Static | ZeroBOX

PE Compile Time

2024-04-24 05:27:19

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0003af14 0x0003b000 5.00580946881
.rsrc 0x0003e000 0x00000546 0x00000600 4.00131391214
.reloc 0x00040000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0003e0a0 0x000002bc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0003e35c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
com.apple.Safari
Unable to resolve HTTP prox
1SPS*
KDBM(A
v4.0.30319
#Strings
Ei}
8 Q [ c i s {
!.!F!f!
"1":"@"M"T"r"
"8#@#G#P#X#
7N4fW80
royqr80
MQIjF0
xcsdK0
IMIeN0
UndbBqiVQ0
si7zjH0h3T0
MLFJZ0
VAw2cPZ9a0
VR9O8e0
LmlHPgq2hh0
4ViNdi0
vkoVceboWv0
$$method0x6000123-1
$$method0x6000095-1
$$method0x6000086-1
$$method0x6000108-1
$$method0x6000128-1
$$method0x6000148-1
$$method0x6000268-1
$$method0x6000129-1
$$method0x600019a-1
$$method0x600010e-1
$$method0x600011e-1
p8hmF511
HMACSHA1
VT_UI1
IEnumerable`1
ICollection`1
IEnumerator`1
IList`1
DTxg6Nkb1
CS$<>9__CachedAnonymousMethodDelegate1
get_Item1
$$method0x6000108-2
$$method0x6000268-2
$$method0x600011e-2
HMACSHA512
Advapi32
kernel32
Microsoft.Win32
user32
ToUInt32
ReadInt32
ToInt32
bVNR572
unVTA2
EmD3ANF2
VT_UI2
il0xI2
PRgsatK2
KeyValuePair`2
Dictionary`2
D3W5kpbj2
get_Item2
BPZnav2
6FIjRz2
rubW533
ODd39sA3
99YNb5G8H3
u2HiXYVJ3
3usKU3
Tuple`3
get_Item3
YeuS9lo3
EfHv7HsKu3
AnSZHv3
hVEbP24
ToUInt64
ReadInt64
ToInt64
tMDFWJP74
ZKOEA4
VT_UI4
4w2eCMIhM4
V3Sk4cN4
gjltN4
uRcQkDeJoO4
Waz1lYR4
YycGrY4
UAAce4
rjFzxCl4
tFjfbp4
lXxalU5q4
Qvwd1J625
5Ttu625
45UxW5
BHNic4z5
IS_TEXT_UNICODE_ASCII16
IS_TEXT_UNICODE_REVERSE_ASCII16
ToUInt16
ReadInt16
ToInt16
HMACSHA256
Q1QyMdC6
yXqpsHy6hP6
pwfrURS6
l0ZrY6
0MnUQVSg6
kmVsgag6
EpYFSUaJdi6
60Pks6
e1zmx6
pB2Ic0C7
4KQKH7
JmfUqZM7
5ZG86OSEhN7
CzeZpTO7
JnV4c7
Gk2Zze7
get_UTF8
VRZ10Z7H8
m3pYH8
VT_UI8
XPymK8
VaultGetItem_WIN8
LO2iS8
2VFittt8
gixe9vMHau8
ZhK9YXw8
C6Nh1Wz8
AJcHmThI9
plt5IHjiY9
Sc4ft43gDe9
b04YhSu9
<Module>
rR3x3ZZa4A
GYRUDA
RbFDCQA
xUHuFD8YjVA
7GG7jIlfbA
5x8t2eA
23nObNIWmA
ZGxpb80B
LPcayciz6B
DhatcA58VBB
y3e1H0pMLB
BCRYPT_KEY_DATA_BLOB
VT_BLOB
UgJzVDYB
To30K3bB
QMqwRhbB
mxMiyfB
yieE9zB
82pA1Z7C
BCRYPT_KEY_DATA_BLOB_MAGIC
OOaumeRC
ND9pypmtZfC
vReqUrfkvxC
LLKHF_EXTENDED
LLKHF_INJECTED
VT_CLSID
get_ID
set_ID
FileHandleID
fileHandleID
lpdwProcessID
processID
get_FormatID
set_FormatID
ffnurSvkUD
f5lp6BewZdD
bF3RTheQJ6E
SM3h7E
6OWjKgBE
DUPLICATE_CLOSE_SOURCE
BCRYPT_CHAINING_MODE
VT_STORAGE
INVALID_HANDLE
VT_FILETIME
FucIPE
IS_TEXT_UNICODE_SIGNATURE
IS_TEXT_UNICODE_REVERSE_SIGNATURE
VT_DATE
IS_TEXT_UNICODE_DBCS_LEADBYTE
01SzBRHNZE
uC1MwSbE
GZ5JRWgE
H237lE
GGCEhCAqE
lvN9wE
RxM2i081F
VkXy1F
CxgOv5VyJF
IkCnUDtSnOF
qIjoA1EPF
vEMPRF
cpS4atNRfF
wNUH1kiF
kQxwoyDd5kF
fvBVlF
UiCjhAqF
EgXgguB9vF
OKSqBInIzF
BCRYPT_AUTH_MODE_CHAIN_CALLS_FLAG
KZeDCG
pA2SU5zfHG
BPvKfDlIFNG
QmCmClMVNG
3yvoeG
3ZqLhG
epJdqoBmG
aGbVYF8a2H
9QhPtViO3H
STATUS_AUTH_TAG_MISMATCH
STATUS_INFO_LENGTH_MISMATCH
IS_TEXT_UNICODE_ODD_LENGTH
BCRYPT_AUTH_TAG_LENGTH
BCRYPT_OBJECT_LENGTH
VHz9RyTH
6TLNG5QyYH
e57gZaaH
MPyG7MU3zbH
1reRaLjN0hH
SqIztOlH
mY5jcrH
3Z6i2I
1LhVsKAI
YFthjIIHFCI
tabKq6DI
get_ASCII
0gAQdO5OII
OvVQG73cKI
RyyyZo5q9UI
dmXNv9DcI
y4axth06tI
E04I5uxI
XAFXb40J
xWwSEIJ
ihluQ6I2nbJ
GND7w5ndJ
NvcsNfJ
ofakyRu0wJ
mESH297GyJ
sttHuBK
tu3YQcFMNIK
t9qLt75KK
IS_TEXT_UNICODE_UNICODE_MASK
IS_TEXT_UNICODE_NOT_UNICODE_MASK
IS_TEXT_UNICODE_REVERSE_MASK
IS_TEXT_UNICODE_NOT_ASCII_MASK
fU6aO4VrsK
vIcIOOtK
pod72xKtvuK
VT_DECIMAL
VT_NULL
WH_KEYBOARD_LL
VT_BOOL
93sEDlv4WL
sJLGG55bWWL
TNeNfL
aYHQhL
CuSqiL
yJM65ymL
GXFTU8c4M
ZspkOBTxN7M
UGF7HWY9M
VT_VERSIONED_STREAM
VT_STREAM
BCRYPT_CHAIN_MODE_GCM
JrCaRMsCM
BCRYPT_AES_ALGORITHM
4FX0sM
F5IRDlrnvM
9AQZC3ng3N
993Hiq9N
BCRYPT_INIT_AUTH_MODE_INFO_VERSION
HC_ACTION
L2UQTN
LLKHF_ALTDOWN
WM_SYSKEYDOWN
WM_KEYDOWN
yUR0cwspYN
nXtMYsaN
VMVyXifCXnN
nXqVtN
VatOPSvxN
B3dkq1O
9EdIsJ2O
dDy14O
