���+�� B���Q���L��S������u��s�F����Cy�ԩ�t�i!^3�1��}�{�-X ?�M��.[���ͅx��e���.B�}R�����y� pf�q�f��W>�"��3&�0'��yZ�QXwd�g���.��y�)�6{b��J��D�����E��.��3à���ڧ4��WP��GT+<��jW���<�ƾ��ӟ�*�so�_�U78�}�8h��=��O�E�����xO�����ˣo�9��vA���Oo����u�8G��P������������_ޖ�{��:�����l�,Mi�����^=F�&�W�~0<���w����lL>?6lF��lcxMb�?(���X���o�"3��LRס{�kC-�H��ϕ�U"Q�0�Y*x�o���hk����I�� f&_}�cһ϶cQ�;2w4wYNc�� ;������?@���LNu��oL�/4�� �@�r5�J8]�]�����)�� Ar��A�0��~<fy%O#1w�DFܡ��4��_m���TB��< lnޝ�s��[o����j��7���z��~ (�)cIT�����|V��P���2���۴�B��tNeZ4�}�bQ�̲�h52��gC=a��UTVjMk�8s�P��Ъmj����E~lC���7�4�Rl<K����n���M�B�f�KG��0�>�N�&�@��Iyxb��a2ZvVi�{e�'`����5�����C�t#uh��%A� k?;g.X��Eh'C`na Mr ���)�f�S�`8+��G��R�gܕ釔%w��!������'yZ˚ q'�Tq���M�'X����G#��'3��n������5k �^&l-�~�:8�'�ۣ����D8�*����/R����l��#.l����^ ����z����BCJ`�qT��>��YX� m�W�ל�"����_�R����L��(��8ʪ�"{L%� ٻk�h��+V�.��?�"&&:Y�ь]�fv,� ����8y��k����y���� B���㏓�Q|����|U o����={���+����p�H��2����t>��^��09��G%E��f��K�]�=��@7L����̏�$[�O�f��<���N�?��\��H|��p7.��,�O�f"'��u�`X�Kx}���e��,���z �`���ۺVx��u��V����K�=�ȶ]S�͐������a�!�>#O�Cn�moTC]$�_ÙQњ�-���#�=)��dF��+�Ҳ7�Q��;�a���%ɣ>�^U����\+ �* ���� ����E��!US���SC���V�� 8y��S~_���lW��E����IŔkz�/���'e!Db;D��VX��%$����v#B���DS�����S��LB�����;|�"Ʊ}�Y��No�+�E�D-�g-�8��p�O�!M3�Zh3�f15쑾� Ƈ�d�N��rL}�P���AcČ҉"9)�o�B�Z]1};p�'���*d]fU�P8aM͎���ء����s��b�H���aʇ����fL�JZ�j�ui�#����;Un�>���l<�G <6,6!F����m�T��*\Wk?86�s�)�dga�T���K:KY�-'B���>{I�C�$,��.�=��qC]���4�D�H�ۡ�D��3̓5Ή���<�����<���h�-�����De4���""�|�J?[lJ>xРAm��<5�u���,k������pJ�q��H�|�W�;E<��ՌHL� f>jf�g�M;�*8u��56|���_��fm�̄��B���U�J��ܳ��A���m� �З�:\f�Z�@r����8��>zl7$�ǯRM�����4� �V���j=�$�s�F!�=P h�ې�C;��n^���ʎEk{.h#�B�� <�t+�zE -��Ú�ߑ��KI;�U�M�5ֆ�$�JFY� QC ���xKG{�!��]���v��\�WX^������¿���ՠ.=�EX�P�#�ѥ�x*x��sa�Yn^m��YUVt�D�cC��Kx�]���i!0e7������m��ȯI��:r9�� ֜L�]����V� lzJ( �?��-�c�Yԉ|�rV�5�����5��@�H���Zoo����e�þ��+���y�,���>[5�ʃ�&�w�3��|p�u빋��� �����uE���m�L �:xrw,�����7�����oXi�r�~�B�+u��|(Da<��F��X�����pr�͆4'� �� �ҢA��C����,���A~Kŵ;m�_���H</�����#6�h���8�V����w�!\�6i蹇独��p}� �{��z��B��w���;y/�;��h-��!�K��}�jV&F�v;ޠp�/��U+�d�mzH����M� '�ѳ��j; ��P��)�n(K�h[�{�����>�^8)|�g #�ww~g�s�8Ǫ߰翙t���v���qg��x'�S��c���k]i1�+��5`4!( ��)�Q�h7�2�Y�S�.�������@��[oD�| ��b[�3���m���46�ql�H�E�x�����ڮd�DZ,SX`4+� :[ ݝ���lϭ�ݤ�F����d���R$����u�k���S�)V��Q�,gbsB ����U�,;�4D ��,��l�� ������Ƨ�x�����L�nvM{N����*cZn\?G���G-��K�}��Ǝ���������0u k�\��&�A*%ᅛ')�\�~! 'z��1\�W���to"77kJ���1�=�P�&?��+X�O���Go��',�������T�̫��%D*ͮf�q=E p�fѩU��W� �#[�D��O�n�o���Xj���W��2��9�t�A-��Y`��|j(�~������M~y��m��B��rG�����i��� �^9��>Z�Ya���5�&� ^t��&[�fW�@t�̂_��Ls�'j~p�PX�h����˱��z�Q+�!j�,8A�Bg�U���]�q��vv*��'��u�0_�V���B��u�$�ᇙ����|�C�2��K����,�Ha�K(~x��� �z�r������5��i��Y�Q��� �R5�*F?�R/j�6EYv�/(��=�ϒHu�� 9��P�jn�-����J�H^��$�8���Y�u,T��q��q����_�����(�=�
Overview
overview
10Static
static
7888 RAT 1.2.5.exe
windows10-1703-x64
10888 RAT 1.2.5.exe
windows7-x64
7888 RAT 1.2.5.exe
windows10-2004-x64
10888 RAT 1.2.5.exe
windows11-21h2-x64
10888 Rat 1....or.exe
windows10-1703-x64
10888 Rat 1....or.exe
windows7-x64
8888 Rat 1....or.exe
windows10-2004-x64
10888 Rat 1....or.exe
windows11-21h2-x64
10888 Rat 1....2).exe
windows10-1703-x64
10888 Rat 1....2).exe
windows7-x64
8888 Rat 1....2).exe
windows10-2004-x64
10888 Rat 1....2).exe
windows11-21h2-x64
10888 rat 1.2.1.exe
windows10-1703-x64
10888 rat 1.2.1.exe
windows7-x64
7888 rat 1.2.1.exe
windows10-2004-x64
7888 rat 1.2.1.exe
windows11-21h2-x64
7Behavioral task
behavioral1
Sample
