�f,UTl<nD��8G��q^��@���_��w�r宅$*�*XD�S����9@Х�-�F'8��ѯk#��_�+�#Vg�3R0!B�8\�l�~������gʒt{��e�٧� �j������r�;����?n��7��nwd����.AB����=��_I4+S���_��К��~�L�Z�����TG���5�;�)�_R��="H�M����*�0����G�DoN�� �F��V*L1.�J�J����36Z���0��-l7N�� Z�$����(JAG��9���� �7q��'�A�A:@�Y�;n ��Ö��m��Ƕ���D5o4����=8��Im��^���3G��'���]�[^L�+� �ЊY������᧞7QK��=���I����ϝ�S��/�2V����_e�����A���b�� ���q�b���'d#��ױ���QEV�(<Ҷ�՝� �Ө0�"���+�O������m�|˞��J]J�H��L�G,Z����@C!�"�0���<vtbz�[R�v{���Ԛ�����#?�� �~��\��]^�Q�@�����6W|�:���U7Y�0M���`U���=��@_h�̡d�h!�y"_�,���T��FMj��ow`�u%���`�BG�j,���( �[3�r�Z�,�8����`�:������Q�&�MM���3��?��UU�ni_R���9�&� +�����%iPLD��J�&����O�����b<6٭��d~��$���W_&��]�jZ>[�9��*��0��,3V��E�1�s��HG��p���y[F��C�خi������S���_�si�W�����w{Rh�^�Xb�L�Y|���<�G��� �-�I�#� ����UNH٬��J��'�� �`I\]�jk^�i>��L-M��rC( �ރ=��,�����"6�GT��=) ^;��.��'��S͞L~e|��if��Jʇ��ɂ8��!�����r5�ò�ߥ1[W��Q!�AaOl�� KHH;1��"�����L����5: �!��ޠ >ut.V ?]��^���0��L�t�{0T@Y@�Ҫ�H$Ǒf�����fo4<��e�=�7�n�W��;7�K�)���"F��U^y153��G� �=�i�{ʱ�dt����o(g!�T%�4�[�� ��q����2���e�ʑ$�f.qR<K�7��Z��+�>_��̂���$<Pq��P��DO�GV� � �����]Ro�riI���K]ٵ���l��H��7�ҏ�A �ou������Iq�(�[���d-��m�1m�!q�C��ɽ���~l~�fS?�:�����G��ؚ���6�@��r��mD�[̭#�����U�5�4�E�;v�ocъ|՞iR���Ubs��?����݈h7d��>�r\�����2`���f���g����_HFv���L^�_<L��o"������com�Mo̼�֧�lq1������v���]?#����h��.y�c���5E}1;�㐭q��Q���4`���vi���C��Q�6����~�P���5���U&���]�m�Hm�x��qS"[��@�L�"�n*�`����'`YO�~]�Q0 �g��z��|茬�S.h��%o��?/����6�Y\]�|+�_��i�?���2��^���b�,K���AKk@����Ŭ��\��"�rF��?�w�����U>�I���,f�6]"���|T�U<@6�X���-ab�%��qIXX{�9Ǘ� �B^2����@��J�K9��:[U+0'�g�3�����[z5\ӑ���� ����(}uk�0zT��{�p�C-��_I*�S�J:�������Uwu��z�=�}!m��b\mP�?`7NE�K����zL͈W�H���!o�{���Vfy z �Yg�HH���s)��$����{Æ���!P�|�Tk �Ba��D�^w����?w������B��n���WЬ�#����!kx�t�*DJ����6-���W��.*��'V,:��Ԭ��K�{���2�I��m���{�� vnؾ4+fj����� 2%6��D/Q��vxf�fQD�P�J5w�G��k���C�k���?��b�{]�>�q=��G����킏��%vg>>Qp�xV�"�R�|ߕ?h�~��fW�<�e؇���[(g�,��[v�ݕx�I_��(��\�$�!�K�V����Mx���{y��<�x�I)e��D�ޅ������T��㐜�·Hw���+2}2'�������RTܫ���@j5��_6Y_m�Ol��-#�P�.�6nK��h���|��ݖj�j< UlUO����A��XT�v��Xg�X�v�rU2�aN?�����$tYIu5���J� T���`=�5P�k��-���^Py?C��r6{�L���S���,{���H��m[P �O ZP�����s��U;�0�N�Ur���ߗ�=]S庼�s��.B�ñ���Y� mͫ�-;��j�͒`xH:���W�/|Y����DT�A�V9U�p��{*s�� "NB�S�D�sfy^Q��� �<�M�*�� fA2+��<x�����6&� 5���5����}�.��P�"�a�;��4�F,D���xXaֹV��f�����g���Fa�t����E30Ƀ��<v2����fe�;��O4(%:��bVܗc�v�ü>�W�U�H��a�M��'\v$ڥυ>X�X.a�PhU/��էX�cGfӝ�ڵ.`�w�y��ut$Q��y�WA~���r�?S7��$Ոb��g,ǃ�j�-�5N��!��?��ħ9m�I���ɛ��dQkx>��5qעyr��;���"�tno�b�WX�⡋3B��'��W]Ì���> ��W�9(T�����M�e��r��u ��G���w�u G3s�$:✉��q�П\SaP�SW�l�=삜{2�Q �[y�?&NK;�Ƭ�zO���}�4SR�49$���?m� p��$�;���dJqDK��8�E.k:?���t���>r7p ���xh -������RԬ絅�J(�AvU y `�\�<��=�ǿ��
Overview
overview
7Static
static
7外挂/155...��.url
windows7-x64
1外挂/155...��.url
windows10-2004-x64
1外挂/AutoLogin.exe
windows7-x64
7外挂/AutoLogin.exe
windows10-2004-x64
7外挂/MSWINSCK.dll
windows7-x64
3外挂/MSWINSCK.dll
windows10-2004-x64
3外挂/神...��.exe
windows7-x64
7外挂/神...��.exe
windows10-2004-x64
