Detections

Yara:

Loki

Analysis

Category Package Started Completed Duration Options Log
FILE exe 2020-06-30 13:36:12 2020-06-30 13:41:43 331 seconds Show Options Show Log
route = tor
2020-05-13 09:13:38,313 [root] INFO: Date set to: 20200630T13:33:50, timeout set to: 200
2020-06-30 13:33:50,046 [root] DEBUG: Starting analyzer from: C:\tmpq_mrpfl7
2020-06-30 13:33:50,046 [root] DEBUG: Storing results at: C:\SxZDEdf
2020-06-30 13:33:50,046 [root] DEBUG: Pipe server name: \\.\PIPE\AGwwTJ
2020-06-30 13:33:50,046 [root] DEBUG: Python path: C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32
2020-06-30 13:33:50,046 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-06-30 13:33:50,062 [root] INFO: Automatically selected analysis package "exe"
2020-06-30 13:33:50,062 [root] DEBUG: Trying to import analysis package "exe"...
2020-06-30 13:33:50,078 [root] DEBUG: Imported analysis package "exe".
2020-06-30 13:33:50,078 [root] DEBUG: Trying to initialize analysis package "exe"...
2020-06-30 13:33:50,078 [root] DEBUG: Initialized analysis package "exe".
2020-06-30 13:33:50,171 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.browser"...
2020-06-30 13:33:50,203 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser".
2020-06-30 13:33:50,203 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.curtain"...
2020-06-30 13:33:50,234 [root] DEBUG: Imported auxiliary module "modules.auxiliary.curtain".
2020-06-30 13:33:50,234 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.digisig"...
2020-06-30 13:33:50,249 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig".
2020-06-30 13:33:50,249 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.disguise"...
2020-06-30 13:33:50,265 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise".
2020-06-30 13:33:50,265 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.human"...
2020-06-30 13:33:50,296 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human".
2020-06-30 13:33:50,296 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.procmon"...
2020-06-30 13:33:50,296 [root] DEBUG: Imported auxiliary module "modules.auxiliary.procmon".
2020-06-30 13:33:50,312 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.screenshots"...
2020-06-30 13:33:50,312 [modules.auxiliary.screenshots] DEBUG: Importing 'time'
2020-06-30 13:33:50,312 [modules.auxiliary.screenshots] DEBUG: Importing 'StringIO'
2020-06-30 13:33:50,312 [modules.auxiliary.screenshots] DEBUG: Importing 'Thread'
2020-06-30 13:33:50,312 [modules.auxiliary.screenshots] DEBUG: Importing 'Auxiliary'
2020-06-30 13:33:50,312 [modules.auxiliary.screenshots] DEBUG: Importing 'NetlogFile'
2020-06-30 13:33:50,312 [modules.auxiliary.screenshots] DEBUG: Importing 'Screenshot'
2020-06-30 13:33:50,328 [lib.api.screenshot] DEBUG: Importing 'math'
2020-06-30 13:33:50,328 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2020-06-30 13:33:51,609 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2020-06-30 13:33:51,656 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2020-06-30 13:33:51,656 [modules.auxiliary.screenshots] DEBUG: Imports OK
2020-06-30 13:33:51,671 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots".
2020-06-30 13:33:51,671 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.sysmon"...
2020-06-30 13:33:51,671 [root] DEBUG: Imported auxiliary module "modules.auxiliary.sysmon".
2020-06-30 13:33:51,671 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.usage"...
2020-06-30 13:33:51,671 [root] DEBUG: Imported auxiliary module "modules.auxiliary.usage".
2020-06-30 13:33:51,687 [root] DEBUG: Trying to initialize auxiliary module "Browser"...
2020-06-30 13:33:51,687 [root] DEBUG: Initialized auxiliary module "Browser".
2020-06-30 13:33:51,687 [root] DEBUG: Trying to start auxiliary module "Browser"...
2020-06-30 13:33:51,687 [root] DEBUG: Started auxiliary module Browser
2020-06-30 13:33:51,687 [root] DEBUG: Trying to initialize auxiliary module "Curtain"...
2020-06-30 13:33:51,687 [root] DEBUG: Initialized auxiliary module "Curtain".
2020-06-30 13:33:51,687 [root] DEBUG: Trying to start auxiliary module "Curtain"...
