Detection(s): RedLine
| Category | Started On | Completed On | Duration | Cuckoo Version |
|---|---|---|---|---|
| FILE | 2025-09-11 04:30:21 | 2025-09-11 04:35:52 | 331 seconds | 2.4-CAPE |
| Machine | Label | Manager | Started On | Shutdown On |
|---|---|---|---|---|
| custom | custom | KVM | 2025-09-11 04:30:21 | 2025-09-11 04:35:51 |
| Type | RedLine Config |
|---|---|
| C2 | 185.215.113.17:7700 |
| Botnet | 24.11 |
| Key | Strumpets |
| Authorization | 09b2368d87369150a96676542aa44ffa |
| Type | Unpacked Shellcode |
|---|---|
| Filename |
cd6ff4ddf371fa36469215de7b8096205b618e5a465ef3bd7050cbc48530c28a
|
| File Type | data |
| File Size | 256 bytes |
| Virtual Address | 0x7FDF0000 |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | d8405c5b7af72f38d3da8cc48d511372 |
| SHA1 | 65ae79f6ca33c89d7a7c1d1b08815c9d77352fcc |
| SHA256 | cd6ff4ddf371fa36469215de7b8096205b618e5a465ef3bd7050cbc48530c28a [VT] [MWDB] [Bazaar] |
| SHA3-384 | 05647ed6c762867b9ed7f74537d4c0445a01b2f64d4defdbed7be4764dd641934966c8f3e5201670a8e8d35f4ed44024 |
| CRC32 | 0155CE7B |
| TLSH | T116D0C0C04D036F3EC244003031CA084CF03940474048F5CD0C65B03BCF231040A61407 |
| Ssdeep | 6:3d+/EgJ8XbTMO8LhbG9E9X1BMv7x2LEIt8X3/nMD1jGJEH9fXx/tMn:N+/k+6oH4x2LQ3WyIXE |
| Type | RedLine Payload: 32-bit DLL |
|---|---|
| Filename |
7eb618a3e50b734797de006b95d8de901890f43f0a0cf415f34964ab135ff9e9
|
| File Type | PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| File Size | 185344 bytes |
| Virtual Address | 0x06710000 |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | d21cc787ab488249569168fb7fb2b923 |
| SHA1 | 175dffddaecd114bd6c10e7280bfdc5308e5b4e9 |
| SHA256 | 7eb618a3e50b734797de006b95d8de901890f43f0a0cf415f34964ab135ff9e9 [VT] [MWDB] [Bazaar] |
| SHA3-384 | 88664b6c4ab9e5289b77173084f768ae96ce69e5866a5432e72a28727b9f207c22d60dc6e1ff73e7ac62d73aa776717e |
| CRC32 | B9110849 |
| TLSH | T14C043A0127CA8E14E7BD2731E1F3441053B5E693A623E74F2DC824F91E92754AE663EE |
| Ssdeep | 3072:V98GaOEnwSwQBw4A6qn3BjpCrTAXI8KoZbVBIIbdIVe/WqXoOSv1xz:HaOq86qnrCfAXI8KoZbVBIIPdSv |
| CAPE Yara |
|
| PE | Strings |
|
get_Credentials
lYHpVgMIwa2tpm4gkWq
progressBar1.Modifiers
AppendLine
GetVs
get_MetadataToken
HPY8MnHhVf
FreeHGlobal
sf34asd21
AyM0BuQvCD
System.Diagnostics
lpBaseAddress
dataFolder
get_Modules
System.Reflection.Emit
TryInitInstalledSoftwares
IPv4Helper
46884713B2F882E5304A1FF1B16370575A53E434
ProldCharotonVoldCharPN
$this.SnapToGrid
359A00EF6C789FD4C18644F56C5D3F97453FFF20
fileName
OpenAlgorithmProvider
_tableEntries
calendarWeekRule
Boolean
Content
BCryptDestroyKeyDelegate
Exception
ToUpper
<Name>k__BackingField
m_isReadOnly
Memory
<>p__0
filename
System
n>b__0_2
ServicePointManager
newSize
PADPADP
get_Id2
System.Globalization.SortVersion
$$method0x600031a-2
PassedPaths
mscoree.dll
SecurityProtocolType
set_SmoothingMode
Cryptography
Activator
<>9__0_2
currencyPositivePattern
set_UseMachineKeyStore
Generic
DialogResult
__StaticArrayInitTypeSize=64
ExecutablePath
TryVerify
input
set_Timeout
Select
dwDesiredAccess
Entity17
bbIIV8gnC0UElGUdBP
get_ServiceCertificate
add_AssemblyResolve
L!M%T(U5VEWHXKYPZT[c\d
TryGetArgs
Strumpets
UnicastIPAddressInformation
<>l__initialThreadId
ReadInt64
Value
get_Ticks
set_MaxArrayLength
currencyDecimalSeparator
X509CertificateValidationMode
GetWindowsScreenScalingFactor
GatherValue
pHT8IorQS4
negativeInfinitySymbol
MethodBase
timeout
NumberOfCores
SpecialFolder
DESKTOPVERTRES
get_ReturnType
lS7tsYM7iJBceQnVN12
__StaticArrayInitTypeSize=72
<>p__1
get_Position
_sqlDataTypeSize
QFa0scKQwx
optionalCalendars
Entity12
ReadContextValue
Alloc
Q4Y0MHpbsx
{11111-22222-10001-00001}
Tailcall
<LibPtr>k__BackingField
lfm06y1W4b
qa58FrQ8SE
get_FullName
SFU4mbT3GMret7THonf
dwProcessId
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
EbV0QyH2XJ
X3II4sOENXF8KSsBNi
Environment
asdasod9234oasd
46F273EF641E07D271D91E0DC24A4392582671F8
dwMaxLength
XmlDictionaryReaderQuotas
Handler
-Infinity
C"d*Q
Rectangle
DirectoryInfo
txt8nMX1dF
SQy8AQlmOf
nCmVqUMjRmFrNS26USr
Yandex\YaAddon
wqUkRo9EscVExha5Yb
dateTimeInfo
`.rsrc
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
set_MaxDepth
managed
_CorExeMain
get_RowLength
TimeSpan
yyyy-MM-dd
ManagementObjectEnumerator
System.Drawing
hAlgorithm
kkdhfakdasd
adapter
WYdZoqk3nEZiHS5fbX
yearMonthPattern
Ldarg_2
get_ExecutablePath
GetModules
monthNames
get_SystemDirectory
ChannelFactory`1
softwares
.ctor
CryptoStream
SvKOxZMF6RUKtvnKjPh
__StaticArrayInitTypeSize=124
System.Net.Security
roSystem.Linqot\CISystem.LinqMV2
Delete
InternalName
hh:mm tt
AsyncCallback
bUZnt982pXJAL26Mek
LocalState
GetHINSTANCE
numberNegativePattern
A898408AA9A30B686240D921FE0E3E3A01EE91A5
TransferMode
MakeByRefType
CreateChannel
_pageSize
cbWRVD
FromBase64CharArray
18B532EF2959EF2ED8C549D712E3446FF49E4287
get_IsStatic
DecryptBlob
numberGroupSizes
SmoothingMode
X509CertificateRecipientClientCredential
__StaticArrayInitTypeSize=282
<Id6>k__BackingField
ReadIntPtr
<security>
Y3C8Gc9uFD
buffer
lpAddress
RootNum
Infinity
NvQ34uZt895nxEhi2FIr
aR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources
OriginalFilename
flAllocationType
FlagsAttribute
currencyGroupSizes
sdfk8h34
Plywoods.g.resources
1A79939AEFF161E557D02CB37CD9A811ABCAF458
.cctor
set_Message
__StaticArrayInitTypeSize=40
DakfubQjHJLVYTmYAj
set_Id12
GetSubKeyNames
OpLinqera GLinqX
iFrq"
get_CurrentEncoding
i5n5dgPY1M9nRIix0B
$this.Icon
get_UserName
maxLevel
aoWmH0Mq1UXSdnNk2nu
tD58CArDL3
FileVersion
SuppressFinalize
m_SortVersion
get_Key
allShortDatePatterns
set_MaxJsonLength
get_HasValue
get_Is64BitOperatingSystem
2FBDC611D3D91C142C969071EA8A7D3D10FF6301
e/p%<VA
a9duh3zd
System.Windows.Application
DownloadUpdate
get_Id12
A3EFD00EA085079EE7F97407F8EFF07E3990696A
ReadOnlyCollectionBase
OpCode
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
BA7D69D99D9DBB0EE4285F6009DAABF743B9641D
BlockCopy
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
CurrentDomain_ResourceResolve
96D6CB223DCF17F7C9F93C825239BDAA3634674A
OperationContractAttribute
set_Id4
cXLX^
height
longDatePattern
ProductVersion
{11111-22222-50001-00000}
__StaticArrayInitTypeSize=48
A8L0DbZnyI
ToInt32
value
SearchOption
%$('32546498:8<;?>^]_]`]a]b]c]d]e]f]g]h]i]j]k]l]m]n]o]p]q]r]s]t]u]v]w]x]y]z]{]~}
EB2DB456E0D779E528D1474FA55AC99055A5E815
MethodInfo
System.Core
GetTypeFromHandle
set_Id8
9D99781A42147118D9E59BED1BC9AE622BA64A6C
Microsoft Primitive Provider
|/2hfZ
System.Collections.Generic.IEnumerator<Entity5>.Current
Point
bytes
EnumCook
TkY0GRXcuB
get_CurrentInputLanguage
CryptoConfig
Dispose
pbAuthData
</assembly>
n>b__1
GetDeviceCaps
+System.Globalization.GregorianCalendarTypes
Height
pbTag
BCryptOpenAlgorithmProviderDelegate
Encoding
Entity6
JLq8qRNF6r
Locals
chain
Image
hGYjAD2q6vD5IiX7UL
CreateDirectory
LENce7y5NXUU2J5sYZ
Entity6T
SystemInfoHelper
(u(y-
yAm0xGUH4vUugXROqM
sender
rootPath
phAlgorithm
MessageBox
CoCryptographyokieCryptographys
H[k@9j
allLongTimePatterns
EZ>$S
blvnzcwqe
slkahs2
Namespace
_.dll
CompareTo
IAsyncResult
ToLower
IsLoopback
get_Id7
clrjit.dll
Module
KDBM(l
asdak83jq
ConvertToBytes
taskId
ScanCook
NordApp
eLHGt3Mtbkx5eUY0CFU
positiveInfinitySymbol
NYXMQfMkQ1YFrtKGqwy
<PrivateImplementationDetails>
System.Runtime.Versioning
<Id5>k__BackingField
m_isInvariant
KeyDataBlob
get_Culture
assembly
cbSize
<GetScanArgs>b__5_0
get_ModuleMemorySize
nanSymbol
allYearMonthPatterns
Entity15
CollectMemory
80E5A0A2B81DB2473AFBB3FDD6F479670B7B41C6
Xp30wWqNfl
cbMacContext
Func`5
QAQBbe6C8Qamp2Z7wO
n>b__0_4
TryInitFtpConnections
ListOfProcesses
<Id15>k__BackingField
abbreviatedMonthNames
IsOdd
LfPSh9MDUmORZ2SYjFg
dwFlags
get_OutgoingMessageHeaders
ViFfASMcS7q7Q1ZmoBv
Append
$$method0x6000346-1
aso0shq2
sdf9j3nasd
X509Chain
get_Id5
x@D .
typemdt
CryptoHelper
AddMonths
PLs0L7jWH3
InputLanguage
StringComparison
percentPositivePattern
XXy0yB1QBl
cbNonce
MonitorSize
Discord
<PreStageActions>k__BackingField
<DomainExists>b__4_1
add_ResourceResolve
X4vUfELBF5L66kX3A4
pmDesignator
BCryptImportKeyDelegate
asdaid9h24kasd
XmlReader
okx02TCOKN
set_MaxNameTableCharCount
OsCrypt
GetWindowsVersion
ChainingModeGCM
InvokeMember
ClientCredentials
get_DisplayName
get_Count
InputLanguageCollection
YCCfr9MyGIkCeG2KWsH
set_MaxBytesPerRead
{11111-22222-50001-00001}
System.Collections.Generic.IEnumerator<Entity5>.get_Current
set_InterpolationMode
BIw0qwmofm
CSharpBinderFlags
ChangeSize
get_ItemOf
ModuleHandle
AdB8GujvggcnCBBXyu`1
serviceInterface
ReadFileAsText
E0CEB3E46E857A70CFB575A05B01A64806A8D426
get_ParameterType
hProcess
32.dll
hNrI7eK4VDCKsvccu1p
Process
Enter
GetDirectories
Replace
get_ModuleName
$this.Language
ICollection`1
FindPaths
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
set_MaxStringContentLength
Binder
ReadBytes
GetGraphicCards
cFileStreamredFileStreamit_cFileStreamardFileStreams
Entity16T
LegalCopyright
get_Location
rSQShYMNZD1t8AkanwT
CharSet
BindingFlags
kernel32.dll
op_Inequality
PathsCollection
95098CDF929872F9B67E58070D088F8238F7CABE
<>o__8
<>9__8_0
__result
xFM04hI2Ep
bTS8sOvItD
dayNames
Entity4T
EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
ManagementObjectSearcher
formatFlags
get_ProductMajorPart
AvailableLanguages
set_Id10
GetProcessors
Int64
EHY07C8Nkx
FileSearcher
g7g5PGRdwFuQFU69Xt
updateTask
get_CurrentDomain
DebuggerHiddenAttribute
<>9__4_1
endIdx
set_RecursionLimit
ChromeGetLocalName
CreateEncryptor
ObjectHandle
Target
ObfuscationAttribute
UR60tcdG3v
<GetDefaultIPv4Address>b__1_0
Concat0 MConcatb oConcatr Concat0
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
jqgdsJXGHELATYm5nd
drEreq3vsa483XgOsM
Substring
EndpointAddress
_masterTableEntries
ChromeGetRoamingName
ChangeType
GetFolderPath
BCryptGetPropertyDelegate
Fields
cbAAD
(System.Globalization.DateTimeFormatFlags
field
4CDA4454A3C36A7EBDCF8FE8B804B379A31D33CA
H9R0frEDDF
lpNumberOfBytesWritten
System.ServiceModel.Security
Graphics
ScanCredentials
IDisposable
a86iACM2Tj62rYXneut
<>9__1_1
Unknown Version
Attribute
ObjectLength
GetExecutingAssembly
startIdx
fieldName
get_Id15
asdk9345asd
set_Mode
7BF285852D43939E0FBD7B6C5592189AF986E8BF
xYo4p9cowCOHN1q3AB
XmlDocument
rowIndex
E3E8284EDCB98A1085E693F9525A3AC3D705B82E
get_BaseType
Entity14T
UInt64
4E3D7F188A5F5102BEC5B820632BBAEC26839E63
currencyNegativePattern
EnumMemberAttribute
ManagementBaseObject
calendar
WriteAllBytes
__StaticArrayInitTypeSize=14
<Id12>k__BackingField
ComputeHash
D67333042BFFC20116BF01BC556566EC76C6F7E2
2A92E2F98903398CD12F10BDF583F44C2C6EEBF5
g9bbH5MgI40eLaLw4Jn
processes
c2w8BDWoyW
i048b1FIg7
OperationContextScope
<>p__3
FullInfoSender
connection
IsNullOrEmpty
IdentitySenderBase
x73sxKHL1IC5Sep5GY
pszImplementation
IsLocalIp
28F794B091ED92F57BFC80EA32B18AF3A8183ADB
kernel
SelectSingleNode
List`1
profiles
EFBD67KKhi2RWAm5NxE
get_BigEndianUnicode
result
BCryptCloseAlgorithmProvider
win32LCID
DeviceCap
level
_fileBytes
get_Length
4B05CEBD7D70F1607D474CAE176FEAEB7439795F
callback
GetProperties
Entity12T
ToBase64String
{11111-22222-10001-00002}
COr0cVo5U2
set_TransferMode
Sme8icxdey
System.Runtime.CompilerServices
IContextChannel
set_ClientCredentialType
Remove
vSNhhHTPdTGxBJWC86
System.ServiceModel
WE8852nD6h
entropy
@.reloc
Clear
F1^.Kv
nLvrU8AQJDKRRZAB7e
KeyValuePair`2
SerialNumber
TryFind
ThreadStart
cbData
<>9__0_4
__StaticArrayInitTypeSize=44
Entity11
GetFiles
String.Replace
ReadMasterOfContext
<GetWindowsVersion>g__HKLM_GetString|11_0
Enumerator
WebRequest
Regex
.NET Framework 4
3DB6DAD76E13B54DC03AF1C6092C40388E57FBBF
FileSystem
Matches
__StaticArrayInitTypeSize=30
B14822E504AE1EF678AE0E823684D7B32F95A725
4EC18FAB222C9FF2E5161F21A90F187D5D98E042
ScanPasswords
XT{t?O-
ResolveMethod
Q^U[A
__StaticArrayInitTypeSize=6
TryInitDiscord
xmlNode
hModule
VS_VERSION_INFO
MessageSecurityOverTcp
IqypAuM1p30t18x8spB
xJD0JFICoe
DebuggableAttribute
pszProperty
gdi32.dll
amDesignator
net.tcp://
perMilleSymbol
DynamicMethod
GetBytes
UNIQUE
source
set_CloseTimeout
IconData
BCrFile.ReadAllTextyptImFile.ReadAllTextportKFile.ReadAllTextey
StreamReader
File.Write
kasdihbfpfduqw
__StaticArrayInitTypeSize=46
c2J8tvIe72
GetFields
Contains
Microsoft.CSharp
<>9__9_0
bcrFileStream.IOypt.dFileStream.IOll
OpenUpdate
387D8DBBFB12BA323F1E0F1F539B4DA9550070C3
get_Exists
TaskResolver
sIdxNnPN3DdGdAT55L
success
nativeSizeOfCode
ExtendV
kadsoji83
encrypted_key
BCryptOpenAlgorithmProvider
R1UwgDZeZFj23x0o6l
RuntimeTypeHandle
CallingConvention
pxu0rqyqZr
Entity1
FileStream.IO
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
__StaticArrayInitTypeSize=58
X2f0nwJcF0
<Id1>k__BackingField
SLG0ZmRW7r
System.Security.Cryptography
Empty
CopyFromScreen
sdfkas83
1938FDF81D9EFE09E9786A7A7DDFFBD755961098
set_MaxReceivedMessageSize
WriteInt64
93D9D319FF04F5E54F3A6431407A7B90388FDC54
ao#QlU
PrepareMethod
get_Size
Dictionary`2
BinaryReader
System.ServiceModel.Description
IPInterfaceProperties
BCRYPT_OAEP_PADDING_INFO
FileAccess
Directory
RowLength
System.Globalization.TextInfo
get_ServerCertificateValidationCallback
get_FileVersionInfo
<>1__state
a8t0IqV0dv
get_OffsetToStringData
installedBrowsers
FromMinutes
System.Runtime.InteropServices
ansiCurrencySymbol
StartsWith
generalLongTimePattern
System.Text
System.Runtime.Remoting
FileScanner
CommandLineUpdate
2A19BFD7333718195216588A698752C517111B02
BCrMemoryStreamyptOpeMemoryStreamnAlgorithmProviMemoryStreamder
timeSeparator
longTimePattern
System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
09b2368d87369150a96676542aa44ffa
ToJSON
FileCopier
__StaticArrayInitTypeSize=20
get_MethodHandle
D82572C56BDDD62E320B8BDAF0397A0DF9DD5BF7
04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
DataMemberAttribute
{11111-22222-10009-11111}
System.Security.Cryptography.AesCryptoServiceProvider
IntPtr
NJK0HP6bbE
<GetTokens>d__2
8C49F78A06E711CF0E21134D0B091985336CC37F
BCrIOStreamyptDecrIOStreamypt
AssemblyName
R]|!P
Y0Q8ln2q0R
leapYearMonthNames
set_Id16
percentNegativePattern
GetEncoding
lOMjN8M5svu6jqPHqHM
FileMode
Uqo0Ks79er
tasks
System.Globalization.CompareInfo
ReadRawData
GatewayIPAddressInformationCollection
Hh4jACAkIEk=
get_JSON
os_crypt
mscorlib
bEncryptedData
set_Key
ChannelFactory
77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
MessageCredentialType
CultureInfo
get_Id14
FF3BAB78FE99DEED16DD82BB73EE1AE091A07815
profilePath
pbNonce
6F66485AF823BAE1F185740DA7F4F595701CD22E
1zHp:
YdjFZFMROvOnEoxoLJ8
AllocCoTaskMem
__StaticArrayInitTypeSize=10
get_InvariantCulture
System.Web.Extensions
0E5921723BD3C6CB75662A156FB56AF05A7152C6
Request
currencyGroupSeparator
lCDAsW5mfE1qB1o2W5.nLvrU8AQJDKRRZAB7e+FJKLljVXn5i8Q7GvId+AdB8GujvggcnCBBXyu`1[[System.Object, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]][]
<encrypted_key>k__BackingField
_.pdb
Dtey6DMXx7TKI2m0BG5
nativeDigits
InvalidOperationException
Finalize
Entity10
generalShortTimePattern
System.Globalization.CultureInfo
isReadOnly
$this.Localizable
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
CultureID
U9R8cmk1lf
npvo*
Version
TfVAqi9MPuMfgVWeEs
MmMppQbpPNjXnJuAp3
GuoMSJc49jmZx0C6wm
offset
Exists
System.Collections.IEnumerator.get_Current
get_Assembly
IPAddress
n>b__7
culture
<>9__0_0
EndpointConnection
string.Replace
\wf$SA)
CallSite
set_WorkingDirectory
set_Id3
Format
KcFyGMwiw3cZLLMwaR
StringFileInfo
BytesToStringConverted
EZOPSET
System.Text.RegularExpressions
get_Id16
StringSplitOptions
Result
VarFileInfo
dvsjiohq3
n>b__0_0
flags
{11111-22222-40001-00001}
uZBNotMH8SB3ixtVRDJ
79E9B68FB6E1987DED749BCD71143BD8EB323CE3
System.Reflection.RuntimeModule
Entity9
<.ctor>b__0
Deserialize
Open
address
digitSubstitution
System.CodeDom.MemberAttributes
Lui8jqVp0r
{11111-22222-40001-00002}
ResourceA
MemoryStream
set_PixelOffsetMode
MessageBoxImage
startIndex
lJf=f
__StaticArrayInitTypeSize=18
StripQuotes
ResolveType
get_CodeBase
twoDigitYearMax
System.