7监控台/...CK.dll
windows7-x64
3监控台/...CK.dll
windows10-2004-x64
3监控台/监控.exe
windows7-x64
3监控台/监控.exe
windows10-2004-x64
3Behavioral task
behavioral1
Sample
外挂/155绿色软件站.url
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
外挂/155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
外挂/AutoLogin.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
外挂/AutoLogin.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
外挂/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
外挂/MSWINSCK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
外挂/神魔小歪.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
外挂/神魔小歪.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
监控台/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
监控台/MSWINSCK.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
监控台/监控.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
监控台/监控.exe
Resource
win10v2004-20240802-en
General
-
Target
db71d6c43ca3083e834f407b66b009da_JaffaCakes118
-
Size
1.4MB
-
MD5
db71d6c43ca3083e834f407b66b009da
-
SHA1
8393ae321e53394c56dfe064c81c9e483155deaa
-
SHA256
ec7609464f63d8d949b7c1ae6293f1e48d821f6a37e9c9a227744f8d57e93745
-
SHA512
a655a6acc5e3c1640e9364d5fd7039ea5527f7c3534345a8584ad9aa3030f45a9f2b84e98bf916053b8c7c26849d0d88acd6498078f4f1c1aa94929214af5f0b
-
SSDEEP
24576:8+iFc1dOqW+yU8wLUjuo/85/OTZfpWiZBNpvvdiMWVOKodtNq4VniGgeymhtwQg/:8+OUoqwrjuQ85/eZRWSzvvdWQdtNqgnu
Malware Config
Signatures
-
resource yara_rule static1/unpack001/外挂/AutoLogin.exe vmprotect static1/unpack001/外挂/神魔小歪.exe vmprotect -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/外挂/AutoLogin.exe unpack001/外挂/神魔小歪.exe unpack001/监控台/监控.exe
Files
-
db71d6c43ca3083e834f407b66b009da_JaffaCakes118.rar
-
外挂/155绿色软件站.url.url
-
外挂/AutoLogin.exe.exe windows:4 windows x86 arch:x86
4e7cdbd1dd7e8c3fbccbdbdd792c3162
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarTstGt
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
__vbaStrI4
ord693
__vbaVarVargNofree
__vbaAryMove
__vbaFreeVar
ord695
__vbaLenBstr
__vbaLineInputStr
__vbaStrVarMove
__vbaVarIdiv
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
ord516
__vbaStrErrVarCopy
_adj_fprem1
__vbaRecAnsiToUni
ord518
__vbaResume
__vbaCopyBytes
ord629
__vbaStrCat
__vbaLsetFixstr
ord553
__vbaVarTextTstEq
ord660
__vbaRecDestruct
__vbaSetSystemError
__vbaLenBstrB
__vbaHresultCheckObj
__vbaLenVar
_adj_fdiv_m32
__vbaAryVar
__vbaVarXor
__vbaAryDestruct
__vbaVarIndexLoadRefLock
ord592
__vbaVarForInit
ord593
__vbaExitProc
__vbaI4Abs
ord595
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
ord598
__vbaVarIndexLoad
__vbaStrFixstr
ord520
__vbaFPFix
__vbaStrTextCmp
__vbaBoolVarNull
__vbaVarTstLt
__vbaFpR8
__vbaRefVarAry
_CIsin
__vbaErase
ord709
__vbaVarCmpGt
__vbaVargVarMove
ord632
__vbaChkstk
__vbaFileClose
ord526
EVENT_SINK_AddRef
__vbaGenerateBoundsError
ord529
__vbaStrCmp
__vbaVarTstEq
__vbaAryConstruct2
__vbaI2I4
DllFunctionCall
__vbaVarOr
ord670
