memcmp
qsort
sscanf
getenv
_vsnwprintf
vfprintf
_exit
raise
isdigit
strcmp
fprintf
_getch
shlwapi
PathAddBackslashW
PathFileExistsW
PathAppendW
advapi32
ReportEventW
DeregisterEventSource
RegisterEventSourceW
Sections
.text Size: - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.3dm0 Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3dm1 Size: - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3dm2 Size: 717KB - Virtual size: 716KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
V1 (01.02.2015)/3dmgame.ini
-
V1 (01.02.2015)/Launcher.exe.exe windows x64
27832b03245210305d132e03a450e4fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcpyA
lstrlenA
GetStartupInfoA
CreateProcessA
VirtualAllocEx
WriteProcessMemory
GetProcAddress
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
ResumeThread
GetCurrentDirectoryA
GetPrivateProfileStringA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
TerminateProcess
EncodePointer
Sleep
msvcr100
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
__set_app_type
_fmode
_commode
_configthreadlocale
_initterm_e
_initterm
__initenv
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__getmainargs
_amsg_exit
sprintf
__setusermatherr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 494KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
V1 (01.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe.exe windows x86
dc85745f3fae2d705c8f0d13d19cab58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
setsockopt
ntohs
recvfrom
sendto
htons
select
listen
WSAStartup
bind
closesocket
connect
socket
send
WSACleanup
ioctlsocket
accept
WSAGetLastError
inet_addr
gethostbyname
gethostname
recv
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
waveOutSetVolume
mciSendStringW
comctl32
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
ImageList_SetDragCursorImage
ImageList_Remove
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_BeginDrag
mpr
WNetUseConnectionW
WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
wininet
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetQueryOptionW
InternetQueryDataAvailable
psapi
EnumProcesses
GetModuleBaseNameW
GetProcessMemoryInfo
EnumProcessModules
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
LoadUserProfileW
kernel32
HeapFree
Sleep
GetCurrentThreadId
MulDiv
GetVersionExW
GetSystemInfo
SetErrorMode
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcpyW
MultiByteToWideChar
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
FindNextFileW
MoveFileW
CopyFileW
CreateDirectoryW
GetProcessHeap
SetSystemPowerState
QueryPerformanceFrequency
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetLocalTime
CompareStringW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
DeviceIoControl
SetFileAttributesW
GetShortPathNameW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
SetPriorityClass
LoadLibraryW
VirtualAlloc
LoadLibraryExW
HeapAlloc
WaitForSingleObject
CreateThread
DuplicateHandle
GetCurrentProcess
GetCurrentThread
CloseHandle
GetLastError
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
IsDebuggerPresent
GetCurrentDirectoryW
lstrcmpiW
RaiseException
ExitProcess
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
HeapCreate
SetHandleCount
GetFileType
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringW
RtlUnwind
SetFilePointer
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
HeapReAlloc
WriteConsoleW
SetEndOfFile
RemoveDirectoryW
SetEnvironmentVariableA
user32
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
ReleaseCapture
SetCapture
WindowFromPoint
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
CharLowerBuffW
MonitorFromRect
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
IsCharLowerW
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
GetClipboardData
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
IsCharAlphaNumericW
IsCharAlphaW
GetKeyboardLayoutNameW
ClientToScreen
RegisterHotKey
GetCursorInfo
SetWindowPos
CopyImage
AdjustWindowRectEx
SetRect
SetClipboardData
EmptyClipboard
CountClipboardFormats
DeleteMenu
CloseClipboard
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
IsClipboardFormatAvailable
OpenClipboard
BlockInput
keybd_event
GetMessageW
IsWindowVisible
gdi32
EndPath
GetTextExtentPoint32W
DeleteObject
ExtCreatePen
StrokeAndFillPath
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
SetPixel
CloseFigure
DeleteDC
GetPixel
CreateDCW
LineTo
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
CreateFontW
GetTextFaceW
GetStockObject
StrokePath
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
GetUserNameW
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
GetAce
AddAce
InitiateSystemShutdownExW
OpenSCManagerW
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
SetSecurityDescriptorDacl
shell32
DragQueryPoint
ShellExecuteExW
SHGetFolderPathW
DragQueryFileW
SHEmptyRecycleBinW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
IIDFromString
StringFromGUID2
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
oleaut32
VariantCopyInd
DispCallFunc
CreateStdDispatch
CreateDispTypeInfo
UnRegisterTypeLi
UnRegisterTypeLibForUser