2020-06-30 13:33:51,687 [root] DEBUG: Started auxiliary module Curtain
2020-06-30 13:33:51,687 [root] DEBUG: Trying to initialize auxiliary module "DigiSig"...
2020-06-30 13:33:51,687 [root] DEBUG: Initialized auxiliary module "DigiSig".
2020-06-30 13:33:51,687 [root] DEBUG: Trying to start auxiliary module "DigiSig"...
2020-06-30 13:33:51,687 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature.
2020-06-30 13:33:51,890 [modules.auxiliary.digisig] DEBUG: File is not signed.
2020-06-30 13:33:51,890 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2020-06-30 13:33:51,906 [root] DEBUG: Started auxiliary module DigiSig
2020-06-30 13:33:51,906 [root] DEBUG: Trying to initialize auxiliary module "Disguise"...
2020-06-30 13:33:51,906 [root] DEBUG: Initialized auxiliary module "Disguise".
2020-06-30 13:33:51,906 [root] DEBUG: Trying to start auxiliary module "Disguise"...
2020-06-30 13:33:51,921 [root] DEBUG: Started auxiliary module Disguise
2020-06-30 13:33:51,921 [root] DEBUG: Trying to initialize auxiliary module "Human"...
2020-06-30 13:33:51,921 [root] DEBUG: Initialized auxiliary module "Human".
2020-06-30 13:33:51,921 [root] DEBUG: Trying to start auxiliary module "Human"...
2020-06-30 13:33:51,921 [root] DEBUG: Started auxiliary module Human
2020-06-30 13:33:51,921 [root] DEBUG: Trying to initialize auxiliary module "Procmon"...
2020-06-30 13:33:51,937 [root] DEBUG: Initialized auxiliary module "Procmon".
2020-06-30 13:33:51,937 [root] DEBUG: Trying to start auxiliary module "Procmon"...
2020-06-30 13:33:51,937 [root] DEBUG: Started auxiliary module Procmon
2020-06-30 13:33:51,937 [root] DEBUG: Trying to initialize auxiliary module "Screenshots"...
2020-06-30 13:33:51,937 [root] DEBUG: Initialized auxiliary module "Screenshots".
2020-06-30 13:33:51,937 [root] DEBUG: Trying to start auxiliary module "Screenshots"...
2020-06-30 13:33:51,937 [root] DEBUG: Started auxiliary module Screenshots
2020-06-30 13:33:51,937 [root] DEBUG: Trying to initialize auxiliary module "Sysmon"...
2020-06-30 13:33:51,937 [root] DEBUG: Initialized auxiliary module "Sysmon".
2020-06-30 13:33:51,937 [root] DEBUG: Trying to start auxiliary module "Sysmon"...
2020-06-30 13:33:51,937 [root] DEBUG: Started auxiliary module Sysmon
2020-06-30 13:33:51,937 [root] DEBUG: Trying to initialize auxiliary module "Usage"...
2020-06-30 13:33:51,937 [root] DEBUG: Initialized auxiliary module "Usage".
2020-06-30 13:33:51,937 [root] DEBUG: Trying to start auxiliary module "Usage"...
2020-06-30 13:33:51,937 [root] DEBUG: Started auxiliary module Usage
2020-06-30 13:33:51,937 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option
2020-06-30 13:33:51,937 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option
2020-06-30 13:33:51,937 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader option
2020-06-30 13:33:51,937 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader_64 option
2020-06-30 13:33:52,281 [lib.api.process] INFO: Successfully executed process from path "C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe" with arguments "" with pid 4016
2020-06-30 13:33:52,281 [lib.api.process] INFO: Monitor config for process 4016: C:\tmpq_mrpfl7\dll\4016.ini
2020-06-30 13:33:52,281 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:52,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:52,328 [root] DEBUG: Loader: Injecting process 4016 (thread 648) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:52,328 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:33:52,343 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:52,343 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:33:52,343 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4016
2020-06-30 13:33:54,343 [lib.api.process] INFO: Successfully resumed process with pid 4016
2020-06-30 13:33:55,078 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:33:55,093 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:33:55,093 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-06-30 13:33:55,109 [root] INFO: Loaded monitor into process with pid 4016
2020-06-30 13:33:55,109 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 4016, handle 0xbc.
2020-06-30 13:33:55,125 [root] INFO: Disabling sleep skipping.
2020-06-30 13:33:55,125 [root] DEBUG: set_caller_info: Adding region at 0x003D0000 to caller regions list (ntdll::NtAllocateVirtualMemory).