__vbaStrR4
__vbaLbound
__vbaRedimPreserve
_adj_fpatan
__vbaFixstrConstruct
__vbaRedim
__vbaStrR8
__vbaRecUniToAnsi
EVENT_SINK_Release
__vbaNew
ord600
__vbaUI1I2
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaStrUI1
__vbaVarMul
__vbaStr2Vec
__vbaUI1I4
__vbaExceptHandler
ord711
ord712
__vbaPrintFile
__vbaStrToUnicode
ord606
_adj_fprem
_adj_fdivr_m64
__vbaR8ErrVar
ord607
ord608
__vbaFPException
ord717
__vbaInStrVar
__vbaStrVarVal
__vbaUbound
__vbaVarCat
ord535
ord644
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaNew2
__vbaInStr
ord648
__vbaVar2Vec
__vbaR8Str
ord571
_adj_fdiv_m32i
ord572
_adj_fdivr_m32i
__vbaStrCopy
ord573
ord681
__vbaI4Str
__vbaVarCmpLt
__vbaVarNot
__vbaFreeStrList
ord576
__vbaVarTextTstGt
_adj_fdivr_m32
__vbaR8Var
__vbaPowerR8
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaI4Var
__vbaVarAdd
__vbaAryLock
ord612
__vbaStrToAnsi
__vbaVarDup
__vbaVarMod
__vbaVarCopy
__vbaVarTstGe
__vbaFpI4
ord616
__vbaRecDestructAnsi
ord617
_CIatan
__vbaUI1Str
__vbaAryCopy
__vbaCastObj
__vbaI2ErrVar
__vbaStrMove
__vbaStrVarCopy
ord619
ord542
ord650
_allmul
__vbaLenVarB
ord545
_CItan
ord546
__vbaUI1Var
__vbaAryUnlock
__vbaFPInt
__vbaVarForNext
_CIexp
__vbaMidStmtBstr
__vbaFreeStr
__vbaFreeObj
ord581
kernel32
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
Exports
Exports
Sections
.text Size: - Virtual size: 506KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 280KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
外挂/MSWINSCK.OCX.dll regsvr32 windows:4 windows x86 arch:x86
fcc40667ac22e0c598518006de958259
Code Sign
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04-12-2003 00:00Not After03-12-2013 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0d:e9:2b:f0:d4:d8:29:88:18:32:05:09:5e:9a:76:88Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before04-12-2003 00:00Not After03-12-2008 23:59SubjectCN=VeriSign Time Stamping Services Signer,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10-01-1997 07:00Not After31-12-2020 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation6a:0b:99:4f:c0:00:de:aa:11:d4:d8:40:9a:a8:be:e6Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10-12-2000 08:00Not After12-11-2005 08:00SubjectCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
61:0e:7d:a7:00:00:00:00:00:48Certificate
IssuerCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before25-10-2003 05:59Not After25-01-2005 06:09SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
5b:3d:e6:b4:56:d1:a3:cc:c3:77:ec:dd:05:31:a7:25:62:28:b5:bcSigner
Actual PE Digest5b:3d:e6:b4:56:d1:a3:cc:c3:77:ec:dd:05:31:a7:25:62:28:b5:bcDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
wsock32
accept
listen
inet_ntoa
recv
WSAGetLastError
WSASetLastError
select
__WSAFDIsSet
shutdown
ntohs
sendto
recvfrom
connect
getsockopt
setsockopt
getsockname
getpeername
closesocket
WSACancelAsyncRequest
gethostbyaddr
bind
WSAAsyncSelect
socket
WSAStartup
WSACleanup
inet_addr
