F:\2-Sources\21-FinalCobalt\Source\cobalt\Cobalt\Cobalt\Win32\Release\Client\Cobalt.Client.pdb
Overview
overview
3Static
static
3483fe88d70...1b.exe
windows7-x64
1483fe88d70...1b.exe
windows10-2004-x64
15bae961fec...00.exe
windows7-x64
15bae961fec...00.exe
windows10-2004-x64
163e81ac3c8...27.exe
windows7-x64
163e81ac3c8...27.exe
windows10-2004-x64
1d2b612729d...67.exe
windows7-x64
1d2b612729d...67.exe
windows10-2004-x64
1ea7ed9bb14...3f.exe
windows7-x64
1ea7ed9bb14...3f.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
483fe88d70cb09361c27468b97b7f96bd667d8c915c9f004a27d4260367d551b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
483fe88d70cb09361c27468b97b7f96bd667d8c915c9f004a27d4260367d551b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
5bae961fec67565fb88c8bcd3841b7090566d8fc12ccb70436b5269456e55c00.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
5bae961fec67565fb88c8bcd3841b7090566d8fc12ccb70436b5269456e55c00.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
63e81ac3c8e438221a088bc765158006cc99b2894d4340cf73305c43d67e9627.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
63e81ac3c8e438221a088bc765158006cc99b2894d4340cf73305c43d67e9627.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
d2b612729d0c106cb5b0434e3d5de1a5dc9d065d276d51a3fb25a08f39e18467.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
d2b612729d0c106cb5b0434e3d5de1a5dc9d065d276d51a3fb25a08f39e18467.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
ea7ed9bb14a7bda590cf3ff81c8c37703a028c4fdb4599b6a283d68fdcb2613f.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
ea7ed9bb14a7bda590cf3ff81c8c37703a028c4fdb4599b6a283d68fdcb2613f.exe
Resource
win10v2004-20240508-en
General
-
Target
Win32.Pay2Key.B.zip
-
Size
5.4MB
-
MD5
2c0c40c3c0441a915730638c7ae10c44
-
SHA1
ab23d13d194092a90493d8c9cd4ed227703cca1c
-
SHA256
c81b819b600a94fad0e61029b9e3c42600ae0f302eb76ede4781d9022da5122a
-
SHA512
7011be5cf0db118c1ae531cf0c86a281ef70b344aa639424f39a0fa2daa3c93721f2d617f97e7069e0cb1fa9b00927fd0131c6672da0b7f9bfb97388c493b3b5
-
SSDEEP
98304:anm3g+SHY48KdJhGmxVGYzpDctqsvByoQIxwUdHqdcu/AAfdB3m02r7ei+l4MkG9:aG/4VdaUBzJcsiyoQyw/lR2rcl4nQCzO
Malware Config
Signatures
-
Unsigned PE 5 IoCs
Checks for missing Authenticode signature.
resource unpack002/483fe88d70cb09361c27468b97b7f96bd667d8c915c9f004a27d4260367d551b.exe unpack002/5bae961fec67565fb88c8bcd3841b7090566d8fc12ccb70436b5269456e55c00 unpack002/63e81ac3c8e438221a088bc765158006cc99b2894d4340cf73305c43d67e9627 unpack002/d2b612729d0c106cb5b0434e3d5de1a5dc9d065d276d51a3fb25a08f39e18467 unpack002/ea7ed9bb14a7bda590cf3ff81c8c37703a028c4fdb4599b6a283d68fdcb2613f.exe
Files
-
Win32.Pay2Key.B.zip.zip
Password: infected
-
Win32.Pay2Key.B.zip
Password: infected
-
483fe88d70cb09361c27468b97b7f96bd667d8c915c9f004a27d4260367d551b.exe.exe windows:6 windows x64 arch:x64
Password: infected
79b3362178937bf9559741c46bb9e035
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
Sections
.MPRESS1 Size: 2.8MB - Virtual size: 10.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
4a1fc30ffeee48f213e256fa7bff77d8abd8acd81e3b2eb3b9c40bd3e2b04756
-
5bae961fec67565fb88c8bcd3841b7090566d8fc12ccb70436b5269456e55c00.exe windows:5 windows x86 arch:x86
Password: infected
0e6377943b05b8b3fb33a543257381a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
netapi32
NetFileClose
NetApiBufferFree
NetFileEnum
kernel32
GetPrivateProfileStringW
FormatMessageW
SetEvent
TerminateThread
TlsAlloc
InterlockedExchangeAdd
CloseHandle
QueueUserAPC
LocalFree
GetProcessHeap
WideCharToMultiByte
InterlockedIncrement
TlsFree
CreateEventA
SetConsoleCtrlHandler
FindFirstFileW
GetCurrentProcess
FindClose
MultiByteToWideChar
FileTimeToSystemTime
HeapAlloc
GetComputerNameW
GetModuleHandleW
