C:\Users\marsd\source\repos\CrazySploit\CrazySploit\obj\Debug\CrazySploit.pdb
Overview
overview
7Static
static
7CrazySploit.zip
windows7-x64
7CrazySploit.zip
windows10-2004-x64
1CrazySploi...it.exe
windows7-x64
1CrazySploi...it.exe
windows10-2004-x64
1CrazySploi...ox.dll
windows7-x64
1CrazySploi...ox.dll
windows10-2004-x64
1CrazySploi...pi.dll
windows7-x64
1CrazySploi...pi.dll
windows10-2004-x64
1CrazySploi...ct.dll
windows7-x64
1CrazySploi...ct.dll
windows10-2004-x64
7CrazySploi...re.dll
windows7-x64
1CrazySploi...re.dll
windows10-2004-x64
1CrazySploi...ms.dll
windows7-x64
1CrazySploi...ms.dll
windows10-2004-x64
1CrazySploi...pf.dll
windows7-x64
1CrazySploi...pf.dll
windows10-2004-x64
1CrazySploi...x.html
windows7-x64
3CrazySploi...x.html
windows10-2004-x64
3CrazySploi...ain.js
windows7-x64
3CrazySploi...ain.js
windows10-2004-x64
3CrazySploi...bat.js
windows7-x64
3CrazySploi...bat.js
windows10-2004-x64
3CrazySploi...fee.js
windows7-x64
3CrazySploi...fee.js
windows10-2004-x64
3CrazySploi...cpp.js
windows7-x64
3CrazySploi...cpp.js
windows10-2004-x64
3CrazySploi...arp.js
windows7-x64
3CrazySploi...arp.js
windows10-2004-x64
3CrazySploi...csp.js
windows7-x64
3CrazySploi...csp.js
windows10-2004-x64
3CrazySploi...css.js
windows7-x64
3CrazySploi...css.js
windows10-2004-x64
3Behavioral task
behavioral1
Sample
CrazySploit.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CrazySploit.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CrazySploit/CrazySploit.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
CrazySploit/CrazySploit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
CrazySploit/FastColoredTextBox.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
CrazySploit/FastColoredTextBox.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
CrazySploit/ForlornApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
CrazySploit/ForlornApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
CrazySploit/ForlornInject.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
CrazySploit/ForlornInject.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
CrazySploit/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CrazySploit/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
CrazySploit/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
CrazySploit/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
CrazySploit/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
CrazySploit/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
CrazySploit/Monaco/index.html
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
CrazySploit/Monaco/index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
CrazySploit/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
CrazySploit/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
CrazySploit/Monaco/vs/basic-languages/bat/bat.js
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
CrazySploit/Monaco/vs/basic-languages/bat/bat.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
CrazySploit/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
CrazySploit/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
CrazySploit/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
CrazySploit/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
CrazySploit/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
CrazySploit/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
CrazySploit/Monaco/vs/basic-languages/csp/csp.js
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
CrazySploit/Monaco/vs/basic-languages/csp/csp.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
CrazySploit/Monaco/vs/basic-languages/css/css.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
CrazySploit/Monaco/vs/basic-languages/css/css.js
Resource
win10v2004-20241007-en
General
-
Target
CrazySploit.zip
-
Size
8.2MB
-
MD5
6851b0717dfdac6d04d5fd2acc026092
-
SHA1
88da1a3ae244d261959aa239de99ee39c4c96482
-
SHA256