RegisterTypeLibForUser
RegisterTypeLi
LoadTypeLibEx
SafeArrayDestroyDescriptor
SafeArrayDestroyData
VariantChangeType
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
OleLoadPicture
QueryPathOfRegTypeLi
SafeArrayCreateVector
SysAllocString
SysFreeString
VariantInit
VariantClear
SysStringLen
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
SafeArrayUnaccessData
VariantCopy
Sections
.text Size: 546KB - Virtual size: 546KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
V2 (08.02.2015)/3dmgame.dll.dll windows x64
8f45c89063f6c60f1548f8e5acc7b806
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualProtectEx
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
SuspendThread
ResumeThread
EnterCriticalSection
SetEnvironmentVariableW
GetVersionExW
DisableThreadLibraryCalls
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
CreateThread
VirtualAlloc
GetProcAddress
FlushInstructionCache
SetThreadPriority
LeaveCriticalSection
Sleep
InitializeCriticalSection
VirtualFree
GetModuleHandleW
GetCurrentProcess
VirtualQuery
GetThreadContext
CreateFileA
FlushConsoleInputBuffer
LoadLibraryW
FreeLibrary
GlobalMemoryStatus
GetStdHandle
GetFileType
MultiByteToWideChar
GetVersion
GetLastError
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetCurrentThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
DecodePointer
EncodePointer
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetProcessWindowStation
GetUserObjectInformationW
GetMessageW
UnregisterClassW
PostMessageW
FindWindowExA
TranslateMessage
RegisterClassExW
ShowWindow
CreateWindowExW
MessageBoxW
MessageBoxExW
DefWindowProcW
DispatchMessageW
GetDesktopWindow
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
msvcr100
_malloc_crt
_initterm
_initterm_e
_encoded_null
_amsg_exit
__C_specific_handler
__CppXcptFilter
__crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_getch
feof
ftell
_fileno
fclose
fwrite
??3@YAXPEAX@Z
wcsstr
_wfopen
_access
??_U@YAPEAX_K@Z
sprintf
strtoul
strchr
malloc
free
isspace
printf
_snprintf
fflush
__iob_func
memmove
_wassert
fseek
fgets
_setmode
fopen
fread
_errno
_strnicmp
atoi
isxdigit
tolower
isupper
strncmp
_gmtime64
fputs
signal
strstr
memcpy
memset
_time64
strncpy
realloc
memcmp
qsort
sscanf
getenv
_vsnwprintf
vfprintf
_exit
raise
isdigit
strcmp
fprintf
ferror
shlwapi
PathAppendW
PathFileExistsW
PathAddBackslashW
advapi32
ReportEventW
DeregisterEventSource
RegisterEventSourceW
Sections
.text Size: - Virtual size: 485KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 464KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.3dm0 Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3dm1 Size: - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3dm2 Size: 801KB - Virtual size: 800KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
V2 (08.02.2015)/3dmgame.ini
-
V2 (08.02.2015)/Launcher.exe.exe windows x64
27832b03245210305d132e03a450e4fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcpyA
lstrlenA
GetStartupInfoA
CreateProcessA
VirtualAllocEx
WriteProcessMemory
GetProcAddress
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
ResumeThread
GetCurrentDirectoryA
GetPrivateProfileStringA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
TerminateProcess
EncodePointer
Sleep
msvcr100
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
__set_app_type
_fmode
_commode
_configthreadlocale
_initterm_e
_initterm
__initenv
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__getmainargs
_amsg_exit
sprintf
__setusermatherr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 494KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
V2 (08.02.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe.exe windows x86
dc85745f3fae2d705c8f0d13d19cab58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
setsockopt
ntohs
recvfrom
sendto
htons
select
listen
WSAStartup
bind
closesocket
connect
socket
send
WSACleanup
ioctlsocket
accept
WSAGetLastError
inet_addr
gethostbyname
gethostname
recv
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
waveOutSetVolume
mciSendStringW
comctl32
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
ImageList_SetDragCursorImage
ImageList_Remove
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_BeginDrag
mpr
WNetUseConnectionW
WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
wininet
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetQueryOptionW
InternetQueryDataAvailable
psapi
EnumProcesses
GetModuleBaseNameW
GetProcessMemoryInfo
EnumProcessModules
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
LoadUserProfileW
kernel32
HeapFree
Sleep
GetCurrentThreadId
MulDiv
GetVersionExW
GetSystemInfo
SetErrorMode
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcpyW
MultiByteToWideChar
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
FindNextFileW
MoveFileW
CopyFileW
CreateDirectoryW
GetProcessHeap
SetSystemPowerState
QueryPerformanceFrequency
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetLocalTime
CompareStringW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
DeviceIoControl
SetFileAttributesW