Invoke
XmlElement
ScanFills
__StaticArrayInitTypeSize=38
Plywoods
Microsoft.Win32
scannerArg
71E427369E07185AE0407E3FAB1A16ED62BD159E
<Result>k__BackingField
AesCryptoServiceProvider
set_Id9
GetRecent
zaIPKBJd3eBVuMQVAJ
set_ReaderQuotas
CE18B047107AA23D1AA9B2ED32D316148E02655F
numInfo
v4.0.30319
DataProtectionScope
sdfk83hkasd
get_Id11
MemberInfo
authTag
bJA8uTcIxU
set_Id5
profilesDirectory
@^<>cZ-
rV9N3WuhF41qaV0GPT
UWp8zQVQVu
IClientChannel
Entity8T
pszBlobType
get_Current
get_Address
UInt16
iWG0xspcVI
Assembly Version
AdapterRAM
ToString
myjYl3MCX4jOhN0kCLJ
WebClient
VfelpFs9075TFRAJbS
HashAlgorithm
Entity4
KQ28UaQygI
FileInfo
E705C6345C26AF82E64D22DBE44B2A3514F2F06F
SenderFactory
set_SecurityProtocol
__StaticArrayInitTypeSize=24
AddressFamily
UnicastIPAddressInformationCollection
TryInitNordVPN
JavaScriptSerializer
R7YAWCr4xoMEwZIN1q
Application
m_abbrevEnglishEraNames
LoadLibrary
<Id10>k__BackingField
GetCommandLineArgs
hardwares
ConvertToULong
scanners
000004b0
searchOption
CreateBind
MessageBoxResult
procName
GetDefaultIPv4Address
CurrentDomain_AssemblyResolve
configs
BCFile.OpenryptGeFile.OpentPropeFile.Openrty
4EF472E2E74116C7FD95C74AB422CCF80DB1C404
Func`2
System.Windows
EBD075615CBE4A710F9410FFECEAF6110A01922B
shortDatePattern
007A56C60CB686C542C5A63F4806094A4F9494B7
rowNum
<Id16>k__BackingField
DownloadData
set_MaxBufferPoolSize
DF2BDC3975DC25BFAFFA4976E9CD1E38AADF463B
EntityTUwSystem.ServiceModel.SessionMode, System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
KadaRiMYfjWF9EKXYEv
set_Security
ConfigReader
ApGenericpDaGenericta\RGenericoamiGenericng\
bInheritHandle
string
lpType
numberDecimalDigits
<GetDefaultIPv4Address>b__1_1
__StaticArrayInitTypeSize=102
positiveSign
Hashtable
IsValidAction
dateSeparator
Abort
abbreviatedDayNames
OrderBy
Ldarg_3
Plywoods.exe
m_name
Entity10T
ManagementObjectCollection
baseDirectory
TlRflgEEHacsmQE3o5
ChromeGetName
Feature
GetILGenerator
X509Certificate
StringBuilder
brpmiPvBUY9Lcn4iL3
get_Actions
m_isDefaultCalendar
get_ProductBuildPart
SessionMode
__StaticArrayInitTypeSize=32
Visible
XmlTextReader
Wv90NW8pBM
__StaticArrayInitTypeSize=42
BCrFile.ReadyptDesFile.ReadtroyKFile.Readey
DynamicAttribute
localhost
Width
Close
Search
CurrentUser
_dbEncoding
9D9AF3AE11A58D55EB8A6AEC8F03F7AD01E8994B
ImageFormat
PreCheck
StringDecrypt
mnf0iy2Xdp
aET8JBjdn5
oldArray
kernel32
Unknown
cbTag
k52nAXMuqwtne7usNEa
'System.Globalization.DateTimeFormatInfo+
rJy0bsBSOH
Entity9T
FrameworkDisplayName
MANGO
RemoteCertificateValidationCallback
PartsSender
8743F6DD6877BBC815E9F16BEC59057DD1A89B0A
serviceInterface.Extension
sdf934asd
TypeCode
SizeOf
cultureID
get_Now
AllocHGlobal
IndexOf
410D551BF9DC1F0CF262E4DB1077795D56EEC026
501BADE98ACDE8BF4A0424FD9A4354615FF08C7F
G53N3ivQR5mlTdjgs9
CreateDnsIdentity
Wmr0YWOKFe
UInt32
IPAddressInformation
n>b__3
PresentationFramework
GetProcAddress
set_ServerCertificateValidationCallback
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
<Module>
FE79FF373808574898C82AC1320C55C1182FB75A
Fof8xr9GjE
percentGroupSeparator
dddd, dd MMMM yyyy
MAr8D8cKed
get_FileVersion
m_currentEraValue
Entity3T
Reverse
width
set_os_crypt
N2cR4B1f5mcs8HPwGd
chainingMode
Func`3
patterns
ExtensionAttribute
IPq0EAgE31
<Id2>k__BackingField
lwj8jEMeFYNrhimRgw4
A9B6DE7C485B3014653A30C8B4BEFA8F70610178
get_ModuleHandle
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
GetImageBase
browsers
StripAfterObfuscation
B3PSOWMauL44DQAsFw0
MWc8XleLVV
value__
File.ReadAllText
DownloadFile
__StaticArrayInitTypeSize=16
m_pData
cbOutput
_CorDllMain
TryInitDisplay
get_DeclaringType
<lvr$
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
W2B8HQ8LZb
IFormatProvider
BCRYPT_PSS_PADDING_INFO
set_Actions
IOStream
get_Id8
hFBK5eAF5WSEKYOPJe
EntityCreator
get_FieldType
Location
Nqour7oa2m21itwjCb
v2.0.50727
ProtectedData
ChainingMode
System.Drawing.Imaging
cF70garKgs
CSharpArgumentInfo
f3x05URidx
cbLabel
D5sl2fM4QVKFJ3CfQFy
paths
get_Id3
VyWLAeeCP61he3Q0Ly
KinR7fMsJc8HWvAAUNb
<Id7>k__BackingField
g7mcw
DF08DD4DFFDB6C9048202CAE65882EF91ECE6BA8
pbKeyObject
__StaticArrayInitTypeSize=12
get_MainModule
TryInitHardwares
Entity5
gkdsi8y234
MessageHeaders
WSystem.Texteb DatSystem.Texta
<Run>b__1_0
InvokeConstructor
ReleaseHdc
9B88C78E81ADB9E7247AB37D1F5F3861810916D8
bewFhMMOobo8Nji3hcc
HiAVRCEaLAw9AEAKODk9EDknMEI8Dw4HKDVObg==
m_eraNames
lCDAsW5mfE1qB1o2W5
Calendar+m_isReadOnly
$$method0x6000338-1
get_PrimaryScreen
ServiceContractAttribute
set_Id7
Microsoft.CSharp.RuntimeBinder
GeckoLocalName
GetMethod
AddressHeader
System.Net
SymmetricAlgorithm
IsNullOrWhiteSpace
BCFile.CloseryptSFile.CloseetPrFile.CloseoperFile.Closety
percentGroupSizes
Supports
5F2F91D44A21E42A979E24B620CF42F2CB8687EC
TrimStart
MM/dd/yyyy
$this.DrawGrid
nDataItem
Cv1aiPMKr8ZKUZh06tf
UNKNOWN
Close
h:mm tt
BitConverter
Authorization
sdfi35sdf
lQs86Wlt1X
DesktopMessanger
#Blob
RecordHeaderField
get_Value
FlushFinalBlock
numberGroupSeparator
domains
get_OperationalStatus
defenders
get_CreationTime
set_Id1
op_GreaterThanOrEqual
__StaticArrayInitTypeSize=2840
get_ASCII
FromBase64
Assembly
get_ManagedThreadId
Buffer
YRf8T10hUc
asdk8jasd
<>9__4_0
ToCharArray
percentSymbol
Write
sslPolicyErrors
ToList
*wallet*
method
qRV0FxcZLN
get_Id9
GatewayIPAddressInformation
vdMNxWMl7t6bnJVKjtn
get_DocumentElement
ReadUInt32
RiYygsMA99fppmVD4Y5
__StaticArrayInitTypeSize=152
cKo3bXMS8OsLtMmCoL2
EnumerateDirectories
UKVsxudQUrbsVxhfdQ
pszAlgId
!This program cannot be run in DOS mode.
<Id11>k__BackingField
DateTime
SwES4iME4IulDEryH9t
CreateHeader
get_ManifestModule
get_BaseStream
aafqkoMnbYWIgfvWaNs
System.IDisposable.Dispose
get_SecurityProtocol
ValueType
GameLauncher
get_Png
gyyqmcMPnXZ5vJW0PE1
Double
RSACryptoServiceProvider
DebuggingModes
TryInitInstalledBrowsers
set_UseShellExecute
Virtual
phKey
</security>
GetScanArgs
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
InterpolationMode
user.config{0}\FileZilla\sitemanager.xmlcookies.sqliteUnknownExtension\Program Files (x86)\configdisplayNamehost_keyNametdataSELECT * FROM expires_utc\Program Data\coMANGOokies.sqMANGOliteAFileSystemntivFileSystemirusPrFileSystemoduFileSystemct|AntiFileSystemSpyWFileSystemareProFileSystemduct|FireFileSystemwallProdFileSystemuct*ssfn*DisplayVersion%localappdata%\-*.lo--gLocalPrefs.jsonOpHandlerenVPHandlerN ConHandlernect%DSK_23%Opera GXcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeROOT\SecurityCenterROOT\SecurityCenter2Web DataSteamPathwaasflleasft.datasfCommandLine\Telegram Desktop\tdataSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesTotalVisibleMemorySizeis_secureSoftware\Valve\SteamLogin DataID: isSecureegram.exeNoDefrdDefVPNDefwaasflletasfv11ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtub2NmZW9mYmRkZ2Npam5taG5mbmtkbmFhZHxDb2luYmFzZQpmaGJvaGltYWVsYm9ocGpiYmxkY25nY25hcG5kb2RqcHxCaW5hbmNlQ2hhaW4Kb2RiZnBlZWloZGtiaWhtb3BrYmptb29uZmFubGJmY2x8QnJhdmVXYWxsZXQKaHBnbGZoZ2ZuaGJncGpkZW5qZ21kZ29laWFwcGFmbG58R3VhcmRhV2FsbGV0CmJsbmllaWlmZmJvaWxsa25qbmVwb2dqaGtnbm9hcGFjfEVxdWFsV2FsbGV0CmNqZWxmcGxwbGViZGpqZW5sbHBqY2JsbWprZmNmZm5lfEpheHh4TGliZXJ0eQpmaWhrYWtmb2JrbWtqb2pwY2hwZmdjbWhmam5tbmZwaXxCaXRBcHBXYWxsZXQKa25jY2hkaWdvYmdoZW5iYmFkZG9qam5uYW9nZnBwZmp8aVdhbGxldAphbWttamptbWZsZGRvZ21ocGpsb2ltaXBib2ZuZmppaHxXb21iYXQKZmhpbGFoZWltZ2xpZ25kZGtqZ29ma2NiZ2VraGVuYmh8QXRvbWljV2FsbGV0Cm5sYm1ubmlqY25sZWdrampwY2ZqY2xtY2ZnZ2ZlZmRtfE1ld0N4Cm5hbmptZGtuaGtpbmlmbmtnZGNnZ2NmbmhkYWFtbW1qfEd1aWxkV2FsbGV0Cm5rZGRnbmNkamdqZmNkZGFtZmdjbWZubGhjY25pbWlnfFNhdHVybldhbGxldApmbmpobWtoaG1rYmpra2FibmRjbm5vZ2Fnb2dibmVlY3xSb25pbldhbGxldAphaWlmYm5iZm9icG1lZWtpcGhlZWlqaW1kcG5scGdwcHxUZXJyYVN0YXRpb24KZm5uZWdwaGxvYmpkcGtoZWNhcGtpampka2djamhraWJ8SGFybW9ueVdhbGxldAphZWFjaGtubWVmcGhlcGNjaW9uYm9vaGNrb25vZWVtZ3xDb2luOThXYWxsZXQKY2dlZW9kcGZhZ2pjZWVmaWVmbG1kZnBocGxrZW5sZmt8VG9uQ3J5c3RhbApwZGFkamtma2djYWZnYmNlaW1jcGJrYWxuZm5lcGJua3xLYXJkaWFDaGFpbg==\Program Files\Opera GX StablenameProfile_Unknown, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueLocal Extension SettingsNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: DisplayNameTel*.vstring.Replacedfpath
A5A8fiNlIF
G1p8ZVMsXB
set_Name
BCRYPT_AUTHENTICATED_CIPHER_MODE_INFO
GetProcessesByName
Func`1
38F431A549411AEB32810068A4C83250B2D31E15
#Strings
set_IsBackground
SOFTWARE\Microsoft\Windows NT\CurrentVersion
profile
67CD3B1DF0AD5BAEAA1ABDDA3FCAFB2EEBDD2684
Entity2T
$this.TrayHeight
4C1117B01D5C4E103EE817F889EC547C63B47B7A
2B9522D4F7398AB5DB789596FE5DB90589B031E9
textInfo
Decrypt
$this.Locked
cYe8gg3jlQ
dwInfoVersion
NetworkInterfaceComponent
TransformBlock
numberDecimalSeparator
get_Height
.text
display
<Id14>k__BackingField
OFileInfopeFileInfora GFileInfoX StabFileInfole
MFr8OaChF8
validForParseAsNumber
ResolveEventHandler
RijndaelManaged
dataProtectionScope
CryptoStreamMode
m_dataItem
remoteFiles
Sleep
ybg8eXHvp2
$this.GridSize
/ProcessC Process
String
set_IV
AddRange
RuntimeFieldHandle
gT889kxuZB
Entity3
<Module>{8E8BC8F9-812D-4941-8368-2F12366EAFE1}
get_Id6
n824Cv0l2e74vhAjPh
cbAuthData
cipherText
Split
Entity5T
$$method0x6000338-2
First
6353B688B99A3543932AA127DAA0E48FBC646BBD
negativeSign
Registry
PrepareDelegate
compareInfo
System.Collections.IEnumerable.GetEnumerator
asdoiad0123
System.Drawing.Icon
__StaticArrayInitTypeSize=22
m_superShortDayNames
TryGetConnection
NativeHelper
ReadFile
pbOutput
fXr6V5hGqLv9j5eOGG
<PrivateImplementationDetails>{FFB93847-F5E5-4C42-AD08-8CA57E731A2E}
System.Threading
NetworkCredential
CompilerGeneratedAttribute
Stream
object
MatchCollection
$$method0x600039c-1
BeginInvoke
GetTypes
System.Security
get_PropertyType
Unwrap
M-z,.
ReadContextTable
searchPatterns
WrapNonExceptionThrows
GetType
Convert
989657DD93570810E43C5B1F68E529460CA796F1
<DomainExists>b__4_0
System.Net.NetworkInformation
qLogbLM6CMixIGCDxV8
Monitor
j1e0OaPnrN
r6X8h4DBtT
System.Xml
shell\open\command
asd44123
Entity&
Ldarg_0
MD5CryptoServiceProvider
<Id9>k__BackingField
GetFunctionPointerForDelegate
QSystem.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
DataBaseConnectionHandler
BCryptCloseAlgorithmProviderDelegate
GUT8RQKnyc
TcgtlTJMqndCQM8LE9
=pZ"x
GetVersionInfo
get_EntryPoint
shortTimePattern
{11111-22222-20001-00002}
windows-1251
KPKWLCMG5goqRpa5gFm
WMc0ahe99r
kRckU9pv31TipsQg2Y
Scope
Nll0SVdCxp
oNUUeJp4QJ2hQxwKZF
set_encrypted_key
EncryptedData
get_GatewayAddresses
classthis
GetEnumerator
set_CertificateValidationMode
ILGenerator
K#w,'
NetTcpBinding
A9139732ED4CF84F8CE948DCB134114E4F24598A
FieldInfo
Binding
ManagementObject
Exclude
SqliteMasterEntry
firstrundone
CryptographicException
cbKeyObject
autofillProfilesTotal of RAM%USERPEnvironmentROFILE%\AppDEnvironmentata\RoaEnvironmentmingAppData\Local\[^\u0020-\u007F]UNKNOWNLocal StateProcessId1*.1l1d1bProfile_encrypted_value%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdatav10 MB or [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\value
n>b__0_6
</trustInfo>
ICryptoTransform
lxASFNzrK2UMo09O20
BCryptSetAlgorithmPropertyDelegate
percentDecimalSeparator
GetLogicalDrives
GetName
459812D18B50C8E5F96831EFD700F962F692D29E
VERTRES
get_AddressFamily
GetValue
GetString
WebResponse
System.Security.Cryptography.X509Certificates
filePath
Action`5
<>o__4
dwIncrement
CreateDecryptor
A937C899247696B6565665BE3BD09607F49A2042
sdfk38jasd
<>9__5_0
Array
QwjeOs
qBNXKNndE1BnO11i7c
get_Module
ReadKey
m_nDataItem
tableName
<Id8>k__BackingField
get_Id4
<Init>b__2_0
nativeEntry
SetValue
Callvirt
<TryFind>b__0_0
set_ReceiveTimeout
n>b__5
TextReader
set_Id14
certificate
%System.Globalization.NumberFormatInfo"
J5D8owahTN
allLongDatePatterns
get_ChildNodes
yVD0lbAY8S
updateId
System.Runtime.Serialization
GetParameters
Parse
get_Id1
get_Id
OpCodes
$$method0x600031a-1
U8LHqdMV6E6braX7JcJ
bUseCalendarInfo
m_abbrevEraNames
CreateDelegate
get_InnerText
TjLkRrMi03p4JDwH7HW
F,kER
d6CqZQhEiQTdS0lVdU
{0}{1}{2}
hOH09yMFa4
OpenVPN
Extensions
hImportKey
nKT0PtGOb0
System.Collections.IEnumerator.Current
GetValueOrDefault
AjaU
FromBase64String
adkasd8u3hbasd
Entity15T
get_ProductPrivatePart
FromJSON
BCRYPT_KEY_LENGTHS_STRUCT
UpK0j1KXn3
TryInitLanguages
Entity17T
Id24&
#GUID
GdiHelper
gfkrJvSnIxB2tWEN90
arrays
SelectMany
GetMember
Round
703C0129D2425B4E51361C24EBE8A0042E483AC5
System.Web.Script.Serialization
FromImage
571B1023DF3ABFB94C92465B365B1814FEBFAB3E
j462k
Q1q0XYRGZR
d5i~c
System.Collections.IEnumerator.Reset
GetResponseStream
__StaticArrayInitTypeSize=76
set_Id6
Entity14
TryInit
GetDelegateForFunctionPointer
OperationalStatus
ReleaseUpdates
DataContractAttribute
FC7F87A17388346181B50EC829634D7F8E842743
FrhwcrMMoeoMGIdLdbw
CreateInstance
QSa0v9FXky
lpflOldProtect
FileZilla
fFxTtKHrwlv9upVou0
CSharpArgumentInfoFlags
vH40en9ELL
Delegate
Entity
dwSize
WriteInt32
<Id13>k__BackingField
ToArray
La3vRZMbKLJlmfAMdk5
get_UserDomainName
i7n0hT6Ml9
Entity13
$this.TrayLargeIcon
Process
1@I=|
NQe<S&
WanaLife
Entity2
BCrFileStreamyptCloseAlgoritFileStreamhmProvFileStreamider
fa7vL0MxKinPWQ1tK9y
System.Collections.Generic.IEnumerable<Entity5>.GetEnumerator
UnverifiableCodeAttribute
File.Close
get_UTF8
set_Position
Message
OperationContext
get_os_crypt
sdkf9h234as
hObject
YugjHU
get_BaseAddress
<.ctor>b__1
pbInput
__StaticArrayInitTypeSize=144
Match
get_InstalledInputLanguages
Screen
BCryptDecrypt
ReadToEnd
B5B4FA236B87DBCD8055443F05776B10DDEFA5CD
sdf923
HH:mm
Resize
Protect
Ldarg_1
Entity8
PmP0WYlgta
wktqiGfFg89n1YtfFy
IconSize
ResourceAssembly
ProcessStartInfo
Enumerable
NetworkInterface
DMMBvIMBfSOU3g0nLJW
Wpx08bvT4i
ITaskProcessor
MulticastDelegate
get_SessionId
get_EnglishName
TryInitBrowsers
CallSite`1
pH&m/
BCryptSetAlgorithmProperty
percentDecimalDigits
OpenSubKey
op_LessThan
Concat
action
get_Bounds
Translation
5BB3788A197C26B8310159EC9A81635814ABB05B
C39241F447680C35D3966F9446AAE6D462E04AD3
EndInvoke
get_UnicastAddresses
asdkadu8
pcbResult
RuntimeHelpers
NotSupportedException
m_ptr
8C550EA96A693C687FFAB21F3B1A5F835E23E3B3
I\ASg
@[1(E
GetSerialNumber
Reset
InitializeArray
GetBrowsers
UNKNWON
lpName
iehh7boeaNq3xAaFC6
ParsSt
System.Collections.Generic
BCryptImportKey
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
get_ProductMinorPart
fSystem.Drawing.Icon, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3ajSystem.CodeDom.MemberAttributes, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089mSystem.Globalization.CultureInfo, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089fSystem.Drawing.Size, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
<ListOfPrograms>b__8_0
<Id4>k__BackingField
System.Collections
<>9__0_6
ListOfPrograms
Entity11T
FileStream
EndpointIdentity
ReadInt32
flNewProtect
TargetFrameworkAttribute
nhy03XOrNY
GetReferencedAssemblies
<Id3>k__BackingField
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
g_E_c_
^D yjP
sdfm83kjasd
SUsSystem.Runtime.InteropServices.CharSet, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
MoveNext
57F4CB785574C3A09AF99937BF91EA2C31E37C8A
get_PassedPaths
LocalMachine
|\M!R
GetFolder
MaxAuthTagSize
chiperText
nIndex
file:///
FQ9J79MTkrVpqwhJ50W
CallSiteBinder
get_Width
UrPGe6xslrAsBK6GjP
op_Equality
EsQJdIBij34n2qlcba
get_PreStageActions
fileInfo
T9b8EroXph
VYO0m6PX3e
set_PassedPaths
GetCaps
Calendar+m_currentEraValue
Create
Write
TryInitSteamFiles
Marshal
FromHwnd
TimeZoneInfo
Connect
HH:mm:ss
ItemName
get_Id10
get_Name
set_FileName
expires
SortedList
.reloc
GeckoRoamingName
m_useUserOverride
GetHdc
GetManifestResourceStream
%USEWanaLifeRPROFILE%\AppDaWanaLifeta\LWanaLifeocal
$$method0x6000346-2
TryCompleteTask
currencySymbol
m_dateWords
Entity1T
<>c__DisplayClass4_0
System.Linq
System.ServiceModel.Channels
files
0410277C15CAD5E63A25F491DAEEF493B897678B
m_listSeparator
genitiveMonthNames
validForParseAsCurrency
nSystem.CollectionspvoSystem.Collections*
base64str
Ae50CFZEG1
asdlasd9h34
TryInitOpenVPN
Where
bMasterKey
MtYH2PlWAOyWweDHfR
System.Reflection.ReflectionContext
CompilationRelaxationsAttribute
ISystem, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
GetDelegate
20CB5B8963ECE3D796594F043D66C0E0BAD86669
ResolveEventArgs
B14D74C51EAE4F88FBF39B8BD07DA392799FCAAF
CSDVersion
MessageHeader
__StaticArrayInitTypeSize=62
i1uYS1ZgJb61OZYA9J
89C95FB6F8086AFCCD50B1B257669F2B17C047B7
m_cultureName
Thread
Int32
RSDS6
<>2__current
<PassedPaths>k__BackingField
FileScanning
ImportKey
F413CEA9BAA458730567FE47F57CC3C94DDF63C0
System.Management
ParamArrayAttribute
81E046FA1D93B661CC948A4DD1E01F20D6192E9B
get_Local
IEnumerator`1
ParameterInfo
SqlStatement
remoteTasks
m_genitiveAbbreviatedMonthNames
Find
get_NewLine
TryInitDefenders
pLv8pJsxuO
ToInt64
GwWxM
customCultureName
pbLabel
BCryptDecryptDelegate
MessageBoxButton
SK70TJ5gw5
EVm0kV0JEU
CipherMode
System.Windows.Forms
GetAllNetworkInterfaces
GetHexString
DBRfhn M
FileShare
FileDescription
GetEntityCards
GetOffset
m_type
AppDomain
Random
IOrderedEnumerable`1
ToUInt32
{11111-22222-20001-00001}
links
<>c__DisplayClass0_0
stringKey
D7t8rnBNGh
Entity13T
version
https://api.ip.sb/ip
JOoSTcUQYrhd3hbI7F
cstringmstringd
File.Read
7FD227EEE2F38A50CFD286D228B794575C0025FB
set_Id15
Start
set_OpenTimeout
TryGetTasks
RegistryKey
FD4C77C0C4405C6A46E5C3CE53E0AE6BAEE7746D
ksaHv8MJmGrVEfRcuMq
Ynv8vglvZw
IEnumerable`1
Serialize
GetProperty
GetTokens
GetIPProperties
__StaticArrayInitTypeSize=154
GetResponse
LSIDsd2
TryInitProcesses
Handle
LEnvironmentogiEnvironmentn DatEnvironmenta
`=ofz
SJCNFgau1mcC1Wx4KB
Program
__StaticArrayInitTypeSize=28
eNetworkCredentialxpirNetworkCredentialy
NetTcpSecurity
ToDouble
languages
currencyDecimalDigits
System.Globalization
LibPtr
cbSalt
XmlNodeList
get_Unicode
i-{-.
