C:\Users\kamil\source\repos\CloudflareSolver\CloudflareSolver\obj\Release\netstandard2.0\CloudflareSolver.pdb
Overview
overview
10Static
static
10CloudflareSolver.dll
windows7-x64
1CloudflareSolver.dll
windows10-2004-x64
1Cloudflare...ha.dll
windows7-x64
1Cloudflare...ha.dll
windows10-2004-x64
1Data/GeoIP.dat
windows7-x64
3Data/GeoIP.dat
windows10-2004-x64
3Data/Settings.ini
windows7-x64
1Data/Settings.ini
windows10-2004-x64
1Data/Stub.exe
windows7-x64
10Data/Stub.exe
windows10-2004-x64
10Data/upx.exe
windows7-x64
7Data/upx.exe
windows10-2004-x64
7MP-Tools.exe
windows7-x64
10MP-Tools.exe
windows10-2004-x64
10launcher/D...IP.dat
windows7-x64
3launcher/D...IP.dat
windows10-2004-x64
3launcher/D...gs.ini
windows7-x64
1launcher/D...gs.ini
windows10-2004-x64
1launcher/D...ub.exe
windows7-x64
10launcher/D...ub.exe
windows10-2004-x64
10launcher/Data/upx.exe
windows7-x64
7launcher/Data/upx.exe
windows10-2004-x64
7launcher/Launcher.exe
windows7-x64
7launcher/Launcher.exe
windows10-2004-x64
7launcher/M...ut.lnk
windows7-x64
3launcher/M...ut.lnk
windows10-2004-x64
3launcher/R...er.exe
windows7-x64
1launcher/R...er.exe
windows10-2004-x64
1launcher/S...ll.exe
windows7-x64
3launcher/S...ll.exe
windows10-2004-x64
7launcher/W...es.exe
windows7-x64
3launcher/W...es.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
CloudflareSolver.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CloudflareSolver.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
CloudflareSolverRe.Captcha.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
CloudflareSolverRe.Captcha.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Data/GeoIP.dat
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Data/GeoIP.dat
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Data/Settings.ini
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Data/Settings.ini
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Data/Stub.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Data/Stub.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Data/upx.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Data/upx.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
MP-Tools.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
MP-Tools.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
launcher/Data/GeoIP.dat
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
launcher/Data/GeoIP.dat
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
launcher/Data/Settings.ini
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
launcher/Data/Settings.ini
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
launcher/Data/Stub.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
launcher/Data/Stub.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
launcher/Data/upx.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
launcher/Data/upx.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
launcher/Launcher.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
launcher/Launcher.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
launcher/MP-Tools.exe - Shortcut.lnk
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
launcher/MP-Tools.exe - Shortcut.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
launcher/Runtime Explorer.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
launcher/Runtime Explorer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
launcher/Secure System Shell.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
launcher/Secure System Shell.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
launcher/Windows Services.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
launcher/Windows Services.exe
Resource
win10v2004-20231222-en
General
-
Target
ip Killer.zip
-
Size
5.0MB
-
MD5
1835855303210b5d79e7eea6af92e8b1
-
SHA1
c0a0211c32eca51117c5f712c09eebd96c8c85e3
-
SHA256
7eaedea89447261d3b423958bd45b76503819b1aec0448a3c961034ec0ede275
-
SHA512
338384ac5f4fbb8e9ac21147b0956c184721499d20c6a2d3c2635eebde1bcebd1b3b420aeb2e5700619299f14740634ec70652f99be2e9fb639f7849be38b063
-
SSDEEP
98304:DptXFZ3pRzXt5amruOrRG3o+JM5O/9t5FptXpZ3pRzXt5amruOP:LFZ3vze4+KOt9pZ3vzR
Malware Config
Signatures
-
ModiLoader Second Stage 3 IoCs
resource yara_rule sample modiloader_stage2 static1/unpack001/Data/Stub.mp modiloader_stage2 static1/unpack001/launcher/Data/Stub.mp modiloader_stage2 -
Modiloader family
-
resource yara_rule static1/unpack001/Data/upx.exe upx static1/unpack001/launcher/Data/upx.exe upx -
Unsigned PE 13 IoCs
Checks for missing Authenticode signature.
