C:\Users\LLAMA\source\repos\VeilUI\FastColoredTextBox\obj\Debug\FastColoredTextBox.pdb
Overview
overview
3Static
static
3Hacks for ...ox.dll
windows7-x64
1Hacks for ...ox.dll
windows10-2004-x64
1Hacks for ...UI.dll
windows7-x64
1Hacks for ...UI.dll
windows10-2004-x64
1Hacks for ....1.exe
windows7-x64
1Hacks for ....1.exe
windows10-2004-x64
1Hacks for ...PI.dll
windows7-x64
1Hacks for ...PI.dll
windows10-2004-x64
1Hacks for ...in.dll
windows7-x64
3Hacks for ...in.dll
windows10-2004-x64
3REDBOY Jai...UI.dll
windows7-x64
1REDBOY Jai...UI.dll
windows10-2004-x64
1REDBOY Jai... 1.exe
windows7-x64
1REDBOY Jai... 1.exe
windows10-2004-x64
1REDBOY Jai...pp.dll
windows7-x64
1REDBOY Jai...pp.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Hacks for Roblox/RedBoy V1.1/FastColoredTextBox.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Hacks for Roblox/RedBoy V1.1/FastColoredTextBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Hacks for Roblox/RedBoy V1.1/FlatUI.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Hacks for Roblox/RedBoy V1.1/FlatUI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Hacks for Roblox/RedBoy V1.1/RedBoyV1.1.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Hacks for Roblox/RedBoy V1.1/RedBoyV1.1.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Hacks for Roblox/RedBoy V1.1/WeAreDevs_API.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Hacks for Roblox/RedBoy V1.1/WeAreDevs_API.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Hacks for Roblox/RedBoy V1.1/exploit-main.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Hacks for Roblox/RedBoy V1.1/exploit-main.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
REDBOY Jailbreak V1/FlatUI.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
REDBOY Jailbreak V1/FlatUI.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
REDBOY Jailbreak V1/RedBoy Jailbreak 1.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
REDBOY Jailbreak V1/RedBoy Jailbreak 1.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
REDBOY Jailbreak V1/WeAreDevs_API.cpp.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
REDBOY Jailbreak V1/WeAreDevs_API.cpp.dll
Resource
win10v2004-20231215-en
General
-
Target
9010d5a8cf59a5d86695c305e9172f6e
-
Size
502KB
-
MD5
9010d5a8cf59a5d86695c305e9172f6e
-
SHA1
ca6d5e4bc918f84c5b28153738cfc3d6080236e5
-
SHA256
48fc432d5717bb7579173c9ec88312737acd129b8f57ba29d38592ebec3278a8
-
SHA512
1291444f98127190fa13c2bae18fc587eb3d1f101c83724a03c80b2ace3d27f5f57fe3e02a100e792a2a7132be633320b559c24d3b7403d033a3ba84e69a83fd
-
SSDEEP
12288:MkbBhQiDtugo2RZvhVn8SwpJWu5bublmetlViI04Z0yUzxKJfD:hbBhZxugTZfOpMu5b8lp4XBl4b
Malware Config
Signatures
-
Unsigned PE 8 IoCs
Checks for missing Authenticode signature.
resource unpack001/Hacks for Roblox/RedBoy V1.1/FastColoredTextBox.dll unpack001/Hacks for Roblox/RedBoy V1.1/FlatUI.dll unpack001/Hacks for Roblox/RedBoy V1.1/RedBoyV1.1.exe unpack001/Hacks for Roblox/RedBoy V1.1/WeAreDevs_API.dll unpack001/Hacks for Roblox/RedBoy V1.1/exploit-main.dll unpack002/REDBOY Jailbreak V1/FlatUI.dll unpack002/REDBOY Jailbreak V1/RedBoy Jailbreak 1.exe unpack002/REDBOY Jailbreak V1/WeAreDevs_API.cpp.dll
Files
-
9010d5a8cf59a5d86695c305e9172f6e.zip
-
Hacks for Roblox/RedBoy V1.1/FastColoredTextBox.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Hacks for Roblox/RedBoy V1.1/FlatUI.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\Aero\Desktop\FlatUI-master\src\FlatUI\obj\Debug\FlatUI.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Hacks for Roblox/RedBoy V1.1/RedBoyV1.1.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
c:\users\hp user\source\repos\RedBoy New\RedBoy New\obj\Debug\RedBoy New.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Hacks for Roblox/RedBoy V1.1/WeAreDevs_API.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
F:\OneDrive\Digital Developing\Visual Studio\ROBLOX\Current\Exploit API v2\WeAreDevs_API\obj\Release\WeAreDevs_API.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Hacks for Roblox/RedBoy V1.1/exploit-main.dll.dll windows:6 windows x86 arch:x86
6ab256ea608b643abcd72a7b73856ef7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
E:\GitHub\Exploit API v2.4\src\Release\exploit-main.pdb
Imports
kernel32
GetProcAddress
FreeLibrary
FormatMessageA
ReadFile
VirtualProtect
CreateNamedPipeA
SetConsoleTextAttribute
VirtualFree
SetConsoleTitleA
GetStdHandle
VirtualAlloc
GetCurrentDirectoryA
ExitThread
GetModuleHandleA
DisconnectNamedPipe
MultiByteToWideChar
Sleep
DisableThreadLibraryCalls
