wearedevs_net.pdb
Overview
overview
7Static
static
3JJSploit.rar
windows7-x64
3JJSploit.rar
windows10-2004-x64
3JJSploit/JJSploit.exe
windows7-x64
1JJSploit/JJSploit.exe
windows10-2004-x64
3JJSploit/r...bot.js
windows7-x64
3JJSploit/r...bot.js
windows10-2004-x64
3JJSploit/r...lip.js
windows7-x64
3JJSploit/r...lip.js
windows10-2004-x64
3JJSploit/u...ll.exe
windows7-x64
7JJSploit/u...ll.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
JJSploit.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JJSploit.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
JJSploit/JJSploit.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
JJSploit/JJSploit.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
JJSploit/resources/luascripts/general/aimbot.js
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
JJSploit/resources/luascripts/general/aimbot.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
JJSploit/resources/luascripts/general/noclip.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
JJSploit/resources/luascripts/general/noclip.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
JJSploit/uninstall.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
JJSploit/uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20240802-en
General
-
Target
JJSploit.rar
-
Size
4.6MB
-
MD5
58bc68b896402f8932dd8cae04278d8c
-
SHA1
934c54dd45ec8b8d0f99be355feec3c644badfc0
-
SHA256
fb069be873919b2feb0eb23ce24724c855da9e61044cf4fe6b9e98c60e1b3bff
-
SHA512
84105b418ea19c49d821322521212c15b481b331d902e572f2cc68309ab61418cb2f7a88d975e447ac05b0a2c70cfe6bacca0a501b2f4fbbe8105720dcbd107d
-
SSDEEP
98304:ODNYEdTyYGhAYnmc1UChUc6Kr6F9IRt/6pjDcYpZHrEhemERLiL/bFLsT:O6EBdOmc13hf6KC9mtSpvcYblmA29Lk
Malware Config
Signatures
-
Unsigned PE 5 IoCs
Checks for missing Authenticode signature.
resource unpack001/JJSploit/JJSploit.exe unpack001/JJSploit/uninstall.exe unpack002/$PLUGINSDIR/LangDLL.dll unpack002/$PLUGINSDIR/System.dll unpack002/$PLUGINSDIR/nsis_tauri_utils.dll
Files
-
JJSploit.rar.rar
-
JJSploit/JJSploit.exe.exe windows:6 windows x86 arch:x86
bdf8646dd054a896cfd3542a140a522c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
bcryptprimitives
ProcessPrng
api-ms-win-core-synch-l1-2-0
WakeByAddressAll
WaitOnAddress
WakeByAddressSingle
kernel32
CancelIo
CreateEventW
GetFinalPathNameByHandleW
InitializeSListHead
ExitProcess
CreateSymbolicLinkW
DeleteFileW
FindFirstFileW
CreateDirectoryW
GetFileInformationByHandleEx
FindClose
FindNextFileW
CreateMutexA
WaitForSingleObjectEx
HeapReAlloc
GetSystemTimePreciseAsFileTime
QueryPerformanceFrequency
ReadFileEx
SleepEx
GetFileAttributesW
GetModuleFileNameW
OutputDebugStringA
OutputDebugStringW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateNamedPipeW
WaitForMultipleObjects
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetEnvironmentVariableW
WriteFileEx
GetStdHandle
SetFilePointerEx
SetFileInformationByHandle
GetSystemDirectoryW
GetWindowsDirectoryW
GetCommandLineW
EncodePointer
DeleteCriticalSection
CreateProcessW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
GetFullPathNameW
GetTempPathW
GetSystemTimeAsFileTime
SleepConditionVariableSRW
WakeAllConditionVariable
InitializeCriticalSectionAndSpinCount
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
TlsAlloc
GetModuleHandleW
lstrlenW
SetFileTime
GetProcessHeap
HeapFree
GetLastError
LoadLibraryA
LoadLibraryW
GetProcAddress
LCIDToLocaleName
GetUserDefaultUILanguage
SetEnvironmentVariableW
GetEnvironmentStringsW
FreeLibrary
HeapAlloc
GetCurrentDirectoryW
SetLastError
ReleaseMutex
GetCurrentProcess
DuplicateHandle
RtlCaptureContext
QueryPerformanceCounter
SetWaitableTimer
CreateWaitableTimerExW
SwitchToThread
GetCurrentThread
SetThreadStackGuarantee
AddVectoredExceptionHandler
CompareStringOrdinal
DeleteProcThreadAttributeList
SetHandleInformation
FreeEnvironmentStringsW
DeviceIoControl
GetVolumeInformationW
GetDriveTypeW
GetCurrentThreadId
TlsGetValue
TerminateProcess
FormatMessageW
TlsFree
LoadLibraryExW
CreateFileW
OpenProcess
TlsSetValue
PostQueuedCompletionStatus
CloseHandle
CreateIoCompletionPort
SetFileCompletionNotificationModes
GetQueuedCompletionStatusEx
GetSystemInfo
ReadFile
GetOverlappedResult
Sleep
GetModuleHandleA
GetFileInformationByHandle
GetConsoleMode
SetFileAttributesW
MoveFileExW
GetProcessIoCounters
GetSystemTimes
WaitForSingleObject
CreateHardLinkW
GetCurrentProcessId
GetExitCodeProcess
GetProcessTimes
GetTickCount64
GlobalMemoryStatusEx
GetLogicalDrives
GetDiskFreeSpaceExW
ws2_32
getaddrinfo
freeaddrinfo
closesocket
getpeername
getsockname
WSASocketW
bind
connect
ioctlsocket
getsockopt
WSACleanup
WSAStartup
shutdown
recv
send
WSASend
WSAIoctl
WSAGetLastError
socket
setsockopt
user32
SendInput
SetForegroundWindow
SetWindowDisplayAffinity
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
GetTouchInputInfo
ValidateRect
VkKeyScanW
GetAsyncKeyState
GetKeyboardState
CreateAcceleratorTableW
ToUnicodeEx
GetKeyState
MapVirtualKeyExW
GetKeyboardLayout
MonitorFromPoint
EnumDisplayMonitors
IsProcessDPIAware
TrackMouseEvent
GetUpdateRect
MapVirtualKeyW
MonitorFromRect
ChangeDisplaySettingsExW
SystemParametersInfoA
SetCursor
SetWindowPlacement
IsWindowVisible
AdjustWindowRectEx
GetMenu
CheckMenuItem
GetWindowRect
LoadCursorW
ClientToScreen
GetClientRect
GetWindowLongW
ShowCursor
InvalidateRgn
FlashWindowEx
DefWindowProcW
SetMenuItemInfoW
CreateMenu
SetWindowPos
AppendMenuW
RedrawWindow
PostThreadMessageW
PostQuitMessage
ClipCursor
GetClipCursor
SendMessageW
EnableMenuItem
GetSystemMenu
ShowWindow
DestroyAcceleratorTable
DestroyIcon
GetRawInputData
SetCapture
SetWindowLongW
MsgWaitForMultipleObjectsEx
RegisterRawInputDevices
RegisterWindowMessageA
RegisterClassExW
PostMessageW
ScreenToClient
EnumChildWindows
GetMessageA
PeekMessageW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetAncestor
GetMessageW
DispatchMessageA
GetMonitorInfoW
MonitorFromWindow
CloseTouchInputHandle
GetCursorPos
GetDC
DestroyWindow
CreateIcon
RegisterTouchWindow
GetSystemMetrics
IsWindow
CreateWindowExW
GetForegroundWindow
SetCursorPos
ReleaseCapture
IsIconic
GetActiveWindow
SetMenu
GetWindowPlacement
shell32
DragFinish
SHCreateItemFromParsingName
ShellExecuteW
SHAppBarMessage
DragQueryFileW
SHGetKnownFolderPath
comctl32
RemoveWindowSubclass
SetWindowSubclass
TaskDialogIndirect
DefSubclassProc
ole32
CoSetProxyBlanket
RegisterDragDrop
RevokeDragDrop
CoTaskMemAlloc
CoInitializeSecurity
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
OleInitialize
gdi32
DeleteObject
GetDeviceCaps
CreateRectRgn
dwmapi
DwmEnableBlurBehindWindow
oleaut32
SetErrorInfo
GetErrorInfo
VariantClear
SysAllocString
SysStringLen
SysFreeString
uxtheme
SetWindowTheme
advapi32
OpenProcessToken
EventRegister
EventSetInformation
EventWriteTransfer
GetTokenInformation
EventUnregister
IsValidSid
GetLengthSid
CopySid
LookupAccountSidW
SystemFunction036
RegOpenKeyExW
RegGetValueW
RegCloseKey
RegQueryValueExW
bcrypt
BCryptGenRandom
secur32
LsaFreeReturnBuffer
DecryptMessage
AcquireCredentialsHandleA
InitializeSecurityContextW
AcceptSecurityContext
LsaGetLogonSessionData
FreeCredentialsHandle
ApplyControlToken
LsaEnumerateLogonSessions
DeleteSecurityContext
QueryContextAttributesW
FreeContextBuffer
EncryptMessage
crypt32
CertEnumCertificatesInStore
CertAddCertificateContextToStore
CertOpenStore
CertCloseStore
CertDuplicateCertificateChain
CertFreeCertificateChain
CertFreeCertificateContext
CertDuplicateCertificateContext
CertVerifyCertificateChainPolicy
CertGetCertificateChain
CertDuplicateStore
ntdll
NtDeviceIoControlFile
NtCancelIoFileEx
RtlNtStatusToDosError
NtCreateFile
NtReadFile
NtWriteFile
NtQuerySystemInformation
pdh
PdhCollectQueryData
PdhRemoveCounter
PdhGetFormattedCounterValue
PdhCloseQuery
PdhOpenQueryA
PdhAddEnglishCounterW
powrprof
CallNtPowerInformation
netapi32
NetUserGetInfo
NetUserGetLocalGroups
NetUserEnum
NetApiBufferFree
iphlpapi
GetIfEntry2
GetAdaptersAddresses
FreeMibTable
GetIfTable2
psapi
GetPerformanceInfo
GetModuleFileNameExW
api-ms-win-crt-math-l1-1-0
round
__setusermatherr
trunc
floor
pow
api-ms-win-crt-string-l1-1-0
_wcsicmp
wcsncmp
wcslen
strcpy_s
api-ms-win-crt-convert-l1-1-0
wcstol
_ultow_s
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
calloc
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
abort
_initterm
_set_app_type
terminate
_controlfp_s
_crt_atexit
_exit
_register_onexit_function
_initialize_onexit_table
exit
_configure_narrow_argv
_initterm_e
__p___argc
_initialize_narrow_environment
_get_initial_narrow_environment
_register_thread_local_exe_atexit_callback
__p___argv
_seh_filter_exe
_c_exit
_cexit
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
JJSploit/resources/luascripts/animations/dab.lua
-
JJSploit/resources/luascripts/animations/energizegui.lua
-
JJSploit/resources/luascripts/animations/jumpland.lua
-
JJSploit/resources/luascripts/animations/levitate.lua
-
JJSploit/resources/luascripts/animations/walkthrough.lua
-
JJSploit/resources/luascripts/beesim/autodig.lua
-
JJSploit/resources/luascripts/general/aimbot.lua.js
-
JJSploit/resources/luascripts/general/chattroll.lua
-
JJSploit/resources/luascripts/general/fly.lua
-
JJSploit/resources/luascripts/general/god.lua
-
JJSploit/resources/luascripts/general/infinitejump.lua
-
JJSploit/resources/luascripts/general/magnetizeto.lua
-
JJSploit/resources/luascripts/general/multidimensionalcharacter.lua
-
JJSploit/resources/luascripts/general/noclip.lua.js
-
JJSploit/resources/luascripts/general/teleportto.lua
-
JJSploit/resources/luascripts/general/tptool.lua
-
JJSploit/resources/luascripts/jailbreak/criminalesp.lua
-
JJSploit/resources/luascripts/jailbreak/policeesp.lua
-
JJSploit/resources/luascripts/jailbreak/removewalls.lua
-
JJSploit/resources/luascripts/jailbreak/walkspeed.lua
-
JJSploit/uninstall.exe.exe windows:4 windows x86 arch:x86
61259b55b8912888e90f516ca08dc514
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExW
RegEnumKeyW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
SetFileSecurityW
RegOpenKeyExW
RegEnumValueW
shell32
SHGetSpecialFolderLocation
SHFileOperationW
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
SHGetFileInfoW
ole32
OleInitialize
OleUninitialize
CoCreateInstance
IIDFromString
CoTaskMemFree
comctl32
ord17
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
user32
GetClientRect
EndPaint
DrawTextW
IsWindowEnabled
DispatchMessageW
wsprintfA
CharNextA
CharPrevW
MessageBoxIndirectW
GetDlgItemTextW
SetDlgItemTextW
GetSystemMetrics
FillRect
AppendMenuW
TrackPopupMenu
OpenClipboard
SetClipboardData
CloseClipboard
IsWindowVisible
CallWindowProcW
GetMessagePos
CheckDlgButton
LoadCursorW
SetCursor
GetSysColor
SetWindowPos
GetWindowLongW
PeekMessageW
SetClassLongW
GetSystemMenu
EnableMenuItem
GetWindowRect
ScreenToClient
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
FindWindowExW
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
EmptyClipboard
CreatePopupMenu
gdi32
SetBkMode
SetBkColor
GetDeviceCaps
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
SetTextColor
SelectObject
kernel32
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleA
GetProcAddress
GetSystemDirectoryW
lstrcatW
Sleep
lstrcpyA
WriteFile
GetTempFileNameW
lstrcmpiA
RemoveDirectoryW
CreateProcessW
CreateDirectoryW
GetLastError
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceW
WideCharToMultiByte
lstrcpynW
lstrlenW
SetErrorMode
GetVersionExW
GetCommandLineW
GetTempPathW
GetWindowsDirectoryW
SetEnvironmentVariableW
CopyFileW
ExitProcess
GetCurrentProcess
GetModuleFileNameW
GetFileSize
CreateFileW
GetTickCount
MulDiv
SetFileAttributesW
GetFileAttributesW
SetCurrentDirectoryW
MoveFileW
GetFullPathNameW
GetShortPathNameW
SearchPathW
CompareFileTime
SetFileTime
CloseHandle
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalFree
GlobalAlloc
GetModuleHandleW
LoadLibraryExW
MoveFileExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
lstrlenA
MultiByteToWideChar
ReadFile
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 176KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/LangDLL.dll.dll windows:4 windows x86 arch:x86
3e8d18bb71c7ebbda2ddc2a4bb03547b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrlenW
GlobalFree
lstrcpynW
lstrcmpW
GlobalAlloc
MulDiv
GetModuleHandleW
lstrcpyW
user32
DialogBoxParamW
SetDlgItemTextW
SendDlgItemMessageW
EndDialog
SetWindowTextW
LoadIconW
ShowWindow
SendMessageW
GetDC
gdi32
GetDeviceCaps
CreateFontIndirectW
DeleteObject
Exports
Exports
LangDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 681B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/System.dll.dll windows:4 windows x86 arch:x86
fc0224e99e736751432961db63a41b76
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleW
GlobalFree
GlobalSize
lstrcpynW
lstrcpyW
GetProcAddress
WideCharToMultiByte
VirtualFree
FreeLibrary
lstrlenW
LoadLibraryW
GlobalAlloc
MultiByteToWideChar
VirtualAlloc
VirtualProtect
GetLastError
user32
wsprintfW
ole32
StringFromGUID2
CLSIDFromString
Exports
Exports
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 867B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 662B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/nsis_tauri_utils.dll.dll windows:6 windows x86 arch:x86
17cb20871354b907f678c7c220e4ca60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OpenProcess
ExitProcess
HeapAlloc
CloseHandle
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapFree
TerminateProcess
GetProcessHeap
GlobalFree
InitializeProcThreadAttributeList
GetLastError
UpdateProcThreadAttribute
CreateProcessW
HeapReAlloc
GlobalAlloc
lstrcpyW
advapi32
GetTokenInformation
OpenProcessToken
EqualSid
user32
GetShellWindow
GetWindowThreadProcessId
Exports
Exports
DllMain
FindProcess
FindProcessCurrentUser
KillProcess
KillProcessCurrentUser
RunAsUser
SemverCompare
memcmp
memcpy
memset
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