Ya3eThqGO
System.IO
Tzby1fXfOPO
P9h2xFaO
O2SP4vdO
iitanjvw4P
CoQsCP
BCRYPT_PAD_OAEP
3KAVUP
WM_SYSKEYUP
WM_KEYUP
LLKHF_UP
n6BSlbP
Ya11b4htbP
AriSv6UeP
4wb9EOPKhP
TaiozUKufiP
l6lD9smP
TFvqtnP
KNdGfuP
G39cBQ
merpHQ
EXzKzY1MQ
s9gpmujIxVQ
akDWcQ
MS_PRIMITIVE_PROVIDER
VT_ERROR
VT_VECTOR
VT_BSTR
VT_LPSTR
VT_LPWSTR
iCjAwMRpR
vwvLr303sR
j2Tz7tR
IS_TEXT_UNICODE_STATISTICS
IS_TEXT_UNICODE_REVERSE_STATISTICS
IS_TEXT_UNICODE_NULL_BYTES
IS_TEXT_UNICODE_CONTROLS
IS_TEXT_UNICODE_REVERSE_CONTROLS
hyJ2qxwY8OS
jt1TOS
RuG0qOS
IS_TEXT_UNICODE_ILLEGAL_CHARS
DUPLICATE_SAME_ACCESS
ERROR_SUCCESS
STATUS_SUCCESS
BCRYPT_PAD_PSS
azj2DMObS
E54NlTodS
EERLbkSnS
O2hyG2TpS
BSxZZ3y3qS
VT_UINT
VT_INT
auB6HhbZT
cs5oALeT
1ZClRBxiT
kHOMT7Yu5U
sV4dgvFU
rAVqIU
ddWCNU
bxt5XQU
4JyqXU
xQHEBiXpU
5ooPZtU
9wXC2x2V
40Eg7V
I02xkrAV
get_IV
set_IV
qrjDP1WV
DZZMVbV
KDuAmV
phIkzV
FPpK0W
jJy57EW67W
Cz51EeQ1FEW
O4m5qMWMW
STATUS_BUFFER_OVERFLOW
V2ef3WEcOW
CveaySW
UHvOrsW
v55nZtssW
6bUZdE9atW
GtrCvvW
P9WE0X
tldlly4X
cGTAmiLX
yQUjrVchjX
77Zb0nt7zsX
liVChCkK3Y
ZgeqIp2WT5Y
MggXEIO6Y
VT_ARRAY
VT_EMPTY
IpmhaY
IvmfsfUIgY
v3jHirY
7JtGxY
q3HCptwCq6Z
b1PPCKov2KZ
value__
jMzu5a
K3lcXa
sDtvQjPGfa
LUhWqcuona
get_Data
set_Data
cbData
ProtectedData
cbAuthData
pbAuthData
PropertyData
SetQuota
qHv0eGb8b
TSwsYuYQ9b
iKKlZsBb
5s5BEEb
Pq0I1GLb
IpfjeQmhLb
9VpUa5ZCQb
LxKxGd9KJTb
ovJMYb
PublicIpAddressGrab
mscorlib
QKt07y6rb
S8r84ZcDYtb
6N8muxb
7bcd610d-7af6-4dc2-875b-dc4fec91463c
04UbZCc
QBkuDc
PemzOc8NtUc
faUFVc
System.Collections.Generic
Microsoft.VisualBasic
WndProc
HookProc
FromFileTimeUtc
pLhhHX53xvc
c6S7pSUgR5d
get_Id
SchemaId
schemaId
pszAlgId
HookId
GetWindowThreadProcessId
processId
SchemaElementId
4k57j3RGVd
Abq72AYZd
PageExecuteRead
OpenRead
FileMapRead
VirtualMemoryRead
CreateThread
lpcbNeeded
DomainExtended
SHA1Managed
RijndaelManaged
add_Changed
remove_Changed
get_LastModified
set_LastModified
_lastModified
Interlocked
set_Enabled
get_IsEnabled
set_IsEnabled
_enabled
Undefined
lpOverlapped
samDesired
add_Elapsed
get_LastAccessed
set_LastAccessed
_lastAccessed
get_Reserved
reserved
TorPid
activeWindowPid
pPackageSid
row_id
get_IsInvalid
get_Guid
vaultGuid
PcHwid
<ID>k__BackingField
<FormatID>k__BackingField
<Data>k__BackingField
<LastModified>k__BackingField
<IsEnabled>k__BackingField
<LastAccessed>k__BackingField
<Password>k__BackingField
<password>k__BackingField
<PropertyStorage>k__BackingField
<Name>k__BackingField
<FileName>k__BackingField
<ApplicationName>k__BackingField
<Username>k__BackingField
<username>k__BackingField
<Type>k__BackingField
<type>k__BackingField
<TypedPropertyValue>k__BackingField
<Size>k__BackingField
<IsRunning>k__BackingField
<Path>k__BackingField
<hostmask>k__BackingField
<Version>k__BackingField
<Application>k__BackingField
<Description>k__BackingField
<user>k__BackingField
<hoster>k__BackingField
<Tasks>k__BackingField
<Contacts>k__BackingField
<objects>k__BackingField
<Accounts>k__BackingField
<Keys>k__BackingField
<Lenght>k__BackingField
<Host>k__BackingField
<GuidMasterKey>k__BackingField
GetField
TrimEnd
ReadToEnd
AppEnd
Append
get_Millisecond
GetUpperBound
GetLowerBound
set_Method
method
awbx1jpLTpd
Clipboard
get_Password
set_Password
DomainPassword
FtpPassword
get_password
set_password
oNEN0sd93e
FkVjJ21AOe
bkFLTe
Replace
DeleteBackspace
QueryDosDevice
hInstance
IdentityReference
Sequence
cbNonce
pbNonce
Resource
vkCode
wScanCode
scanCode
keyCode
set_Mode
FileMode
ShareMode
PaddingMode
CryptoStreamMode
CipherMode
SelectSingleNode
XmlNode
get_Unicode
get_BigEndianUnicode
IsTextUnicode
FromImage
SectionImage
get_PropertyStorage
set_PropertyStorage
SerializedPropertyStorage
SendMessage
AddRange
CompareExchange
CredentialCache
SectionNoCache
xfErie
EndInvoke
BeginInvoke
NsIwke
GetEnvironmentVariable
SetEnvironmentVariable
IEnumerable
IDisposable
ToDouble
get_Handle