& FRG
oJP8SRFkee
oldChar
qI4cbCC3kcaDQ7cP38
RuntimeCompatibilityAttribute
AuthTagLength
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
pbMacContext
cbInput
browserPaths
<>9__1_0
flProtect
718D1294A5C2D3F3D70E09F2F473155C4F567201
loginPairs
<>9__2_0
TryConfirm
<DomainExists>b__2
eXC8PKN5Gw
OfRPriMmaJtddgP1kJN
Bitmap
u8bl1
GetMd5Hash
gll0AmYYTa
get_Directory
PY08V2MERI
$$method0x600035a-1
monthDayPattern
SOFTWARE\Clients\StartMenuInternet
BCryptGetProperty
TableEntry
get_LibPtr
K1v6Zxx8EGgi3VLo23
ICommunicationObject
Fsl0RG6qjV
get_Result
DownloadAndExecuteUpdate
Object
chromeKey
SecurityMode
set_Id11
dateTimeOffsetPattern
Entity'
get_AllowOnlyFipsAlgorithms
gKp000g6Bc
System.Globalization.TextInfo%System.Globalization.NumberFormatInfo'System.Globalization.DateTimeFormatInfo&System.Globalization.GregorianCalendar
A9BBD7EDD219DE023751096B9380E8A4C1EF797F
Entity7
get_Method
GetGenericArguments
&System.Globalization.GregorianCalendar
RuntimeMethodHandle
$$method0x60005c0-1
GetCurrentProcess
System.Drawing.Drawing2D
__StaticArrayInitTypeSize=256
Entity7T
<AvailableLanguages>b__9_0
Combine
TryInitScannedFiles
m_win32LangID
set_Id2
sdfo8n234
4369729D8B79D0C651E00137A3B22A1A24DEBB4C
System.Drawing.Size
ExpandEnvironmentVariables
progressBar1.Locked
{11111-22222-50001-00002}
SkipVerification
pPaddingInfo
get_CurrentThread
%}S3%
Entity16
Calendar+twoDigitYearMax
BEDDFAEB0360B1694AB8CD2A69986414790A1D9A
Count
Actions
BCryptDestroyKey
BCRYPT_INIT_AUTH_MODE_INFO_VERSION
<os_crypt>k__BackingField
yyyy MMMM
EB14352FBADB40E2FA237D444A6575B918573C43
File.Open
ProductName
AllWallets
get_Id13
<>p__2
Arguments
XmlNode
get_Authentication
cirvDfMhIMZoFX2yMQ2
settings
<>9__0_8
FileSystemInfo
get_IsValueType
Nullable`1
0.0.0.0
WaitForExit
FileVersionInfo
WriteIntPtr
FJKLljVXn5i8Q7GvId
QQp1tlMwm8pqWZmRBj1
@Pm y
String.Remove
allShortTimePatterns
a5qV4V4VO04tb09fTW
System.Reflection
CfF0Vu1jc2
ProcessModuleCollection
K2WE05r7UGCruxpwqO
c1L0ui0mSw
.NETFramework,Version=v4.0
Compare
n>b__0_8
eKJES7WknTpihyBFNt
firstDayOfWeek
fullDateTimePattern
provider
set_SendTimeout
RequestConnection
GetPublicKeyToken
ProcessModule
get_encrypted_key
<.ctor>b__0_0
</requestedPrivileges>
PropertyInfo
MakeTries
TryInitColdWallets
__StaticArrayInitTypeSize=78
X509ServiceCertificateAuthentication
IEnumerable
1076B53156E190E9BCBE281016712F2D3F02D3B4
E63C93C721909983D6276C980CFF923987A4D2AA
get_Chars
GetManifestResourceNames
Ev+me
IList`1
Xyi010l0nD
System.IO
jnACrMMWMBqHqDljP54
Unprotect
set_CreateNoWindow
set_Id13
UnmanagedFunctionPointerAttribute
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
V6b0g4fO38opQb8IQD
SslPolicyErrors
percentage
fdfg9i3jn4
TryInitTelegramFiles
Ldarg_S
System.Net.Sockets
asdk9y3
get_Item
A8F9B62160DF085B926D5ED70E2B0F6C95A25280
askd435
PixelOffsetMode
PreStageActions
dwMinLength
A8A5F2DC86E781EC7360D1DDBE09F80EEECE48EA
B5TlfpDFPaDncvorqR
IEnumerator
set_PreStageActions
GetField
DomainExists
<Actions>k__BackingField
5VFi1
|
| Type | RedLine Payload: 32-bit executable |
|---|---|
| Filename |
7915013ae369873689bfa9912f22dc22f180bb1954a09f8b579b379079052e44
|
| File Type | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| File Size | 179200 bytes |
| Virtual Address | 0x06750000 |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | 5775e6dbc741b38e7bc1ac9754a92c2a |
| SHA1 | eaf2c620c1d8937f7849fb525c5bf2e7103ab493 |
| SHA256 | 7915013ae369873689bfa9912f22dc22f180bb1954a09f8b579b379079052e44 [VT] [MWDB] [Bazaar] |
| SHA3-384 | 3369369abed09048bbaa2fbcb0ef281d9c19c19565635fc134fd3cc3db147e0658f02eecdaedb55b71d3f160dbc074a9 |
| CRC32 | 9CFC413B |
| TLSH | T1ED044B1177CA8A15EBBD2631E1E2041153B5E6936633D74E2CC464F92E83700EE6B7EE |
| Ssdeep | 3072:qSNGfcU3o7Bw4A6qn3BjpCr/AXI8KoZbVBIIbdIVe/WqXoOSv1x:qLfctU6qnrCbAXI8KoZbVBIIPdSv |
| CAPE Yara |
|
| PE | Strings |
|
get_Credentials
lYHpVgMIwa2tpm4gkWq
progressBar1.Modifiers
AppendLine
GetVs
get_MetadataToken
HPY8MnHhVf
FreeHGlobal
sf34asd21
AyM0BuQvCD
System.Diagnostics
lpBaseAddress
dataFolder
get_Modules
System.Reflection.Emit
TryInitInstalledSoftwares
IPv4Helper
46884713B2F882E5304A1FF1B16370575A53E434
ProldCharotonVoldCharPN
$this.SnapToGrid
359A00EF6C789FD4C18644F56C5D3F97453FFF20
fileName
OpenAlgorithmProvider
_tableEntries
calendarWeekRule
Boolean
Content
BCryptDestroyKeyDelegate
Exception
ToUpper
<Name>k__BackingField
m_isReadOnly
Memory
<>p__0
filename
System
n>b__0_2
ServicePointManager
newSize
PADPADP
get_Id2
System.Globalization.SortVersion
$$method0x600031a-2
PassedPaths
mscoree.dll
SecurityProtocolType
set_SmoothingMode
Cryptography
Activator
<>9__0_2
currencyPositivePattern
set_UseMachineKeyStore
Generic
__StaticArrayInitTypeSize=64
ExecutablePath
TryVerify
input
set_Timeout
Select
dwDesiredAccess
Entity17
bbIIV8gnC0UElGUdBP
get_ServiceCertificate
L!M%T(U5VEWHXKYPZT[c\d
TryGetArgs
Strumpets
UnicastIPAddressInformation
<>l__initialThreadId
ReadInt64
Value
get_Ticks
set_MaxArrayLength
currencyDecimalSeparator
X509CertificateValidationMode
GetWindowsScreenScalingFactor
GatherValue
pHT8IorQS4
negativeInfinitySymbol
MethodBase
timeout
NumberOfCores
SpecialFolder
DESKTOPVERTRES
get_ReturnType
lS7tsYM7iJBceQnVN12
__StaticArrayInitTypeSize=72
<>p__1
get_Position
_sqlDataTypeSize
QFa0scKQwx
optionalCalendars
Entity12
ReadContextValue
Alloc
Q4Y0MHpbsx
{11111-22222-10001-00001}
Tailcall
<LibPtr>k__BackingField
lfm06y1W4b
qa58FrQ8SE
get_FullName
SFU4mbT3GMret7THonf
dwProcessId
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
EbV0QyH2XJ
X3II4sOENXF8KSsBNi
Environment
asdasod9234oasd
46F273EF641E07D271D91E0DC24A4392582671F8
dwMaxLength
XmlDictionaryReaderQuotas
Handler
-Infinity
C"d*Q
Rectangle
DirectoryInfo
txt8nMX1dF
SQy8AQlmOf
nCmVqUMjRmFrNS26USr
Yandex\YaAddon
wqUkRo9EscVExha5Yb
dateTimeInfo
`.rsrc
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
set_MaxDepth
managed
_CorExeMain
get_RowLength
TimeSpan
yyyy-MM-dd
ManagementObjectEnumerator
System.Drawing
hAlgorithm
kkdhfakdasd
adapter
WYdZoqk3nEZiHS5fbX
yearMonthPattern
Ldarg_2
get_ExecutablePath
GetModules
monthNames
get_SystemDirectory
ChannelFactory`1
softwares
.ctor
CryptoStream
SvKOxZMF6RUKtvnKjPh
__StaticArrayInitTypeSize=124
System.Net.Security
roSystem.Linqot\CISystem.LinqMV2
Delete
InternalName
hh:mm tt
AsyncCallback
bUZnt982pXJAL26Mek
LocalState
GetHINSTANCE
numberNegativePattern
A898408AA9A30B686240D921FE0E3E3A01EE91A5
TransferMode
MakeByRefType
CreateChannel
_pageSize
cbWRVD
FromBase64CharArray
18B532EF2959EF2ED8C549D712E3446FF49E4287
get_IsStatic
DecryptBlob
numberGroupSizes
SmoothingMode
X509CertificateRecipientClientCredential
__StaticArrayInitTypeSize=282
<Id6>k__BackingField
ReadIntPtr
<security>
Y3C8Gc9uFD
buffer
lpAddress
RootNum
Infinity
NvQ34uZt895nxEhi2FIr
aR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources
OriginalFilename
flAllocationType
FlagsAttribute
currencyGroupSizes
sdfk8h34
Plywoods.g.resources
1A79939AEFF161E557D02CB37CD9A811ABCAF458
.cctor
set_Message
__StaticArrayInitTypeSize=40
DakfubQjHJLVYTmYAj
set_Id12
GetSubKeyNames
OpLinqera GLinqX
iFrq"
get_CurrentEncoding
i5n5dgPY1M9nRIix0B
$this.Icon
get_UserName
maxLevel
aoWmH0Mq1UXSdnNk2nu
tD58CArDL3
FileVersion
SuppressFinalize
m_SortVersion
get_Key
allShortDatePatterns
set_MaxJsonLength
get_HasValue
get_Is64BitOperatingSystem
2FBDC611D3D91C142C969071EA8A7D3D10FF6301
e/p%<VA
a9duh3zd
DownloadUpdate
get_Id12
A3EFD00EA085079EE7F97407F8EFF07E3990696A
ReadOnlyCollectionBase
OpCode
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
BA7D69D99D9DBB0EE4285F6009DAABF743B9641D
BlockCopy
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
96D6CB223DCF17F7C9F93C825239BDAA3634674A
OperationContractAttribute
set_Id4
cXLX^
height
longDatePattern
ProductVersion
{11111-22222-50001-00000}
__StaticArrayInitTypeSize=48
A8L0DbZnyI
ToInt32
value
SearchOption
%$('32546498:8<;?>^]_]`]a]b]c]d]e]f]g]h]i]j]k]l]m]n]o]p]q]r]s]t]u]v]w]x]y]z]{]~}
EB2DB456E0D779E528D1474FA55AC99055A5E815
MethodInfo
System.Core
GetTypeFromHandle
set_Id8
9D99781A42147118D9E59BED1BC9AE622BA64A6C
Microsoft Primitive Provider
|/2hfZ
System.Collections.Generic.IEnumerator<Entity5>.Current
Point
bytes
EnumCook
TkY0GRXcuB
get_CurrentInputLanguage
CryptoConfig
Dispose
pbAuthData
</assembly>
n>b__1
GetDeviceCaps
+System.Globalization.GregorianCalendarTypes
Height
pbTag
BCryptOpenAlgorithmProviderDelegate
Encoding
Entity6
JLq8qRNF6r
Locals
chain
Image
hGYjAD2q6vD5IiX7UL
CreateDirectory
LENce7y5NXUU2J5sYZ
Entity6T
SystemInfoHelper
(u(y-
yAm0xGUH4vUugXROqM
rootPath
sender
phAlgorithm
MessageBox
CoCryptographyokieCryptographys
H[k@9j
allLongTimePatterns
EZ>$S
blvnzcwqe
slkahs2
Namespace
CompareTo
IAsyncResult
ToLower
IsLoopback
get_Id7
clrjit.dll
Module
KDBM(l
asdak83jq
ConvertToBytes
taskId
ScanCook
NordApp
eLHGt3Mtbkx5eUY0CFU
positiveInfinitySymbol
NYXMQfMkQ1YFrtKGqwy
<PrivateImplementationDetails>
System.Runtime.Versioning
<Id5>k__BackingField
m_isInvariant
KeyDataBlob
get_Culture
assembly
cbSize
<GetScanArgs>b__5_0
get_ModuleMemorySize
nanSymbol
allYearMonthPatterns
Entity15
CollectMemory
80E5A0A2B81DB2473AFBB3FDD6F479670B7B41C6
Xp30wWqNfl
cbMacContext
Func`5
QAQBbe6C8Qamp2Z7wO
n>b__0_4
TryInitFtpConnections
ListOfProcesses
<Id15>k__BackingField
abbreviatedMonthNames
IsOdd
LfPSh9MDUmORZ2SYjFg
dwFlags
get_OutgoingMessageHeaders
ViFfASMcS7q7Q1ZmoBv
Append
$$method0x6000346-1
aso0shq2
sdf9j3nasd
X509Chain
get_Id5
x@D .