CompareFileTime
ReleaseSemaphore
TerminateProcess
WaitForMultipleObjectsEx
OpenProcess
WaitForSingleObjectEx
CopyFileW
CreateSemaphoreA
GetSystemWindowsDirectoryW
GetProcessTimes
SetWaitableTimer
TlsSetValue
PostQueuedCompletionStatus
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetQueuedCompletionStatus
CreateEventW
Sleep
VerSetConditionMask
SleepEx
VerifyVersionInfoW
TlsGetValue
CreateIoCompletionPort
FindNextFileW
GetVolumeInformationW
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
DeleteFileW
MoveFileW
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
SetStdHandle
CreateProcessA
GetExitCodeProcess
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WaitForSingleObject
WaitForMultipleObjects
InterlockedDecrement
HeapFree
InterlockedExchange
SetFileAttributesW
GetFileAttributesW
FormatMessageA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedPopEntrySList
InterlockedPushEntrySList
SetLastError
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetCommandLineW
GetCommandLineA
WriteFile
HeapReAlloc
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
ExitThread
GetFullPathNameA
GetDriveTypeW
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameA
GetFileType
GetStdHandle
RtlUnwind
RaiseException
LoadLibraryW
VirtualProtect
UnregisterWaitEx
QueryDepthSList
TryEnterCriticalSection
GetCurrentThreadId
DuplicateHandle
GetCurrentThread
QueryPerformanceCounter
QueryPerformanceFrequency
GetStringTypeW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetTickCount
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetCurrentDirectoryW
CreateFileW
GetFileAttributesExW
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
MoveFileExW
AreFileApisANSI
CreateFileA
GetFileSize
SetFilePointer
MapViewOfFileEx
UnmapViewOfFile
GetModuleHandleA
CreateFileMappingA
OpenEventA
ResumeThread
GetLogicalProcessorInformation
CreateWaitableTimerA
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
InterlockedFlushSList
user32
wsprintfW
BeginPaint
UpdateWindow
ShutdownBlockReasonDestroy
PostQuitMessage
LoadCursorW
LoadIconW
TranslateMessage
AdjustWindowRect
ShutdownBlockReasonCreate
DispatchMessageW
ShowWindow
RegisterClassExW
SendMessageW
CreateWindowExW
DefWindowProcW
GetMessageW
SystemParametersInfoW
EndPaint
advapi32
AdjustTokenPrivileges
CryptGetUserKey
CryptDecrypt
CryptExportKey
CryptImportKey
CryptGenKey
LookupPrivilegeValueW
CryptReleaseContext
AbortSystemShutdownW
OpenProcessToken
CryptAcquireContextW
CryptEncrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
iphlpapi
GetAdaptersInfo
ws2_32
WSAStartup
setsockopt
ioctlsocket
freeaddrinfo
htonl
getsockopt
WSARecv
connect
getsockname
getaddrinfo
WSASocketW
WSASetLastError
listen
select
WSASend
closesocket
WSAIoctl
bind
accept
WSACleanup
__WSAFDIsSet
WSAGetLastError
rstrtmgr
RmEndSession
RmGetList
RmRegisterResources
RmStartSession
Sections
.text Size: 743KB - Virtual size: 742KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
63e81ac3c8e438221a088bc765158006cc99b2894d4340cf73305c43d67e9627.exe windows:4 windows x64 arch:x64
Password: infected
96c44fa1eee2c4e9b9e77d7bf42d59e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
winmm
timeEndPeriod
timeBeginPeriod
ws2_32
WSAGetOverlappedResult
kernel32
WriteFile
WriteConsoleW
WaitForSingleObject
VirtualFree
VirtualAlloc
SwitchToThread
SetWaitableTimer
SetUnhandledExceptionFilter
SetProcessPriorityBoost
SetEvent
SetErrorMode
SetConsoleCtrlHandler
LoadLibraryA
LoadLibraryW
GetSystemInfo
GetStdHandle
GetQueuedCompletionStatus
GetProcessAffinityMask
GetProcAddress
GetEnvironmentStringsW
GetConsoleMode
FreeEnvironmentStringsW
ExitProcess
DuplicateHandle
CreateThread
CreateIoCompletionPort
CreateEventA
CloseHandle
AddVectoredExceptionHandler
Sections