3c328e9f25a277e022237b0d45d18479fa5db72c4031cc0135cb33f57e3121b2
-
SHA512
69f604f87080eb2407d7b6b628191005ed0ad17fd4dd769367ebb9170dd4bf1e3da5f1b8ced31919df628e10f66e2056fd57404f9926dfd0d822c7e2d630802d
-
SSDEEP
196608:DqSM6An/yKmxkGXMcmzlf1DplqChiHbdkdVt:DqZhayGX4fdC5kt
Malware Config
Signatures
-
resource yara_rule static1/unpack001/CrazySploit/ForlornInject.dll vmprotect -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/CrazySploit/CrazySploit.exe unpack001/CrazySploit/FastColoredTextBox.dll unpack001/CrazySploit/ForlornApi.dll unpack001/CrazySploit/ForlornInject.dll
Files
-
CrazySploit.zip.zip
-
CrazySploit/CrazySploit.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
CrazySploit/FastColoredTextBox.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\Projects_CSharp\FastColoredTextBox\FastColoredTextBox\obj\Debug\FastColoredTextBox.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 322KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
CrazySploit/ForlornApi.dll.dll windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\capta\source\repos\ForlornAPII\obj\Release\net472\ForlornApi.pdb
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
CrazySploit/ForlornInject.dll.dll windows:6 windows x64 arch:x64
22f1907af71b391673dc37c47e7cfa75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
LockResource
FlsSetValue
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
OpenClipboard
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
advapi32
CryptDecrypt
ole32
CoCreateGuid
ws2_32
bind
crypt32
CertFreeCertificateContext
wtsapi32
WTSSendMessageW
Exports
Exports
ExecuteSC
ScriptCompilable
StartClient
Sections
.text Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fptable Size: - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
CrazySploit/Microsoft.Web.WebView2.Core.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:03:a5:41:11:e8:f0:7f:be:0b:75:00:00:00:00:03:a5Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19-10-2023 19:51Not After16-10-2024 19:51SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08-07-2011 20:59Not After08-07-2026 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
29:db:03:00:11:c2:7e:36:3a:16:33:9a:7d:78:a0:4b:38:79:24:e8:47:95:6a:21:0f:4a:1e:c9:12:ad:69:03Signer
Actual PE Digest29:db:03:00:11:c2:7e:36:3a:16:33:9a:7d:78:a0:4b:38:79:24:e8:47:95:6a:21:0f:4a:1e:c9:12:ad:69:03Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\a\_work\1\s\third_party\edge_webview2\win\webview2_api_writer\dotNetAPIWrapper\Microsoft.Web.WebView2.Core\bin\ReleasePackage\Microsoft.Web.WebView2.Core.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 563KB - Virtual size: 563KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
CrazySploit/Microsoft.Web.WebView2.WinForms.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:03:a5:41:11:e8:f0:7f:be:0b:75:00:00:00:00:03:a5Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19-10-2023 19:51Not After16-10-2024 19:51SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08-07-2011 20:59Not After08-07-2026 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
55:36:1c:fb:15:3a:aa:de:d9:06:6b:64:23:1f:56:e9:08:ca:c3:31:bf:a9:22:9d:81:5b:d5:97:63:0a:29:e6Signer
Actual PE Digest55:36:1c:fb:15:3a:aa:de:d9:06:6b:64:23:1f:56:e9:08:ca:c3:31:bf:a9:22:9d:81:5b:d5:97:63:0a:29:e6Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\a\_work\1\s\third_party\edge_webview2\win\winforms_control\Microsoft.Web.WebView2.WinForms\obj\Release Stable APIs\net462\Microsoft.Web.WebView2.WinForms.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
CrazySploit/Microsoft.Web.WebView2.Wpf.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:03:a4:cb:e3:56:b8:cb:7f:e4:27:00:00:00:00:03:a4Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19-10-2023 19:51Not After16-10-2024 19:51SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08-07-2011 20:59Not After08-07-2026 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