typemdt
CryptoHelper
AddMonths
PLs0L7jWH3
InputLanguage
StringComparison
percentPositivePattern
XXy0yB1QBl
cbNonce
MonitorSize
Discord
<PreStageActions>k__BackingField
<DomainExists>b__4_1
X4vUfELBF5L66kX3A4
pmDesignator
BCryptImportKeyDelegate
asdaid9h24kasd
XmlReader
okx02TCOKN
set_MaxNameTableCharCount
OsCrypt
GetWindowsVersion
ChainingModeGCM
InvokeMember
ClientCredentials
get_DisplayName
get_Count
InputLanguageCollection
YCCfr9MyGIkCeG2KWsH
set_MaxBytesPerRead
{11111-22222-50001-00001}
System.Collections.Generic.IEnumerator<Entity5>.get_Current
set_InterpolationMode
BIw0qwmofm
CSharpBinderFlags
ChangeSize
get_ItemOf
ModuleHandle
AdB8GujvggcnCBBXyu`1
serviceInterface
ReadFileAsText
E0CEB3E46E857A70CFB575A05B01A64806A8D426
get_ParameterType
hProcess
32.dll
hNrI7eK4VDCKsvccu1p
Process
Enter
GetDirectories
Replace
get_ModuleName
$this.Language
ICollection`1
FindPaths
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
set_MaxStringContentLength
Binder
ReadBytes
GetGraphicCards
cFileStreamredFileStreamit_cFileStreamardFileStreams
Entity16T
LegalCopyright
get_Location
rSQShYMNZD1t8AkanwT
CharSet
BindingFlags
kernel32.dll
op_Inequality
PathsCollection
95098CDF929872F9B67E58070D088F8238F7CABE
<>o__8
<>9__8_0
__result
xFM04hI2Ep
bTS8sOvItD
dayNames
Entity4T
EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
ManagementObjectSearcher
formatFlags
get_ProductMajorPart
AvailableLanguages
set_Id10
GetProcessors
Int64
EHY07C8Nkx
FileSearcher
g7g5PGRdwFuQFU69Xt
updateTask
DebuggerHiddenAttribute
<>9__4_1
endIdx
set_RecursionLimit
ChromeGetLocalName
CreateEncryptor
ObjectHandle
Target
ObfuscationAttribute
UR60tcdG3v
<GetDefaultIPv4Address>b__1_0
Concat0 MConcatb oConcatr Concat0
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
jqgdsJXGHELATYm5nd
drEreq3vsa483XgOsM
Substring
EndpointAddress
_masterTableEntries
ChromeGetRoamingName
ChangeType
GetFolderPath
BCryptGetPropertyDelegate
Fields
cbAAD
(System.Globalization.DateTimeFormatFlags
field
4CDA4454A3C36A7EBDCF8FE8B804B379A31D33CA
H9R0frEDDF
lpNumberOfBytesWritten
System.ServiceModel.Security
Graphics
ScanCredentials
IDisposable
a86iACM2Tj62rYXneut
<>9__1_1
Unknown Version
Attribute
ObjectLength
GetExecutingAssembly
startIdx
fieldName
get_Id15
asdk9345asd
set_Mode
7BF285852D43939E0FBD7B6C5592189AF986E8BF
xYo4p9cowCOHN1q3AB
XmlDocument
rowIndex
E3E8284EDCB98A1085E693F9525A3AC3D705B82E
Entity14T
UInt64
4E3D7F188A5F5102BEC5B820632BBAEC26839E63
currencyNegativePattern
EnumMemberAttribute
ManagementBaseObject
calendar
WriteAllBytes
__StaticArrayInitTypeSize=14
<Id12>k__BackingField
ComputeHash
D67333042BFFC20116BF01BC556566EC76C6F7E2
2A92E2F98903398CD12F10BDF583F44C2C6EEBF5
g9bbH5MgI40eLaLw4Jn
processes
c2w8BDWoyW
i048b1FIg7
OperationContextScope
<>p__3
FullInfoSender
connection
IsNullOrEmpty
IdentitySenderBase
x73sxKHL1IC5Sep5GY
pszImplementation
IsLocalIp
28F794B091ED92F57BFC80EA32B18AF3A8183ADB
kernel
SelectSingleNode
List`1
profiles
EFBD67KKhi2RWAm5NxE
get_BigEndianUnicode
result
BCryptCloseAlgorithmProvider
win32LCID
DeviceCap
level
_fileBytes
get_Length
4B05CEBD7D70F1607D474CAE176FEAEB7439795F
callback
GetProperties
Entity12T
ToBase64String
{11111-22222-10001-00002}
COr0cVo5U2
set_TransferMode
Sme8icxdey
System.Runtime.CompilerServices
IContextChannel
set_ClientCredentialType
Remove
vSNhhHTPdTGxBJWC86
System.ServiceModel
WE8852nD6h
entropy
Clear
F1^.Kv
nLvrU8AQJDKRRZAB7e
KeyValuePair`2
SerialNumber
TryFind
ThreadStart
cbData
<>9__0_4
__StaticArrayInitTypeSize=44
Entity11
GetFiles
String.Replace
ReadMasterOfContext
<GetWindowsVersion>g__HKLM_GetString|11_0
Enumerator
WebRequest
Regex
.NET Framework 4
3DB6DAD76E13B54DC03AF1C6092C40388E57FBBF
FileSystem
Matches
__StaticArrayInitTypeSize=30
B14822E504AE1EF678AE0E823684D7B32F95A725
4EC18FAB222C9FF2E5161F21A90F187D5D98E042
ScanPasswords
XT{t?O-
ResolveMethod
Q^U[A
__StaticArrayInitTypeSize=6
TryInitDiscord
xmlNode
hModule
VS_VERSION_INFO
MessageSecurityOverTcp
IqypAuM1p30t18x8spB
xJD0JFICoe
DebuggableAttribute
pszProperty
gdi32.dll
amDesignator
net.tcp://
perMilleSymbol
DynamicMethod
GetBytes
UNIQUE
source
set_CloseTimeout
IconData
BCrFile.ReadAllTextyptImFile.ReadAllTextportKFile.ReadAllTextey
StreamReader
File.Write
kasdihbfpfduqw
__StaticArrayInitTypeSize=46
c2J8tvIe72
GetFields
Contains
Microsoft.CSharp
<>9__9_0
bcrFileStream.IOypt.dFileStream.IOll
OpenUpdate
387D8DBBFB12BA323F1E0F1F539B4DA9550070C3
get_Exists
TaskResolver
sIdxNnPN3DdGdAT55L
success
nativeSizeOfCode
ExtendV
kadsoji83
encrypted_key
BCryptOpenAlgorithmProvider
R1UwgDZeZFj23x0o6l
RuntimeTypeHandle
CallingConvention
pxu0rqyqZr
Entity1
FileStream.IO
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
__StaticArrayInitTypeSize=58
X2f0nwJcF0
<Id1>k__BackingField
SLG0ZmRW7r
System.Security.Cryptography
Empty
CopyFromScreen
sdfkas83
1938FDF81D9EFE09E9786A7A7DDFFBD755961098
set_MaxReceivedMessageSize
WriteInt64
93D9D319FF04F5E54F3A6431407A7B90388FDC54
ao#QlU
PrepareMethod
get_Size
Dictionary`2
BinaryReader
System.ServiceModel.Description
IPInterfaceProperties
BCRYPT_OAEP_PADDING_INFO
FileAccess
Directory
RowLength
System.Globalization.TextInfo
get_ServerCertificateValidationCallback
get_FileVersionInfo
<>1__state
a8t0IqV0dv
get_OffsetToStringData
installedBrowsers
FromMinutes
System.Runtime.InteropServices
ansiCurrencySymbol
StartsWith
generalLongTimePattern
System.Text
System.Runtime.Remoting
FileScanner
CommandLineUpdate
2A19BFD7333718195216588A698752C517111B02
BCrMemoryStreamyptOpeMemoryStreamnAlgorithmProviMemoryStreamder
timeSeparator
longTimePattern
System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
09b2368d87369150a96676542aa44ffa
ToJSON
FileCopier
__StaticArrayInitTypeSize=20
get_MethodHandle
D82572C56BDDD62E320B8BDAF0397A0DF9DD5BF7
04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
DataMemberAttribute
{11111-22222-10009-11111}
System.Security.Cryptography.AesCryptoServiceProvider
IntPtr
NJK0HP6bbE
<GetTokens>d__2
8C49F78A06E711CF0E21134D0B091985336CC37F
BCrIOStreamyptDecrIOStreamypt
AssemblyName
R]|!P
Y0Q8ln2q0R
leapYearMonthNames
set_Id16
percentNegativePattern
GetEncoding
lOMjN8M5svu6jqPHqHM
FileMode
Uqo0Ks79er
tasks
System.Globalization.CompareInfo
ReadRawData
GatewayIPAddressInformationCollection
Hh4jACAkIEk=
get_JSON
os_crypt
mscorlib
bEncryptedData
set_Key
ChannelFactory
77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
MessageCredentialType
CultureInfo
get_Id14
FF3BAB78FE99DEED16DD82BB73EE1AE091A07815
profilePath
pbNonce
6F66485AF823BAE1F185740DA7F4F595701CD22E
1zHp:
YdjFZFMROvOnEoxoLJ8
AllocCoTaskMem
__StaticArrayInitTypeSize=10
get_InvariantCulture
System.Web.Extensions
0E5921723BD3C6CB75662A156FB56AF05A7152C6
Request
currencyGroupSeparator
lCDAsW5mfE1qB1o2W5.nLvrU8AQJDKRRZAB7e+FJKLljVXn5i8Q7GvId+AdB8GujvggcnCBBXyu`1[[System.Object, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]][]
<encrypted_key>k__BackingField
Dtey6DMXx7TKI2m0BG5
nativeDigits
InvalidOperationException
Finalize
Entity10
generalShortTimePattern
System.Globalization.CultureInfo
isReadOnly
$this.Localizable
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
CultureID
U9R8cmk1lf
npvo*
Version
TfVAqi9MPuMfgVWeEs
MmMppQbpPNjXnJuAp3
GuoMSJc49jmZx0C6wm
offset
Exists
System.Collections.IEnumerator.get_Current
get_Assembly
IPAddress
n>b__7
culture
<>9__0_0
EndpointConnection
string.Replace
\wf$SA)
CallSite
set_WorkingDirectory
set_Id3
Format
KcFyGMwiw3cZLLMwaR
StringFileInfo
BytesToStringConverted
EZOPSET
System.Text.RegularExpressions
get_Id16
StringSplitOptions
Result
VarFileInfo
dvsjiohq3
n>b__0_0
flags
{11111-22222-40001-00001}
uZBNotMH8SB3ixtVRDJ
79E9B68FB6E1987DED749BCD71143BD8EB323CE3
System.Reflection.RuntimeModule
Entity9
<.ctor>b__0
Deserialize
Open
address
digitSubstitution
System.CodeDom.MemberAttributes
Lui8jqVp0r
{11111-22222-40001-00002}
ResourceA
MemoryStream
set_PixelOffsetMode
MessageBoxImage
startIndex
lJf=f
__StaticArrayInitTypeSize=18
StripQuotes
ResolveType
get_CodeBase
twoDigitYearMax
System.
Invoke
XmlElement
ScanFills
__StaticArrayInitTypeSize=38
Plywoods
Microsoft.Win32
scannerArg
71E427369E07185AE0407E3FAB1A16ED62BD159E
<Result>k__BackingField
AesCryptoServiceProvider
set_Id9
GetRecent
zaIPKBJd3eBVuMQVAJ
set_ReaderQuotas
CE18B047107AA23D1AA9B2ED32D316148E02655F
numInfo
v4.0.30319
DataProtectionScope
sdfk83hkasd
get_Id11
MemberInfo
authTag
bJA8uTcIxU
set_Id5
profilesDirectory
@^<>cZ-
rV9N3WuhF41qaV0GPT
UWp8zQVQVu
IClientChannel
Entity8T
pszBlobType
get_Current
get_Address
UInt16
iWG0xspcVI
Assembly Version
AdapterRAM
ToString
myjYl3MCX4jOhN0kCLJ
WebClient
VfelpFs9075TFRAJbS
HashAlgorithm
Entity4
KQ28UaQygI
FileInfo
E705C6345C26AF82E64D22DBE44B2A3514F2F06F
SenderFactory
set_SecurityProtocol
__StaticArrayInitTypeSize=24
AddressFamily
UnicastIPAddressInformationCollection
TryInitNordVPN
JavaScriptSerializer
R7YAWCr4xoMEwZIN1q
Application
m_abbrevEnglishEraNames
LoadLibrary
<Id10>k__BackingField
hardwares
ConvertToULong
scanners
000004b0
searchOption
CreateBind
MessageBoxResult
procName
GetDefaultIPv4Address
configs
BCFile.OpenryptGeFile.OpentPropeFile.Openrty
4EF472E2E74116C7FD95C74AB422CCF80DB1C404
Func`2
System.Windows
EBD075615CBE4A710F9410FFECEAF6110A01922B
shortDatePattern
007A56C60CB686C542C5A63F4806094A4F9494B7
rowNum
<Id16>k__BackingField
DownloadData
set_MaxBufferPoolSize
DF2BDC3975DC25BFAFFA4976E9CD1E38AADF463B
EntityTUwSystem.ServiceModel.SessionMode, System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
KadaRiMYfjWF9EKXYEv
set_Security
ConfigReader
ApGenericpDaGenericta\RGenericoamiGenericng\
bInheritHandle
string
lpType
numberDecimalDigits
<GetDefaultIPv4Address>b__1_1
__StaticArrayInitTypeSize=102
positiveSign
Hashtable
IsValidAction
dateSeparator
Abort
abbreviatedDayNames
OrderBy
Ldarg_3
Plywoods.exe
m_name
Entity10T
ManagementObjectCollection
baseDirectory
TlRflgEEHacsmQE3o5
ChromeGetName
Feature
GetILGenerator
X509Certificate
StringBuilder
brpmiPvBUY9Lcn4iL3
get_Actions
m_isDefaultCalendar
get_ProductBuildPart
SessionMode
__StaticArrayInitTypeSize=32
Visible
XmlTextReader
Wv90NW8pBM
__StaticArrayInitTypeSize=42
BCrFile.ReadyptDesFile.ReadtroyKFile.Readey
DynamicAttribute
localhost
Width
Close
Search
CurrentUser
_dbEncoding
9D9AF3AE11A58D55EB8A6AEC8F03F7AD01E8994B
ImageFormat
PreCheck
StringDecrypt
mnf0iy2Xdp
aET8JBjdn5
oldArray
kernel32
Unknown
cbTag
k52nAXMuqwtne7usNEa
'System.Globalization.DateTimeFormatInfo+
rJy0bsBSOH
Entity9T
FrameworkDisplayName
MANGO
RemoteCertificateValidationCallback
PartsSender
8743F6DD6877BBC815E9F16BEC59057DD1A89B0A
serviceInterface.Extension
sdf934asd
TypeCode
SizeOf
cultureID
get_Now
AllocHGlobal
IndexOf
410D551BF9DC1F0CF262E4DB1077795D56EEC026
501BADE98ACDE8BF4A0424FD9A4354615FF08C7F
G53N3ivQR5mlTdjgs9
CreateDnsIdentity
Wmr0YWOKFe
UInt32
IPAddressInformation
n>b__3
PresentationFramework
GetProcAddress
set_ServerCertificateValidationCallback
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
<Module>
FE79FF373808574898C82AC1320C55C1182FB75A
Fof8xr9GjE
percentGroupSeparator
dddd, dd MMMM yyyy
MAr8D8cKed
get_FileVersion
m_currentEraValue
Entity3T
Reverse
width
set_os_crypt
N2cR4B1f5mcs8HPwGd
chainingMode
Func`3
patterns
ExtensionAttribute
IPq0EAgE31
<Id2>k__BackingField
lwj8jEMeFYNrhimRgw4
A9B6DE7C485B3014653A30C8B4BEFA8F70610178
get_ModuleHandle
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
GetImageBase
browsers
StripAfterObfuscation
B3PSOWMauL44DQAsFw0
MWc8XleLVV
value__
File.ReadAllText
DownloadFile
__StaticArrayInitTypeSize=16
m_pData
cbOutput
TryInitDisplay
get_DeclaringType
<lvr$
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
W2B8HQ8LZb
IFormatProvider
BCRYPT_PSS_PADDING_INFO
set_Actions
IOStream
get_Id8
hFBK5eAF5WSEKYOPJe
EntityCreator
get_FieldType
Location
Nqour7oa2m21itwjCb
ProtectedData
ChainingMode
System.Drawing.Imaging
cF70garKgs
CSharpArgumentInfo
f3x05URidx
cbLabel
D5sl2fM4QVKFJ3CfQFy
paths
get_Id3
VyWLAeeCP61he3Q0Ly
KinR7fMsJc8HWvAAUNb
<Id7>k__BackingField
g7mcw
DF08DD4DFFDB6C9048202CAE65882EF91ECE6BA8
pbKeyObject
__StaticArrayInitTypeSize=12
get_MainModule
TryInitHardwares
Entity5
gkdsi8y234
MessageHeaders
WSystem.Texteb DatSystem.Texta
<Run>b__1_0
InvokeConstructor
ReleaseHdc
9B88C78E81ADB9E7247AB37D1F5F3861810916D8
bewFhMMOobo8Nji3hcc
HiAVRCEaLAw9AEAKODk9EDknMEI8Dw4HKDVObg==
m_eraNames
lCDAsW5mfE1qB1o2W5
Calendar+m_isReadOnly
$$method0x6000338-1
get_PrimaryScreen
ServiceContractAttribute
set_Id7
Microsoft.CSharp.RuntimeBinder
GeckoLocalName
GetMethod
AddressHeader
System.Net
SymmetricAlgorithm
IsNullOrWhiteSpace
BCFile.CloseryptSFile.CloseetPrFile.CloseoperFile.Closety
percentGroupSizes
Supports
5F2F91D44A21E42A979E24B620CF42F2CB8687EC
TrimStart
MM/dd/yyyy
$this.DrawGrid
nDataItem
Cv1aiPMKr8ZKUZh06tf
UNKNOWN
Close
h:mm tt
BitConverter
Authorization
sdfi35sdf
lQs86Wlt1X
DesktopMessanger
#Blob
RecordHeaderField
get_Value
FlushFinalBlock
numberGroupSeparator
domains
get_OperationalStatus
defenders
get_CreationTime
set_Id1
op_GreaterThanOrEqual
__StaticArrayInitTypeSize=2840
get_ASCII
FromBase64
Assembly
get_ManagedThreadId
Buffer
YRf8T10hUc
asdk8jasd
<>9__4_0
ToCharArray
percentSymbol
Write
sslPolicyErrors
ToList
*wallet*
method
qRV0FxcZLN
get_Id9
GatewayIPAddressInformation
vdMNxWMl7t6bnJVKjtn
get_DocumentElement
ReadUInt32
RiYygsMA99fppmVD4Y5
__StaticArrayInitTypeSize=152
cKo3bXMS8OsLtMmCoL2
EnumerateDirectories
UKVsxudQUrbsVxhfdQ
pszAlgId
!This program cannot be run in DOS mode.
<Id11>k__BackingField
DateTime
SwES4iME4IulDEryH9t
CreateHeader
get_ManifestModule
get_BaseStream
aafqkoMnbYWIgfvWaNs
System.IDisposable.Dispose
get_SecurityProtocol
ValueType
GameLauncher
get_Png
gyyqmcMPnXZ5vJW0PE1
Double
RSACryptoServiceProvider
DebuggingModes
TryInitInstalledBrowsers
set_UseShellExecute
Virtual
phKey
</security>
GetScanArgs
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
InterpolationMode
user.config{0}\FileZilla\sitemanager.xmlcookies.sqliteUnknownExtension\Program Files (x86)\configdisplayNamehost_keyNametdataSELECT * FROM expires_utc\Program Data\coMANGOokies.sqMANGOliteAFileSystemntivFileSystemirusPrFileSystemoduFileSystemct|AntiFileSystemSpyWFileSystemareProFileSystemduct|FireFileSystemwallProdFileSystemuct*ssfn*DisplayVersion%localappdata%\-*.lo--gLocalPrefs.jsonOpHandlerenVPHandlerN ConHandlernect%DSK_23%Opera GXcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeROOT\SecurityCenterROOT\SecurityCenter2Web DataSteamPathwaasflleasft.datasfCommandLine\Telegram Desktop\tdataSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesTotalVisibleMemorySizeis_secureSoftware\Valve\SteamLogin DataID: isSecureegram.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\Program Files\Opera GX StablenameProfile_Unknown, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueLocal Extension SettingsNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: DisplayNameTel*.vstring.Replacedfpath
A5A8fiNlIF
G1p8ZVMsXB
set_Name
BCRYPT_AUTHENTICATED_CIPHER_MODE_INFO
GetProcessesByName
Func`1
38F431A549411AEB32810068A4C83250B2D31E15
#Strings
set_IsBackground
SOFTWARE\Microsoft\Windows NT\CurrentVersion
profile
67CD3B1DF0AD5BAEAA1ABDDA3FCAFB2EEBDD2684
Entity2T
$this.TrayHeight
4C1117B01D5C4E103EE817F889EC547C63B47B7A
2B9522D4F7398AB5DB789596FE5DB90589B031E9
textInfo
Decrypt
$this.Locked
cYe8gg3jlQ
dwInfoVersion
NetworkInterfaceComponent
TransformBlock
numberDecimalSeparator
get_Height
.text
display
<Id14>k__BackingField
OFileInfopeFileInfora GFileInfoX StabFileInfole
MFr8OaChF8
validForParseAsNumber
RijndaelManaged
dataProtectionScope
CryptoStreamMode
m_dataItem
remoteFiles
Sleep
ybg8eXHvp2
$this.GridSize
/ProcessC Process
String
set_IV
AddRange
RuntimeFieldHandle
gT889kxuZB
Entity3
<Module>{8E8BC8F9-812D-4941-8368-2F12366EAFE1}
get_Id6
n824Cv0l2e74vhAjPh
cbAuthData
cipherText
Split
Entity5T
$$method0x6000338-2
First
6353B688B99A3543932AA127DAA0E48FBC646BBD
negativeSign
Registry
PrepareDelegate
compareInfo
System.Collections.IEnumerable.GetEnumerator
asdoiad0123
System.Drawing.Icon
__StaticArrayInitTypeSize=22
m_superShortDayNames
TryGetConnection
NativeHelper
ReadFile
pbOutput
fXr6V5hGqLv9j5eOGG
<PrivateImplementationDetails>{FFB93847-F5E5-4C42-AD08-8CA57E731A2E}
System.Threading
NetworkCredential
CompilerGeneratedAttribute
Stream
object
MatchCollection
$$method0x600039c-1
BeginInvoke
System.Security
get_PropertyType
Unwrap
M-z,.