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
gethostbyname
htons
gethostname
ioctlsocket
send
kernel32
WideCharToMultiByte
GetVersion
GetProcAddress
GetModuleFileNameA
InitializeCriticalSection
HeapFree
HeapAlloc
GetProcessHeap
lstrcpynA
lstrcpyA
lstrlenA
lstrcatA
IsBadWritePtr
DisableThreadLibraryCalls
lstrlenW
LeaveCriticalSection
GetCurrentThreadId
EnterCriticalSection
LocalFree
FormatMessageA
GetTickCount
MultiByteToWideChar
SetLastError
GetLocaleInfoA
DeleteCriticalSection
FreeLibrary
lstrcmpA
InterlockedDecrement
GetFileAttributesA
GetWindowsDirectoryA
LoadLibraryA
GetLastError
InterlockedIncrement
lstrcmpiA
FindResourceA
LockResource
LoadResource
HeapReAlloc
user32
EndDialog
DrawEdge
DialogBoxParamA
LoadCursorA
MessageBoxA
GetActiveWindow
GetDC
CharNextA
ReleaseDC
SetParent
GetWindowRect
ShowWindow
WinHelpA
IsDialogMessageA
GetWindow
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
IsChild
GetKeyState
SetWindowPos
LoadBitmapA
IsWindowVisible
EndPaint
GetClientRect
BeginPaint
GetSystemMetrics
GetDlgItemTextA
ClientToScreen
OffsetRect
EqualRect
IntersectRect
SetWindowRgn
PtInRect
MessageBeep
LoadStringA
IsWindow
CreateDialogIndirectParamA
GetParent
SetDlgItemTextA
SendMessageA
DefWindowProcA
GetWindowLongA
DestroyWindow
SetWindowLongA
KillTimer
SetTimer
UnregisterClassA
RegisterClassA
PeekMessageA
PostMessageA
SendDlgItemMessageA
GetDlgItemInt
SetDlgItemInt
SetFocus
MoveWindow
CreateWindowExA
wsprintfA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CreateOleAdviseHolder
advapi32
RegDeleteValueA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
oleaut32
VariantChangeType
SysAllocStringLen
SysAllocString
SafeArrayRedim
SysStringLen
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
LoadTypeLibEx
OleCreatePropertyFrame
LoadRegTypeLi
SetErrorInfo
SysFreeString
CreateErrorInfo
GetErrorInfo
SafeArrayUnaccessData
SafeArrayDestroy
VariantClear
SysAllocStringByteLen
SafeArrayCreate
SysStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
VariantInit
SafeArrayAccessData
SafeArrayGetDim
gdi32
GetDeviceCaps
CreateCompatibleDC
CreateRectRgnIndirect
GetWindowExtEx
GetViewportExtEx
DeleteDC
DeleteObject
GetObjectA
LPtoDP
SetMapMode
SetViewportExtEx
SetWindowExtEx
SetViewportOrgEx
SetWindowOrgEx
CreateDCA
BitBlt
SelectObject
Exports
Exports
DLLGetDocumentation
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
外挂/神魔小歪.exe.exe windows:4 windows x86 arch:x86
3b8a6208a0a9857a546eb1366574a196
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaR8FixI4
__vbaVarTstGt
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaHresultCheck
__vbaStrI4
__vbaVarMove
__vbaVarVargNofree
ord693
__vbaAryMove
__vbaFreeVar
ord695
__vbaLenBstr
__vbaLateIdCall
__vbaLineInputStr
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
__vbaVarIdiv
_adj_fdiv_m64
__vbaAryRecMove
ord513
__vbaNextEachVar
__vbaFreeObjList
ord516
_adj_fprem1
__vbaRecAnsiToUni
ord518
ord626