2020-06-30 13:33:55,125 [root] DEBUG: set_caller_info: Adding region at 0x01300000 to caller regions list (kernel32::GetSystemTime).
2020-06-30 13:33:55,140 [root] DEBUG: DLL loaded at 0x75B30000: C:\Windows\system32\cryptbase (0xc000 bytes).
2020-06-30 13:33:55,140 [root] DEBUG: DumpMemory: Exception occured reading memory address 0x1300000
2020-06-30 13:33:55,140 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x01300000 size 0x400000.
2020-06-30 13:33:55,156 [root] DEBUG: DumpPEsInRange: Scanning range 0x1300000 - 0x1301000.
2020-06-30 13:33:55,156 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x1300000-0x1301000.
2020-06-30 13:33:55,187 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\SxZDEdf\CAPE\4016_139712899255331530262020 (size 0xe47)
2020-06-30 13:33:55,187 [root] DEBUG: DumpRegion: Dumped stack region from 0x01300000, size 0x1000.
2020-06-30 13:33:55,406 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\SxZDEdf\CAPE\4016_93695215455331530262020 (size 0x93f0)
2020-06-30 13:33:55,406 [root] DEBUG: DumpRegion: Dumped stack region from 0x003D0000, size 0xa000.
2020-06-30 13:33:55,406 [root] DEBUG: set_caller_info: Adding region at 0x003F0000 to caller regions list (ntdll::memcpy).
2020-06-30 13:33:55,437 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\SxZDEdf\CAPE\4016_146959109055331530262020 (size 0x1a)
2020-06-30 13:33:55,437 [root] DEBUG: DumpRegion: Dumped stack region from 0x003F0000, size 0x1000.
2020-06-30 13:33:55,453 [root] INFO: Announced 32-bit process name: crypted_pdf.exe pid: 1088
2020-06-30 13:33:55,453 [lib.api.process] INFO: Monitor config for process 1088: C:\tmpq_mrpfl7\dll\1088.ini
2020-06-30 13:33:55,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:55,468 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:55,468 [root] DEBUG: Loader: Injecting process 1088 (thread 5308) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,468 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:33:55,484 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,484 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:33:55,484 [root] DEBUG: Successfully injected DLL C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,484 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1088
2020-06-30 13:33:55,484 [root] DEBUG: DLL loaded at 0x75AE0000: C:\Windows\system32\apphelp (0x4c000 bytes).
2020-06-30 13:33:55,515 [root] DEBUG: DLL unloaded from 0x00400000.
2020-06-30 13:33:55,515 [root] DEBUG: CreateProcessHandler: using lpCommandLine: "C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe" .
2020-06-30 13:33:55,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1088, ImageBase: 0x00400000
2020-06-30 13:33:55,515 [root] INFO: Announced 32-bit process name: crypted_pdf.exe pid: 1088
2020-06-30 13:33:55,515 [lib.api.process] INFO: Monitor config for process 1088: C:\tmpq_mrpfl7\dll\1088.ini
2020-06-30 13:33:55,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:55,531 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:55,531 [root] DEBUG: Loader: Injecting process 1088 (thread 5308) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,531 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:33:55,531 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,531 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-06-30 13:33:55,531 [root] DEBUG: Successfully injected DLL C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1088
2020-06-30 13:33:55,546 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x108 amd local view 0x02C10000 to global list.
2020-06-30 13:33:55,546 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x108 to target process 1088.
2020-06-30 13:33:55,546 [root] INFO: Announced 32-bit process name: crypted_pdf.exe pid: 1088
2020-06-30 13:33:55,546 [lib.api.process] INFO: Monitor config for process 1088: C:\tmpq_mrpfl7\dll\1088.ini
2020-06-30 13:33:55,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:55,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:55,562 [root] DEBUG: Loader: Injecting process 1088 (thread 0) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,562 [root] DEBUG: Error 299 (0x12b) - GetProcessInitialThreadId: Failed to read from process: Only part of a ReadProcessMemory or WriteProcessMemory request was completed.
2020-06-30 13:33:55,562 [root] DEBUG: InjectDll: No thread ID supplied, GetProcessInitialThreadId failed (SessionId=1).