ReadContextTable
searchPatterns
WrapNonExceptionThrows
GetType
Convert
989657DD93570810E43C5B1F68E529460CA796F1
<DomainExists>b__4_0
System.Net.NetworkInformation
qLogbLM6CMixIGCDxV8
Monitor
j1e0OaPnrN
r6X8h4DBtT
System.Xml
shell\open\command
asd44123
Entity&
Ldarg_0
MD5CryptoServiceProvider
<Id9>k__BackingField
GetFunctionPointerForDelegate
QSystem.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
DataBaseConnectionHandler
BCryptCloseAlgorithmProviderDelegate
GUT8RQKnyc
TcgtlTJMqndCQM8LE9
=pZ"x
GetVersionInfo
get_EntryPoint
shortTimePattern
{11111-22222-20001-00002}
windows-1251
KPKWLCMG5goqRpa5gFm
WMc0ahe99r
kRckU9pv31TipsQg2Y
Scope
Nll0SVdCxp
oNUUeJp4QJ2hQxwKZF
set_encrypted_key
EncryptedData
get_GatewayAddresses
classthis
GetEnumerator
set_CertificateValidationMode
ILGenerator
K#w,'
NetTcpBinding
A9139732ED4CF84F8CE948DCB134114E4F24598A
FieldInfo
Binding
ManagementObject
Exclude
SqliteMasterEntry
firstrundone
CryptographicException
cbKeyObject
autofillProfilesTotal of RAM%USERPEnvironmentROFILE%\AppDEnvironmentata\RoaEnvironmentmingAppData\Local\[^\u0020-\u007F]UNKNOWNLocal StateProcessId1*.1l1d1bProfile_encrypted_value%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdatav10 MB or [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\value
n>b__0_6
</trustInfo>
ICryptoTransform
lxASFNzrK2UMo09O20
BCryptSetAlgorithmPropertyDelegate
percentDecimalSeparator
GetLogicalDrives
GetName
459812D18B50C8E5F96831EFD700F962F692D29E
VERTRES
get_AddressFamily
GetValue
GetString
WebResponse
System.Security.Cryptography.X509Certificates
filePath
Action`5
<>o__4
dwIncrement
CreateDecryptor
A937C899247696B6565665BE3BD09607F49A2042
sdfk38jasd
<>9__5_0
Array
QwjeOs
qBNXKNndE1BnO11i7c
get_Module
ReadKey
m_nDataItem
tableName
<Id8>k__BackingField
get_Id4
<Init>b__2_0
nativeEntry
SetValue
Callvirt
<TryFind>b__0_0
set_ReceiveTimeout
n>b__5
TextReader
set_Id14
certificate
%System.Globalization.NumberFormatInfo"
J5D8owahTN
allLongDatePatterns
get_ChildNodes
yVD0lbAY8S
updateId
System.Runtime.Serialization
GetParameters
Parse
get_Id1
get_Id
OpCodes
$$method0x600031a-1
U8LHqdMV6E6braX7JcJ
bUseCalendarInfo
m_abbrevEraNames
CreateDelegate
get_InnerText
TjLkRrMi03p4JDwH7HW
F,kER
d6CqZQhEiQTdS0lVdU
{0}{1}{2}
hOH09yMFa4
Extensions
OpenVPN
hImportKey
nKT0PtGOb0
System.Collections.IEnumerator.Current
GetValueOrDefault
AjaU
FromBase64String
adkasd8u3hbasd
Entity15T
get_ProductPrivatePart
FromJSON
BCRYPT_KEY_LENGTHS_STRUCT
UpK0j1KXn3
TryInitLanguages
Entity17T
Id24&
#GUID
GdiHelper
gfkrJvSnIxB2tWEN90
arrays
SelectMany
GetMember
Round
703C0129D2425B4E51361C24EBE8A0042E483AC5
System.Web.Script.Serialization
FromImage
571B1023DF3ABFB94C92465B365B1814FEBFAB3E
j462k
Q1q0XYRGZR
d5i~c
System.Collections.IEnumerator.Reset
GetResponseStream
__StaticArrayInitTypeSize=76
set_Id6
Entity14
TryInit
GetDelegateForFunctionPointer
OperationalStatus
ReleaseUpdates
DataContractAttribute
FC7F87A17388346181B50EC829634D7F8E842743
FrhwcrMMoeoMGIdLdbw
CreateInstance
QSa0v9FXky
lpflOldProtect
FileZilla
fFxTtKHrwlv9upVou0
CSharpArgumentInfoFlags
vH40en9ELL
Delegate
Entity
dwSize
WriteInt32
<Id13>k__BackingField
ToArray
La3vRZMbKLJlmfAMdk5
get_UserDomainName
i7n0hT6Ml9
Entity13
$this.TrayLargeIcon
Process
1@I=|
NQe<S&
WanaLife
Entity2
BCrFileStreamyptCloseAlgoritFileStreamhmProvFileStreamider
fa7vL0MxKinPWQ1tK9y
System.Collections.Generic.IEnumerable<Entity5>.GetEnumerator
UnverifiableCodeAttribute
File.Close
get_UTF8
set_Position
Message
OperationContext
get_os_crypt
sdkf9h234as
hObject
YugjHU
get_BaseAddress
<.ctor>b__1
pbInput
__StaticArrayInitTypeSize=144
Match
get_InstalledInputLanguages
Screen
BCryptDecrypt
ReadToEnd
B5B4FA236B87DBCD8055443F05776B10DDEFA5CD
sdf923
HH:mm
Resize
Protect
Ldarg_1
Entity8
PmP0WYlgta
wktqiGfFg89n1YtfFy
IconSize
ProcessStartInfo
Enumerable
NetworkInterface
DMMBvIMBfSOU3g0nLJW
Wpx08bvT4i
ITaskProcessor
MulticastDelegate
get_SessionId
get_EnglishName
TryInitBrowsers
CallSite`1
pH&m/
BCryptSetAlgorithmProperty
percentDecimalDigits
OpenSubKey
op_LessThan
Concat
action
get_Bounds
Translation
5BB3788A197C26B8310159EC9A81635814ABB05B
C39241F447680C35D3966F9446AAE6D462E04AD3
EndInvoke
get_UnicastAddresses
asdkadu8
pcbResult
RuntimeHelpers
NotSupportedException
m_ptr
8C550EA96A693C687FFAB21F3B1A5F835E23E3B3
I\ASg
@[1(E
GetSerialNumber
Reset
InitializeArray
GetBrowsers
UNKNWON
lpName
iehh7boeaNq3xAaFC6
ParsSt
System.Collections.Generic
BCryptImportKey
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
get_ProductMinorPart
fSystem.Drawing.Icon, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3ajSystem.CodeDom.MemberAttributes, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089mSystem.Globalization.CultureInfo, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089fSystem.Drawing.Size, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
<ListOfPrograms>b__8_0
<Id4>k__BackingField
System.Collections
<>9__0_6
ListOfPrograms
Entity11T
FileStream
EndpointIdentity
ReadInt32
flNewProtect
TargetFrameworkAttribute
nhy03XOrNY
<Id3>k__BackingField
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
g_E_c_
^D yjP
sdfm83kjasd
SUsSystem.Runtime.InteropServices.CharSet, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
MoveNext
57F4CB785574C3A09AF99937BF91EA2C31E37C8A
get_PassedPaths
LocalMachine
|\M!R
GetFolder
MaxAuthTagSize
chiperText
nIndex
file:///
FQ9J79MTkrVpqwhJ50W
CallSiteBinder
get_Width
UrPGe6xslrAsBK6GjP
op_Equality
EsQJdIBij34n2qlcba
get_PreStageActions
fileInfo
T9b8EroXph
VYO0m6PX3e
set_PassedPaths
GetCaps
Calendar+m_currentEraValue
Create
Write
TryInitSteamFiles
Marshal
FromHwnd
TimeZoneInfo
Connect
HH:mm:ss
ItemName
get_Id10
get_Name
set_FileName
expires
SortedList
.reloc
GeckoRoamingName
m_useUserOverride
GetHdc
GetManifestResourceStream
%USEWanaLifeRPROFILE%\AppDaWanaLifeta\LWanaLifeocal
$$method0x6000346-2
TryCompleteTask
currencySymbol
m_dateWords
Entity1T
<>c__DisplayClass4_0
System.Linq
System.ServiceModel.Channels
files
0410277C15CAD5E63A25F491DAEEF493B897678B
m_listSeparator
genitiveMonthNames
validForParseAsCurrency
nSystem.CollectionspvoSystem.Collections*
base64str
Ae50CFZEG1
asdlasd9h34
TryInitOpenVPN
Where
bMasterKey
MtYH2PlWAOyWweDHfR
System.Reflection.ReflectionContext
CompilationRelaxationsAttribute
ISystem, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
GetDelegate
20CB5B8963ECE3D796594F043D66C0E0BAD86669
B14D74C51EAE4F88FBF39B8BD07DA392799FCAAF
CSDVersion
MessageHeader
__StaticArrayInitTypeSize=62
i1uYS1ZgJb61OZYA9J
89C95FB6F8086AFCCD50B1B257669F2B17C047B7
m_cultureName
Thread
Int32
<>2__current
<PassedPaths>k__BackingField
FileScanning
ImportKey
F413CEA9BAA458730567FE47F57CC3C94DDF63C0
System.Management
ParamArrayAttribute
81E046FA1D93B661CC948A4DD1E01F20D6192E9B
get_Local
IEnumerator`1
SqlStatement
ParameterInfo
remoteTasks
m_genitiveAbbreviatedMonthNames
Find
get_NewLine
TryInitDefenders
pLv8pJsxuO
ToInt64
GwWxM
customCultureName
pbLabel
BCryptDecryptDelegate
MessageBoxButton
SK70TJ5gw5
EVm0kV0JEU
CipherMode
System.Windows.Forms
GetAllNetworkInterfaces
GetHexString
DBRfhn M
FileShare
FileDescription
GetEntityCards
GetOffset
m_type
Random
IOrderedEnumerable`1
ToUInt32
{11111-22222-20001-00001}
links
<>c__DisplayClass0_0
stringKey
D7t8rnBNGh
Entity13T
version
https://api.ip.sb/ip
JOoSTcUQYrhd3hbI7F
cstringmstringd
File.Read
7FD227EEE2F38A50CFD286D228B794575C0025FB
set_Id15
Start
set_OpenTimeout
TryGetTasks
RegistryKey
FD4C77C0C4405C6A46E5C3CE53E0AE6BAEE7746D
ksaHv8MJmGrVEfRcuMq
Ynv8vglvZw
IEnumerable`1
Serialize
GetProperty
GetTokens
GetIPProperties
__StaticArrayInitTypeSize=154
GetResponse
LSIDsd2
TryInitProcesses
Handle
LEnvironmentogiEnvironmentn DatEnvironmenta
`=ofz
SJCNFgau1mcC1Wx4KB
Program
__StaticArrayInitTypeSize=28
eNetworkCredentialxpirNetworkCredentialy
NetTcpSecurity
ToDouble
languages
currencyDecimalDigits
System.Globalization
LibPtr
cbSalt
XmlNodeList
get_Unicode
i-{-.
& FRG
oJP8SRFkee
oldChar
qI4cbCC3kcaDQ7cP38
RuntimeCompatibilityAttribute
AuthTagLength
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
pbMacContext
cbInput
browserPaths
<>9__1_0
flProtect
718D1294A5C2D3F3D70E09F2F473155C4F567201
loginPairs
<>9__2_0
TryConfirm
<DomainExists>b__2
eXC8PKN5Gw
OfRPriMmaJtddgP1kJN
Bitmap
u8bl1
GetMd5Hash
gll0AmYYTa
get_Directory
PY08V2MERI
$$method0x600035a-1
monthDayPattern
SOFTWARE\Clients\StartMenuInternet
BCryptGetProperty
TableEntry
get_LibPtr
K1v6Zxx8EGgi3VLo23
ICommunicationObject
Fsl0RG6qjV
get_Result
DownloadAndExecuteUpdate
Object
chromeKey
SecurityMode
set_Id11
dateTimeOffsetPattern
Entity'
get_AllowOnlyFipsAlgorithms
gKp000g6Bc
System.Globalization.TextInfo%System.Globalization.NumberFormatInfo'System.Globalization.DateTimeFormatInfo&System.Globalization.GregorianCalendar
A9BBD7EDD219DE023751096B9380E8A4C1EF797F
Entity7
get_Method
GetGenericArguments
&System.Globalization.GregorianCalendar
RuntimeMethodHandle
$$method0x60005c0-1
GetCurrentProcess
System.Drawing.Drawing2D
__StaticArrayInitTypeSize=256
Entity7T
<AvailableLanguages>b__9_0
Combine
TryInitScannedFiles
m_win32LangID
set_Id2
sdfo8n234
4369729D8B79D0C651E00137A3B22A1A24DEBB4C
System.Drawing.Size
ExpandEnvironmentVariables
progressBar1.Locked
{11111-22222-50001-00002}
SkipVerification
pPaddingInfo
get_CurrentThread
%}S3%
Entity16
Calendar+twoDigitYearMax
BEDDFAEB0360B1694AB8CD2A69986414790A1D9A
Count
Actions
BCryptDestroyKey
BCRYPT_INIT_AUTH_MODE_INFO_VERSION
<os_crypt>k__BackingField
yyyy MMMM
EB14352FBADB40E2FA237D444A6575B918573C43
File.Open
ProductName
AllWallets
get_Id13
<>p__2
Arguments
XmlNode
get_Authentication
cirvDfMhIMZoFX2yMQ2
settings
<>9__0_8
FileSystemInfo
get_IsValueType
Nullable`1
0.0.0.0
WaitForExit
FileVersionInfo
WriteIntPtr
FJKLljVXn5i8Q7GvId
QQp1tlMwm8pqWZmRBj1
@Pm y
String.Remove
allShortTimePatterns
a5qV4V4VO04tb09fTW
System.Reflection
CfF0Vu1jc2
ProcessModuleCollection
K2WE05r7UGCruxpwqO
c1L0ui0mSw
.NETFramework,Version=v4.0
Compare
n>b__0_8
eKJES7WknTpihyBFNt
firstDayOfWeek
fullDateTimePattern
provider
set_SendTimeout
RequestConnection
GetPublicKeyToken
ProcessModule
get_encrypted_key
<.ctor>b__0_0
</requestedPrivileges>
MakeTries
TryInitColdWallets
PropertyInfo
__StaticArrayInitTypeSize=78
X509ServiceCertificateAuthentication
IEnumerable
1076B53156E190E9BCBE281016712F2D3F02D3B4
E63C93C721909983D6276C980CFF923987A4D2AA
get_Chars
Ev+me
IList`1
Xyi010l0nD
System.IO
jnACrMMWMBqHqDljP54
Unprotect
set_CreateNoWindow
set_Id13
UnmanagedFunctionPointerAttribute
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
V6b0g4fO38opQb8IQD
SslPolicyErrors
percentage
fdfg9i3jn4
TryInitTelegramFiles
Ldarg_S
System.Net.Sockets
asdk9y3
get_Item
A8F9B62160DF085B926D5ED70E2B0F6C95A25280
askd435
PixelOffsetMode
PreStageActions
dwMinLength
A8A5F2DC86E781EC7360D1DDBE09F80EEECE48EA
B5TlfpDFPaDncvorqR
IEnumerator
set_PreStageActions
GetField
DomainExists
<Actions>k__BackingField
5VFi1
|
| Type | Unpacked Shellcode |
|---|---|
| Filename |
4f96493ee38f27038427d72151bf83059fa96cfe8f79cdf2c01a6d95e3da1351
|
| File Type | data |
| File Size | 60 bytes |
| Virtual Address | 0x7FE00000 |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | 969c9fd2fcfead07651d87bd0432b234 |
| SHA1 | 3f847f8d1ed039c7296611731551a232c321e834 |
| SHA256 | 4f96493ee38f27038427d72151bf83059fa96cfe8f79cdf2c01a6d95e3da1351 [VT] [MWDB] [Bazaar] |
| SHA3-384 | ceadc72c07de8abb839885451b83bde38026ba4f13079c5d2978847978213cb3f50149da40e35bbb7364b0ac9a68821a |
| CRC32 | 9DA75C34 |
| TLSH | T1AEA002146645D951CC54033247A6BA028315E45A90AE4D612D04A380968605714D7607 |
| Ssdeep | 3:Uaql/stnyzNkbItEUWglXltn:UF/sVyhkbAWgX3n |
| Type | RedLine Payload: 32-bit executable |
|---|---|
| Filename |
c7a71f2c483f21aca2e82c5c385a053ed55b2f302334e3369c4833d58a482bdd
|
| File Type | PE32 executable (GUI) Intel 80386, for MS Windows |
| File Size | 227328 bytes |
| Virtual Address | 0x03E20000 |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | 00fe898e10e9698e058def467b2d3f2d |
| SHA1 | ed4d02ee9c054d7e1afede66994e9e0df50415f5 |
| SHA256 | c7a71f2c483f21aca2e82c5c385a053ed55b2f302334e3369c4833d58a482bdd [VT] [MWDB] [Bazaar] |
| SHA3-384 | 3040566fc2e91cfa372841394d6921837fcd8d7d666985277a0fdb65b805183c53bc2962bbe6642c2f6021f4c8d934aa |
| CRC32 | DCFA5E2F |
| TLSH | T1F824BF2075C1C2B3C4B6117084E6CB759A3A30714B7A96D7BBDD1BBA6F112E163352CE |
| Ssdeep | 3072:gDKW1LgppLRHMY0TBfJvjcTp5X7ECe8UwwuK8h/XQjgIVcXtIEhP:gDKW1Lgbdl0TBBvjc/oh8USKQPQjgQjE |
| CAPE Yara |
|
| PE | Strings |
|
l$8+n
l6qnk
R6032
R6025
GetUserObjectInformationA
wpcN_8
Z<-bH
xe[Tk1
CorExitProcess
OZw3(?
O<C+%
];}D'
V_:X1:
UTF-8
y\ru2
__cdecl
wP#r+
[+)Nw
yk^/-J
Unknown exception
ZsAS&%K
TH{IB
_^][H
?PJzM
T$h9T$
FL9~Xu
- 7Ju
- Attempt to initialize the CRT more than once.
O6w0D
];E "
6p/]NC
/lohOF
91&ga
jQ&JX8V
4KW^0)
R6027
U,ETlc
@N2m)
EncodePointer
(N@^zx
N0WPQ
au(~V
IaJUc
IsDebuggerPresent
Illegal byte sequence
WPWUj
`vector constructor iterator'
9~O^4w
- not enough space for stdio initialization
;5P?B
HeapAlloc
SetLastError
Invalid seek
Q6NcE
HeapSize
RtlUnwind
Operation not permitted
61Gdf
%cx*f
T|eY4IP
kndBtt
H
GAIsProcessorFeaturePresent
7biL
`eh vector constructor iterator'
R6017
`copy constructor closure'
&Y(E5C
B)?]Z
LockResource
cLfylG
/C|A@
zr@8|
Mi0w/]
!dPJO
w)9v!
w/tbd
GetProcAddress
Resource deadlock avoided
|$ WSPV
R6024
PMu#Y/M
w+OQvr
( 8PX
!"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
GetModuleFileNameA
8N-Qh9$Y
mscoree.dll
nmJm9]
L$(+L$
6AEG_
1#SNAN
GetLastActivePopup
KERNEL32.dll
`vector destructor iterator'
R6Z\y
)$p(W
N@QPj
"<F4T
<SUVW
Thursday
`RTTI
TlsAlloc
{OgQ|w
^(9^$u
NHPWj
_F19d
Inappropriate I/O control operation
32z9H
D$3UV
9QfcV
J7}\Rk
SetFilePointer
CompareStringW
S~}#)2
3Vlip
N%qrR4
^SSSSS
`eh vector vbase copy constructor iterator'
hoA (
alE6(
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
, <Xw
September
EZs2K
nYwAaF
delete
+IUJW>"
)yb?7
9=p>B
|hj&u
t"SS9]
?WQ0G
>If90t
v$;540B
}{8).,
^WWWWW
700PP
4''tX
E`AS?
D\9V`-}[
43nKZ
`managed vector copy constructor iterator'
|jD5hD3
P]4d+
|)|Y%
Nl#N4
Exec format error
CONOUT$
uaXP}
DOMAIN error
Bad file descriptor
GetActiveWindow
aCHxM
LoadLibraryA
FindResourceA
9Ghs%
October
OLEAUT32.dll
Translation
Arg list too long
ole32.dll
}zM~J
Microsoft Visual C++ Runtime Library
G]?*r
Q\h}jFp
C?^\xM
=xn[k
~,WPV
R1h58
@PAQBR
~(9~$u
h/}[2
.yw8x3
nDiklo
R6009
('8PW
Y__^[
FreeEnvironmentStringsA
April
1pX5N
VPWUj
December
jcrP5
- unable to open console device
HeapReAlloc
{Syp$_
dxM:.O
Sunday
w<9G,s
ep{IO
zK<y$
FDWWW
gcY{$
ABCDEFGHIJKLMNOPQRSTUVWXYZ
>=Yt1j
This application has requested the Runtime to terminate it in an unusual way.
_7("[
sfa3=%
G(9G,
tr9_ tm9_$th
\7=.OPa6
Vl+Vp
Permission denied
3i%po
3Jm$>^
SetHandleCount
FN(o[
qs^Mv&
f?q%G0
delete[]
e.t#*
`vector copy constructor iterator'
ccAua
Fc[w4
EI,w|S
FlsSetValue
D$ )D$
0"o2-
]%S_ZV
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
CreateToolhelp32Snapshot
R6018
N=GtKDxX
- not enough space for arguments
ux]wO
,:pM?
YNf_q
uTRN_
FLWUP
';D@O
GetLastError
__clrcall
YU<oP
SunMonTueWedThuFriSat
Z)pam%
R6016
-C-4F
O(9O$u
\V+$g
<+t(<-t$:
Broken pipe
xo[qa%
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
Mhr%*
)/+&?tO
VS_VERSION_INFO
]dZTv
dNh4G
Not a directory
(null)
e,}RA
GetStartupInfoA
gm=vt3
tNVSP
lfAy;x
lstrlenA
y}sF,
vm<KApK%r
;l$Ts
5Y`N^r
No such device or address
9S<YN
Friday
-J>LXI
An application has made an attempt to load the C runtime library incorrectly.