__vbaI2Abs
__vbaCopyBytes
__vbaResume
__vbaForEachCollAd
__vbaVarCmpNe
__vbaStrCat
ord629
ord552
__vbaInStrVarB
ord660
ord553
__vbaLsetFixstr
__vbaRecDestruct
__vbaSetSystemError
__vbaNameFile
__vbaLenBstrB
ord662
__vbaHresultCheckObj
ord557
__vbaLenVar
_adj_fdiv_m32
__vbaAryVar
__vbaVarXor
__vbaAryDestruct
__vbaVarIndexLoadRefLock
__vbaForEachCollObj
ord593
__vbaBoolStr
__vbaStrBool
__vbaExitProc
__vbaVarForInit
ord300
ord594
__vbaI4Abs
ord301
__vbaOnError
__vbaObjSet
ord302
_adj_fdiv_m16i
ord303
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaVarIndexLoad
ord598
__vbaFpR4
ord306
ord520
__vbaStrFixstr
ord307
ord706
ord308
__vbaFPFix
ord309
__vbaVarTstLt
__vbaFpR8
__vbaBoolVarNull
__vbaRefVarAry
_CIsin
ord631
ord709
__vbaErase
__vbaNextEachCollObj
ord632
__vbaVarCmpGt
__vbaVargVarMove
__vbaChkstk
ord526
__vbaFileClose
EVENT_SINK_AddRef
ord528
__vbaVarAbs
__vbaGenerateBoundsError
ord529
__vbaStrCmp
__vbaPutOwner3
__vbaAryConstruct2
__vbaVarTstEq
ord561
__vbaI2I4
__vbaPrintObj
DllFunctionCall
__vbaVarLateMemSt
ord670
__vbaVarOr
__vbaFpUI1
ord564
__vbaStrR4
__vbaLbound
__vbaRedimPreserve
_adj_fpatan
__vbaFixstrConstruct
__vbaLateIdCallLd
__vbaStrR8
__vbaRedim
__vbaRecUniToAnsi
EVENT_SINK_Release
__vbaNew
ord600
__vbaUI1I2
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaUI1I4
__vbaStrUI1
__vbaVarMul
__vbaExceptHandler
ord711
ord712
__vbaPrintFile
__vbaStrToUnicode
__vbaDateStr
_adj_fprem
_adj_fdivr_m64
__vbaI2Str
__vbaFailedFriend
__vbaVarDiv
ord607
ord608
ord531
__vbaVarCmpLe
__vbaFPException
ord717
__vbaInStrVar
__vbaGetOwner3
__vbaStrVarVal
__vbaUbound
__vbaVarCat
__vbaDateVar
ord535
__vbaI2Var
ord644
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
ord570
__vbaVar2Vec
__vbaInStr
ord648
__vbaR8Str
__vbaNew2
ord571
_adj_fdiv_m32i
ord572
_adj_fdivr_m32i
__vbaStrCopy
ord573
ord681
__vbaI4Str
__vbaFreeStrList
__vbaVarCmpLt
__vbaVarNot
ord576
_adj_fdivr_m32
__vbaPowerR8
_adj_fdiv_r
ord578
ord685
ord100
__vbaVarTstNe
__vbaVarSetVar
__vbaI4Var
__vbaVarCmpEq
ord610
__vbaLateMemCall
__vbaInStrB
__vbaAryLock
__vbaVarAdd
ord612
__vbaFreeVarg
__vbaVarDup
__vbaStrToAnsi
ord614
__vbaAryVarVarg
__vbaFpI2
__vbaVarMod
__vbaVarLateMemCallLd
ord616
__vbaFpI4
__vbaVarCopy
__vbaVarTstGe
__vbaLateMemCallLd
__vbaRecDestructAnsi
ord617
_CIatan
__vbaCastObj
__vbaUI1Str
__vbaAryCopy
__vbaI2ErrVar
__vbaStrMove
__vbaForEachVar
__vbaR8IntI4
__vbaStrVarCopy
ord619
ord542
ord650
_allmul
__vbaLateIdSt
__vbaLenVarB
__vbaAryRecCopy
ord545
_CItan
__vbaNextEachCollAd
ord546
__vbaFPInt
__vbaUI1Var
__vbaAryUnlock
__vbaVarForNext
_CIexp
__vbaRecAssign
__vbaI4ErrVar
__vbaFreeObj
__vbaFreeStr
ord581
kernel32
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
Exports
Exports