2020-06-30 13:33:55,562 [root] DEBUG: Failed to inject DLL C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,562 [lib.api.process] ERROR: Unable to inject into 32-bit process with pid 1088, error: 4294967281
2020-06-30 13:33:55,578 [root] DEBUG: SetThreadContextHandler: Hollow process entry point reset via NtSetContextThread to 0x000139DE (process 1088).
2020-06-30 13:33:55,578 [root] INFO: Announced 32-bit process name: crypted_pdf.exe pid: 1088
2020-06-30 13:33:55,578 [lib.api.process] INFO: Monitor config for process 1088: C:\tmpq_mrpfl7\dll\1088.ini
2020-06-30 13:33:55,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:55,593 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:55,593 [root] DEBUG: Loader: Injecting process 1088 (thread 5308) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,593 [root] DEBUG: Process image base: 0x00400000
2020-06-30 13:33:55,593 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,593 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:33:55,593 [root] DEBUG: Successfully injected DLL C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:55,593 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1088
2020-06-30 13:33:55,609 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00400000.
2020-06-30 13:33:55,609 [root] DEBUG: DumpProcess: Module entry point VA is 0x000139DE.
2020-06-30 13:33:55,656 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x18200.
2020-06-30 13:33:55,656 [root] DEBUG: ResumeThreadHandler: Dumped PE image from buffer.
2020-06-30 13:33:55,656 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 1088.
2020-06-30 13:33:55,656 [root] DEBUG: DumpSectionViewsForPid: Shared section view found with pid 1088, local address 0x02C10000.
2020-06-30 13:33:55,656 [root] DEBUG: ScanForDisguisedPE: PE image located at: 0x2c10000
2020-06-30 13:33:55,656 [root] DEBUG: DumpSectionViewsForPid: Dumping PE image from shared section view, local address 0x02C10000.
2020-06-30 13:33:55,656 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-30 13:33:55,656 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x02C10000.
2020-06-30 13:33:55,671 [root] DEBUG: DumpProcess: Module entry point VA is 0x000139DE.
2020-06-30 13:33:55,671 [root] DEBUG: readPeSectionsFromProcess: Failed to relocate image back to header image base 0x00400000.
2020-06-30 13:33:55,671 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x18200.
2020-06-30 13:33:55,671 [root] DEBUG: DumpSectionViewsForPid: Dumped PE image from shared section view.
2020-06-30 13:33:55,687 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x2c10001-0x2cb2000.
2020-06-30 13:33:55,687 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 4016
2020-06-30 13:33:55,687 [root] DEBUG: GetHookCallerBase: thread 3272 (handle 0x0), return address 0x003D2E8B, allocation base 0x003D0000.
2020-06-30 13:33:55,687 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00400000.
2020-06-30 13:33:55,687 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-30 13:33:55,687 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00400000.
2020-06-30 13:33:55,687 [root] DEBUG: DumpProcess: Module entry point VA is 0x00057B6C.
2020-06-30 13:33:55,703 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:33:55,703 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:33:55,703 [root] INFO: Disabling sleep skipping.
2020-06-30 13:33:55,718 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-06-30 13:33:55,718 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 1088 at 0x6b650000, image base 0x400000, stack from 0x126000-0x130000
2020-06-30 13:33:55,718 [root] DEBUG: Commandline: C:\Users\Rebecca\AppData\Local\Temp\"C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe".
2020-06-30 13:33:55,734 [root] INFO: Loaded monitor into process with pid 1088
2020-06-30 13:33:55,734 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xb8 amd local view 0x76AE0000 to global list.
2020-06-30 13:33:55,734 [root] DEBUG: DLL loaded at 0x76AE0000: C:\Windows\system32\SHELL32 (0xc4c000 bytes).
2020-06-30 13:33:55,750 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x95e00.
2020-06-30 13:33:55,750 [root] DEBUG: DLL unloaded from 0x76730000.
2020-06-30 13:33:55,765 [root] INFO: Process with pid 4016 has terminated
2020-06-30 13:33:55,765 [root] DEBUG: DLL loaded at 0x75600000: C:\Windows\system32\CRYPTSP (0x17000 bytes).
2020-06-30 13:33:55,781 [root] DEBUG: DLL loaded at 0x75390000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2020-06-30 13:33:55,781 [root] DEBUG: DLL loaded at 0x75B30000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2020-06-30 13:33:55,812 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xe4 amd local view 0x6B1C0000 to global list.