GlobalAlloc
FreeConsole
CreateThread
AddVectoredExceptionHandler
GlobalLock
GetConsoleWindow
GlobalUnlock
AllocConsole
VirtualQuery
ConnectNamedPipe
GetCurrentProcess
InterlockedExchange
InterlockedCompareExchange
FlushInstructionCache
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcessId
GetCurrentThreadId
OpenThread
GetThreadContext
LoadLibraryA
SuspendThread
ResumeThread
CloseHandle
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
WriteConsoleW
SetEndOfFile
HeapSize
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
MoveFileExW
GetTimeZoneInformation
DeleteFileW
GetFileSizeEx
CreateFileW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
WaitForSingleObject
GetConsoleCP
WriteFile
FlushFileBuffers
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLastError
SetThreadContext
GetModuleFileNameA
GetTimeFormatW
GetDateFormatW
QueryPerformanceFrequency
GetTempPathW
CreateProcessW
DuplicateHandle
GetModuleHandleExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
RaiseException
WideCharToMultiByte
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetProcessHeap
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlUnwind
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
ExitProcess
user32
GetCursorPos
SendInput
CreateMenu
SetWindowPos
MessageBoxW
GetSystemMetrics
CreatePopupMenu
ShowWindow
GetAsyncKeyState
OpenClipboard
SetWindowLongA
CloseClipboard
CallWindowProcA
EmptyClipboard
GetWindowLongA
MessageBoxA
SetMenu
DefWindowProcA
GetClipboardData
FindWindowW
SendMessageA
DrawMenuBar
SetClipboardData
AppendMenuA
gdi32
SetTextColor
GetStockObject
shell32
ShellExecuteA
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
Sections
.text Size: 423KB - Virtual size: 423KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Hacks for Roblox/RedBoy v1.zip.zip
-
REDBOY Jailbreak V1/FlatUI.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\Aero\Desktop\FlatUI-master\src\FlatUI\obj\Debug\FlatUI.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
REDBOY Jailbreak V1/RedBoy Jailbreak 1.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\HP User\source\repos\RedBoy Jailbreak 1\RedBoy Jailbreak 1\obj\Release\RedBoy Jailbreak 1.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
REDBOY Jailbreak V1/WeAreDevs_API.cpp.dll.dll windows:6 windows x86 arch:x86
6d572cad86c0ee4af3fa5bf3e6a016f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
C:\Users\work\OneDrive\Digital Developing\Visual Studio\ROBLOX\Current\Exploit API v2.3\Release\WeAreDevs_API.cpp.pdb
Imports
kernel32
GetModuleFileNameA
Process32First
WriteProcessMemory
WriteFile
TerminateProcess
lstrlenA
WaitForSingleObject
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
GetTempPathA
CreateFileA
DeleteFileA
Process32Next
CloseHandle
GetProcAddress
VirtualAllocEx
CreateRemoteThread
VirtualFreeEx
SetUnhandledExceptionFilter
InitializeSListHead
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentProcessId
UnhandledExceptionFilter
user32
wsprintfA
MessageBoxA
msvcp140
?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z
?_Xlength_error@std@@YAXPBD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAPAD0PAH001@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?always_noconv@codecvt_base@std@@QBE_NXZ
??Bid@locale@std@@QAEIXZ
?_BADOFF@std@@3_JB
?_Xout_of_range@std@@YAXPBD@Z
?_Xinvalid_argument@std@@YAXPBD@Z
?uncaught_exception@std@@YA_NXZ
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
??0_Lockit@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
wininet
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
urlmon
URLDownloadToFileA
vcruntime140
memset
memcpy
memchr
_CxxThrowException
__std_terminate
__std_exception_copy
__std_type_info_destroy_list
_except_handler4_common
__std_exception_destroy
__CxxFrameHandler3
memmove
api-ms-win-crt-string-l1-1-0
strtok
_strdup
api-ms-win-crt-stdio-l1-1-0
fwrite
fputc
_get_stream_buffer_pointers
fgetc
__acrt_iob_func
fflush
_fseeki64
fsetpos
ungetc
setvbuf
fgetpos
fclose
__stdio_common_vfprintf
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
_seh_filter_dll
_invalid_parameter_noinfo
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_cexit
_configure_narrow_argv
_initterm_e
_errno
_initterm
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-heap-l1-1-0
free
malloc
_callnewh
Exports
Exports
GetModuleParentPath
GetProcessIDByName
InjectDLLIntoProcessIdentifier
KillProcessID
LaunchExploit
SMTNP
SendCommand
SendLimitedLuaScript
SendLuaCScript
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