�m��,`K�t�̈́k"w��c�B��LYd+���v#��\�a�M��-���h�4�ElR�"�{�f0���K���Y����]�4b ���ɇfT���"���R>�B�������.s;�m^�V���+o�Tb�x*Lj?����^t��n�q��),�45,��U����_t��2�^p&;X��� j��i�+$��TX�EƗ�I���&`�z|�3�X):�LF���-���.�����%�[{�*���� �?�ٸ0c;�F_ �W�ޔ�q|��~b.Ea:��Yϻ� R�i"sC<r��n�7��ea�e���"����B��c����I��}A�Z����ڬ�=�������#y�bі�Vu�����i���ΗAa�)6��i%]k����6�� ��גY�����u�}�Wfb~o� ���0F+��ؗ��'hQЎ�\JFV����,�o��i�i���_7�mH'כ�~��ys �|�Ę2��ܕ�U� ��u@���b�x��u��Tk�&n���/ �9hRtb8ϯ�*p���=���R榏ӈ��1khCK���+ȡ����^L��qzU6��(�n�a��Q�w��Dl T��lN=Z2���GV�@eC[��krP��I�t������Ml��Q[GP#�v���CT���{��K�wZmD�5Y�zd���1��XWv���T�/ѽ���|1����Q�4&`��l�D<��V��#�AZ#ш� �8~��^N ��ҏoD�H��O�S�tkW��9��]�j^��6���6��z tq��Z0�R6����G�mps��l=�ƀ���V������^���>WKۛ���iG5�X�b�_C���j���@!�� [���n6��o ��`q�O������;K��#������ �5�O�5�:�N��P�S��E� ]�G�.#~��ܣJ�������iY '��t�N7��u�=ܭ�\�I��jU�M��a,2O��V�|���'AX�V-�˳�+��:����6��W��0點qW�2Z2��.dž~:��p+BP��H(i9�)�q��mNǿ��*�Yٌ�;� V�[ ����.��̥�{��_z�F��'�8>���j/���iÐ�<���W;�R�� ���%θ�0j�}A�LF����Z1�W�鲆�F������wf٩�.���f��u�x�1��+ _ rd�=K37���`+9f�5���}6A4&+Q��W���t!o��I�Z�[|h�b]/F��U;t��2,$F�Q��t�羱�gC7ؗ�!qs C�|�a�!I�+�����U���?�گ�ZgQvc��4�k���ώ�1��'�E��`��Ы�Ty���F\���1_xGtz�&4���*��Mz%R��e%� "!k�u��F���,�d���a���w������`���$҆ ��/)[K�����gr���Ux�R÷z�WI���7����B"������V[�.�ȩ�6��|G�t䬽�aF�P�t��`�R����m|�5�x��F\� ��G�+:���H��ʱ�#H��d/���,��;��eB�]~1�U'��xC�p�,�'N��d 5�5����E��N��� ����8��o�3�bd��[C.����:���ώ!g�����Zϳ�e��������3G6��J���KO�����&_��am/`�>/�<ZFo����E[� ���NK�ig���C�iL1����P�O;���l&�CMG�{��i ������+�`���+;2;�+ }����E�r��� *A����EF-���Mv�_�2����}��'���Oi'��3��=�U�rp�X!��P�c�A�>��<{{�<j�?f���� Jޒ9֏q0]���_�)�U�?:fL='�Yir��� Y��x%����孕^�n��Ȭ9��l����Vd8L���8J_si0+ǬRh^T������+�-�K�k#*����|�XŷA]�}��/9����D��%#s�]�0,}/Ls�����"_ ���P��5��x�Sx��V��P��B�|~�wC�4���X���<�h���� e�r�����/W2Y��ʔ�Vx���&�!����-Q��5c��\>m]�L/�-��[T�#Q�֏��3 �F��?�hD��<(�.��������^�DЄ��y0q�L�j�>T����Ap�$�o��hɠh�����c ��i��XGS��"��3�E�i6"������Eh�s�ȹ� h눅F��o�؋�N���z��<�����뿂Qں�TN�G� ��k$4B$F+�w�!�-�N�j����O`��Ua�0�3��5�������M|V$lf��-�Ѹ�R<��p��_����0�c��u��>� W�Hf������L��֥�ʄ�m����c���}��1��{;˯/حV��g���8"�6s8�ULَp�/�B6���6�#-�>��S~��ؿ馍ov���?�v��B_�5<��Uk��SC5ډmՁ� ���j �=�D�?�)���zfRg5'�ݺp�j y����ܝ�&'�U�T�|kL�[��3��\D�u��,�t�Ö�͢�Qv��Z�qf�q��O�ncWGք[�7���F�!|� XVEY·83��8_*`&\���|M������w�X��g@v^�Re�/_.�ި����Պr^�F�O5'�>�D��B.7�E�����S][)�})��y7�W����X#����K�w̭+�M����pg���YQgS�& ��\>��WLBF��+?�������I���_���ܯ�k{&?�N6fMi#=8֡6�D��3 ��H5#���W��vt!��.�^7e������L�i�T�t�ZDc�> ���K�L9�I�\��M�P���Oc0��iZzbx��kca~�n<p��?����: 0LI�<�yS��9T�5� ��y�߽�|�@������� �#��p����n��4G���h�������Y��Ggtn�s�s���Z\��V<�V�vŻP�*b��B�d�t@VK5��)H۷PN�߬A��Zڙ�=?Z���B��H� ��@k8�I7`�\
Sections
.text Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 464KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 896KB - Virtual size: 893KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
监控台/Config.ini
-
监控台/MSWINSCK.OCX.dll regsvr32 windows:4 windows x86 arch:x86
fcc40667ac22e0c598518006de958259
Code Sign