GetShortPathNameW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
SetPriorityClass
LoadLibraryW
VirtualAlloc
LoadLibraryExW
HeapAlloc
WaitForSingleObject
CreateThread
DuplicateHandle
GetCurrentProcess
GetCurrentThread
CloseHandle
GetLastError
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
IsDebuggerPresent
GetCurrentDirectoryW
lstrcmpiW
RaiseException
ExitProcess
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
HeapCreate
SetHandleCount
GetFileType
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringW
RtlUnwind
SetFilePointer
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
HeapReAlloc
WriteConsoleW
SetEndOfFile
RemoveDirectoryW
SetEnvironmentVariableA
user32
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
ReleaseCapture
SetCapture
WindowFromPoint
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
CharLowerBuffW
MonitorFromRect
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
IsCharLowerW
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
GetClipboardData
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
IsCharAlphaNumericW
IsCharAlphaW
GetKeyboardLayoutNameW
ClientToScreen
RegisterHotKey
GetCursorInfo
SetWindowPos
CopyImage
AdjustWindowRectEx
SetRect
SetClipboardData
EmptyClipboard
CountClipboardFormats
DeleteMenu
CloseClipboard
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
IsClipboardFormatAvailable
OpenClipboard
BlockInput
keybd_event
GetMessageW
IsWindowVisible
gdi32
EndPath
GetTextExtentPoint32W
DeleteObject
ExtCreatePen
StrokeAndFillPath
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
SetPixel
CloseFigure
DeleteDC
GetPixel
CreateDCW
LineTo
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
CreateFontW
GetTextFaceW
GetStockObject
StrokePath
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
GetUserNameW
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
GetAce
AddAce
InitiateSystemShutdownExW
OpenSCManagerW
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
SetSecurityDescriptorDacl
shell32
DragQueryPoint
ShellExecuteExW
SHGetFolderPathW
DragQueryFileW
SHEmptyRecycleBinW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
IIDFromString
StringFromGUID2
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
oleaut32
VariantCopyInd
DispCallFunc
CreateStdDispatch
CreateDispTypeInfo
UnRegisterTypeLi
UnRegisterTypeLibForUser
RegisterTypeLibForUser
RegisterTypeLi
LoadTypeLibEx
SafeArrayDestroyDescriptor
SafeArrayDestroyData
VariantChangeType
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
OleLoadPicture
QueryPathOfRegTypeLi
SafeArrayCreateVector
SysAllocString
SysFreeString
VariantInit
VariantClear
SysStringLen
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
SafeArrayUnaccessData
VariantCopy
Sections
.text Size: 546KB - Virtual size: 546KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
V3 (02.03.2015)/3dmgame.dll.dll windows x64
4494230761600cc31b74c7b661a443be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualProtectEx
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
SuspendThread
ResumeThread
EnterCriticalSection
SetEnvironmentVariableW
GetVersionExW
DisableThreadLibraryCalls
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
CreateThread
VirtualAlloc
GetProcAddress
FlushInstructionCache
SetThreadPriority
LeaveCriticalSection
Sleep
InitializeCriticalSection
VirtualFree
GetModuleHandleW
GetCurrentProcess
VirtualQuery
GetThreadContext
CreateFileA
FlushConsoleInputBuffer
LoadLibraryW
FreeLibrary
GlobalMemoryStatus
GetStdHandle
GetFileType
MultiByteToWideChar
GetVersion
GetLastError
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetCurrentThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
DecodePointer
EncodePointer
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetProcessWindowStation
GetUserObjectInformationW
GetMessageW
UnregisterClassW
PostMessageW
FindWindowExA
TranslateMessage
RegisterClassExW
ShowWindow
CreateWindowExW
MessageBoxW
MessageBoxExW
DefWindowProcW
DispatchMessageW
GetDesktopWindow
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
msvcr100
fclose
_malloc_crt
_initterm
_initterm_e
_encoded_null
_amsg_exit
__C_specific_handler
__CppXcptFilter
__crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
feof
ftell
_fileno
_setmode
fwrite
??3@YAXPEAX@Z
memset
wcsstr
_wfopen
_access
??_U@YAPEAX_K@Z
sprintf
strtoul
strchr
malloc
free
isspace
printf
_snprintf
fflush
__iob_func
memmove
_wassert
fseek
fgets
fopen
fread
ferror
_errno
_strnicmp
atoi
isxdigit
tolower
isupper
strncmp
_gmtime64
fputs
signal
strstr
memcpy
_time64
strncpy
realloc
memcmp
qsort
sscanf
getenv
_vsnwprintf
vfprintf
_exit
raise
isdigit
strcmp
fprintf
_getch
shlwapi
PathAddBackslashW
PathFileExistsW
PathAppendW
advapi32
ReportEventW
DeregisterEventSource
RegisterEventSourceW
Sections
.text Size: - Virtual size: 488KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 547KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.3dm0 Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3dm1 Size: - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3dm2 Size: 832KB - Virtual size: 832KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