2020-06-30 13:33:55,812 [root] DEBUG: DLL loaded at 0x6B1C0000: C:\Program Files\Mozilla Firefox\nss3 (0x22f000 bytes).
2020-06-30 13:33:55,843 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6B5D0000 for section view with handle 0xe4.
2020-06-30 13:33:55,843 [root] DEBUG: DLL loaded at 0x6B5D0000: C:\Program Files\Mozilla Firefox\mozglue (0x71000 bytes).
2020-06-30 13:33:55,843 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xd8 amd local view 0x75D60000 to global list.
2020-06-30 13:33:55,843 [root] DEBUG: DLL loaded at 0x75D60000: C:\Windows\system32\CRYPT32 (0x122000 bytes).
2020-06-30 13:33:55,843 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x75C50000 for section view with handle 0xd8.
2020-06-30 13:33:55,859 [root] DEBUG: DLL loaded at 0x75C50000: C:\Windows\system32\MSASN1 (0xc000 bytes).
2020-06-30 13:33:55,859 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x750B0000 for section view with handle 0xe4.
2020-06-30 13:33:55,859 [root] DEBUG: DLL loaded at 0x750B0000: C:\Windows\system32\VERSION (0x9000 bytes).
2020-06-30 13:33:55,875 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x75E90000 for section view with handle 0xd8.
2020-06-30 13:33:55,875 [root] DEBUG: DLL loaded at 0x75E90000: C:\Windows\system32\WINTRUST (0x2f000 bytes).
2020-06-30 13:33:55,875 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6BF80000 for section view with handle 0xe4.
2020-06-30 13:33:55,890 [root] DEBUG: DLL loaded at 0x6BF80000: C:\Windows\system32\dbghelp (0xeb000 bytes).
2020-06-30 13:33:55,921 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6B550000 for section view with handle 0xe4.
2020-06-30 13:33:55,984 [root] DEBUG: DLL loaded at 0x6B550000: C:\Windows\system32\MSVCP140 (0x71000 bytes).
2020-06-30 13:33:56,062 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6F470000 for section view with handle 0xe4.
2020-06-30 13:33:56,062 [root] DEBUG: DLL loaded at 0x6F470000: C:\Windows\system32\VCRUNTIME140 (0x15000 bytes).
2020-06-30 13:33:56,093 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D580000 for section view with handle 0xe4.
2020-06-30 13:33:56,093 [root] DEBUG: DLL loaded at 0x6D580000: C:\Windows\system32\api-ms-win-crt-runtime-l1-1-0 (0x4000 bytes).
2020-06-30 13:33:56,109 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D4A0000 for section view with handle 0xe4.
2020-06-30 13:33:56,109 [root] DEBUG: DLL loaded at 0x6D4A0000: C:\Windows\system32\ucrtbase (0xe0000 bytes).
2020-06-30 13:33:56,109 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D460000 for section view with handle 0xe4.
2020-06-30 13:33:56,125 [root] DEBUG: DLL loaded at 0x6D460000: C:\Windows\system32\api-ms-win-core-timezone-l1-1-0 (0x3000 bytes).
2020-06-30 13:33:56,125 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73BE0000 for section view with handle 0xe4.
2020-06-30 13:33:56,125 [root] DEBUG: DLL loaded at 0x73BE0000: C:\Windows\system32\api-ms-win-core-file-l2-1-0 (0x3000 bytes).
2020-06-30 13:33:56,140 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73BD0000 for section view with handle 0xe4.
2020-06-30 13:33:56,140 [root] DEBUG: DLL loaded at 0x73BD0000: C:\Windows\system32\api-ms-win-core-localization-l1-2-0 (0x3000 bytes).
2020-06-30 13:33:56,156 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73BB0000 for section view with handle 0xe4.
2020-06-30 13:33:56,171 [root] DEBUG: DLL loaded at 0x73BB0000: C:\Windows\system32\api-ms-win-core-processthreads-l1-1-1 (0x3000 bytes).
2020-06-30 13:33:56,171 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73BA0000 for section view with handle 0xe4.
2020-06-30 13:33:56,171 [root] DEBUG: DLL loaded at 0x73BA0000: C:\Windows\system32\api-ms-win-core-file-l1-2-0 (0x3000 bytes).
2020-06-30 13:33:56,171 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73B90000 for section view with handle 0xe4.
2020-06-30 13:33:56,187 [root] DEBUG: DLL loaded at 0x73B90000: C:\Windows\system32\api-ms-win-crt-string-l1-1-0 (0x4000 bytes).