cb:f4:a5:a1:3c:a4:b1:bc:3e:63:3a:f9:7d:35:84:b7:96:21:0b:9c:f2:5e:ba:19:1a:d9:2d:56:1c:9a:38:12Signer
Actual PE Digestcb:f4:a5:a1:3c:a4:b1:bc:3e:63:3a:f9:7d:35:84:b7:96:21:0b:9c:f2:5e:ba:19:1a:d9:2d:56:1c:9a:38:12Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\a\_work\1\s\third_party\edge_webview2\win\wpf_control\Microsoft.Web.WebView2.Wpf\obj\Release Stable APIs\net462\Microsoft.Web.WebView2.Wpf.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
CrazySploit/Monaco/index.html.html .js polyglot
-
CrazySploit/Monaco/vs/base/worker/workerMain.js.js
-
CrazySploit/Monaco/vs/basic-languages/bat/bat.js
-
CrazySploit/Monaco/vs/basic-languages/coffee/coffee.js
-
CrazySploit/Monaco/vs/basic-languages/cpp/cpp.js
-
CrazySploit/Monaco/vs/basic-languages/csharp/csharp.js
-
CrazySploit/Monaco/vs/basic-languages/csp/csp.js
-
CrazySploit/Monaco/vs/basic-languages/css/css.js
-
CrazySploit/Monaco/vs/basic-languages/dockerfile/dockerfile.js
-
CrazySploit/Monaco/vs/basic-languages/fsharp/fsharp.js
-
CrazySploit/Monaco/vs/basic-languages/go/go.js
-
CrazySploit/Monaco/vs/basic-languages/handlebars/handlebars.js.js
-
CrazySploit/Monaco/vs/basic-languages/html/html.js.js
-
CrazySploit/Monaco/vs/basic-languages/ini/ini.js
-
CrazySploit/Monaco/vs/basic-languages/java/java.js
-
CrazySploit/Monaco/vs/basic-languages/less/less.js
-
CrazySploit/Monaco/vs/basic-languages/lua/lua.js
-
CrazySploit/Monaco/vs/basic-languages/markdown/markdown.js.js
-
CrazySploit/Monaco/vs/basic-languages/msdax/msdax.js
-
CrazySploit/Monaco/vs/basic-languages/mysql/mysql.js
-
CrazySploit/Monaco/vs/basic-languages/objective-c/objective-c.js
-
CrazySploit/Monaco/vs/basic-languages/pgsql/pgsql.js
-
CrazySploit/Monaco/vs/basic-languages/php/php.js
-
CrazySploit/Monaco/vs/basic-languages/postiats/postiats.js
-
CrazySploit/Monaco/vs/basic-languages/powershell/powershell.js
-
CrazySploit/Monaco/vs/basic-languages/pug/pug.js
-
CrazySploit/Monaco/vs/basic-languages/python/python.js
-
CrazySploit/Monaco/vs/basic-languages/r/r.js
-
CrazySploit/Monaco/vs/basic-languages/razor/razor.js.js
-
CrazySploit/Monaco/vs/basic-languages/redis/redis.js
-
CrazySploit/Monaco/vs/basic-languages/redshift/redshift.js
-
CrazySploit/Monaco/vs/basic-languages/ruby/ruby.js
-
CrazySploit/Monaco/vs/basic-languages/rust/rust.js
-
CrazySploit/Monaco/vs/basic-languages/sb/sb.js
-
CrazySploit/Monaco/vs/basic-languages/scss/scss.js
-
CrazySploit/Monaco/vs/basic-languages/solidity/solidity.js
-
CrazySploit/Monaco/vs/basic-languages/sql/sql.js
-
CrazySploit/Monaco/vs/basic-languages/st/st.js
-
CrazySploit/Monaco/vs/basic-languages/swift/swift.js
-
CrazySploit/Monaco/vs/basic-languages/vb/vb.js
-
CrazySploit/Monaco/vs/basic-languages/xml/xml.js
-
CrazySploit/Monaco/vs/basic-languages/yaml/yaml.js
-
CrazySploit/Monaco/vs/editor/contrib/suggest/media/String_16x.svg
-
CrazySploit/Monaco/vs/editor/contrib/suggest/media/String_inverse_16x.svg
-
CrazySploit/Monaco/vs/editor/editor.main.css
-
CrazySploit/Monaco/vs/editor/editor.main.js.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.de.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.es.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.fr.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.it.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.ja.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.ko.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.ru.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.zh-cn.js
-
CrazySploit/Monaco/vs/editor/editor.main.nls.zh-tw.js
-
CrazySploit/Monaco/vs/editor/standalone/browser/quickOpen/symbol-sprite.svg
-
CrazySploit/Monaco/vs/language/css/cssMode.js.js
-
CrazySploit/Monaco/vs/language/css/cssWorker.js.js
-
CrazySploit/Monaco/vs/language/html/htmlMode.js.js
-
CrazySploit/Monaco/vs/language/html/htmlWorker.js.js
-
CrazySploit/Monaco/vs/language/json/jsonMode.js.js
-
CrazySploit/Monaco/vs/language/json/jsonWorker.js.js