RuntimeFieldHandle
hSourceHandle
SafeHandle
GetModuleHandle
RuntimeTypeHandle
ReleaseHandle
CloseHandle
DuplicateHandle
CreateHandle
GetTypeFromHandle
hSourceProcessHandle
hTargetProcessHandle
lpTargetHandle
bInheritHandle
vaultHandle
activeWindowHandle
handle
Rectangle
ToSingle
CreateFile
hTemplateFile
DeleteFile
WriteFile
MoveFile
MapViewOfFile
UnmapViewOfFile
lastTitle
activeWindowTitle
lphModule
get_MainModule
ProcessModule
get_Name
set_Name
lpDeviceName
get_FileName
set_FileName
GetModuleFileName
lpExistingFileName
lpFileName
GetFileName
lpNewFileName
_fileName
get_ModuleName
lpModuleName
lpBaseName
baseName
lpValueName
StartupRegName
rootPathName
get_OSFullName
get_FullName
OperatingSystemName
get_ApplicationName
set_ApplicationName
StartupInstallationName
lpName
lpAppName
get_UserName
get_ComputerName
ThisComputerName
ProcessorName
get_ProcessName
processName
StartupEnvName
GetProcessesByName
lpKeyName
pszCredentialFriendlyName
StartupDirectoryName
GetDirectoryName
astable_name
item_name
Filename
filename
get_Username
set_Username
get_username
set_username
DateTime
GetLastAccessTime
dwTime
AppendLine
get_NewLine
Combine
LocalMachine
Escape
Unescape
DataProtectionScope
get_Type
set_Type
pszBlobType
GetFileType
MimeType
ValueType
LogType
SecurityProtocolType
GetType
item_type
get_type
set_type
FileShare
Compare
System.Core
PtrToStructure
get_InvariantCulture
Capture
HttpWebResponse
GetResponse
Dispose
Reverse
X509Certificate
GenericCertificate
DomainCertificate
Create
KBDLLHookProcDelegate
MulticastDelegate
Terminate
PcState
GetKeyboardState
lpKeyState
GetKeyState
Delete
PageReadWrite
PageExecuteReadWrite
nNumberOfBytesToWrite
FileMapWrite
VirtualMemoryWrite
Remote
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
SecuritySafeCriticalAttribute
ExtensionAttribute
AssemblyFileVersionAttribute
FlagsAttribute
CompilationRelaxationsAttribute
ReliabilityContractAttribute
ParamArrayAttribute
RuntimeCompatibilityAttribute
SuppressUnmanagedCodeSecurityAttribute
set_UseShellExecute
FileMapExecute
ReadByte
ToByte
get_Value
HandleValue
TryGetValue
get_TypedPropertyValue
set_TypedPropertyValue
GetPropertyValue
set_KeepAlive
Remove
SectionReserve
get_Size
set_Size
dataSize
cbSize
get_StorageSize
lpFileSize
get_NameSize
volumeNameSize
nFileSystemNameSize
SQLDataTypeSize
get_StoreSize
get_ValueSize
get_HashSize
set_BlockSize
chunkSize
get_KeySize
Serialize
Deserialize
Initialize
Finalize
Synchronize
page_size
Resize
e2JKc7f
SizeOf
get_ItemOf
LastIndexOf
TKHQzQf
otXQVf
D1RgSbDZf
ZPmefPYXubf
cchBuff
N9gfl80lFgf
FBQjyRkf
lastInputInf
ZwzkEgpf
fEsFwrtf
wZkutf
NBg4yf
CcDeoaLyf
CTQfTKg
qI5K2z15uPg
5jpNF31g8Qg
c18G2NwXg
get_Jpeg
System.Threading
get_Padding
set_Padding
UTF8Encoding
encoding
System.Drawing.Imaging
get_IsRunning
set_IsRunning
CreateFileMapping
FromBase64String
ToBase64String
EscapeDataString
UnescapeDataString
DownloadString
lpReturnedString
GetPrivateProfileString
ToString
GetString
OctetString
BitString
Substring
System.Drawing
get_Msg
QP1Vrfwg
lIsy2c2Dh
3jrc40qVh
dwMaximumSizeHigh
dwFileOffsetHigh
dX78OVOvph
ComputeHash
get_Path
set_Path
SystemAppdataPath
get_ExecutablePath
AsmFilePath
AppStartupFullPath
GetTempPath
GetFolderPath
lpTargetPath
StartupDirectoryPath
get_Width
get_Length
MaximumLength
dwMinLength
SystemInformationLength
ObjectInformationLength
set_MaxJsonLength
ReturnLength
maximumComponentLength
set_ContentLength
GetWindowTextLength
dwMaxLength
EndsWith
StartsWith
3DfKhQ3i
OIacm63we3i
svGaE4i
MiOzG3gQtBi
UGKEwSVRi
FKBw9xkRSi
WeqEXV2UYi
rODZXd79Kgi
PtrToStringUni
StringToHGlobalUni
QgzCcEj
VgE62Gj
i2rjoBjGj
lXNgXRe1Tj
qARXrIPXj
objrij
J95PW3p7k
rBXmEk
fKy6dORk
aZA71Wk
8VqmKwVzcWk
sd7iUXk
kjGIaXk
AsyncCallback
RemoteCertificateValidationCallback
get_ServerCertificateValidationCallback
set_ServerCertificateValidationCallback