2020-06-30 13:33:56,187 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73B80000 for section view with handle 0xe4.
2020-06-30 13:33:56,203 [root] DEBUG: DLL loaded at 0x73B80000: C:\Windows\system32\api-ms-win-crt-heap-l1-1-0 (0x3000 bytes).
2020-06-30 13:33:56,218 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73B30000 for section view with handle 0xe4.
2020-06-30 13:33:56,218 [root] DEBUG: DLL loaded at 0x73B30000: C:\Windows\system32\api-ms-win-crt-stdio-l1-1-0 (0x4000 bytes).
2020-06-30 13:33:56,234 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73B20000 for section view with handle 0xe4.
2020-06-30 13:33:56,234 [root] DEBUG: DLL loaded at 0x73B20000: C:\Windows\system32\api-ms-win-crt-convert-l1-1-0 (0x4000 bytes).
2020-06-30 13:33:56,234 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73AE0000 for section view with handle 0xe4.
2020-06-30 13:33:56,249 [root] DEBUG: DLL loaded at 0x73AE0000: C:\Windows\system32\api-ms-win-crt-locale-l1-1-0 (0x3000 bytes).
2020-06-30 13:33:56,249 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73B10000 for section view with handle 0xe4.
2020-06-30 13:33:56,249 [root] DEBUG: DLL loaded at 0x73B10000: C:\Windows\system32\api-ms-win-crt-math-l1-1-0 (0x5000 bytes).
2020-06-30 13:33:56,265 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73570000 for section view with handle 0xe4.
2020-06-30 13:33:56,281 [root] DEBUG: DLL loaded at 0x73570000: C:\Windows\system32\api-ms-win-crt-multibyte-l1-1-0 (0x5000 bytes).
2020-06-30 13:33:56,296 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73AD0000 for section view with handle 0xe4.
2020-06-30 13:33:56,328 [root] DEBUG: DLL loaded at 0x73AD0000: C:\Windows\system32\api-ms-win-crt-time-l1-1-0 (0x3000 bytes).
2020-06-30 13:33:56,328 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73A60000 for section view with handle 0xe4.
2020-06-30 13:33:56,343 [root] DEBUG: DLL loaded at 0x73A60000: C:\Windows\system32\api-ms-win-crt-filesystem-l1-1-0 (0x3000 bytes).
2020-06-30 13:33:56,343 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x73A90000 for section view with handle 0xe4.
2020-06-30 13:33:56,343 [root] DEBUG: DLL loaded at 0x73A90000: C:\Windows\system32\api-ms-win-crt-environment-l1-1-0 (0x3000 bytes).
2020-06-30 13:33:56,343 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x738D0000 for section view with handle 0xe4.
2020-06-30 13:33:56,359 [root] DEBUG: DLL loaded at 0x738D0000: C:\Windows\system32\api-ms-win-crt-utility-l1-1-0 (0x3000 bytes).
2020-06-30 13:33:56,359 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x71540000 for section view with handle 0xe4.
2020-06-30 13:33:56,421 [root] DEBUG: DLL loaded at 0x71540000: C:\Windows\system32\WINMM (0x32000 bytes).
2020-06-30 13:33:56,421 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6E5C0000 for section view with handle 0xe4.
2020-06-30 13:33:56,437 [root] DEBUG: DLL loaded at 0x6E5C0000: C:\Windows\system32\WSOCK32 (0x7000 bytes).
2020-06-30 13:33:56,468 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x114 amd local view 0x6B510000 to global list.
2020-06-30 13:33:56,484 [root] DEBUG: DLL loaded at 0x6B510000: C:\Program Files\Mozilla Firefox\softokn3 (0x37000 bytes).
2020-06-30 13:33:56,500 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6B150000 for section view with handle 0x114.
2020-06-30 13:33:56,515 [root] DEBUG: DLL loaded at 0x6B150000: C:\Program Files\Mozilla Firefox\freebl3 (0x6f000 bytes).
2020-06-30 13:33:56,656 [root] DEBUG: DLL unloaded from 0x6B150000.
2020-06-30 13:33:56,656 [root] DEBUG: DLL unloaded from 0x6B510000.
2020-06-30 13:33:56,671 [root] DEBUG: DLL unloaded from 0x6B1C0000.
2020-06-30 13:33:56,671 [root] DEBUG: DLL unloaded from 0x72490000.
