Match: ScreenShot
Match: local_credential_Steal
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: ThreadControl__Context
Match: SEH__vectored
Match: anti_dbg
Match: disable_dep
Match: infoStealer_emailClients_Zero
Match: ScreenShot
Match: local_credential_Steal
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: ThreadControl__Context
Match: SEH__vectored
Match: anti_dbg
Match: disable_dep
http://www.nirsoft.net/
Extracted/injected images (may contain unpacked executables)
Download #1
Match: Network_DNS
Match: Network_SMTP_dotNet
Match: Virtual_currency_Zero
Match: KeyLogger
Match: Code_injection
Match: infoStealer_emailClients_Zero
Match: ScreenShot
Match: local_credential_Steal
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: ThreadControl__Context
Match: SEH__vectored
Match: anti_dbg
Match: disable_dep
Match: win_hook
http://www.usertrust.com1 http://ocsp.comodoca.com0 http://crt.usertrust.com/UTNAddTrustObject_CA.crt0% https://secure.comodo.net/CPS0A http://crl.usertrust.com/UTN-USERFirst-Object.crl05 http://crl.usertrust.com/UTN-USERFirst-Object.crl0t http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r http://www.nirsoft.net/ http://crl.usertrust.com/AddTrustExternalCARoot.crl05 http://ocsp.usertrust.com0 http://crt.comodoca.com/COMODOCodeSigningCA2.crt0