-
CrazySploit/Monaco/vs/language/typescript/lib/typescriptServices.js.js
-
CrazySploit/Monaco/vs/language/typescript/tsMode.js.js
-
CrazySploit/Monaco/vs/language/typescript/tsWorker.js.js
-
CrazySploit/Monaco/vs/loader.js.js
-
CrazySploit/Newtonsoft.Json.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
06:ce:e1:31:be:6d:55:c8:07:f7:c0:c7:fb:44:e6:20Certificate
IssuerCN=DigiCert CS RSA4096 Root G5,O=DigiCert\, Inc.,C=USNot Before15-01-2021 00:00Not After14-01-2046 23:59SubjectCN=DigiCert CS RSA4096 Root G5,O=DigiCert\, Inc.,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0a:de:32:e9:50:9b:44:aa:34:b1:da:f1:bc:0e:c8:73Certificate
IssuerCN=DigiCert CS RSA4096 Root G5,O=DigiCert\, Inc.,C=USNot Before15-07-2021 00:00Not After14-07-2031 23:59SubjectCN=.NET Foundation Projects Code Signing CA2,O=.NET Foundation,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0c:d1:40:7a:5a:bd:ed:43:d5:c1:73:12:1d:38:c5:29Certificate
IssuerCN=.NET Foundation Projects Code Signing CA2,O=.NET Foundation,C=USNot Before13-08-2021 00:00Not After29-10-2024 23:59SubjectSERIALNUMBER=603 389 068,CN=Json.NET (.NET Foundation),O=Json.NET (.NET Foundation),L=Redmond,ST=Washington,C=US,1.3.6.1.4.1.311.60.2.1.2=#130a57617368696e67746f6e,1.3.6.1.4.1.311.60.2.1.3=#13025553,2.5.4.15=#131450726976617465204f7267616e697a6174696f6eExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
0c:4d:69:72:4b:94:fa:3c:2a:4a:3d:29:07:80:3d:5aCertificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before21-09-2022 00:00Not After21-11-2033 23:59SubjectCN=DigiCert Timestamp 2022 - 2,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23-03-2022 00:00Not After22-03-2037 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01-08-2022 00:00Not After09-11-2031 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
38:27:11:d0:35:02:fc:58:64:ae:1e:6c:cb:c5:eb:67:eb:5d:dc:c8:86:9e:e4:59:cc:0d:02:0e:5f:d1:fc:9bSigner
Actual PE Digest38:27:11:d0:35:02:fc:58:64:ae:1e:6c:cb:c5:eb:67:eb:5d:dc:c8:86:9e:e4:59:cc:0d:02:0e:5f:d1:fc:9bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
/_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 681KB - Virtual size: 680KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
CrazySploit/runtimes/win-x64/native/WebView2Loader.dll.dll windows:10 windows x64 arch:x64
f6946d311bccc86e2042a388e375de41
Code Sign
33:00:00:03:a5:41:11:e8:f0:7f:be:0b:75:00:00:00:00:03:a5Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19-10-2023 19:51Not After16-10-2024 19:51SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08-07-2011 20:59Not After08-07-2026 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
66:91:e4:87:43:4a:4b:89:d7:23:b2:fa:60:2f:b7:5e:14:29:d9:69:aa:25:04:ba:4d:c7:44:8a:4d:73:0c:b1Signer
Actual PE Digest66:91:e4:87:43:4a:4b:89:d7:23:b2:fa:60:2f:b7:5e:14:29:d9:69:aa:25:04:ba:4d:c7:44:8a:4d:73:0c:b1Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\a\_work\e\src\out\Release_x64\WebView2Loader.dll.pdb
Imports
kernel32
AcquireSRWLockExclusive
CloseHandle
CreateFileW
DeleteCriticalSection
EncodePointer
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetEnvironmentVariableW
GetFileAttributesW
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedFlushSList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
MultiByteToWideChar
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReleaseSRWLockExclusive
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SleepConditionVariableSRW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
Exports
Exports
CompareBrowserVersions
CreateCoreWebView2Environment
CreateCoreWebView2EnvironmentWithOptions
GetAvailableCoreWebView2BrowserVersionString
GetAvailableCoreWebView2BrowserVersionStringWithOptions
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxfg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.retplne Size: 512B - Virtual size: 140B
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