callback
get_CapsLock
TransformFinalBlock
TransformBlock
XK7xelgk
idHook
_clipboardHook
_keyboardHook
get_hostmask
set_hostmask
PMffqtk
dXe6S6oFl
eE8NcBkLOIl
enPXNZSgTZl
AllocHGlobal
FreeHGlobal
Illegal
Marshal
NetworkCredential
Decimal
System.Security.Principal
set_Interval
ScreenInterval
KeyloggerInterval
Rijndael
cbLabel
pbLabel
System.ComponentModel
EnableTorPanel
kgD60Qo8hl
Kernel32.dll
kernel32.dll
User32.dll
user32.dll
vaultcli.dll
psapi.dll
ntdll.dll
bcrypt.dll
System.Xml
set_SecurityProtocol
Control
xGG2Fxl
Knzd8J75m
FileStream
get_BaseStream
GetResponseStream
CryptoStream
GetRequestStream
MemoryStream
get_LParam
get_WParam
get_Param
lParam
wParam
RqSkcm
get_Item
set_Item
VaultGetItem
vaultItem
OperatingSystem
HmacAlgorithm
SymmetricAlgorithm
phAlgorithm
KeyedHashAlgorithm
algorithm
Random
ICryptoTransform
Maximum
root_num
e68ZMym
ASQ7R10n
aIhS0n
TnQw5n
cSPEakcKAn
HWDlgB5NHLn
GNf6pQRn
4xpTRTn
VXnoi3Un
NN2c4WPWn
xv8GNXn
ToBoolean
IsLittleEndian
CopyFromScreen
get_PrimaryScreen
lpNumberOfBytesWritten
iFUo3fn
V59Jbthn
hkf9in
X509Chain
ChangeClipboardChain
ASZVOOOrln
Extension
get_OSVersion
get_Version
set_Version
dwInfoVersion
get_Application
set_Application
get_Location
ObjectDataInformation
SystemRegistryQuotaInformation
SystemBasicInformation
ObjectBasicInformation
QueryLimitedInformation
SystemPerformanceInformation
SystemProcessorPerformanceInformation
SystemLookasideInformation
SystemHandleInformation
ObjectNameInformation
GetVolumeInformation
ObjectTypeInformation
ObjectAllInformation
NtQuerySystemInformation
SystemExceptionInformation
SystemProcessInformation
ObjectInformation
SetInformation
SystemInterruptInformation
SystemTimeOfDayInformation
QueryInformation
VirtualMemoryOperation
pszImplementation
System.Globalization
System.Web.Script.Serialization
System.Reflection
PropertyDataCollection
ValueCollection
MatchCollection
GroupCollection
ManagementObjectCollection
KeyCollection
set_Position
CreationDisposition
SearchOption
Win32Exception
CryptographicException
ArgumentOutOfRangeException
ArgumentException
get_Description
set_Description
get_StatusDescription
_description
System.Runtime.ConstrainedExecution
StringComparison
Yy3YPVutn
add_KeyDown
remove_KeyDown
get_CtrlKeyDown
get_ShiftKeyDown
get_AltKeyDown
Unknown
jA42dsgNoDo
dqiM2wI14Qo
CompareTo
CopyTo
PaPtV8HWWo
O5zstEXo
OaCiWu0bgdo
rRCAfo
lastInPutNfo
dwExtraInfo
ImageCodecInfo
FieldInfo
FileInfo
CultureInfo
pPaddingInfo
FileSystemInfo
MemberInfo
ComputerInfo
get_StartInfo
ProcessStartInfo
GetLastInputInfo
DirectoryInfo
tAshFWNONno
eFcRzsto
jL8ujD9p
KL1sFp
jOX5fqGp
BLxjhH9mOp
add_KeyUp
remove_KeyUp
oEU2iYp
anUzZp
dwNumberOfBytesToMap
Bitmap
5clC0bp
TimeStamp
GaqJop
LocalApp
AppAddStartup
HideFileStartup
61VP7q
yDQIZq
7dL1DCAlq
System.Linq
xuBEaJtq
gJZt70r
PeXVKF87r
nL6s7r
LW5TuwIOEr
bDx1SJr
ToChar
lpChar
DirectorySeparatorChar
ObjectTypeNumber
volumeSerialNumber
StreamReader
TextReader
BinaryReader
SHA1CryptoServiceProvider
MD5CryptoServiceProvider
RNGCryptoServiceProvider
TripleDESCryptoServiceProvider
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
IFormatProvider
StringBuilder
SpecialFolder
sender
Encoder
volumeNameBuffer
fileSystemNameBuffer
buffer
ServicePointManager
Integer
EnableClipboardLogger
EnableScreenLogger
_screenLogger
_keyLogger
EnableKeylogger
ManagementObjectSearcher
ObjectIdentifier
SecurityIdentifier
ElapsedEventHandler
LogTimer
ToUpper
FtpUser
CurrentUser
get_user
set_user
EncoderParameter
Object_Pointer
BitConverter
get_hoster
set_hoster
BinaryFormatter
SetClipboardViewer
ToLower
JavaScriptSerializer
S5LEybnr
get_Major
get_Minor
GetLastWin32Error
GetLastError
Authenticator
IEnumerator
ManagementObjectEnumerator
GetEnumerator
RandomNumberGenerator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
HL6LFhpr
eVj50yVBZqr
passwordVaultPtr
ReadIntPtr
GJ0EJGhng0s
u7AiECDs
fhLD2MhPs
Graphics
System.Diagnostics
get_Bounds
Microsoft.VisualBasic.Devices
System.Runtime.InteropServices
System.Runtime.CompilerServices
GetInstances
get_ChildNodes
Matches
EnableCookies
GetDirectories
master_table_entries
get_Properties
ExpandEnvironmentVariables
GetFiles
EnumProcessModules
NumberStyles
GetSubKeyNames
field_names
ReadAllLines
GetProcesses
System.Security.Cryptography.X509Certificates
FlagsAndAttributes
lpFileMappingAttributes
SecurityAttributes
FileBytes
Rfc2898DeriveBytes
ReadAllBytes
BufferBytes
GetBytes
db_bytes
get_Values
GetLogicalDrives
fileSystemFlags
dwFlags
ElapsedEventArgs
get_Ticks
get_Tasks
set_Tasks
1Fm3ls
ICredentials
set_Credentials
get_DefaultCredentials
Equals
CreateParams
VaultEnumerateItems
System.Windows.Forms
Contains
System.Web.Extensions
System.Text.RegularExpressions
iterations
System.Collections
set_MaximumAutomaticRedirections
StringSplitOptions
RegexOptions
options
get_Groups
get_Chars
GetImageEncoders
System.Timers
RuntimeHelpers
EncoderParameters
SslPolicyErrors
SystemInformationClass
ObjectInformationClass
ManagementClass
dwDesiredAccess
GrantedAccess
FileAccess
FileMapAllAccess
processAccess
get_Success
CreateProcess
hProcess
OpenProcess
GetCurrentProcess
lpBaseAddress
PublicIpAddress
get_Contacts
set_Contacts
EnableContacts
get_objects
set_objects
VaultEnumerateVaults
pPropertyElements
set_Arguments
get_Accounts
set_Accounts
get_Exists
w3Ga07vgxs
get_Keys
set_Keys
get_ModifierKeys
xeHuBBfPDt
4aIajlwkXEt
VKhHlY9v2Wt
Concat
AppendFormat
ImageFormat
Subtract
VT_BLOB_Object
VT_STREAMED_Object
VT_STORED_Object
ManagementBaseObject
hFileMappingObject
hObject
ManagementObject
cbKeyObject
pbKeyObject
NtQueryObject
object
Collect
set_AllowAutoRedirect
flProtect
Unprotect
System.Net
offset
get_Height
get_Lenght
set_Lenght
op_Explicit
SectionCommit
ATB77tqit
WaitForExit
cbSalt
VaultOpenVault
get_Default
lpDefault
pcbResult
IAsyncResult
phkResult
result
UnsignedInt
ToUpperInvariant
set_UserAgent
PublicUserAgent
WebClient
System.Management
pResourceElement
XmlElement
pAuthenticatorElement
pIdentityElement
dwIncrement
sql_statement
Environment
XmlDocument
get_Parent
GetParent
get_Current
CheckRemoteDebuggerPresent
isDebuggerPresent
content
get_Count
get_HandleCount
get_TickCount
vaultItemCount
set_IterationCount
dwPropertiesCount
vaultCount
pplPwcpt
BCryptDecrypt
BCryptEncrypt
nYHiRVqt
TrimStart
AppStart
Convert
UnsignedShort
vL6EewHjKst
FtpWebRequest
HttpWebRequest
XmlNodeList
ToList
MozillaBrowserList
ChromiumBrowserList
get_Host
set_Host
FtpHost
1QTdjXptt
set_Timeout
GetKeyboardLayout
dwLayout
cbInput
pbInput
cbOutput
pbOutput
get_StandardOutput
set_RedirectStandardOutput
in0yhkI0wt
MoveNext
System.Text
LastCopiedText
KeylogText
ReadAllText
AppendAllText
get_InnerText
GetText
GetWindowText
Log_text
cbMacContext
pbMacContext
uMEeO92u
f8W50QGu
JiT3YQu
OIduUI6tSu
yGmH7Vu
6t6mcu
ehYFeu
jF0XSnOeu
vslffZku
5wddGZoe3lu
cR3Np2v
2TMkxrHm4v
D52KKuurMv
0LuXGFrxYv
AjDnav
ZYOsQT4zsev
6kFR4pnv
QaB9ov
7bLJyPLtv
1VvazpFIuv
DCve1w
OuJe1SDw
c6b3Sw
CEhFlQitYw
kqw9ew
dwMaximumSizeLow
dwFileOffsetLow
get_Now
GetForegroundWindow
NativeWindow
set_CreateNoWindow
s6aJhFiiow
UrX4vw
ZKGFxSK8x
Q8ejAxlDx
ToUnicodeEx
GetModuleFileNameEx
RegQueryValueEx
GetFileSizeEx
UnhookWindowsHookEx
SetWindowsHookEx
CallNextHookEx
MaximumEx
RegOpenKeyEx
ZBYiB8zeMGx
ErpmCmojfHx
Uexazm4nHx
N10tMx
ucchMax
ILeZcx
BufferEndIndex
BlockIndex
BufferStartIndex
HL49tx
wKlGyx
iqCP9y
RyI7dLCy
9qbcP8SVCy
xgIeAFy
qAtqBp7lpUy
qDfajjwuVy
ProtectedArray
ToByteArray
InitializeArray
ToArray
ToCharArray
Consistency
1O5XeAEsdy
get_Key
set_Key
OpenSubKey
subKey
RegCloseKey
get_GuidMasterKey
set_GuidMasterKey
_guidMasterKey
ContainsKey
wVirtKey
hImportKey
BCryptImportKey
BCryptDestroyKey
RegistryKey
_wsftpkey
System.Security.Cryptography
GetExecutingAssembly
PageReadonly
Multiply
JIBdgU4my
PageWriteCopy
BlockCopy
FileMapCopy
System.Runtime.Serialization.Formatters.Binary
AmountOfMemory
get_TotalPhysicalMemory
Directory
Registry
Mp6offxry
get_Capacity
Quality
op_Equality
op_Inequality
System.Security
System.Net.Security
Identity
IsNullOrEmpty
BCryptSetAlgorithmProperty
BCryptGetProperty
BCryptSetProperty
pszProperty
A7DsPDz
QIPx2Sz
FIEOz4oz
J2x8KTVSoz
aQhm3gsz
WrapNonExceptionThrows
1.0.0.0
$0dd626f2-c13c-40c6-b158-9db84250db31
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
tt t!t"t#t$t%t&t't(t)t*t+t,t-t.t/t0t1t2t3t4t5t6t7t8t9t:t;t<t=t>t?t@tAtBtEtFtGtHtItLtiy
k#n+n9
56 7!8"9#:$;%<&='>(?)@*A+B,C-D0E4F5G6H7I8J9L:O;P=RAUD[F`HfLxRyVzX{[|_}b
CBDBJIKIRQWVXVYV_^fehgigjgkglgmgpo
yyyy_MM_dd_HH_mm_ss
/log.tmp
<html>
</html>
yyyy-MM-dd HH:mm:ss
text/plain
Contacts_
<br>User Name:
Time:
<br>RAM:
MM/dd/yyyy HH:mm:ss
<br>Computer Name:
<br>OSFullName:
IP Address:
<br>CPU:
User Name:
Recovered!
Time:
OSFullName:
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
ftp://ftp.horeca-bucuresti.ro
americas2@horeca-bucuresti.ro
H*TE9iL;x61m
appdata
roSkM.exe
http://ip-api.com/line/?fields=hosting
Sf2.dll
snxhk.dll
cmdvrt32.dll
SxIn.dll
SbieDll.dll
Manufacturer
microsoft corporation
VIRTUAL
vmware
VirtualBox
root\CIMV2
SELECT * FROM Win32_VideoController
VMware
Select * from Win32_ComputerSystem
]</b> (
{KEYDOWN}
{PageUp}
{PageDown}
{ALT+TAB}
{KEYUP}
{NumLock}
{KEYRIGHT}
{CTRL}
{ALT+F4}
{HOME}
{Insert}
{KEYLEFT}
{CAPSLOCK}
{BACK}
control
{ENTER}
&quot;
<br><hr>Copied Text: <br>
logins
IE/Edge
2F1A6504-0641-44CF-8BB5-3612D865F2E5
Windows Secure Note
3CCD5499-87A8-4B10-A215-608888DD3B55
Windows Web Password Credential
154E23D0-C644-4E6F-8CE6-5069272F999F
Windows Credential Picker Protector
4BF4C442-9B8A-41A0-B380-DD4A704DDB28
Web Credentials
77BC582B-F0A6-4E15-4E80-61736B6F3B29
Windows Credentials
E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
Windows Domain Certificate Credential
3E0E35BE-1B77-43E7-B873-AED901B6275B
Windows Domain Password Credential
3C886FF3-2669-4AA2-A8FB-3F6759A77548
Windows Extended Credential
00000000-0000-0000-0000-000000000000
SchemaId
pResourceElement
pIdentityElement
pPackageSid
pAuthenticatorElement
UC Browser
UCBrowser\
Login Data
journal
wow_logins
Safari for Windows
\Common Files\Apple\Apple Application Support\plutil.exe
\Apple Computer\Preferences\keychain.plist
<string>
</string>
<data>
</data>
<array>
<dict>
-convert xml1 -s -o "
\fixed_keychain.xml"
\Microsoft\Credentials\
\Microsoft\Protect\
credential
QQ Browser
Profile
\EncryptedStorage
\Default\EncryptedStorage
Tencent\QQBrowser\User Data
entries
category
Password
password_value
IncrediMail
SmtpPassword
PopPassword
Software\IncrediMail\Identities\
\Accounts_New
SmtpServer
EmailAddress
Eudora
Software\Qualcomm\Eudora\CommandLine\
current
Settings
SavePasswordText
ReturnAddress
Falkon Browser
\falkon\profiles\
startProfile=([A-z0-9\/\.\"]+)
profiles.ini
\browsedata.db
autofill
ClawsMail
\Claws-mail
\clawsrc
passkey0
master_passphrase_salt=(.+)
master_passphrase_pbkdf2_rounds=(.+)
\accountrc
smtp_server
address
account
\passwordstorerc
{(.*),(.*)}(.*)
Flock Browser
APPDATA
\Flock\Browser\
signons3.txt
DynDns
ALLUSERSPROFILE
Dyn\Updater\config.dyndns
username=
password=
https://account.dyn.com/
t6KzXhCh
Dyn\Updater\daemon.cfg
global
accounts
account.
username
password
Psi/Psi+
\Psi+\profiles
\accounts.xml
\Psi\profiles
OpenVPN
Software\OpenVPN-GUI\configs
Software\OpenVPN-GUI\configs\
auth-data
entropy
USERPROFILE
\OpenVPN\config\
remote
NordVPN
NordVpn.exe*
user.config
//setting[@name='Username']/value
//setting[@name='Password']/value
Private Internet Access
%ProgramW6432%
Private Internet Access\data
ProgramFiles(x86)
\Private Internet Access\data
\account.json
.*"username":"(.*?)"
.*"password":"(.*?)"
privateinternetaccess.com
FileZilla
\FileZilla\recentservers.xml
<Server>
<Host>
</Host>
<Port>
</Port>
<User>
</User>
<Pass encoding="base64">
</Pass>
<Pass>
CoreFTP
SOFTWARE\FTPWare\COREFTP\Sites
hdfzpysvpzimorhk
WinSCP
SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
HostName
UserName
PublicKeyFile
PortNumber
[PRIVATE KEY LOCATION: "{0}"]
ABCDEF
Flash FXP
\FlashFXP\
Sites.dat
quick.dat
yA36zA48dEhfrvghGRg57h5UlDv3
FTP Navigator
Server
SystemDrive
\FTP Navigator\Ftplist.txt
No Password
SmartFTP
SmartFTP\Client 2.0\Favorites\Quick Connect
WS_FTP
Ipswitch\WS_FTP\Sites\ws_ftp.ini
FtpCommander
\cftp\Ftplist.txt
\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
\Program Files (x86)\FTP Commander\Ftplist.txt
;Port=
;Password=
\VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
\VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
;Server=
;User=
;Anonymous=
FTPGetter
<server>
\FTPGetter\servers.xml
<server_ip>
</server_ip>
<server_port>
</server_port>
<server_user_name>
</server_user_name>
<server_user_password>
</server_user_password>
The Bat!
\The Bat!
\Account.CFN
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
+-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
Becky!
HKEY_CURRENT_USER\Software\RimArts\B2\Settings
DataDir
Folder.lst
\Mailbox.ini
Account
PassWd
SMTPServer
MailAddress
Outlook
9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\11.0\Outlook\Profiles
Software\Microsoft\Office\12.0\Outlook\Profiles
Software\Microsoft\Office\14.0\Outlook\Profiles
Software\Microsoft\Office\15.0\Outlook\Profiles
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\16.0\Outlook\Profiles
IMAP Password
POP3 Password
HTTP Password
SMTP Password
Server
Windows Mail App
COMPlus_legacyCorruptedStateExceptionsPolicy
Software\Microsoft\ActiveSync\Partners
syncpassword
mailoutgoing
FoxMail
HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
Executable
HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
FoxmailPath
\Storage\
\VirtualStore\Program Files\Foxmail\mail
\VirtualStore\Program Files (x86)\Foxmail\mail
\Accounts\Account.rec0
\Account.stg
POP3Host
SMTPHost
IncomingServer
POP3Password
Opera Mail
\Opera Mail\Opera Mail\wand.dat
opera:
ijklmno
vwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
PocoMail
\Pocomail\accounts.ini
POPPass
SMTPPass
eM Client
eM Client\accounts.dat
Accounts
"Username":"
"Secret":"
72905C47-F4FD-4CF7-A489-4E8121A155BD
"ProviderName":"
o6806642kbM7c5
Mailbird
SenderIdentities
\Mailbird\Store\Store.db
Server_Host
Username
EncryptedPassword
RealVNC 4.x
SOFTWARE\RealVNC\WinVNC4
RealVNC 3.x
SOFTWARE\RealVNC\vncserver
TightVNC
Software\TightVNC\Server
PasswordViewOnly
SOFTWARE\Wow6432Node\RealVNC\WinVNC4
TigerVNC
Software\TigerVNC\Server
Software\ORL\WinVNC3
TightVNC ControlPassword
ControlPassword
UltraVNC
\uvnc bvba\UltraVNC\ultravnc.ini
passwd
passwd2
ProgramFiles
\UltraVNC\ultravnc.ini
JDownloader 2.0
JDownloader 2.0\cfg
org.jdownloader.settings.AccountSettings.accounts.ejs
jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
Paltalk
Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
nickname
paltalk.com
Pidgin
\.purple\accounts.xml
<account>
<protocol>
</protocol>
<name>
</name>
<password>
</password>
Trillian
\Trillian\users\global\accounts.dat
trillian.im
MysqlWorkbench
\MySQL\Workbench\workbench_user_data.dat
Internet Downloader Manager
Software\DownloadManager\Passwords\
EncPassword
Discord
discord.com
Discord Token
[\w-]{24}\.[\w-]{6}\.[\w-]{27}
mfa\.[\w-]{84}
discordcanary
Local Storage\leveldb
discordptb
origin_url
username_value
Opera Stable
\Local State
"encrypted_key":"(.*?)"
\Login Data
\Default\Login Data
key4.db
metaData
nssPrivate
2a864886f70d0209
2a864886f70d010c050103
key3.db
global-salt
Version
password-check
Path=([A-z0-9\/\.\-]+)
[^\u0020-\u007F]
logins.json
\"(hostname|encryptedPassword|encryptedUsername)":"(.*?)"