March
8X0o(
November
DsU9#2A]
GetSystemTimeAsFileTime
>=upF
^<)g]
q!*M__
- unable to initialize heap
<at9<rt,<wt
5bhm2w
FYb<<
._c7S
GetTickCount
KERNEL32
]8dAw
9]$SS
9=\9B
x\Yy[
@#qlF+
Class Hierarchy Descriptor'
`.rdata
1A26b
YY};d
L#PsO7
-z(/5v
Delete
kqDW3Z
Q,a4C
InternalName
HH:mm:ss
VVVVj
_%m\;Xv
Too many open files in system
c/)t6
GetModuleHandleA
g`l$Z
__unaligned
Monday
CP_^][
=0kY#3,d7
{q"K+
CO6ld
LeaveCriticalSection
`eh vector vbase constructor iterator'
uL9=\9B
Runtime Error!
SetEndOfFile
w#X]y
~<+~t
PPPPP
<program name unknown>
e+000
1\Ke)
`local static guard'
<B-K!
- not enough space for thread data
_IIL_
Y8g6
Qd'W|
x2>!F
$>I>%A
`h`hhh
;Bvr0WIW
Input/output error
?vBg]
- unexpected heap error
Resource temporarily unavailable
No such file or directory
GetStringTypeA
OVtco
X8Ga|]B
}#.cN
Improper link
O,+L$
`vbtable'
;D$8t
USER32.DLL
gRjJX,p
JY-;+
>[ak1
k/KMJ
/AN)UK
`omni callsig'
1#IND
*cfRu
<security>
`string'
R6034
z?aUY
X3OYc^f$
GA'=ti
*'){k
U%+Ul@
)\ZEo^m/
operator
:{A<sh
r0f;p
K@R3o
Dz<#@
$i=jYs
D$Tt*;
?C1Hn
kIw[{
*U[i9
u'zbd
T$<PQR
!This program cannot be run in DOS mode.
+t HHt
Oh;O\sN
OriginalFilename
SZ`bk
SSSSW
GetCommandLineA
u!;\$
*BD#(GwU
Domain error
7y!8c
T$$QUR
KERNEL32.DLL
DecodePointer
&%B&J
GetStdHandle
LLH@;
F\<wu
Q[Y0[
(cTfP@^Ng
`h````
#GfPq
4|j2:q
`virtual displacement map'
-9D5Q
K"L=OI
G|,BG
W/3A.
z7c/!-
.Z|8j
TTl@;
FlsGetValue
This indicates a bug in your application.
t$H;t$8
OGsn08
N]Z38
FileVersion
'x'cI7
Filename too long
7G$K/"h(
j@j ^V
;_H_!6/Y
_4Ha*J
R6026
No error
0WWWWW
WWWWV
</security>
- not enough space for environment
N?opI
@.data
TerminateProcess
< tK<
Visual C++ CRT: Not enough memory to complete call to strerror.
ForceRemove
FlsFree
h(((( H
((((( H
GetConsoleCP
nR]lM
7-lpE
WVV=b
GetEnvironmentStrings
0mf/nA
{-s|L=@
`local vftable'
- CRT not initialized
G8Sry
354"B
HeapCreate
t:<wuE
TYMP.fH'
$!){o
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
DeleteCriticalSection
- floating point support not loaded
OV"$,
WriteConsoleW
Unknown error
VUiCJ@
~2#n~
D$0^][_
SSSSS
Q+S~@`p]
Directory not empty
1#INF
-_9,.
Too many links
~!_A
O@;H(s
4N[iS
~5X>V
~2#i~
L$4;D$Ts<)D$T
0SSSSS
HHtXHHt
9C+Oi
ProductVersion
p<O#|$
*zYm_
CloseHandle
O*9y]
[cuk|
FileDescription
MessageBoxA
n>VPf
WWWWW
`eh vector destructor iterator'
FreeResource
mj>zjZ
SetEnvironmentVariableA
InterlockedIncrement
VirtualAlloc
O@;H s
k@xC$
*mT60
,90>$
t$,PV
.text
No child processes
j"^SSSSS
JanFebMarAprMayJunJulAugSepOctNovDec
u7i+AY
!FH>Ta
m*J3h
__thiscall
^jjI[
1b}}Q_
f]0SV%
pJGac
GetACP
SetStdHandle
cB]jT_
SVWUj
vg`nt
TOpRj
wu.~@X
SING error
-HeSm{
`placement delete[] closure'
Sleep
t{~Bj
k#2[~
\a9e0
WYxXf
;t$,v-
nMST'
a-c_D
G0SRP
abcdefghijklmnopqrstuvwxyz
IiGM>nw
T$LRh
95(6B
V@WQR
L$,uL
78z,3H
^oEZ_
e}B&kj
tGHt.Ht&
Jdt+M>N
SUVW
~Rich,q
N h0%
y/%EH^
Bad address
tB~f*
_w<M
IsValidCodePage
File exists
Vlf+Vd
FreeEnvironmentStringsW
])$AghC
!M*f@
January
Saturday
`vector vbase copy constructor iterator'
TlsGetValue
L$(9ODv
InitializeCriticalSectionAndSpinCount
#vj1*g
V h0%
ANG3B
dr<3)
950>B
`scalar deleting destructor'
__based(
GHtV;
PThIH
'I?+a6
lt=oL
0A@@Ju
95(/B
QSWVj
__ptr64
.?AVbad_alloc@std@@
MGBxtK
~>mW^s
9] SS
VZ3.Z
TlsSetValue
9F sn
*O`]0:
February
Interrupted function call
VirtualFree
No such process
ReadFile
B*uZ3p
@S{w.
GetCurrentThreadId
O0SPQ
\$Dj8
URPQQh
<G9wN
GetOEMCP
MultiByteToWideChar
`LH$j
QueryPerformanceCounter
PPPPPPPP
NJ2"v
B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
UnhandledExceptionFilter
Al9BA
v3Q9;L*
]HJ(lwH
StringFileInfo
Ph4"B
A9{<s
bB(iOL
`vcall'
Type Descriptor'
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
D<Tke
CkYm{
#tZgx
@PWSS
Q2,`[
[=.qw4
Complete Object Locator'
VarFileInfo
vQO+t
ra^.F
J56dc1a>
R6019
No space left on device
LCMapStringW
}$s$/PMR
`dynamic initializer for '
H+(*b
FoGm>
>oQr5*
Invalid argument
!{q;cU*
LoadResource
~\wuJ
(1eF?
gQEF~
fo&&/
Read-only file system
1J8hyE
=V4MC
`);L#
O6Z(X;
td"6hj
700WP
Too many open files
UTF-16LE
Sn7st
R6031
8Xrh%
UNICODE
G`9Gh
OAmG4<
tEHt1
InterlockedDecrement
GetLocaleInfoA
{lEtS
`local static thread guard'
Wednesday
\@|lV
\$(+^
"wJBS
3ex@,|
GetConsoleOutputCP
SmqiN
- not enough space for _onexit/atexit table
mgF2X
- unexpected multithread lock error
[j@j
- Attempt to use MSIL code from this assembly during native code initialization
J;h)a
August
u8SS3
R6028
x)bxF
CreateFileA
FD)np)nl
rZYtm
tSj=V
+AhNws
D$(+D$
t:;L$
GetStringTypeW
s#@c8
N(Uh0%
`typeof'
`managed vector destructor iterator'
qu]/V:8
)5>5D
J4Q7!
Tuesday
}9=E<
'TW%nc
FlsAlloc
|7=(_
_x<hWL
=C/4[
Yz$I1<G0C
OleInitialize
v.\0|__
GetCurrentProcess
C8v`#kE
Vlf+Vp
95L>B
`vector deleting destructor'
QQSV3
^,A}d1&
)Nd)Vh
- not enough space for locale information
! kHQa
D$<RSP
CompareStringA
Not enough space
xppwpp
?~Zvf
;T$$f
'e]M`/
TDgw^
VW|[;
In&B,
/D9>L&
e7Z]U
- pure virtual function call
)Vd)Nh
J$Wd?
R6030
O' ur
9=P?B
a+b~c
xpxxxx
`local vftable constructor closure'
WriteConsoleA
GetEnvironmentStringsW
TlsFree
L$$J#
</trustInfo>
T$HRW
V8WUR
Y_^[]
-C#/.b;
1wsHp
Gh9Ghr
;$}^;bY
!gwf\
T$(;P
hx/T.b
{=nBT
`eh vector copy constructor iterator'
L$PQSV
4eC+-
Assembly Version
N,_^3
~2#{~-q
a'p!U
[-&LMb#{'
^]v'n
- not enough space for lowio initialization
A2:vw
Kz.c^
Program:
SizeofResource
<=,;"AZ
Is a directory
oF|bI-
|$Dj8
~%%La
9n!y:8t]
U y&3gab
8{x4b
`vector vbase constructor iterator'
PkqVL
~\ruK
yivC@
"2O8w
\Dk'>
si&+Y
u";T$
N&4@w
-lD()
P+w}kB-9!
/fci`6tUgmG
|6e8@t
s`qc-8)"n{\
xXqs/
D$@QP
0.0.0.0
8;Fi[t
wIVSP
9n4u'
]pz*l4
;l$TsY)l$T
6WJmR
Base Class Array'
T{k/Ki
^%e/*:
1.2.3
Function not implemented
\;HTg
GetProcessHeap
THZ?Y
02Yh.6
;f_S?
~0]Bm
NoRemove
t.9Vlt)
WriteFile
N]ABy
`default constructor closure'
~\wu(j
EnterCriticalSection
8RdEZV
.?AVtype_info@@
000004b0
=$6}J
;FLuK
H*0"ZOW
RKD[-
Resource device
__pascal
FlushFileBuffers
D$$)G@
#bML"
t+WWVPV
r0f;H
wn>Jj
dddd, MMMM dd, yyyy
+T$TN
`placement delete closure'
V1S)S
aOj$u3
;58-B
GetCPInfo
[xdAT
z&ydQ
:2pf;C
1#QNAN
XE/*b
`vbase destructor'
</requestedPrivileges>
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
.rsrc
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
Module32First
@@7f!
fN@%V
Q0Own
bM@k_
.?AV_com_error@@
cjGK>I
LegalCopyright
Please contact the application's support team for more information.
wT=X[F
`udt returning'
t%HHt
__fastcall
GetModuleHandleW
GetFileType
T~z5uQ
EL*#O8C
E'#TI
@Y@PW
No locks available
__restrict
3&0z 8F
Z|`!d"g
c}5UH
;0[AfN
-*Fz1
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
hC9AL
*ItnI
Bt\%;
GetProcessWindowStation
HHty+
8VVVVV
x<_^]
bad allocation
SUVW3
R6008
5OjwZG
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
GetCurrentProcessId
baf]\
zc%C1
$^+C5
Result too large
gbJR<
Y"?KO5
SetUnhandledExceptionFilter
NPMP2
GetConsoleMode
L$ H#
t*9Qlu%
No such device
LCMapStringA
^_C%)
GHtR;
Plywoods.exe
UQPXY]Y[
dmO[u
{H/g;
HeapFree
D$HUWP
ewh/?y
RaiseException
K3kk~
@]?yl
Qkkbal
R6033
`dynamic atexit destructor for '
MM/dd/yy
Module32Next
VVVVV
Base Class Descriptor at (
File too large
-64OS
uKDHP
`s<=A
`managed vector constructor iterator'
A0SUP
V0WQR
_VVVVV
new[]
R6002
k:a("
Jgp!1
runtime error
#+3;CScs
TLOSS error
Wt9T$
tVHtG
*2ljIg
P#haH
zr]??
ExitProcess
`vftable'
__stdcall
.?AVexception@std@@
z{oYf
{h*+Z
WideCharToMultiByte
%+!^%Z;
]X\^/|%
zx[wd
|
| Type | Unpacked Shellcode |
|---|---|
| Filename |
e963a3eca0d42e4ae2e03b27f2fae7684a7b85a9d448074fef71f4e7c55a0e62
|
| File Type | data |
| File Size | 5665 bytes |
| Virtual Address | 0x03FA0000 |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | 0549861ceb86d0f089e70a30e72d810c |
| SHA1 | aead0cd5809365e64450a0d99ae5801eb5b5caf5 |
| SHA256 | e963a3eca0d42e4ae2e03b27f2fae7684a7b85a9d448074fef71f4e7c55a0e62 [VT] [MWDB] [Bazaar] |
| SHA3-384 | cb7b43b405e142a411e259236526acdf1b67cb1ef8b73b5a5ff83c5d9053a60af064dda695cc00f16092c13965ecb4bf |
| CRC32 | 276D3C3D |
| TLSH | T1ECC12235837B4FE7C147FA744E258D8BD50823A1027665EFA8B80CDC481EA5E53BA3D8 |
| Ssdeep | 96:IHP1/+MhHBGcOwDpl3jI8gwDpl3jI8fmTjbnUQnnn1c77QMHjR7ZW7L/anFbW/Ev:6PdjBGUpljnpljbmjn1c77Hy7LanFbJv |
| Strings | |
|
|q8c|q
Pi|q\i|qP
a|qPe|q
`g|qlg|q)
la|qxa|q
Hh|qTh|q<
@c|qHc|q>
h|qXc|qA
`a|qla|q
Dl|qTl|q
li|qxi|qR
j|q,j|qg
Dk|qPk|q
lg|qxg|q*
Th|q`h|q=
b|q(b|q
pf|q|f|q
@b|qLb|q
h|q$h|q8
\i|qli|qQ
\m|qhm|q
k|q(k|q
4l|qDl|q
i|q d|qa
Pm|q\m|q
,n|q8n|q
a|q8d|q
8j|qDj|qi
,f|qXf|q
lb|qtb|q&
`k|qlk|q
4m|qPm|q
$c|q@c|q=
c|q$c|q<
8e|qDe|q
g|q,g|q$
c|q8c|q
Xc|q`c|qB
a|qHa|q
$h|q0h|q9
j|q j|qf
hj|qtj|qm
(a|q0a|q
h|q,c|qF
,j|q8j|qh
dl|qpl|q
Hd|qPd|q
Xd|q`d|q#
d|q,d|qb
`h|qlh|q>
0h|q<h|q:
Ha|qTa|q
j|qhd|qt
(m|q4m|q
f|q,f|q
tb|q|b|q'
Tg|q`g|q(
Hc|qPc|q?
lk|qxk|q
l|q$l|q
pl|q|l|q
0a|qx
g|q g|q#
i|q(i|qL
a|q(a|q
a|qXd|q"
Xf|qdf|q
Dg|qTg|q'
c|q8e|q
d|q,n|q
df|qpf|q
hm|qtm|q
\j|qhj|ql
(b|q4b|q
8d|q@d|q
8c|qHd|q
<h|qHh|q;
`d|qdb|q$
lh|qxh|q?
Di|qL
j|qtd|qw
(i|qDi|qM
,g|q8g|q%
`c|qhc|qC
Dj|qPj|qj
Tl|qdl|q
d|qpc|qE
8g|qDg|q&
4b|q@b|q
8n|qDn|q
Pe|q|e|q
Pj|q\j|qk
fqPi|qO
db|qlb|q%
8k|qDk|q
m|q(m|q
d|q8k|q
Ta|q`a|q
e|q e|q
d|qPn|q
Lb|qXb|q
pc|qxc|qF
!{q e|q
$l|q4l|q
Pk|q`k|q
|
| Type | unknown |
|---|---|
| Filename |
84e716e130482df7e33f810b024885c44ad380c3cafc21c691c625a44f214298
|
| File Type | DOS executable (COM), start instruction 0xeb03c20c 00558bec |
| File Size | 230992 bytes |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | ff7363c645255246397ee134aa0f0d87 |
| SHA1 | 76380491487ab7d03dc584219c2efd2b429a08eb |
| SHA256 | 84e716e130482df7e33f810b024885c44ad380c3cafc21c691c625a44f214298 [VT] [MWDB] [Bazaar] |
| SHA3-384 | 9a0673ac54800942b8929a26b23ef3258942212771db2fd326419cb35fdcffb7b5c5d218579ae529e6a03f4dabee7a27 |
| CRC32 | FABEF1AC |
| TLSH | T11C34CF2471C0C2B3C8B6117084E6CB769A7A34714B7A95D7BBDD1BBA5F203E163352CA |
| Ssdeep | 3072:xDKW1LgppLRHMY0TBfJvjcTp5X7ECe8UwwuK8h/XQjgIVcXtIEhP:xDKW1Lgbdl0TBBvjc/oh8USKQPQjgQjE |
| Strings | |
|
l$8+n
l6qnk
R6032
R6025
GetUserObjectInformationA
wpcN_8
Z<-bH
xe[Tk1
CorExitProcess
OZw3(?
O<C+%
];}D'
V_:X1:
UTF-8
y\ru2
__cdecl
wP#r+
[+)Nw
yk^/-J
Unknown exception
ZsAS&%K
TH{IB
_^][H
?PJzM
T$h9T$
FL9~Xu
- 7Ju
- Attempt to initialize the CRT more than once.
O6w0D
];E "
6p/]NC
/lohOF
91&ga
jQ&JX8V
4KW^0)
R6027
U,ETlc
@N2m)
EncodePointer
(N@^zx
N0WPQ
au(~V
IaJUc
IsDebuggerPresent
Illegal byte sequence
WPWUj
`vector constructor iterator'
9~O^4w
- not enough space for stdio initialization
;5P?B
HeapAlloc
SetLastError
Invalid seek
Q6NcE
HeapSize
RtlUnwind
Operation not permitted
61Gdf
%cx*f
T|eY4IP
kndBtt
H
GAIsProcessorFeaturePresent
7biL
`eh vector constructor iterator'
R6017
`copy constructor closure'
&Y(E5C
B)?]Z
LockResource
cLfylG
/C|A@
zr@8|
Mi0w/]
!dPJO
w)9v!
w/tbd
GetProcAddress
Resource deadlock avoided
|$ WSPV
R6024
PMu#Y/M
w+OQvr
( 8PX
!"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
GetModuleFileNameA
8N-Qh9$Y
mscoree.dll
nmJm9]
L$(+L$
6AEG_
1#SNAN
GetLastActivePopup
KERNEL32.dll
`vector destructor iterator'
R6Z\y
)$p(W
N@QPj
"<F4T
<SUVW
Thursday
`RTTI
TlsAlloc
{OgQ|w
^(9^$u
NHPWj
_F19d
Inappropriate I/O control operation
32z9H
D$3UV
9QfcV
J7}\Rk
SetFilePointer
CompareStringW
S~}#)2
3Vlip
N%qrR4
^SSSSS
`eh vector vbase copy constructor iterator'
hoA (
alE6(
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
, <Xw
September
EZs2K
nYwAaF
delete
+IUJW>"
)yb?7
9=p>B
|hj&u
t"SS9]
?WQ0G
>If90t
v$;540B
}{8).,
^WWWWW
700PP
4''tX
E`AS?
D\9V`-}[
43nKZ
`managed vector copy constructor iterator'
|jD5hD3
P]4d+
|)|Y%
Nl#N4
Exec format error
CONOUT$
uaXP}
DOMAIN error
Bad file descriptor
GetActiveWindow
aCHxM
LoadLibraryA
FindResourceA
9Ghs%
October
OLEAUT32.dll
Translation
Arg list too long
ole32.dll
}zM~J
Microsoft Visual C++ Runtime Library
G]?*r
Q\h}jFp
C?^\xM
=xn[k
~,WPV
R1h58
@PAQBR
~(9~$u
h/}[2
.yw8x3
nDiklo
R6009
('8PW
Y__^[
FreeEnvironmentStringsA
April
1pX5N
VPWUj
December
jcrP5
- unable to open console device
HeapReAlloc
{Syp$_
dxM:.O
Sunday
w<9G,s
ep{IO
zK<y$
FDWWW
gcY{$
ABCDEFGHIJKLMNOPQRSTUVWXYZ
>=Yt1j
This application has requested the Runtime to terminate it in an unusual way.
_7("[
sfa3=%
G(9G,
tr9_ tm9_$th
\7=.OPa6
Vl+Vp
Permission denied
3i%po
3Jm$>^
SetHandleCount
FN(o[
qs^Mv&
f?q%G0
delete[]
e.t#*
`vector copy constructor iterator'
ccAua
Fc[w4
EI,w|S
FlsSetValue
D$ )D$
0"o2-
]%S_ZV
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
CreateToolhelp32Snapshot
R6018
N=GtKDxX
- not enough space for arguments
ux]wO
,:pM?
YNf_q
uTRN_
FLWUP
';D@O
GetLastError
__clrcall
YU<oP
SunMonTueWedThuFriSat
Z)pam%
R6016
-C-4F
O(9O$u
\V+$g
<+t(<-t$:
Broken pipe
xo[qa%
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
Mhr%*
)/+&?tO
VS_VERSION_INFO
]dZTv
dNh4G
Not a directory
(null)
e,}RA
GetStartupInfoA
gm=vt3
tNVSP
lfAy;x
lstrlenA
y}sF,
vm<KApK%r
;l$Ts
5Y`N^r
No such device or address
9S<YN
Friday
-J>LXI
An application has made an attempt to load the C runtime library incorrectly.