2020-06-30 13:33:56,687 [root] DEBUG: DLL unloaded from 0x76650000.
2020-06-30 13:33:56,765 [root] DEBUG: DLL unloaded from 0x72490000.
2020-06-30 13:33:56,796 [root] DEBUG: DLL unloaded from 0x76650000.
2020-06-30 13:33:57,187 [root] DEBUG: DLL loaded at 0x73570000: C:\Windows\system32\vaultcli (0xc000 bytes).
2020-06-30 13:33:57,203 [root] DEBUG: DLL unloaded from 0x77D90000.
2020-06-30 13:33:58,125 [root] INFO: Announced starting service "b'VaultSvc'"
2020-06-30 13:33:58,125 [lib.api.process] INFO: Monitor config for process 460: C:\tmpq_mrpfl7\dll\460.ini
2020-06-30 13:33:58,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:58,218 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:58,234 [root] DEBUG: Loader: Injecting process 460 (thread 0) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:58,234 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 520, handle 0xa0
2020-06-30 13:33:58,234 [root] DEBUG: Process image base: 0x00D00000
2020-06-30 13:33:58,249 [root] DEBUG: InjectDllViaIAT: Not a new process, aborting IAT patch
2020-06-30 13:33:58,249 [root] DEBUG: InjectDll: IAT patching failed, falling back to thread injection.
2020-06-30 13:33:58,296 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:33:58,296 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:33:58,296 [root] INFO: Disabling sleep skipping.
2020-06-30 13:33:58,296 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 460 at 0x6b650000, image base 0xd00000, stack from 0x1c96000-0x1ca0000
2020-06-30 13:33:58,328 [root] DEBUG: Commandline: C:\Windows\System32\services.exe.
2020-06-30 13:33:58,328 [root] INFO: Loaded monitor into process with pid 460
2020-06-30 13:33:58,328 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-30 13:33:58,343 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-30 13:33:58,343 [root] DEBUG: Successfully injected DLL C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:59,359 [root] INFO: Announced 32-bit process name: lsass.exe pid: 5924
2020-06-30 13:33:59,359 [lib.api.process] INFO: Monitor config for process 5924: C:\tmpq_mrpfl7\dll\5924.ini
2020-06-30 13:33:59,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:59,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:59,390 [root] DEBUG: Loader: Injecting process 5924 (thread 5992) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:59,390 [root] DEBUG: Process image base: 0x00830000
2020-06-30 13:33:59,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:59,406 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-06-30 13:33:59,406 [root] DEBUG: Successfully injected DLL C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:59,406 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5924
2020-06-30 13:33:59,421 [root] DEBUG: CreateProcessHandler: using lpCommandLine: C:\Windows\system32\lsass.exe.
2020-06-30 13:33:59,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5924, ImageBase: 0x00830000
2020-06-30 13:33:59,468 [root] INFO: Announced 32-bit process name: lsass.exe pid: 5924
2020-06-30 13:33:59,468 [lib.api.process] INFO: Monitor config for process 5924: C:\tmpq_mrpfl7\dll\5924.ini
2020-06-30 13:33:59,484 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpq_mrpfl7\dll\IjSOxS.dll, loader C:\tmpq_mrpfl7\bin\ZetYYlZ.exe
2020-06-30 13:33:59,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\AGwwTJ.
2020-06-30 13:33:59,500 [root] DEBUG: Loader: Injecting process 5924 (thread 5992) with C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:59,515 [root] DEBUG: Process image base: 0x00830000
2020-06-30 13:33:59,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:59,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-06-30 13:33:59,515 [root] DEBUG: Successfully injected DLL C:\tmpq_mrpfl7\dll\IjSOxS.dll.
2020-06-30 13:33:59,531 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5924
2020-06-30 13:33:59,531 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 5924.
2020-06-30 13:33:59,546 [root] DEBUG: Python path set to 'C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32'.
2020-06-30 13:33:59,562 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-30 13:33:59,578 [root] INFO: Disabling sleep skipping.
2020-06-30 13:33:59,578 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-06-30 13:33:59,578 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 5924 at 0x6b650000, image base 0x830000, stack from 0x156000-0x160000
2020-06-30 13:33:59,578 [root] DEBUG: Commandline: C:\Windows\System32\lsass.exe.