resource unpack001/CloudflareSolver.dll unpack001/CloudflareSolverRe.Captcha.dll unpack001/Data/Stub.mp unpack001/Data/upx.exe unpack001/MP-Tools.exe unpack001/launcher/Data/Stub.mp unpack001/launcher/Data/upx.exe unpack001/launcher/Launcher.exe unpack001/launcher/Runtime Explorer.exe unpack001/launcher/Secure System Shell.exe unpack001/launcher/Windows Services.exe unpack001/launcher/dataBaseCfg.exe unpack001/launcher/mpt.exe
Files
-
ip Killer.zip.zip
-
CloudflareSolver.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
CloudflareSolverRe.Captcha.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\Ryuzaki\Documents\Visual Studio 2017\Projects\CloudflareSolverRe\src\CloudflareSolverRe.Captcha\obj\Release\netstandard1.1\CloudflareSolverRe.Captcha.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Data/GeoIP.dat
-
Data/Settings.ini
-
Data/Stub.mp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 7KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Data/upx.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 281KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
MP-Tools.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\thorson\Desktop\Launcher1\Launcher\Launcher\obj\Debug\LUNCHER CRACKING.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
launcher/Data/GeoIP.dat
-
launcher/Data/Settings.ini
-
launcher/Data/Stub.mp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 7KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
launcher/Data/upx.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 281KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
launcher/Launcher.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
e:\Desarrollo\MultiProgramClipp\interface\interface\obj\Debug\Launcher.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
launcher/MP-Tools.exe - Shortcut.lnk.lnk
-
launcher/Runtime Explorer.exe.exe windows:4 windows x86 arch:x86
4b60677cd8064a4abd81c80ad1230196
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaFreeVarList
_adj_fdiv_m64
__vbaNextEachVar
_adj_fprem1
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaExitProc
__vbaOnError
_adj_fdiv_m16i
_adj_fdivr_m16i
__vbaBoolVar
__vbaVargVar
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaStrCmp
__vbaVarLateMemSt
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
ord716
__vbaFPException
__vbaVarCat
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarSetVar
__vbaVarCmpEq
__vbaVarAdd
__vbaVarDup
__vbaVarLateMemCallLd
__vbaVarCopy
_CIatan
__vbaStrMove
__vbaForEachVar
__vbaStrVarCopy
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
launcher/Secure System Shell.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
c:\Users\luchos\Desktop\MONITOR 2.0\mon2\MONITOR 2\obj\Debug\Secure System Shell.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
launcher/Windows Services.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
c:\Users\luchos\Desktop\MONITOR 2.0\mon1\MONITOR 2\obj\Debug\Windows Services.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
launcher/dataBaseCfg.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
e:\Desarrollo\Ultimate Cracking Tools\Ultimate Cracking Tools\interface\interface\obj\Debug\dataBaseCfg.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
launcher/mpt.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
EXECryptor_AntiDebug
EXECryptor_DecodeSerialNumber
EXECryptor_DecodeSerialNumberW
EXECryptor_DecryptStr
EXECryptor_DecryptStrW
EXECryptor_EncryptStr
EXECryptor_EncryptStrW
EXECryptor_FN_0
EXECryptor_FN_1
EXECryptor_FN_10
EXECryptor_FN_11
EXECryptor_FN_12
EXECryptor_FN_13
EXECryptor_FN_14
EXECryptor_FN_15
EXECryptor_FN_16
EXECryptor_FN_2
EXECryptor_FN_3
EXECryptor_FN_4
EXECryptor_FN_5
EXECryptor_FN_6
EXECryptor_FN_7
EXECryptor_FN_8
EXECryptor_FN_9
EXECryptor_GetDate
EXECryptor_GetEXECryptorVersion
EXECryptor_GetHardwareID
EXECryptor_GetProcAddr
EXECryptor_GetReleaseDate
EXECryptor_GetTrialDaysLeft
EXECryptor_GetTrialRunsLeft
EXECryptor_IsAppProtected
EXECryptor_IsRegistered
EXECryptor_MessageBox
EXECryptor_ProtectImport
EXECryptor_RegConst_0
EXECryptor_RegConst_1
EXECryptor_RegConst_2
EXECryptor_RegConst_3
EXECryptor_RegConst_4
EXECryptor_RegConst_5
EXECryptor_RegConst_6
EXECryptor_RegConst_7
EXECryptor_SecureRead
EXECryptor_SecureReadW
EXECryptor_SecureWrite
EXECryptor_SecureWriteW
EXECryptor_VerifySerialNumber
EXECryptor_VerifySerialNumberW
EXECryptor_halt
Sections
Size: 754KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 17KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 187KB - Virtual size: 640KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 704KB - Virtual size: 704KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE