)�����z�e5�M>�3�!�G�HTRa_�������4��eӶ��X&���Xr�e��݇"#2�2#l:�|�Lu��Ѵ���G��96�G��}�$u�.�G�{z�}El�S��(��E4�����Yۡ��~�� 1L�+A@|�ڨ�^�<qَJ�O�<�����g�J�19�1� %�kʂ0e�@>Z�O�~kZ?��j�p�9��;���Bo}�SY�-!%G�h�sn2pY��� ���x��웖���ɽVW?�O��������� ��}����_�Co���t1�جG4�(��c��.�݆�ָ��,�ܑ�$ޙ�K<̎M���sTO9�����}"2x1̡~�MU�r�����Pf����L��*:�ܨ�d�ݍ[���y��<�+t���"���>��|��\���0n�ħ<-��{2 t/i��� �!��5`ι�wۂ��7�p��kIfC�'���'��b7�3�:�� �6c�d��4Yw��4��n�(���0�SP�S.U&O����@�%݂��s��=O1�M>/_��)���d_�'��J�h'�z/�C���SɻV�=n��&�Ho��#aɵ��2���e��8u�<�<���C�5��� ] �:_��.����X��"JB���"e���I �1G���%�U��LP��rC�]�]�����*k"�:�)3\=1\�#�H�P" ��s)��\� Q��-��� ��p(�C�k��8�I�!ђ�D���'��,��Y�{� �>��q�w�������EG��Y���3�QA�]�s~=ݨ�S�'��@7��x�ڱn|%�p�^��/K����P"���Ǩp�g��/w�]�mDP,�l�ˁ�@��v~ƺ��ԇY��"���6~�5Xs�t��G%�A^��� ���LIL{ \����wn�G�c�/%��\�˃�ɹ�X�@S;��p&x\0u¯8��C�ύ���U�d[V�qp��� ��bb��i���*#=x��&4i���{�����O�Bx3"���-ej�IA��DtA[+�(�hP���@ �� A�vsI�Ї��8�\�����/�����2��-�im_2�J��8��1;���O�Ջ,[YJc�4�l-6n~;�fZK��J)vX~q��ƹbL�7�|+��7�B��A�ElN�W"' �&��i#��>���VQ�=o��/Cʇ9�^}G�UR���p6kj��J�R�ѻG ��x��2��7�?��<�5=��*��f%���Q�x3��L���Q�Ď��<��l5&1g/�F�s���=�zk��e���Տ��G��݊:a�E��%��N��x�z�(�R}��ے�<�G0"�&����!Rz���/b�����*�ūv��u7��ix@/o��)�n�sϖ�.�J~��YO���K2��C��O�t�QmID >g�Q��ɏq�3ɘ;/��M&9����>�H�ˮ_�{���v����a�/�v1a/[�}�u��o�j��^�N��:�*#̤�Sӥ�_�rsn&�o*�"f���y�y���]��"��F�`�)^�ͷ�2��� (Na�"�~�i�)y:"�n5�����MHtWEq ��w_&R~�$@ �r�~`�Y"���QhK�$<��X2�ԁ��+;����J���bq$_�u�~Z�yV��6�U�N������(�)f]`����.!�Ħy��"�P�(}{�ȯ-4e��A�P՚ə��=�a���m2+9l�@�����7��~s5�<kNi��ώ��x��_/b=w�B¤�P$>������#�IA�we}CnB$�~�Г��I�ʅ�q����ǭk�qRq�w�y�^�#=�{��e�e���|Z�b�L>B�Db`�����r���Dq����$�M`.�5��3僃�����f�� ��L8�f#���fC�BO3�.�*���;�F���f-'}��-l�=���8S��a�#Q�y�)�sM�OOq��� .T��u�)�=�B�#S���g��ސ���!��@6���հm�� ���P��B~H�p;�:A�P/��� p^��h`����ϧ�}U���][P������@�E^³�p{b_uI�������X�Q�=:���BN��LŚ�-�i 'ݜ#�D_�ͬ������0Wr�Ѣ~�4�Ǵ���T`[u<E��a#Ȇ,�G8;=����@�.x{����%��h�:xc���1h��[R�$�����7�H���F���h��i���q?頺ʃa�����r��eB�f����1'=�gf�\2o�p"��#�@��,z����3<�"��Ùqol���cy� �[�>ݑ��O!:����0t�6«E��3ۑN��l��y�.����.m u��7rm���ƣ���\�Õr�{��Eȱ�Y{_��,���e��oh��b���~h�'��Z"������&jV�xʌ�����!�O��9' �!�0�('a��9�إ�"��]��Z]o�JC!nCk<����sj����0S>���a �\�n>��0��k.���Yg����+%g���>��3w�?b��$>��_����K��"�'�|7|"dH����9����S��0�"E��N �:����.5�RM;���>�UA����YAں�3v�kn]�<�"�E^ �k����������a�+W8QML�}�j<���n�f�m2A���mc���(=6�_VA��~5���=,�Q�?�N� o&��� ��ϲg��őA � ~�^ ~��փ������#�D�/_���,�qC[EHw=X� b{`_A+ـ��aL�i���T�H��)S�'{�����V��3���?$�3t��h�A_�#�d&@��{�7�D���0�p�rX�y�� +u�/9��{V��z�c��d ���/���0�ܐ�m��� �ڔ.���@�w~����q�&.7{Pv}�N*����p>��n> �k�2+��)���O���]�i����jY���Mg� 5\*�������@)�q�f\-��bY1��K�#��\?�}����ʵ��V�[PsV<��%P8�/o۷ �r��,�U&Q����0ģم��;/L�!�F��a�Ύ��7��J��
Behavioral task
behavioral1
Sample
R8/R8_protected.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
R8/R8_protected.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
R8/msdia140.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
R8/msdia140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
R8/symsrv.dll
Resource
win10v2004-20240802-en
General
-
Target
cf5d12c0ae71a3d398cf6fb6bb8e6705_JaffaCakes118
-
Size
8.0MB
-
MD5
cf5d12c0ae71a3d398cf6fb6bb8e6705
-
SHA1
ff941f20efa85c89b36ecf4d976804c7b93028b4
-
SHA256
1bf9057ed79ed59b0fbb72d0fb860096525249370c380e8ae49380b20a987a52
-
SHA512
19ce974eca3ceb649e24175a7cab60f01102c1992f1aa81185bf93b3d824cb08f3bbb258aae6f54aaaf9e64ebfa7ddaa2c2fcd4c83cbc2f18ed56aa7536102ae
-
SSDEEP
196608:2JPMzTUcN7FnU6hX7qrtJdMgqCo7NS//0GjqJW4rGj9wMSl:2JEzI8xU652dM57yMspXq
Malware Config
Signatures
-
resource yara_rule static1/unpack001/R8/R8_protected.exe vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/R8/R8_protected.exe
Files
-
cf5d12c0ae71a3d398cf6fb6bb8e6705_JaffaCakes118.rar
-
R8/R8_protected.exe.exe windows:5 windows x86 arch:x86
89d5ea0eb4d2b413bc84f201e7449840
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameA
kernel32
LockResource
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CreateWindowExA
CharUpperBuffW
wtsapi32
WTSSendMessageW
advapi32
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
Exports
Exports
Sections
.text Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 7.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 7.5MB - Virtual size: 7.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
R8/msdia140.dll.dll regsvr32 windows:6 windows x86 arch:x86
c667a4f5d244f2dd8585dfea306b77c5
Code Sign
33:00:00:00:d8:e4:75:f9:45:6f:48:f7:ae:00:00:00:00:00:d8Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before02/10/2017, 22:57Not After02/01/2019, 22:57SubjectCN=Microsoft Time-Stamp Service,OU=AOC+OU=Thales TSS ESN:70DD-4B5B-4568,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:78:25:5a:b5:cd:23:c6:5f:95:00:01:00:00:01:78Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:11Not After11/08/2018, 20:11SubjectCN=Microsoft Corporation,OU=AOC,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:c3:0e:9b:a7:d8:b2:dc:f7:2c:00:00:00:00:00:c3Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:20Not After11/08/2018, 20:20SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ac:71:00:8c:05:89:62:08:0f:a1:ef:10:5e:b4:9d:1e:09:3c:43:f4:18:6a:4f:01:f0:84:82:50:f9:76:de:c6Signer
Actual PE Digestac:71:00:8c:05:89:62:08:0f:a1:ef:10:5e:b4:9d:1e:09:3c:43:f4:18:6a:4f:01:f0:84:82:50:f9:76:de:c6Digest Algorithmsha256PE Digest Matchestrueac:6f:4b:0e:ba:47:82:9c:df:fe:cf:8a:88:3e:bc:53:d4:95:50:fbSigner
Actual PE Digestac:6f:4b:0e:ba:47:82:9c:df:fe:cf:8a:88:3e:bc:53:d4:95:50:fbDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
msdia140.pdb
Imports
kernel32
SetLastError
FindResourceExW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
LoadLibraryExW
GetProcAddress
LocalAlloc
LocalFree
GetModuleFileNameW
GetLastError
GetSystemInfo
InitializeCriticalSection
DeleteCriticalSection
LCMapStringW
UnmapViewOfFile
CloseHandle
EnterCriticalSection
LeaveCriticalSection
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
FileTimeToSystemTime
RaiseException
VirtualProtect
VirtualQuery
FreeLibrary
GetModuleHandleW
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
InterlockedFlushSList
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetFullPathNameW
GetFullPathNameA
SetStdHandle
GetFileType
SetFilePointerEx
ReadFile
GetConsoleMode
ReadConsoleW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
WideCharToMultiByte
HeapFree
HeapAlloc
GetACP
GetStdHandle
GetStringTypeW
GetDriveTypeW
WriteFile
CompareStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetCurrentDirectoryW
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
DecodePointer
GetFileAttributesW
SetFileAttributesW
VirtualAlloc
VirtualFree
DeleteFileW
DeviceIoControl
ExpandEnvironmentStringsW
GetFileSizeEx
MapViewOfFileEx
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
VSDllRegisterServer
VSDllUnregisterServer
Sections
.text Size: 1018KB - Virtual size: 1018KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
R8/settings.ini
-
R8/symsrv.dll.dll windows:10 windows x86 arch:x86
5802dd11251a8ef1e796d205b0e4a3c3
Code Sign
33:00:00:00:89:62:0d:9e:95:d3:61:6b:a8:00:00:00:00:00:89Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/10/2015, 18:14Not After07/01/2017, 18:14SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:98FD-C61E-E641,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:0a:2c:79:ae:d7:79:7b:a6:ac:00:01:00:00:01:0aCertificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/06/2015, 17:42Not After04/09/2016, 17:42SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:7b:a2:81:0b:87:11:ab:e7:fc:00:00:00:00:00:7bCertificate
IssuerCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before01/10/2014, 18:06Not After01/01/2016, 18:06SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0c:52:4c:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before06/07/2010, 20:40Not After06/07/2025, 20:50SubjectCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
c5:eb:15:37:2b:c5:18:ae:a2:5d:c6:47:b7:e7:05:e2:26:3d:8f:15:e3:30:e8:cd:5f:d6:27:88:30:23:51:4aSigner
Actual PE Digestc5:eb:15:37:2b:c5:18:ae:a2:5d:c6:47:b7:e7:05:e2:26:3d:8f:15:e3:30:e8:cd:5f:d6:27:88:30:23:51:4aDigest Algorithmsha256PE Digest Matchestrueeb:4f:5a:19:6d:0b:b0:1a:de:d8:a2:e0:83:fe:9b:e2:40:fa:c8:49Signer
Actual PE Digesteb:4f:5a:19:6d:0b:b0:1a:de:d8:a2:e0:83:fe:9b:e2:40:fa:c8:49Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
symsrv.pdb
Imports
msvcrt
strcat_s
wcsstr
tolower
_wcslwr
_wtoi64
strrchr
_wmakepath_s
iswspace
vswprintf_s
isspace
free
memmove
iswprint
getenv
_purecall
_callnewh
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
_CxxThrowException
memcpy
??1type_info@@UAE@XZ
strcpy_s
malloc
__dllonexit
wcsncpy_s
_vsnwprintf
_unlock
_lock
_except_handler4_common
_onexit
_XcptFilter
towlower
fclose
wcsrchr
_stricmp
_wfopen
fgetws
??3@YAXPAX@Z
wcscpy_s
__CxxFrameHandler3
_amsg_exit
_wsplitpath_s
wcscat_s
_wcsnicmp
_wcsicmp
swprintf_s
_initterm
wcschr
memset
api-ms-win-core-synch-l1-1-0
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
SetWaitableTimer
AcquireSRWLockExclusive
OpenMutexW
ReleaseMutex
ReleaseSRWLockExclusive
DeleteCriticalSection
api-ms-win-core-file-l1-1-0
ReadFile
GetFileSize
CreateDirectoryW
GetDriveTypeW
RemoveDirectoryW
CreateFileW
WriteFile
LocalFileTimeToFileTime
DeleteFileA
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFileTime
SetFilePointer
CreateFileA
DeleteFileW
GetFileAttributesExW
GetFileTime
GetFileAttributesW
api-ms-win-core-errorhandling-l1-1-0
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
SetLastError
SetErrorMode
api-ms-win-core-processenvironment-l1-1-0
GetEnvironmentVariableW
ExpandEnvironmentStringsW
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CreateThread
TerminateProcess
OpenProcessToken
api-ms-win-security-base-l1-1-0
EqualSid
AllocateAndInitializeSid
FreeSid
GetTokenInformation
api-ms-win-core-debug-l1-1-0
DebugBreak
OutputDebugStringW
api-ms-win-core-libraryloader-l1-1-0
FreeLibrary
LoadLibraryExA
GetModuleHandleW
GetProcAddress
LoadLibraryExW
GetModuleFileNameW
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetVersionExW
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetSystemDirectoryW
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
WideCharToMultiByte
api-ms-win-core-misc-l1-1-0
LocalAlloc
LocalReAlloc
LocalFree
FormatMessageW
Sleep
GlobalFree
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-localregistry-l1-1-0
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegEnumValueW
ws2_32
WSAStartup
GetAddrInfoW
FreeAddrInfoW
WSACleanup
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-memory-l1-1-0
VirtualProtect
VirtualQuery
api-ms-win-core-heap-l1-1-0
GetProcessHeap
HeapAlloc
Exports
Exports
EulaDlgProc
RunDllEntry
SymbolServer
SymbolServerByIndex
SymbolServerByIndexW
SymbolServerClose
SymbolServerDeltaName
SymbolServerDeltaNameW
SymbolServerGetIndexString
SymbolServerGetIndexStringW
SymbolServerGetOptions
SymbolServerGetSupplement
SymbolServerGetSupplementW
SymbolServerGetVersion
SymbolServerIsStore
SymbolServerIsStoreW
SymbolServerPing
SymbolServerPingW
SymbolServerPingWEx
SymbolServerSetOptions
SymbolServerSetOptionsW
SymbolServerStoreFile
SymbolServerStoreFileW
SymbolServerStoreSupplement
SymbolServerStoreSupplementW
SymbolServerW
SymbolServerWEx
httpCloseHandle
httpOpenFileHandle
httpOpenFileHandleW
httpQueryDataAvailable
httpReadFile
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mrdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
R8/конфиги/settings(1).ini
-
R8/конфиги/settings.ini