888 RAT 1.2.5.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
888 RAT 1.2.5.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
888 RAT 1.2.5.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
888 RAT 1.2.5.exe
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
888 Rat 1.2.4 Cracked By Escanor.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
888 Rat 1.2.4 Cracked By Escanor.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
888 Rat 1.2.4 Cracked By Escanor.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
888 Rat 1.2.4 Cracked By Escanor.exe
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
888 Rat 1.2.4 Cracked For Lifetime (2).exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
888 Rat 1.2.4 Cracked For Lifetime (2).exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
888 Rat 1.2.4 Cracked For Lifetime (2).exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
888 Rat 1.2.4 Cracked For Lifetime (2).exe
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
888 rat 1.2.1.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
888 rat 1.2.1.exe
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
888 rat 1.2.1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
888 rat 1.2.1.exe
Resource
win11-20240709-en
General
-
Target
888.zip
-
Size
318.6MB
-
MD5
20f2ec7536dafbafe3500212ac0acec8
-
SHA1
601cb29d855cda970bd2323194b169e544b02d3c
-
SHA256
a0870503b673085716382adb59f7cfcd71bfc1b67c5561142150bdee6751167f
-
SHA512
78292faca10cb56bc31fa1a07c71bf823dded066793fe6f71f42d76a29deaf5a969c8bb1c3a283cb0a7e3c104c477ba95b6ff1fb807c7ce67e4c7d200a174d19
-
SSDEEP
6291456:EXZN0ALNx2NjGjiHDmO5okwDgPeXuXAmHKu6w1jsfXZN0ALNx2NjGk:0kGAmO5CXbmHeyjsrkGk
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/888 RAT 1.2.5.exe upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule static1/unpack002/out.upx autoit_exe static1/unpack001/888 rat 1.2.1.exe autoit_exe -
Unsigned PE 5 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/888 RAT 1.2.5.exe unpack002/out.upx unpack001/888 Rat 1.2.4 Cracked By Escanor.exe unpack001/888 Rat 1.2.4 Cracked For Lifetime (2).exe unpack001/888 rat 1.2.1.exe
Files
-
888.zip.zip
-
888 RAT 1.2.5.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 480KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 264KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 514KB - Virtual size: 513KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
888 Rat 1.2.4 Cracked By Escanor.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
Size: 257KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 14KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 522KB - Virtual size: 7.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
888 Rat 1.2.4 Cracked For Lifetime (2).exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
���+�� B���Q���L��S������u��s�F����Cy�ԩ�t�i!^3�1��}�{�-X ?�M��.[���ͅx��e���.B�}R�����y� pf�q�f��W>�"��3&�0'��yZ�QXwd�g���.��y�)�6{b��J��D�����E��.��3à���ڧ4��WP��GT+<��jW���<�ƾ��ӟ�*�so�_�U78�}�8h��=��O�E�����xO�����ˣo�9��vA���Oo����u�8G��P������������_ޖ�{��:�����l�,Mi�����^=F�&�W�~0<���w����lL>?6lF��lcxMb�?(���X���o�"3��LRס{�kC-�H��ϕ�U"Q�0�Y*x�o���hk����I�� f&_}�cһ϶cQ�;2w4wYNc�� ;������?@���LNu��oL�/4�� �@�r5�J8]�]�����)�� Ar��A�0��~<fy%O#1w�DFܡ��4��_m���TB��< lnޝ�s��[o����j��7���z��~ (�)cIT�����|V��P���2���۴�B��tNeZ4�}�bQ�̲�h52��gC=a��UTVjMk�8s�P��Ъmj����E~lC���7�4�Rl<K����n���M�B�f�KG��0�>�N�&�@��Iyxb��a2ZvVi�{e�'`����5�����C�t#uh��%A� k?;g.X��Eh'C`na Mr ���)�f�S�`8+��G��R�gܕ釔%w��!