March
8X0o(
November
DsU9#2A]
GetSystemTimeAsFileTime
>=upF
^<)g]
q!*M__
- unable to initialize heap
<at9<rt,<wt
5bhm2w
FYb<<
._c7S
GetTickCount
KERNEL32
]8dAw
9]$SS
9=\9B
x\Yy[
@#qlF+
Class Hierarchy Descriptor'
`.rdata
1A26b
YY};d
L#PsO7
-z(/5v
Delete
kqDW3Z
Q,a4C
InternalName
HH:mm:ss
VVVVj
_%m\;Xv
Too many open files in system
c/)t6
GetModuleHandleA
g`l$Z
__unaligned
Monday
CP_^][
=0kY#3,d7
{q"K+
CO6ld
LeaveCriticalSection
`eh vector vbase constructor iterator'
uL9=\9B
Runtime Error!
SetEndOfFile
w#X]y
~<+~t
PPPPP
<program name unknown>
e+000
1\Ke)
`local static guard'
<B-K!
- not enough space for thread data
_IIL_
Y8g6
Qd'W|
x2>!F
$>I>%A
`h`hhh
;Bvr0WIW
Input/output error
?vBg]
- unexpected heap error
Resource temporarily unavailable
No such file or directory
GetStringTypeA
OVtco
X8Ga|]B
}#.cN
Improper link
O,+L$
`vbtable'
;D$8t
USER32.DLL
gRjJX,p
JY-;+
>[ak1
k/KMJ
/AN)UK
`omni callsig'
1#IND
*cfRu
<security>
`string'
R6034
z?aUY
X3OYc^f$
GA'=ti
*'){k
U%+Ul@
)\ZEo^m/
operator
:{A<sh
r0f;p
K@R3o
Dz<#@
$i=jYs
D$Tt*;
?C1Hn
kIw[{
*U[i9
u'zbd
T$<PQR
!This program cannot be run in DOS mode.
+t HHt
Oh;O\sN
OriginalFilename
SZ`bk
SSSSW
GetCommandLineA
u!;\$
*BD#(GwU
Domain error
7y!8c
T$$QUR
KERNEL32.DLL
DecodePointer
&%B&J
GetStdHandle
LLH@;
F\<wu
Q[Y0[
(cTfP@^Ng
`h````
#GfPq
4|j2:q
`virtual displacement map'
-9D5Q
K"L=OI
G|,BG
W/3A.
z7c/!-
.Z|8j
TTl@;
FlsGetValue
This indicates a bug in your application.
t$H;t$8
OGsn08
N]Z38
FileVersion
'x'cI7
Filename too long
7G$K/"h(
j@j ^V
;_H_!6/Y
_4Ha*J
R6026
No error
0WWWWW
WWWWV
</security>
- not enough space for environment
N?opI
@.data
TerminateProcess
< tK<
Visual C++ CRT: Not enough memory to complete call to strerror.
ForceRemove
FlsFree
h(((( H
((((( H
GetConsoleCP
nR]lM
7-lpE
WVV=b
GetEnvironmentStrings
0mf/nA
{-s|L=@
`local vftable'
- CRT not initialized
G8Sry
354"B
HeapCreate
t:<wuE
TYMP.fH'
$!){o
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
DeleteCriticalSection
- floating point support not loaded
OV"$,
WriteConsoleW
Unknown error
VUiCJ@
~2#n~
D$0^][_
SSSSS
Q+S~@`p]
Directory not empty
1#INF
-_9,.
Too many links
~!_A
O@;H(s
4N[iS
~5X>V
~2#i~
L$4;D$Ts<)D$T
0SSSSS
HHtXHHt
9C+Oi
ProductVersion
p<O#|$
*zYm_
CloseHandle
O*9y]
[cuk|
FileDescription
MessageBoxA
n>VPf
WWWWW
`eh vector destructor iterator'
FreeResource
mj>zjZ
SetEnvironmentVariableA
InterlockedIncrement
VirtualAlloc
O@;H s
k@xC$
*mT60
,90>$
t$,PV
.text
No child processes
j"^SSSSS
JanFebMarAprMayJunJulAugSepOctNovDec
u7i+AY
!FH>Ta
m*J3h
__thiscall
^jjI[
1b}}Q_
f]0SV%
pJGac
GetACP
SetStdHandle
cB]jT_
SVWUj
vg`nt
TOpRj
wu.~@X
SING error
-HeSm{
`placement delete[] closure'
Sleep
t{~Bj
k#2[~
\a9e0
WYxXf
;t$,v-
nMST'
a-c_D
G0SRP
abcdefghijklmnopqrstuvwxyz
IiGM>nw
T$LRh
95(6B
V@WQR
L$,uL
78z,3H
^oEZ_
e}B&kj
tGHt.Ht&
Jdt+M>N
SUVW
~Rich,q
N h0%
y/%EH^
Bad address
tB~f*
_w<M
IsValidCodePage
File exists
Vlf+Vd
FreeEnvironmentStringsW
])$AghC
!M*f@
January
Saturday
`vector vbase copy constructor iterator'
TlsGetValue
L$(9ODv
InitializeCriticalSectionAndSpinCount
#vj1*g
V h0%
ANG3B
dr<3)
950>B
`scalar deleting destructor'
__based(
GHtV;
PThIH
'I?+a6
lt=oL
0A@@Ju
95(/B
QSWVj
__ptr64
.?AVbad_alloc@std@@
MGBxtK
~>mW^s
9] SS
VZ3.Z
TlsSetValue
9F sn
*O`]0:
February
Interrupted function call
VirtualFree
No such process
ReadFile
B*uZ3p
@S{w.
GetCurrentThreadId
O0SPQ
\$Dj8
URPQQh
<G9wN
GetOEMCP
MultiByteToWideChar
`LH$j
QueryPerformanceCounter
PPPPPPPP
NJ2"v
B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
UnhandledExceptionFilter
Al9BA
v3Q9;L*
]HJ(lwH
StringFileInfo
Ph4"B
A9{<s
bB(iOL
`vcall'
Type Descriptor'
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
D<Tke
CkYm{
#tZgx
@PWSS
Q2,`[
[=.qw4
Complete Object Locator'
VarFileInfo
vQO+t
ra^.F
J56dc1a>
R6019
No space left on device
LCMapStringW
}$s$/PMR
`dynamic initializer for '
H+(*b
FoGm>
>oQr5*
Invalid argument
!{q;cU*
LoadResource
~\wuJ
(1eF?
gQEF~
fo&&/
Read-only file system
1J8hyE
=V4MC
`);L#
O6Z(X;
td"6hj
700WP
Too many open files
UTF-16LE
Sn7st
R6031
8Xrh%
UNICODE
G`9Gh
OAmG4<
tEHt1
InterlockedDecrement
GetLocaleInfoA
{lEtS
`local static thread guard'
Wednesday
\@|lV
\$(+^
"wJBS
3ex@,|
GetConsoleOutputCP
SmqiN
- not enough space for _onexit/atexit table
mgF2X
- unexpected multithread lock error
[j@j
- Attempt to use MSIL code from this assembly during native code initialization
J;h)a
August
u8SS3
R6028
x)bxF
CreateFileA
FD)np)nl
rZYtm
tSj=V
+AhNws
D$(+D$
t:;L$
GetStringTypeW
s#@c8
N(Uh0%
`typeof'
`managed vector destructor iterator'
qu]/V:8
)5>5D
J4Q7!
Tuesday
}9=E<
'TW%nc
FlsAlloc
|7=(_
_x<hWL
=C/4[
Yz$I1<G0C
OleInitialize
v.\0|__
GetCurrentProcess
C8v`#kE
Vlf+Vp
95L>B
`vector deleting destructor'
QQSV3
^,A}d1&
)Nd)Vh
- not enough space for locale information
! kHQa
D$<RSP
CompareStringA
Not enough space
xppwpp
?~Zvf
;T$$f
'e]M`/
TDgw^
VW|[;
In&B,
/D9>L&
e7Z]U
- pure virtual function call
)Vd)Nh
J$Wd?
R6030
O' ur
9=P?B
a+b~c
xpxxxx
`local vftable constructor closure'
WriteConsoleA
GetEnvironmentStringsW
TlsFree
L$$J#
</trustInfo>
T$HRW
V8WUR
Y_^[]
-C#/.b;
1wsHp
Gh9Ghr
;$}^;bY
!gwf\
T$(;P
hx/T.b
{=nBT
`eh vector copy constructor iterator'
L$PQSV
4eC+-
Assembly Version
N,_^3
~2#{~-q
a'p!U
[-&LMb#{'
^]v'n
- not enough space for lowio initialization
A2:vw
Kz.c^
Program:
SizeofResource
<=,;"AZ
Is a directory
oF|bI-
|$Dj8
~%%La
9n!y:8t]
U y&3gab
8{x4b
`vector vbase constructor iterator'
PkqVL
~\ruK
yivC@
"2O8w
\Dk'>
si&+Y
u";T$
N&4@w
-lD()
P+w}kB-9!
/fci`6tUgmG
|6e8@t
s`qc-8)"n{\
xXqs/
D$@QP
0.0.0.0
8;Fi[t
wIVSP
9n4u'
]pz*l4
;l$TsY)l$T
6WJmR
Base Class Array'
T{k/Ki
^%e/*:
1.2.3
Function not implemented
\;HTg
GetProcessHeap
THZ?Y
02Yh.6
;f_S?
~0]Bm
NoRemove
t.9Vlt)
WriteFile
N]ABy
`default constructor closure'
~\wu(j
EnterCriticalSection
8RdEZV
.?AVtype_info@@
000004b0
=$6}J
;FLuK
H*0"ZOW
RKD[-
Resource device
__pascal
FlushFileBuffers
D$$)G@
#bML"
t+WWVPV
r0f;H
wn>Jj
dddd, MMMM dd, yyyy
+T$TN
`placement delete closure'
V1S)S
aOj$u3
;58-B
GetCPInfo
[xdAT
z&ydQ
:2pf;C
1#QNAN
XE/*b
`vbase destructor'
</requestedPrivileges>
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
.rsrc
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
Module32First
@@7f!
fN@%V
Q0Own
bM@k_
.?AV_com_error@@
cjGK>I
LegalCopyright
Please contact the application's support team for more information.
wT=X[F
`udt returning'
t%HHt
__fastcall
GetModuleHandleW
GetFileType
T~z5uQ
EL*#O8C
E'#TI
@Y@PW
No locks available
__restrict
3&0z 8F
Z|`!d"g
c}5UH
;0[AfN
-*Fz1
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
hC9AL
*ItnI
Bt\%;
GetProcessWindowStation
HHty+
8VVVVV
x<_^]
bad allocation
SUVW3
R6008
5OjwZG
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
GetCurrentProcessId
baf]\
zc%C1
$^+C5
Result too large
gbJR<
Y"?KO5
SetUnhandledExceptionFilter
NPMP2
GetConsoleMode
L$ H#
t*9Qlu%
No such device
LCMapStringA
^_C%)
GHtR;
Plywoods.exe
UQPXY]Y[
dmO[u
{H/g;
HeapFree
D$HUWP
ewh/?y
RaiseException
K3kk~
@]?yl
Qkkbal
R6033
`dynamic atexit destructor for '
MM/dd/yy
Module32Next
VVVVV
Base Class Descriptor at (
File too large
-64OS
uKDHP
`s<=A
`managed vector constructor iterator'
A0SUP
V0WQR
_VVVVV
new[]
R6002
k:a("
Jgp!1
runtime error
#+3;CScs
TLOSS error
Wt9T$
tVHtG
*2ljIg
P#haH
zr]??
ExitProcess
`vftable'
__stdcall
.?AVexception@std@@
z{oYf
{h*+Z
WideCharToMultiByte
%+!^%Z;
]X\^/|%
zx[wd
|
| Type | Unpacked Shellcode |
|---|---|
| Filename |
3193f95835b02b24e4d6a1cc2fa765d51776121795329a15a0a66a47ff829032
|
| File Type | DOS executable (COM), start instruction 0xb8d57205 63e10001 |
| File Size | 360447 bytes |
| Virtual Address | 0x02270000 |
| Process | 3ea19538971898322afc.exe |
| PID | 6440 |
| Path | C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe |
| MD5 | 4e61429d4b028bc4aeb6cac392e3bce1 |
| SHA1 | 3a496565ee8e6bf00675d1ed31dd59db88f0d2e3 |
| SHA256 | 3193f95835b02b24e4d6a1cc2fa765d51776121795329a15a0a66a47ff829032 [VT] [MWDB] [Bazaar] |
| SHA3-384 | ec3411ce1979d8a52b66772b85ab5a6cb7974197dc89cfb76663cc9846646e3497631ceca1e01c0bb2c2649dce04a1e8 |
| CRC32 | B0A9A1CF |
| TLSH | T1CA749D017BC4C115EAB65AB5ADD7D59C3932BC268D12C70F7094A3BE2DFA36A6C32710 |
| Ssdeep | 6144:KBSFiheoIW+Gd/Wdbfzyr042K1Zataoz4RI8ppI:KBSiheo1+AWJzyr042ztl4RfPI |
| Strings | |
|
2m[4)
43N8
->SA?t
M)m,^]U
ktxa'
T#!aY
wbZ^hs
Dv~<fm
XAS,+|
LpLF&
Xw+\mx
C:\tmphqm3e63s\data\yara\XWorm.yar
X[uZl
A<`~!
;C:\Users\raciu\AppData\Local\Progra
USERDOMAIN=DE!
_wCcf
qDc9N{
MP!$B
es-MX
)avvQ"PW
?sMjk
SORS=2
f[<hP}
Gjv(8%(q
WLDIl
MYlX`bO
~Ik lm
a$b5aM
#Bg9mP
?j]7,s
e$xq|
uhv++
;CD*T9Se
en-AU
strictcfg
IToTC
prefersystem32
.nA-L
_;gQw
$T\w
5np^
Vhy%Y|Z
.!Pdo
vIKt~
LV)L'
mk;o(
}(%GqfSQ
PROCESSOR_ARCHITEW6432=AMD64
+Bn'!
)W5+N
$0<;r
1tsy*~?
:+|&;
"_|FhW
5amve"
0[it(c'
OScT\\B
K3i`/
}LMcX
EitP}Fw
R_pv>
R6oC<
0O!?]
PUBLIC=C:\Users\Public
])c\1
6jZQ8M
3D(:6
j15%s
69%p8
}2'Io}
{(66 3B|3A) ?? 74 [1-14] BB 69 04 00 00 53 E0 [5-20] 74}
_6t)<
C:\Windows\SYSTEM32\CRYPTBASE.DLL
k-h>n
ta\Local\Temp
+$=p_d
gC+9r
pData\Local\Prog
vE+AdK
hell\v1.0\Module
%1AnO
BY?mq
RcJ#:
x?koS
spcIndirectData
eC!dR&
S-1-15-3-3215430884-1339816292-89257616-1145831019
KuM?o
{49 89 C3 B0 [4] E8 [3] 00}
Hb]o$
:3%n'H
<%qP>,]r
jsbs,[m
yFlZLZ
SPcp\D
;!^]7
fy-NL
f-interest=C:\Users\racid*)
.o@dsx
D]n\h
o*RT\
\??\C:\tmphqm3e63s\data\yara\BumbleBee.yar
MSVCRT.dll
~PB7C
!ht0a'
MSVCRT20.dll
J gkB
+9|0%
pN>qy
msvcrt.dll
ProgramW6432=C:\Program Files
lv-LV
allownonexportedcalltargets
U4M2w
.epiX
C:\Users\raciu\AppData\Local\Temp\
nb-NO
\Device\HarddiskVolume2.
HOMEPATH=\User
OS=Windows_NT
OLE32.dll
C:\Windows\System32\msvcp_win.dll
h2&uX?q
a:RCE
\l#mW
8;'Qj
_TiP<UP
X$D^i
YD_nQ
ropsimexec
blocklowlabelimageloads
B3]g$8
{48 8B 4C 24 ?? E8 [4] 84 C0 B8 [4] 41 0F 45 C6 EB}
MIX}Y
8FZ%t
x0OgDF
{FF 34 08 [0-360] 8F 04 0B [0-360] 83 F9 18 [0-460] FF E3}
1-16] E9
xmc"[S
`tA>[
2\Drivers\DriverData
6!6$e:
bA"F-
W$@$C
Iw.6h
no>b+"U
spcMsCountersignature
E2 Uh$)
C:\Windows\SYSTEM32\ntdll.dll
{8B 01 8B 40 3C FF 50 10 8B C8 E8 [4] 89 45 CC B8 1A 00 00 00}
&xYzs
^Z 2TuC
hu-HU
aL>{8+
H!^ yR5V
:F0#J
L!"]|
"DI\J}q
C:\Windows\SYSTEM32\sechost.dll
gjksk]
aIl[7
Tco@<
h&--O:
0}<)<
tGPwtGPw
SERPROFILE=C:\Us
/EX6 Y
\Dg)0
C:\Windows\Temp\AslLog_ShimDebugLog_3ea19538971898322afc.exe_6440.txt
?@n<&
qps-Latn-x-sh
ng)MV
)^ME%
t^4 JOZrxzt
2n, 9
ar-SA
SKTOP-0KEHDCV
PROCESSOR_LEVEL=25
nl-BE
{68 [4] E8 [4] E8 [4] C2 ?? 00 CC CC CC CC CC CC CC CC}
kt(`'
E>TBA26'o`
000}\
@E+\2M
O!A\4
S_69d
n^>Q[
</MATCHED_ENTRIES>
spcSpOpusInfo
2Z_K)A
allowstoresignedbinaries
pHg>>]
;t&Fd
'5Xam
}VzPa
FWCWSP.dll
qps-plocm
C:\Windows\System32\bcrypt.dll
{81 C6 00 10 00 00 [0-88] 81 FE 00 F0 [2] 0F 84 [2] 00 00}
dI,{&
$!?Tc
|T[v`
DitPb'
USERNAME=raciu
.VBE;.JS;.JSE;.WSF;.WSH;.MSC
Xnv#^2
ath=C:\Windows\system32;C:\Windo
C:\tmphqm3e63s\data\yara\QakBot.yar
C:\tmphqm3e63s\data\yara\RdtscpAntiVM.yar
6{nu>
aDDf;3
1:bFP
$@Chw
)%52F
~pzR_QK
OLEAUT32.dll
O`^N"]
requirerelocationinformation
0] FF E3
}Ja$a
;TllC.L
#??!y
ProgramFiles=C:\Program Files (x86)
C:\Windows\SYSTEM32;C:\Windows\system;C:\Windows;
ole32.dll
+M_XW
ZutK)
P}Fw8b'
\??\PIPE\LeIROOy
rI&$X
}i%JeR
r+gik
loaderintegritycontinuity
C:\tmphqm3e63s\data\yara\Rhadamanthys.yar
*1k)|
#uxEB
1z[!n
:\Users\raciu\AppData\Roaming
2IaL;
C:\Windows\System32\ucrtbase.dll
importaddressfilter
,t0YR
@5ft<3ft
A9%w~*%
T)V`s
QTIM32.DLL
NT AUTHORITY\SYSTEM
LS[REHG-
$<&+~
BD.@g"
?D,=w
KRrZ1/8Y
SPC_MICROSOFT_COUNTERSIGNATURE
MFC42D.DLL
0\Pw0\Pws
%Qa&LNH|"
C:\Windows\System32\RPCRT4.dll
s43dQ
L5ftD4ftPait
VWWmB
>9IXG
5 Model 97 Stepping 2, AuthenticAMD
@5ftt3ftP_it
6kVfp
.q&Z!
yZkc.#
\??\C:\tmphqm3e63s\data\yara\Zloader.yar
V0_^[
Uy/SZ
)ZuEO=6
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DDRAW.DLL
gm/dM
ET\4Nu
{0F 31 89 45 ?? 6A 00 8D 45 ?? 8B CB 50 E8 [4] 0F 31}
(5=I!H
ozDY}
7vzp:
u9u],
uQA5MH
EG:TB
WCD)@
Path=C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\Scripts\;C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\
>glUC
en-SG
C:\Windows\System32\ole32.dll
SystemRoot=C:\Windows
d):h%W
tWg<"
ogpmr
DNmjW
a1PZ
C"@>\[0
>.vj(
9p)[V.
XEj%K<!
C:\tmphqm3e63s\dll\NzzsixO.dll
vaOfx
a+Q$K
F#c>i
u1.3.14.3.2.7
V45QP
1:PFb
Jdk]M,,28
.5y}n
>m$)_P%
xv`ol
browser
eHTv*I
_ROAMINGPROFILE=
[Pw>C
XpaB0
2xE,
1'}/\
B '\xn
S+VXE
Js-,R
!n->t)r
3VEE
VRt~|O
?Hce9
ja-JP
ditHa'
D0'p%
enforcesigninglevelfordependentmodules
>yofA
BSO@t
*S_so_'
(ffZ!
k?K4[
wpfredwnd_v0400.dll
devicecapabilitycamera
32\WindowsPowerShell
$Z9}#
c\TS9
1g7us
9xE1C
*,AX6
f-kr3T
:muY~
7_P]6)
VY*;tq
E)c\<
.v`,>
eK[hWlB
GlMk|
^JnDh
u\AppData\Local\
F\,oe
*x;vMiDS
dL+kQ<
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
]PiE
ok!uo
jMT{f
e0
Y6Xif
winsta0\default
hitpv
8MftTMft`Mmt
t x!Bsp
/Rv3g
}];:O
H\)Vb%
*C+55uAp
onlyallowmicrosoftsignedbinaries
G,E;}
@5ftl3ft
USERD
q/U%]
js|{A<Tta
Xz@q:
bS2q!p
en-NZ
standardprotections
=@j?<Z
%N%@8
A_>UY
lsasspirpc
Ru4#Yu
NT Authority\NetworkService
\CNf
C]LjnZ
m^f?