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04-12-2003 00:00Not After03-12-2013 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0d:e9:2b:f0:d4:d8:29:88:18:32:05:09:5e:9a:76:88Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before04-12-2003 00:00Not After03-12-2008 23:59SubjectCN=VeriSign Time Stamping Services Signer,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10-01-1997 07:00Not After31-12-2020 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation6a:0b:99:4f:c0:00:de:aa:11:d4:d8:40:9a:a8:be:e6Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10-12-2000 08:00Not After12-11-2005 08:00SubjectCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
61:0e:7d:a7:00:00:00:00:00:48Certificate
IssuerCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before25-10-2003 05:59Not After25-01-2005 06:09SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
5b:3d:e6:b4:56:d1:a3:cc:c3:77:ec:dd:05:31:a7:25:62:28:b5:bcSigner
Actual PE Digest5b:3d:e6:b4:56:d1:a3:cc:c3:77:ec:dd:05:31:a7:25:62:28:b5:bcDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
wsock32
accept
listen
inet_ntoa
recv
WSAGetLastError
WSASetLastError
select
__WSAFDIsSet
shutdown
ntohs
sendto
recvfrom
connect
getsockopt
setsockopt
getsockname
getpeername
closesocket
WSACancelAsyncRequest
gethostbyaddr
bind
WSAAsyncSelect
socket
WSAStartup
WSACleanup
inet_addr
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
gethostbyname
htons
gethostname
ioctlsocket
send
kernel32
WideCharToMultiByte
GetVersion
GetProcAddress
GetModuleFileNameA
InitializeCriticalSection
HeapFree
HeapAlloc
GetProcessHeap
lstrcpynA
lstrcpyA
lstrlenA
lstrcatA
IsBadWritePtr
DisableThreadLibraryCalls
lstrlenW
LeaveCriticalSection
GetCurrentThreadId
EnterCriticalSection
LocalFree
FormatMessageA
GetTickCount
MultiByteToWideChar
SetLastError
GetLocaleInfoA
DeleteCriticalSection
FreeLibrary
lstrcmpA
InterlockedDecrement
GetFileAttributesA
GetWindowsDirectoryA
LoadLibraryA
GetLastError
InterlockedIncrement
lstrcmpiA
FindResourceA
LockResource
LoadResource
HeapReAlloc
user32
EndDialog
DrawEdge
DialogBoxParamA
LoadCursorA
MessageBoxA
GetActiveWindow
GetDC
CharNextA
ReleaseDC
SetParent
GetWindowRect
ShowWindow
WinHelpA
IsDialogMessageA
GetWindow
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
IsChild
GetKeyState
SetWindowPos
LoadBitmapA
IsWindowVisible
EndPaint
GetClientRect
BeginPaint
GetSystemMetrics
GetDlgItemTextA
ClientToScreen
OffsetRect
EqualRect
IntersectRect
SetWindowRgn
PtInRect
MessageBeep
LoadStringA
IsWindow
CreateDialogIndirectParamA
GetParent
SetDlgItemTextA
SendMessageA
DefWindowProcA
GetWindowLongA
DestroyWindow
SetWindowLongA
KillTimer
SetTimer
UnregisterClassA
RegisterClassA
PeekMessageA
PostMessageA
SendDlgItemMessageA
GetDlgItemInt
SetDlgItemInt
SetFocus
MoveWindow
CreateWindowExA
wsprintfA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CreateOleAdviseHolder
advapi32
RegDeleteValueA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
oleaut32
VariantChangeType
SysAllocStringLen
SysAllocString
SafeArrayRedim
SysStringLen
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
LoadTypeLibEx
OleCreatePropertyFrame
LoadRegTypeLi
SetErrorInfo