������'yZ˚ q'�Tq���M�'X����G#��'3��n������5k �^&l-�~�:8�'�ۣ����D8�*����/R����l��#.l����^ ����z����BCJ`�qT��>��YX� m�W�ל�"����_�R����L��(��8ʪ�"{L%� ٻk�h��+V�.��?�"&&:Y�ь]�fv,� ����8y��k����y���� B���㏓�Q|����|U o����={���+����p�H��2����t>��^��09��G%E��f��K�]�=��@7L����̏�$[�O�f��<���N�?��\��H|��p7.��,�O�f"'��u�`X�Kx}���e��,���z �`���ۺVx��u��V����K�=�ȶ]S�͐������a�!�>#O�Cn�moTC]$�_ÙQњ�-���#�=)��dF��+�Ҳ7�Q��;�a���%ɣ>�^U����\+ �* ���� ����E��!US���SC���V�� 8y��S~_���lW��E����IŔkz�/���'e!Db;D��VX��%$����v#B���DS�����S��LB�����;|�"Ʊ}�Y��No�+�E�D-�g-�8��p�O�!M3�Zh3�f15쑾� Ƈ�d�N��rL}�P���AcČ҉"9)�o�B�Z]1};p�'���*d]fU�P8aM͎���ء����s��b�H���aʇ����fL�JZ�j�ui�#����;Un�>���l<�G <6,6!F����m�T��*\Wk?86�s�)�dga�T���K:KY�-'B���>{I�C�$,��.�=��qC]���4�D�H�ۡ�D��3̓5Ή���<�����<���h�-�����De4���""�|�J?[lJ>xРAm��<5�u���,k������pJ�q��H�|�W�;E<��ՌHL� f>jf�g�M;�*8u��56|���_��fm�̄��B���U�J��ܳ��A���m� �З�:\f�Z�@r����8��>zl7$�ǯRM�����4� �V���j=�$�s�F!�=P h�ې�C;��n^���ʎEk{.h#�B�� <�t+�zE -��Ú�ߑ��KI;�U�M�5ֆ�$�JFY� QC ���xKG{�!��]���v��\�WX^������¿���ՠ.=�EX�P�#�ѥ�x*x��sa�Yn^m��YUVt�D�cC��Kx�]���i!0e7������m��ȯI��:r9�� ֜L�]����V� lzJ( �?��-�c�Yԉ|�rV�5�����5��@�H���Zoo����e�þ��+���y�,���>[5�ʃ�&�w�3��|p�u빋��� �����uE���m�L �:xrw,�����7�����oXi�r�~�B�+u��|(Da<��F��X�����pr�͆4'� �� �ҢA��C����,���A~Kŵ;m�_���H</�����#6�h���8�V����w�!\�6i蹇独��p}� �{��z��B��w���;y/�;��h-��!�K��}�jV&F�v;ޠp�/��U+�d�mzH����M� '�ѳ��j; ��P��)�n(K�h[�{�����>�^8)|�g #�ww~g�s�8Ǫ߰翙t���v���qg��x'�S��c���k]i1�+��5`4!( ��)�Q�h7�2�Y�S�.�������@��[oD�| ��b[�3���m���46�ql�H�E�x�����ڮd�DZ,SX`4+� :[ ݝ���lϭ�ݤ�F����d���R$����u�k���S�)V��Q�,gbsB ����U�,;�4D ��,��l�� ������Ƨ�x�����L�nvM{N����*cZn\?G���G-��K�}��Ǝ���������0u k�\��&�A*%ᅛ')�\�~! 'z��1\�W���to"77kJ���1�=�P�&?��+X�O���Go��',�������T�̫��%D*ͮf�q=E p�fѩU��W� �#[�D��O�n�o���Xj���W��2��9�t�A-��Y`��|j(�~������M~y��m��B��rG�����i��� �^9��>Z�Ya���5�&� ^t��&[�fW�@t�̂_��Ls�'j~p�PX�h����˱��z�Q+�!j�,8A�Bg�U���]�q��vv*��'��u�0_�V���B��u�$�ᇙ����|�C�2��K����,�Ha�K(~x��� �z�r������5��i��Y�Q��� �R5�*F?�R/j�6EYv�/(��=�ϒHu�� 9��P�jn�-����J�H^��$�8���Y�u,T��q��q����_�����(�=�
Sections
Size: 257KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 14KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 522KB - Virtual size: 7.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
888 rat 1.2.1.exe.exe windows:5 windows x86 arch:x86
04b4eec1b14791bf23f31173f27a5df0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
setsockopt
ntohs
recvfrom
sendto
htons
select
listen
WSAStartup
bind
closesocket
connect
socket
send
WSACleanup
ioctlsocket
accept
WSAGetLastError
inet_addr
gethostbyname
gethostname
recv
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
waveOutSetVolume
mciSendStringW
comctl32
ImageList_Remove
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Destroy
mpr
WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
WNetUseConnectionW
wininet
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetQueryOptionW
InternetQueryDataAvailable
psapi
EnumProcesses
GetModuleBaseNameW
GetProcessMemoryInfo
EnumProcessModules
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
LoadUserProfileW
kernel32
HeapAlloc
Sleep
GetCurrentThreadId
RaiseException
MulDiv
GetVersionExW
GetSystemInfo
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcpyW
MultiByteToWideChar
lstrlenW
lstrcmpiW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
FindNextFileW
MoveFileW
CopyFileW
CreateDirectoryW
RemoveDirectoryW
GetProcessHeap