(a+*~Ux
ge@2\
HOMEDRIVE=C:
C:\Windows\System32\ADVAPI32.dll
L`|+!
Qc*2H?
PROCESSOR_ARCHITECTURE=x86
!!W+1
3Us<jh
!8B*f
sJ|Dfu
it-IT
OpenSSH\;C:\User
n54$i
s\system32\Windo
kw+i
[PwPzV
mGJs[
C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe
\hq]Os
{8B ?? 24 [1-4] 33 C8 8B C1 48 63 4C 24 ?? 48 8B 94 24 [4] 88 04 0A}
Ri@ ,r
th-TH
CV`bf
`ob"n
Consumer=C:\Users\raciu\OneDrive
d<38w>+
-A:Fd
9Dsn
exportaddressfilter
L5ftT3ft`Dit
dEEwvRz
@5ftd3ft
cs-CZ
E}/9tE
wjK!;
Apphelp
^rito
E V9L
/ |28
VD85}
1{rY.
T9{G^|y
.m2U3RSZ
eTE#e
c*Y N
c:\windows\system32\kernel32.dll
u|Nml~
NT AUTHORITY\LOCAL SERVICE
IAcjm
yBCtq
MFCD42D.DLL
SspiCli.dll
MFC42.dll
4ft0Dit
COMPUTERNAME=DESKTOP-0
3VvE~
vp8T1L
,U8c.
)Nwi$
jkR'2
",qHxD
M"s ~
?eUy2
l5s3A
nl-NL
gg>yW
-oY-+'
gTEKHx
@aGM<G
bg-BG
l&]no
3ft `it
ropgadgetdetection
],&#*C
R!@[D~
i#1j>
Y=:&5
cwcNJ}g
W0An?9
{48 8B 17 48 85 D2 0F 85 [2] 00 00 8B 47 08 85 C0 0F 85 [2] 00 00}
C:\Windows\SYSTEM32\MSIMG32.dll
R6@',
Qa<8P
xVO>5q
^@K[b
BohZN
+zN)&2
lt-LT
C:\tmphqm3e63s\data\yara\NitrogenLoader.yar
P)$PK
_&2"Oo
en-IE
!R^\0
c%N`&WI
windir=C:\Windows
CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files
6)=C:\Program Files (x86
Xp_j\o
restrictsetthreadcontext
Y}Fyp
@5ft05ft ]itPG
fr-BE
o($v>
=C:\Users\Public
LOGONSERVER=\\DESKTOP-0KEHDCV
v5LOM6
&5[#2
?NY[9
r[V*1D
_bCB<
Qd;8L
RRPXC
531=#
62}Tm
C:\Windows\System32\SHLWAPI.dll
d|!9'
{81 C2 A1 03 00 00 87 D1 29 D3 33 C0 5A 59 59 64 89 10 68}
FS,`j
%R!h:Y
{83 FA 04 E9 [3] (00|FF)}
2QbQp
E.Obp=m
CRYPT32.dll
^qwK5"
Y(sWg
win32kfiltering
{oz8S
,#@ee
Y:Op5
L/K{?
KERNEL32.DLL
MP=C:\Users\raciu\AppData\Local\Temp
{+hYY
h\Pw/
{.Ff)G
GvpU`
9w&+/6:$S
4ZUR9
})#d7
,,+R@
LOCALAPPDATA=C:\Users\ra
-*9 <w
advancedprotections
o2J1)
b1o{5
\??\C:\Users\raciu\AppData
stM},
amFiles(x86)=C:\Program Files (x
raciu
L?TvUsY
MFCN42D.DLL
fA_85
x^T{0
StOtG
\Common Files
?ZNT2!
rogramFiles%\Win
RB^ND
?RXjT
SPC_SP_OPUS_INFO_OBJID
iz2]O
>GVUg
WsG/Cg
1:IF}
dg2I?
R,^?>]
f;u)\
sl-SI
sr-Latn-CS
@\Pw@\Pw~;
pa~I\
g+yg
a]=@12
G'\2_)
\??\C:\tmphqm3e63s\data\yara\RisePro.yar
d>@w]]P
ncalrpc
*/P30
en-CA
)69PQ
2$&`V
KA.7(
f@#z8V
z`*({
EgY$W
#j<Ap
sehop
\??\C:\tmphqm3e63s\dll\6440.ini
h[-U7$
codeintegrityguard
ftpVmt
zh-HK
0CRe*in
jg:n4x
#rLD0
52C64B7E
mandatoryaslr
DetectorsTrace
{4C 8B D1 B8 [2] 00 00 (0F 05|FF 25 ?? ?? ?? ??) C3}
((((( H
lq\R"
@5ftl4ft
=C:\Program Files (x86)\Common F
2xxPj
L5ftT4ft
analyzer=C:\tmph
di#Zk
iu\AppData\Local\Programs\Python\Pyt
-g"&g
uU^!_>
bn>"V
`TI&OH
JuK-<j
-7AXJk$
C:\Windows\System32\GDI32.dll
iJ*5tU
LA`y|$w$9Y
disablewin32ksystemcalls
3Pw 8Ds
SPC_NESTED_SIGNATUREs
@8wWpE
BLACKBOX.DLL
,>YN,
ts=C:\gcYcqTKME
S./:I
SYs4q
9#Ywk
arbitrarycodeguard
2WpoI
P}l)H
OLec-
`\Pw`\PweORS
{5F 5E 5B C9 C3 51 6A 00 E8 [4] 59 59 85 C0 75 01 C3}
VD+kW
uAzG)
en-US
SeXNE
DriverData=C:\Windows\System32\Drivers\DriverData
hG20~H
H8*Pv
uS4[G
C:\Windows\System32\CRYPT32.dll
[5N~M
!96+$V
c,>R\
hdw|TpA
g *&h
@5ft|2ft
2F-CR=
uP}Fw
_h/lG
fi-FI
de-AT
ooQ$t
V -T_
Q9ukv5
u1.2.840.113549.3.4
Ebu+.
{8B C2 48 8D 49 01 83 E0 07 FF C2 0F B6 44 30 ?? 30 41 FF 3B D5 72}
}@S'_
p\Pwl
Kbcy`7
wMZ@a+
1ow?<
|mF`L
*E4!(y
N@w,1%
C:\Windows\System32\KERNELBASE.dll
MFC42ENU.DLL
C:\Windows\System32\USER32.dll
Lg6'12Lkrdp6
disableextensionpoints
HBT1s*
eitPw
_/NyW
k8F_B
D!Z(Ew
%A 4M
)^]V.s
nhBHa
BI,b(
3kvUC
qQ9E@
highentropyaslr
&[jE2
}COpz
3"a{.
-fKo<
5t_NL
0SSmu
COMPUTERNAME=DESKTOP-0KEHDCV
o?^q%
}oMTg
1+NxNh:Y>n
ApphelpDebug
OneDriveConsumer=C:\Users\raciu\OneDrive
Mft$Mft`
A5U2c
f8b<9
@\&R
\??\C:\tmphqm3e63s\data\yara\UrsnifV3.yar
8_z.(
HOMEDRIVE=C
B>4-H`
C:\Windows\System32
Xn?mBXIw]
stricthandlechecks
et-EE
C:\Windows\Temp\AslLog_DetectorsTrace_3ea19538971898322afc.exe_6440.txt
0=Fsh
5WUQJ
4ft Xit
ko-KR
ProgramData=C:\ProgramData
4p>gK
DT+'!`
*,qQu
\^32M
SPC_INDIRECT_DATA
tMK[$Ix
HjiN^
{39 5D ?? 75 06 83 7D ?? 03 74 05 BB 01 00 00 00 41 89 1C ?? 48 8B 4D ?? 41 FF D0}
{B0 01 00 00 00 8B [2] E8 [4] 8B D7 2B D3 [4] 88 54 18 FF 40 40 75}
Hg.$r&i
S-1-15-3-787448254-1207972858-3558633622-1059886964
I}GA1
u1.2.840.113549.1.1.1
APPDATA=C:\Users\raciu\AppData\Roaming
LZ#py
U&Vaz
USER32.dll
abcdefghijklmnopqrstuvwxyz
6o-+T
|k)HV
2.dll
;xMiO]+
7WcL#
GDI32.dll
,s&Opw
^?^;h
:5cwT
Bx9,&
he-IL
pHm_[
@H,z%v
uw^Kt
pt-PT
de-CH
SVWQd
'I$rV
vU@g+
QG]N<
Y1U:c
]'2c
8+Z*T
onlyallowcontrolflowguardenabledbinaries
{56 33 F6 B9 FF FF FF 7F 89 75 FC 8B C1 F0 FF 45 FC 83 E8 01 75 F7}
es-ES
{31 FF [0-128] (B9|C7 85 F8 00 00 00) 60 5F A9 00}
u:bf;
MessageBoxError
#UOGi
wrt !r
9N`,?
3U$o<v
RPCRT4.dll
controlflowguard
PPjjm
7EF]w/
I%f,t
HOMEPATH=\Users\raciu
yh>qm
DESKTOP-0KEHDCV
qfs.!
de-DE
kt@`'
{46 0F 01 F9 [0-4] 66 0F 6E C6 F3 0F E6 C0 66 0F 2F ?? 73}
\Device\HarddiskVolume2\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe
jMcdV5
exportaddressfilterplus
z8#]Z
Zu<9)
6hy~B
,BMNs
FHrVk
MSVCRT40.dll
_{Sk%
ltXc'
@@Bl$
\??\C:\tmphqm3e63s\data\yara\SlowLoader.yar
pt-BR
*!5I6
J"8%&
]QIhj
Ae#y[
ShortRunApp
AW$c.5
startup-time=120000
=IY,[
@5ft$3ft
e qc&Ss\
{<#7'
8G^!|
Yud;2s
mpL&jz3
{HeZj
K[wi%
@<$hF-Q6
<ZD"h
CommonProgramFiles=C:\Program Files (x86)\Common Files
CommonProgramW6432=C:\Program Files\Common Files
0\cW@Pl#i
@5ftd2ft
@Jo'S
et`*et
B3j :
x`v9se
ApAw{u\
{4C 8B D1 66 8B 05 [4] (0F 05|FF 25 ?? ?? ?? ??) C3}
P$Qx\
7D*3\e
dM>!;q
C:\Windows\SYSTEM32\apphelp.dll
\??\C:\tmphqm3e63s\data\yara\VBCrypter.yar
a+RuB
s\system32\cmd.exe
8;Pnd
`S"oy
{6A 44 53 E8 [2] FF FF 83 C4 08 8D 85 ?? FF FF FF C7 85 ?? FF FF FF 44 00 00 00 50}
es-CO
OWY0R
nt-J?>
tLj@h
t+X>q
Eit8b'
n-`UO
Z1QF
stem32\Wbem;C:\Windows\System32\
$sMWO
ANvE#
#dkhe0B
)9.'_L
JRwva
Rp<qi
C:\Windows\System32\sechost.dll
> '{@<
a0ZCS
yp-E^'
j/wp"<w
qatDt
FAJ1A
tr-TR
R`[ .
\??\C:\tmphqm3e63s\data\yara\AntiCuckoo.yar
PDg!mL#
C:\Windows\system32\IMM32.DLL
KOt)@
V<P<,
DUBgD
MFC40.dll
OneDrive=C:\Users\raciu\O
9yct5
L5ft,4ft@Jit
HyOG({
rive=C:
Created ShortRunApp telemetry
sk-SK
s!Tc:
Oh 8"F>
C:\tmphqm3e63s\data\yara\SmokeLoader.yar
l4N'm
V7lau
u1.2.840.113549.3.7
spcNestedSignature
gc#iv
ComSpec=C:\Windows\system32\cmd.exe
{F2 0F 11 45 ?? FF 15 [4] 6A 00 68 10 27 00 00 52 50 E8 [4] 8B C8 E8 [4] F2 0F 59 45}
1~5.R
USERPROFILE=C:\Users\raciu
Created MessageBoxError telemetry
E-[H<
PROCESSO
C:\Windows\System32\win32u.dll
7MFqP
Ih.{/
o4C;s
'@ 2a
ropstackpivotdetection
4ft ait
e5QN!
ndows
kt`a'
Xithb'
'i3M+
1)s+%
OneDrive=C:\Users\raciu\OneDrive
w\cA0K
;~>9Cx
92Vo`
jayu3
w@bOX(:\
ncTL|8
en-GB
h%^Wb1
hr-HR
mw?^C
LOCALAPPDATA=C:\Users\raciu\AppData\Local
ojzR]S
p\Pw!
KERNELBASE.DLL
=(%J;
n@9+%
/9I}_
?!$Z!.
{]e{3yWc
zh-CN
{53 57 57 57 FF 15 [4] 8B F0 74 03 75 01 B8 E8 [4] 74 03 75 01 B8}
S=KJs
<!^!~]>/
t79.zVv
NCdih
g^dtN>
6g@0Wh
9sqbzE
restrictindirectbranchprediction
l\v1.0\;C:\Windows\System32\Open
C/Uw/
ropcallerdetection
$nACk
b0>C8
ohc_j&sc
C:\Windows\System32\IMM32.DLL
ProgramFiles(x86)=C:\Program Files (x86)
Mjawo
6BFT
jBpLK
&f=/$
,eFod
T!E9
C:\Windows\System32\WS2_32.dll
yua1am
USERNAME
1d*Ql
ex\oa
CjMpq=
:C@XS
ET.>Z.
,8Fn&
S-1-15-3-3845273463-1331427702-1186551195-1148109977
_D2BM
<?xml version="1.0" encoding="utf-8"?>
4U'>b
2r<>I,
sv-SE
p8f=7i,3o
,w&674
JQr%4l^
4rT:vy
disablenonmicrosoftfonts
JF8.#H
!,mgH
\Pw \Pwv
JQk'-
Pv"#gj
A|jn8
bij]2
TEMP=C:\Users\raciu\AppData\Local\Temp
kz{~>
85-3m
C:\Windows\SYSTEM32\ucrtbase.dll
j{P\^
zh-TW
TPp#gGU
~JEXe;G?
Ln7Lb
C:\tmphqm3e63s\data\yara\EmotetPacker.yar
\??\C:\tmphqm3e63s\data\yara\capemon.yac
ice\HarddiskVolume2\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe
C:\Windows\Temp\AslLog_ApphelpDebug_3ea19538971898322afc.exe_6440.txt
LI_Q9
&ZJPd
>']UT
A0_^[
E1pr|k:YNRK
|,d&$
shimengstate
s;(<C
{Ik||g
J]/i2
xdi2Gu
es-US
HWF/<2
a'kQt0
C:\Windows\System32\KERNEL32.DLL
C:\Windows\System32\combase.dll
ro-RO
terminateonheapcorruption
i=6 7{
devicecapabilitymicrophone
j&^{S
|I.[(
n@/2l
>uiy]
u1.2.840.113549.3.2
{FF 75 30 83 3D [4] 10 BA [4] B9 [4] 0F 43 15 [4] 83 3D [4] 10 0F 43 0D [4] E8 [4] A3}
el-GR
"C:\Users\raciu\AppData\Local\Temp\3ea19538971898322afc.exe"
blockremoteimageloads
;hJp:<
b3>_i
PSModul
USERDOMAIN=DESKTOP-0KEHDCV
]iBtm
EQw)`
p>&V_0D
iverData
@kjGJ,
"E%YE
{8o~f
PROCESSOR_IDENTIFIER=AMD64 Fami
2~5"w
_it0t
DetectorDWM8And16Bit
SystemDrive=C:
blockchildprocesscreation
J>f?@
zh-SG
#S\?{}h
&SkB;
VAL;|fw
fr-CH
C:\Windows\System32\msvcrt.dll
?~)`L
pl-PL
b({4u
=uBvX]5aS!!
msvcp_win.dll
WS2_32.dll
8APEW
#!J;f
RyUy8]<4
-UW<{
#+P!TDA{a
&dgQ<
USERDOMAIN_ROAMINGPROFILE=DESKTOP-0KEHDCV
|@,N$
(\Pw(\Pw
TMP=C:\Users\raciu\AppData\Local\Temp
{48 31 C0 4C 8B 19 8B 41 10 48 8B 49 08 49 89 CA 41 FF E3}
PROCESSOR_REVISION=6102
1}AhZG
2Uqkf
fr-FR
aA:rs
{4C 8B D1 66 B8 [2] (0F 05|FF 25 ?? ?? ?? ??) C3}
MSVCIRT.dll
C:\tmphqm3e63s\data\yara\Lumma.yar
C:\Windows\Temp\AslLog_shimengstate_3ea19538971898322afc.exe_6440.txt
sr-Latn-RS
C:\Windows\SYSTEM32\SspiCli.dll
%'&rl
=l7!;
^y00P
kC0}us
C:\tmphqm3e63s\data\yara\UPX.yar
ProgramFiles=C:\Progra
8MftDMft
9,WD[
A)PY7
i$SwF
6SsQQ
l7f'#7
win32u.dll
MFCSUBS.dll
es-AR
0KEHDCV
(nl$(
Q>G;Lx
NO*UZ
\pt0/
(18M1
ELLxeWzb{R
j|l8wz
z6_x[Z
bottomupaslr
{EB 00 55 8B EC 66 3B E4 74 ?? [1-5] 64 A1 18 00 00 00 5D EB}
,dV)4v
rShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
FWCWSP64.dll
Local\Temp
pUjq!
rShell\Modules;C
ru-RU
moduletamperingprotection
dl TX
SfQhVA
{48 8D 0D [4] 48 8B E8 E8 [4] 33 C9 E8 [4] 8B 15 [4] 3B 15 [4] 0F 84}
o<Nn*
hit b'
XWW(Y
'F*+I
u_jVc
k"?X3
sers\raciu\AppData\L
{6A 00 6A 01 8B 45 ?? 50 FF 55 ?? 33 C0 5A 59 59 64 89 10 68}
vv%<=
\??\C:\tmphqm3e63s\data\yara\Pikabot.yar
>QfpF
C:\Users\raciu\AppData\Local\Temp;C:\Windows\SYSTEM32;C:\Windows\system;C:\Windows;.;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\Scripts\;C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\
wXE5d
HsH,O
$&w!e
PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
ktX`'
22`eJj
e#|^Ok
|&Cg/
&YO=S
O+faw
]c~0[.
PROCESSOR_IDENTIFIER=AMD64 Family 25 Model 97 Stepping 2, AuthenticAMD
C:\Windows\SYSTEM32\gdi32full.dll
returnflowguard
kfXEYt
ALLUSERSPROFILE=C:\Progr
>t$+b
^%\e*7M
devicecapabilitylocation
#0Y6A
X_Mq&
2A$-"Gp
NBeobqGi
K5aG>
b>1_`
DLPb>
nO/72
!%e=W
^QCy7
CommonProgramW6432=C:\Program F
en-HK
%.3xt[
N@ZWA
kernel32.dll
0zFbD
]it@c'
DriverData=C:
lcU)w
yF/vF
dqXd
es-CL
`Ditp`'
fr-CA
{44 89 4C 24 20 4C 89 44 24 18 48 89 54 24 10 66 3B ED 74}
!?O$1
ltpc'
s\raciu
{49 89 CA 40 89 ?? (41 FF|FF)}
/?6BL
<MATCHED_ENTRIES>
v;@;FW
Z02*T7+
d\@-y
?'>=v
&YJ"^uT
<q/]!
=4JVc+
Qm(5f
V-ql6
J5YTa
TilNH
lVY4/
%9]^AMY
12\$?7
SystemRo
ALLUSERSPROFILE=C:\ProgramData
#$BTO-
?esP?es
U9#M5c
0rE-S5
hitP_
NUMBER_OF_PROCESSORS=2
X,BfZ
{paN9W
dependentmodulesdontinherittamperprotection
PROCESS
TEMP=C:\Us
R>%a]
8\Pw8\Pw
"LmusR
da-DK
#.].|
%X)\+iS
/@e6K+
!-dI/
HU9twS;
zX<:r
F'CwW
E&%58^[
C/L*&
C:\Windows\System32\gdi32full.dll
b'1p,
|`0qV
ython\Python310-32\Scripts\;C:\Users
Du7AYm
LBT3e_
uk-UA
qZqIn
C:\tmphqm3e63s\data\yara\Socks5Systemz.yar
%U|>D
p}fAc
{48 8B C4 48 89 58 08 48 89 68 10 48 89 70 18 48 89 78 20 41 56 48 83 EC 30 4C 8B 05 [4] 33 D2 C7 40 [5] 88 50 ?? 49 63 40 3C 42 8B 8C 00 88 00 00 00 85 C9 0F 84}
vP](*
allowthreadsoptoutofarbitrarycodeguard
qps-ploc
l9wAo
ShimDebugLog
@7GS7u
UK;Y)X
`Ej^A
?3V64j(
Lft0[it@;
a!QSi 2t
windir=C:\Wind
{48 8D 0D [4] E8 [4] [7] 8B 44 24 ?? 44 8B CB 4C 8B 44 24 ?? 48 8B D7 89 44 24 ?? E8}
:%Y):ra$
H_E^p|
MFCO42D.DLL
zLx15
zi2nb
L,gUj
8<E;_P
m,bK5
{89 44 24 20 FF 93 [2] 00 00 80 BB [2] 00 00 00 8B F0 74}
|
registry filesystem process threading services device network synchronization crypto browser