.text Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 123KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
d2b612729d0c106cb5b0434e3d5de1a5dc9d065d276d51a3fb25a08f39e18467.exe windows:5 windows x86 arch:x86
Password: infected
8b7ac1fd2af282ebbd5d19a84254b0c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
F:\2-Sources\21-FinalCobalt\Source\cobalt\Cobalt\Cobalt\Win32\Release\Client\Cobalt.Client.pdb
Imports
netapi32
NetFileClose
NetApiBufferFree
NetFileEnum
kernel32
GetPrivateProfileStringW
FormatMessageW
SetEvent
TerminateThread
TlsAlloc
DeleteFileW
InterlockedExchangeAdd
CloseHandle
QueueUserAPC
LocalFree
GetProcessHeap
WideCharToMultiByte
InterlockedIncrement
TlsFree
CreateEventA
SetConsoleCtrlHandler
FindFirstFileW
GetCurrentProcess
FindClose
MultiByteToWideChar
FileTimeToSystemTime
HeapAlloc
GetComputerNameW
GetModuleHandleW
GetModuleFileNameW
CreateProcessW
CompareFileTime
ReleaseSemaphore
TerminateProcess
WaitForMultipleObjectsEx
OpenProcess
WaitForSingleObjectEx
CopyFileW
CreateSemaphoreA
GetSystemWindowsDirectoryW
GetProcessTimes
PostQueuedCompletionStatus
TlsSetValue
SetLastError
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetQueuedCompletionStatus
CreateEventW
Sleep
VerSetConditionMask
SleepEx
VerifyVersionInfoW
TlsGetValue
CreateIoCompletionPort
FindNextFileW
GetVolumeInformationW
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
MoveFileW
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
SetStdHandle
CreateProcessA
GetExitCodeProcess
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WaitForSingleObject
WaitForMultipleObjects
InterlockedDecrement
HeapFree
InterlockedExchange
SetFileAttributesW
GetFileAttributesW
FormatMessageA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualProtect
InterlockedPopEntrySList
SetWaitableTimer
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetCommandLineW
GetCommandLineA
WriteFile
HeapReAlloc
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
ExitThread
GetFullPathNameA
GetDriveTypeW
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameA
GetFileType
GetStdHandle
RtlUnwind
RaiseException
VirtualFree
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
TryEnterCriticalSection
GetCurrentThreadId
DuplicateHandle
GetCurrentThread
QueryPerformanceCounter
QueryPerformanceFrequency
GetStringTypeW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetTickCount
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetCurrentDirectoryW
CreateFileW
GetFileAttributesExW
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
MoveFileExW
AreFileApisANSI
CreateFileA
GetFileSize
SetFilePointer
MapViewOfFileEx
UnmapViewOfFile
GetModuleHandleA
CreateFileMappingA
OpenEventA
ResumeThread
GetLogicalProcessorInformation
CreateWaitableTimerA
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualAlloc
InterlockedPushEntrySList
user32
wsprintfW
BeginPaint
UpdateWindow
ShutdownBlockReasonDestroy
PostQuitMessage
LoadCursorW
LoadIconW
TranslateMessage
AdjustWindowRect
ShutdownBlockReasonCreate
DispatchMessageW
ShowWindow
RegisterClassExW
SendMessageW
CreateWindowExW
DefWindowProcW
GetMessageW
SystemParametersInfoW
EndPaint
advapi32
AdjustTokenPrivileges
CryptGetUserKey
CryptDecrypt
CryptExportKey
CryptImportKey
CryptGenKey
LookupPrivilegeValueW
CryptReleaseContext
AbortSystemShutdownW
OpenProcessToken
CryptAcquireContextW
CryptEncrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
iphlpapi
GetAdaptersInfo
ws2_32
WSAStartup
setsockopt
ioctlsocket
freeaddrinfo
htonl
getsockopt
WSARecv
connect
getsockname
getaddrinfo
WSASocketW
WSASetLastError
listen
select
WSASend
closesocket
WSAIoctl
bind
accept
WSACleanup
__WSAFDIsSet
WSAGetLastError
rstrtmgr
RmEndSession
RmStartSession
RmGetList
RmRegisterResources
Sections