signons.sqlite
moz_logins
hostname
encryptedUsername
encryptedPassword
Host:
Application:
Password:
Username:
<br>Password:
<br>Username:
<br><hr>
<br>Application:
Yandex Browser
Yandex\YandexBrowser\User Data
Chrome
Google\Chrome\User Data
Chedot
Chedot\User Data
BlackHawk
\NETGATE Technologies\BlackHawk\
Amigo\User Data
K-Meleon
\K-Meleon\
Iridium Browser
Iridium\User Data
Orbitum
Orbitum\User Data
WaterFox
\Waterfox\
Edge Chromium
Microsoft\Edge\User Data
Kometa
Kometa\User Data
Cool Novo
MapleStudio\ChromePlus\User Data
Chromium
Chromium\User Data
Sleipnir 6
Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
PaleMoon
\Moonchild Productions\Pale Moon\
uCozMedia\Uran\User Data
Postbox
\Postbox\
Torch Browser
Torch\User Data
Opera Browser
Opera Software\Opera Stable
Vivaldi
Vivaldi\User Data
IceCat
\Mozilla\icecat\
360 Browser
360Chrome\Chrome\User Data
Coccoc
CocCoc\Browser\User Data
7Star\7Star\User Data
Sputnik
Sputnik\Sputnik\User Data
Liebao Browser
liebao\User Data
QIP Surf
QIP Surf\User Data
BraveSoftware\Brave-Browser\User Data
SeaMonkey
\Mozilla\SeaMonkey\
CyberFox
\8pecxstudios\Cyberfox\
IceDragon
\Comodo\IceDragon\
Elements Browser
Elements Browser\User Data
CentBrowser
CentBrowser\User Data
Comodo Dragon
Comodo\Dragon\User Data
Citrio
CatalinaGroup\Citrio\User Data
Firefox
\Mozilla\Firefox\
Epic Privacy
Epic Privacy Browser\User Data
Coowon
Coowon\Coowon\User Data
Thunderbird
\Thunderbird\
00061561
Berkelet DB
00000002
1.85 (Hash, version 2, native byte-order)
Unknow database format
SQLite format 3
UNIQUE
global-messages-db.sqlite
identities
{0:X2}
OBJECTIDENTIFIER
INTEGER
SEQUENCE {
OCTETSTRING
Windows Credential
chrome
{{{0}}}
policy
sha512
ObjectLength
ChainingModeGCM
AuthTagLength
ChainingMode
KeyDataBlob
Microsoft Primitive Provider
:Zone.Identifier
SELECT * FROM Win32_Processor
win32_processor
processorID
960fd4af-eb8f-4b2a-ad9f-fbd4c25ed497
Win32_NetworkAdapterConfiguration
IPEnabled
MacAddress
cf80117c-610d-47fc-9622-68f0738e7a85
Win32_BaseBoard
SerialNumber
33ed95e2-8cd1-4d49-b750-3e46ad657513
FormatID: {0}
Version: 0x{0:X}
StorageSize: {0} (0x{0:X})
Size of the SerializedPropertyStorage is less than 28 ({0})
Size of the SerializedPropertyStore is less than {0} ({1})
Version is not equal to {0} ({1})
{D5CDD505-2E9C-101B-9397-08002B2CF9AE}
Value: {0}
Type: {0}
Name: {0}
ValueSize: {0} (0x{0:X})
NameSize: {0} (0x{0:X})
Size of the NameSize is not equal to {0} ({1})
Size of the StringName is not equal to {0} ({1})
Size of the StringName is less than 9 ({0})
ID: 0x{0:X}
Size of the SerializedPropertyStore is less than 8 ({0})
StoreSize: {0} (0x{0X})
\Device\LanmanRedirector\
Failed to retrieve system handle information.
Accounts
logins
sha512
credential
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
7bcd610d-7af6-4dc2-875b-dc4fec91463c.exe
LegalCopyright
OriginalFilename
7bcd610d-7af6-4dc2-875b-dc4fec91463c.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.AgentTesla.i!c
tehtris Clean
ClamAV Win.Packed.Msilperseus-9956591-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.AgentTesla.dt
ALYac Gen:Variant.Jalapeno.320
Cylance Unsafe
Zillya Trojan.AgentTesla.Win32.9795
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005ac7f11 )
Alibaba TrojanPSW:MSIL/AgentTesla.e44d3d5d
K7GW Trojan ( 005ac7f11 )
Cybereason malicious.24efc9
Baidu Clean
VirIT Trojan.Win32.AgentTesla.DAA
Symantec Trojan.Whispergate
Elastic Windows.Generic.Threat
ESET-NOD32 a variant of MSIL/Spy.AgentTesla.F
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan-PSW.MSIL.Agensla.a
BitDefender Gen:Variant.Jalapeno.320
NANO-Antivirus Trojan.Win32.Agensla.kmfjyp
ViRobot Trojan.Win.Z.Jalapeno.244224
MicroWorld-eScan Gen:Variant.Jalapeno.320
Tencent Malware.Win32.Gencirc.140a62dc
Sophos Troj/Tesla-CNT
F-Secure Heuristic.HEUR/AGEN.1370979
DrWeb BackDoor.SpyBotNET.75
VIPRE Gen:Variant.Jalapeno.320
TrendMicro TrojanSpy.Win32.NEGASTEAL.YXEDXZ
McAfeeD Real Protect-LS!2788F9C24EFC
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.2788f9c24efc9877
Emsisoft Gen:Variant.Jalapeno.320 (B)
Paloalto generic.ml
GData MSIL.Trojan-Stealer.BatStealer.A
Jiangmin Trojan.PSW.MSIL.etei
Webroot Clean
Varist W32/Azorult.D.gen!Eldorado
Avira HEUR/AGEN.1370979
MAX malware (ai score=81)
Antiy-AVL Clean
Kingsoft MSIL.Trojan-PSW.Agensla.a
Gridinsoft Ransom.Win32.AzorUlt.sa
Xcitium Malware@#250in2g0xxejd
Arcabit Trojan.Jalapeno.320
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Agensla.a
Microsoft Trojan:MSIL/AgentTesla.CCHS!MTB
Google Detected
AhnLab-V3 Infostealer/Win.AgentTesla.C5555608
Acronis Clean
McAfee AgentTesla!2788F9C24EFC
TACHYON Clean
VBA32 Trojan.MSIL.InfoStealer.gen.D
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.NEGASTEAL.YXEDXZ
Rising Trojan.AntiVM!1.CF63 (CLASSIC)
Yandex TrojanSpy.AgentTesla!OU4TKkq3uQo
Ikarus Trojan-Spy.MSIL.Redline
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/AgentTesla.B!tr
BitDefenderTheta Gen:NN.ZemsilF.36808.om0@a0ocXjo
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Trojan[stealer]:MSIL/AgentTesla.I
No IRMA results available.