V3 (02.03.2015)/3dmgame.ini
-
V3 (02.03.2015)/Launcher.exe.exe windows x64
27832b03245210305d132e03a450e4fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcpyA
lstrlenA
GetStartupInfoA
CreateProcessA
VirtualAllocEx
WriteProcessMemory
GetProcAddress
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
ResumeThread
GetCurrentDirectoryA
GetPrivateProfileStringA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
TerminateProcess
EncodePointer
Sleep
msvcr100
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
__set_app_type
_fmode
_commode
_configthreadlocale
_initterm_e
_initterm
__initenv
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__getmainargs
_amsg_exit
sprintf
__setusermatherr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 494KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
V3 (02.03.2015)/Origin.Games.Reg.Tools.v1.0-3DM.exe.exe windows x86
dc85745f3fae2d705c8f0d13d19cab58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
setsockopt
ntohs
recvfrom
sendto
htons
select
listen
WSAStartup
bind
closesocket
connect
socket
send
WSACleanup
ioctlsocket
accept
WSAGetLastError
inet_addr
gethostbyname
gethostname
recv
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
waveOutSetVolume
mciSendStringW
comctl32
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
ImageList_SetDragCursorImage
ImageList_Remove
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_BeginDrag
mpr
WNetUseConnectionW
WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
wininet
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetQueryOptionW
InternetQueryDataAvailable
psapi
EnumProcesses
GetModuleBaseNameW
GetProcessMemoryInfo
EnumProcessModules
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
LoadUserProfileW
kernel32
HeapFree
Sleep
GetCurrentThreadId
MulDiv
GetVersionExW
GetSystemInfo
SetErrorMode
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcpyW
MultiByteToWideChar
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
FindNextFileW
MoveFileW
CopyFileW
CreateDirectoryW
GetProcessHeap
SetSystemPowerState
QueryPerformanceFrequency
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetLocalTime
CompareStringW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
DeviceIoControl
SetFileAttributesW
GetShortPathNameW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
SetPriorityClass
LoadLibraryW
VirtualAlloc
LoadLibraryExW
HeapAlloc
WaitForSingleObject
CreateThread
DuplicateHandle
GetCurrentProcess
GetCurrentThread
CloseHandle
GetLastError
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
IsDebuggerPresent
GetCurrentDirectoryW
lstrcmpiW
RaiseException
ExitProcess
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
HeapCreate
SetHandleCount
GetFileType
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringW
RtlUnwind
SetFilePointer
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
HeapReAlloc
WriteConsoleW
SetEndOfFile
RemoveDirectoryW
SetEnvironmentVariableA
user32
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
ReleaseCapture
SetCapture
WindowFromPoint
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
CharLowerBuffW
MonitorFromRect
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
IsCharLowerW
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
GetClipboardData
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
IsCharAlphaNumericW
IsCharAlphaW
GetKeyboardLayoutNameW
ClientToScreen
RegisterHotKey
GetCursorInfo
SetWindowPos
CopyImage
AdjustWindowRectEx
SetRect
SetClipboardData
EmptyClipboard
CountClipboardFormats
DeleteMenu
CloseClipboard
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
IsClipboardFormatAvailable
OpenClipboard
BlockInput
keybd_event
GetMessageW
IsWindowVisible
gdi32
EndPath
GetTextExtentPoint32W
DeleteObject
ExtCreatePen
StrokeAndFillPath
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
SetPixel
CloseFigure
DeleteDC
GetPixel
CreateDCW
LineTo
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
CreateFontW
GetTextFaceW
GetStockObject
StrokePath
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
GetUserNameW
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
GetAce
AddAce
InitiateSystemShutdownExW
OpenSCManagerW
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
SetSecurityDescriptorDacl
shell32
DragQueryPoint
ShellExecuteExW
SHGetFolderPathW
DragQueryFileW
SHEmptyRecycleBinW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
IIDFromString
StringFromGUID2
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
oleaut32
VariantCopyInd
DispCallFunc
CreateStdDispatch
CreateDispTypeInfo
UnRegisterTypeLi
UnRegisterTypeLibForUser
RegisterTypeLibForUser
RegisterTypeLi
LoadTypeLibEx
SafeArrayDestroyDescriptor
SafeArrayDestroyData
VariantChangeType
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
OleLoadPicture
QueryPathOfRegTypeLi
SafeArrayCreateVector
SysAllocString
SysFreeString
VariantInit
VariantClear
SysStringLen
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
SafeArrayUnaccessData
VariantCopy
Sections
.text Size: 546KB - Virtual size: 546KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