.text Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ea7ed9bb14a7bda590cf3ff81c8c37703a028c4fdb4599b6a283d68fdcb2613f.exe.exe windows:5 windows x86 arch:x86
Password: infected
0e6377943b05b8b3fb33a543257381a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
F:\2-Sources\21-FinalCobalt\Source\cobalt\Cobalt\Cobalt\Win32\Release\Client\Cobalt.Client.pdb
Imports
netapi32
NetFileClose
NetApiBufferFree
NetFileEnum
kernel32
GetPrivateProfileStringW
FormatMessageW
SetEvent
TerminateThread
TlsAlloc
InterlockedExchangeAdd
CloseHandle
QueueUserAPC
LocalFree
GetProcessHeap
WideCharToMultiByte
InterlockedIncrement
TlsFree
CreateEventA
SetConsoleCtrlHandler
FindFirstFileW
GetCurrentProcess
FindClose
MultiByteToWideChar
FileTimeToSystemTime
HeapAlloc
GetComputerNameW
GetModuleHandleW
CompareFileTime
ReleaseSemaphore
TerminateProcess
WaitForMultipleObjectsEx
OpenProcess
WaitForSingleObjectEx
CopyFileW
CreateSemaphoreA
GetSystemWindowsDirectoryW
GetProcessTimes
SetWaitableTimer
TlsSetValue
PostQueuedCompletionStatus
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetQueuedCompletionStatus
CreateEventW
Sleep
VerSetConditionMask
SleepEx
VerifyVersionInfoW
TlsGetValue
CreateIoCompletionPort
FindNextFileW
GetVolumeInformationW
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
DeleteFileW
MoveFileW
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
SetStdHandle
CreateProcessA
GetExitCodeProcess
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WaitForSingleObject
WaitForMultipleObjects
InterlockedDecrement
HeapFree
InterlockedExchange
SetFileAttributesW
GetFileAttributesW
FormatMessageA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedPopEntrySList
InterlockedPushEntrySList
SetLastError
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetCommandLineW
GetCommandLineA
WriteFile
HeapReAlloc
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
ExitThread
GetFullPathNameA
GetDriveTypeW
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameA
GetFileType
GetStdHandle
RtlUnwind
RaiseException
LoadLibraryW
VirtualProtect
UnregisterWaitEx
QueryDepthSList
TryEnterCriticalSection
GetCurrentThreadId
DuplicateHandle
GetCurrentThread
QueryPerformanceCounter
QueryPerformanceFrequency
GetStringTypeW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetTickCount
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetCurrentDirectoryW
CreateFileW
GetFileAttributesExW
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
MoveFileExW
AreFileApisANSI
CreateFileA
GetFileSize
SetFilePointer
MapViewOfFileEx
UnmapViewOfFile
GetModuleHandleA
CreateFileMappingA
OpenEventA
ResumeThread
GetLogicalProcessorInformation
CreateWaitableTimerA
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
InterlockedFlushSList
user32
wsprintfW
BeginPaint
UpdateWindow
ShutdownBlockReasonDestroy
PostQuitMessage
LoadCursorW
LoadIconW
TranslateMessage
AdjustWindowRect
ShutdownBlockReasonCreate
DispatchMessageW
ShowWindow
RegisterClassExW
SendMessageW
CreateWindowExW
DefWindowProcW
GetMessageW
SystemParametersInfoW
EndPaint
advapi32
AdjustTokenPrivileges
CryptGetUserKey
CryptDecrypt
CryptExportKey
CryptImportKey
CryptGenKey
LookupPrivilegeValueW
CryptReleaseContext
AbortSystemShutdownW
OpenProcessToken
CryptAcquireContextW
CryptEncrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
iphlpapi
GetAdaptersInfo
ws2_32
WSAStartup
setsockopt
ioctlsocket
freeaddrinfo
htonl
getsockopt
WSARecv
connect
getsockname
getaddrinfo
WSASocketW
WSASetLastError
listen
select
WSASend
closesocket
WSAIoctl
bind
accept
WSACleanup
__WSAFDIsSet
WSAGetLastError
rstrtmgr
RmEndSession
RmGetList
RmRegisterResources
RmStartSession
Sections
.text Size: 743KB - Virtual size: 742KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