QueryPerformanceFrequency
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetLocalTime
CompareStringW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
SetErrorMode
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
DeviceIoControl
SetFileAttributesW
GetShortPathNameW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetCurrentThread
GetProcessIoCounters
CreateProcessW
SetPriorityClass
LoadLibraryW
VirtualAlloc
LoadLibraryExW
HeapFree
WaitForSingleObject
CreateThread
DuplicateHandle
GetLastError
CloseHandle
GetCurrentProcess
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
IsDebuggerPresent
GetCurrentDirectoryW
ExitProcess
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
HeapCreate
SetHandleCount
GetFileType
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringW
RtlUnwind
SetFilePointer
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
HeapReAlloc
WriteConsoleW
SetEndOfFile
SetSystemPowerState
SetEnvironmentVariableA
user32
GetCursorInfo
RegisterHotKey
ClientToScreen
GetKeyboardLayoutNameW
IsCharAlphaW
IsCharAlphaNumericW
IsCharLowerW
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
ReleaseCapture
SetCapture
WindowFromPoint
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
CheckMenuRadioItem
SetWindowPos
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
TranslateMessage
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongW
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
GetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
MessageBoxW
DefWindowProcW
CopyImage
AdjustWindowRectEx
SetRect
SetClipboardData
EmptyClipboard
CountClipboardFormats
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
BlockInput
GetMessageW
LockWindowUpdate
GetMenuItemID
DispatchMessageW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
PeekMessageW
UnregisterHotKey
CharLowerBuffW
keybd_event
MonitorFromRect
GetWindowThreadProcessId
gdi32
DeleteObject
AngleArc
GetTextExtentPoint32W
ExtCreatePen
StrokeAndFillPath
StrokePath
EndPath
SetPixel
CloseFigure
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
GetDeviceCaps
MoveToEx
DeleteDC
GetPixel
CreateDCW
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
CreateFontW
GetTextFaceW
GetStockObject
LineTo
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
CloseServiceHandle
UnlockServiceDatabase
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
CopySid
LogonUserW
LockServiceDatabase
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
GetAce
AddAce
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
AdjustTokenPrivileges
InitiateSystemShutdownExW
OpenSCManagerW
RegCloseKey
shell32
DragQueryPoint
ShellExecuteExW
SHGetFolderPathW
DragQueryFileW
SHEmptyRecycleBinW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CLSIDFromString
StringFromGUID2
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
ProgIDFromCLSID
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
OleUninitialize
IIDFromString
oleaut32
VariantChangeType
VariantCopyInd
DispCallFunc
CreateStdDispatch
CreateDispTypeInfo
SysFreeString
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayUnaccessData
SysStringLen
SafeArrayAllocData
GetActiveObject
QueryPathOfRegTypeLi
SafeArrayAllocDescriptorEx
SafeArrayCreateVector
SysAllocString
VariantCopy
VariantClear
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
OleLoadPicture
SafeArrayAccessData
VariantInit
Sections
.text Size: 514KB - Virtual size: 513KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