SysFreeString
CreateErrorInfo
GetErrorInfo
SafeArrayUnaccessData
SafeArrayDestroy
VariantClear
SysAllocStringByteLen
SafeArrayCreate
SysStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
VariantInit
SafeArrayAccessData
SafeArrayGetDim
gdi32
GetDeviceCaps
CreateCompatibleDC
CreateRectRgnIndirect
GetWindowExtEx
GetViewportExtEx
DeleteDC
DeleteObject
GetObjectA
LPtoDP
SetMapMode
SetViewportExtEx
SetWindowExtEx
SetViewportOrgEx
SetWindowOrgEx
CreateDCA
BitBlt
SelectObject
Exports
Exports
DLLGetDocumentation
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
监控台/监控.exe.exe windows:4 windows x86 arch:x86
6997c3dc934c4f18f2412b999fe116d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarTstGt
__vbaVarSub
_CIcos
_adj_fptan
__vbaStrI4
__vbaAryMove
__vbaFreeVar
__vbaLateIdCall
__vbaStrVarMove
__vbaLenBstr
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaI2Abs
__vbaResume
__vbaStrCat
__vbaVarCmpNe
__vbaInStrVarB
__vbaLsetFixstr
ord660
__vbaSetSystemError
__vbaRecDestruct
__vbaHresultCheckObj
ord662
_adj_fdiv_m32
__vbaAryVar
__vbaAryDestruct
__vbaExitProc
__vbaVarForInit
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaFpR4
ord520
__vbaBoolVarNull
_CIsin
ord631
__vbaErase
ord632
__vbaVarCmpGt
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaStrCmp
__vbaAryConstruct2
__vbaVarTstEq
__vbaI2I4
DllFunctionCall
__vbaVarLateMemSt
__vbaVarOr
__vbaCastObjVar
__vbaRedimPreserve
__vbaStrR4
_adj_fpatan
__vbaFixstrConstruct
__vbaLateIdCallLd
__vbaRedim
__vbaStrR8
EVENT_SINK_Release
__vbaUI1I2
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaStrUI1
__vbaExceptHandler
ord711
__vbaPrintFile
__vbaStrToUnicode
ord712
_adj_fprem
_adj_fdivr_m64
ord607
__vbaR8ErrVar
ord608
ord531
__vbaFPException
ord717
__vbaInStrVar
__vbaUbound
__vbaStrVarVal
__vbaVarCat
ord535
__vbaI2Var
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaVar2Vec
__vbaInStr
ord648
__vbaNew2
__vbaVarLateMemCallLdRf
_adj_fdiv_m32i
ord572
_adj_fdivr_m32i
ord573
__vbaStrCopy
__vbaVarSetObj
__vbaI4Str
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaI4Var
__vbaAryLock
__vbaVarAdd
__vbaStrToAnsi
__vbaVarDup
ord612
__vbaFpI4
__vbaVarLateMemCallLd
ord617
_CIatan
__vbaUI1Str
__vbaStrMove
__vbaAryCopy
__vbaCastObj
ord619
_allmul
__vbaLateIdSt
__vbaVarLateMemCallSt
_CItan
ord546
__vbaAryUnlock
__vbaUI1Var
__vbaVarForNext
_CIexp
__vbaFreeObj
__vbaFreeStr
ord581
Sections
.text Size: 464KB - Virtual size: 461KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
脚本/50级无限灭火.txt
-
脚本/人类刺客主线1-15.txt
-
脚本/人类战士主线1-15.txt
-
脚本/元素战争-风.txt
-
脚本/元素战争地.txt
-
脚本/元素战争风(包括BOSS).txt
-
脚本/元素战争风(放弃BOSS任务).txt
-
脚本/愿望.txt
-
脚本/日常任务-厨师练习(明文命令提供学习).txt
-
脚本/日常任务-守护生命之井.txt
-
脚本/日常任务-矮人的朋友(只找人版).txt
-
脚本/日常任务-矮人的朋友(打怪版).txt
-
脚本/日常任务-矮人的朋友.txt
-
脚本/日常任务-艾西河的亡灵.txt
-
脚本/枪手主线1-15.txt
-
脚本/灵魂的火焰全自动版.txt
-
脚本/灵魂的火焰选怪辅助.txt
-
脚本/矮人的朋友(包括打怪版).txt
-
脚本/联系狩魔.txt
-
脚本/采集命令范本.txt
-
脚本/里奥-学习.txt
-
脚本/里奥-愿望智能骑马.txt
-
脚本/里奥-阅读.txt
-
脚本/锡月林-探险家任务.txt