2020-06-30 13:33:59,593 [root] INFO: Loaded monitor into process with pid 5924
2020-06-30 13:34:29,531 [root] INFO: Process with pid 5924 has terminated
2020-06-30 13:34:29,578 [root] DEBUG: ResumeThreadHandler: CurrentInjectionInfo 0x0 (Pid 1088).
2020-06-30 13:34:30,000 [root] DEBUG: DLL loaded at 0x75BE0000: C:\Windows\system32\profapi (0xb000 bytes).
2020-06-30 13:34:30,859 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x148 amd local view 0x74770000 to global list.
2020-06-30 13:34:30,859 [root] DEBUG: DLL loaded at 0x73B00000: C:\Windows\system32\SAMCLI (0xf000 bytes).
2020-06-30 13:34:30,875 [root] DEBUG: DLL loaded at 0x74730000: C:\Windows\system32\WKSCLI (0xf000 bytes).
2020-06-30 13:34:30,875 [root] DEBUG: DLL loaded at 0x74770000: C:\Windows\system32\NETAPI32 (0x11000 bytes).
2020-06-30 13:34:30,875 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x74970000 for section view with handle 0x148.
2020-06-30 13:34:30,890 [root] DEBUG: DLL loaded at 0x74970000: C:\Windows\system32\netutils (0x9000 bytes).
2020-06-30 13:34:30,906 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x757E0000 for section view with handle 0x148.
2020-06-30 13:34:30,921 [root] DEBUG: DLL loaded at 0x757E0000: C:\Windows\system32\srvcli (0x19000 bytes).
2020-06-30 13:34:30,921 [root] DEBUG: DLL loaded at 0x74700000: C:\Windows\system32\SAMLIB (0x12000 bytes).
2020-06-30 13:34:30,953 [root] DEBUG: DLL loaded at 0x75210000: C:\Windows\system32\USERENV (0x17000 bytes).
2020-06-30 13:34:31,015 [root] DEBUG: DLL loaded at 0x75D60000: C:\Windows\system32\CRYPT32 (0x122000 bytes).
2020-06-30 13:34:31,046 [root] DEBUG: DLL loaded at 0x75C50000: C:\Windows\system32\MSASN1 (0xc000 bytes).
2020-06-30 13:34:31,093 [root] DEBUG: DLL loaded at 0x755C0000: C:\Windows\system32\mswsock (0x3c000 bytes).
2020-06-30 13:34:31,109 [root] DEBUG: DLL loaded at 0x75140000: C:\Windows\System32\wshtcpip (0x5000 bytes).
2020-06-30 13:34:31,921 [root] INFO: Added new file to list with pid None and path C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
2020-06-30 13:34:32,078 [root] DEBUG: DLL loaded at 0x75480000: C:\Windows\system32\DNSAPI (0x44000 bytes).
2020-06-30 13:34:32,093 [root] DEBUG: DLL loaded at 0x72290000: C:\Windows\system32\rasadhlp (0x6000 bytes).
2020-06-30 13:34:32,109 [root] DEBUG: DLL loaded at 0x755B0000: C:\Windows\System32\wship6 (0x6000 bytes).
2020-06-30 13:34:32,906 [root] INFO: Added new file to list with pid None and path C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
2020-06-30 13:34:39,828 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 1088
2020-06-30 13:34:39,843 [root] DEBUG: GetHookCallerBase: thread 4168 (handle 0x0), return address 0x6B681698, allocation base 0x6B650000.
2020-06-30 13:34:39,843 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00400000.
2020-06-30 13:34:39,859 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-30 13:34:39,921 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x9e000.
2020-06-30 13:34:39,953 [root] INFO: Process with pid 1088 has terminated
2020-06-30 13:37:15,046 [root] INFO: Analysis timeout hit, terminating analysis.
2020-06-30 13:37:20,281 [lib.api.process] INFO: Terminate event set for process 460
2020-06-30 13:37:20,375 [root] DEBUG: Terminate Event: Attempting to dump process 460
2020-06-30 13:37:22,750 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x3f000.
2020-06-30 13:37:22,750 [lib.api.process] INFO: Termination confirmed for process 460
2020-06-30 13:37:22,750 [root] INFO: Terminate event set for process 460.
2020-06-30 13:37:22,765 [root] INFO: Created shutdown mutex.
2020-06-30 13:37:23,765 [root] INFO: Shutting down package.
2020-06-30 13:37:23,765 [root] INFO: Stopping auxiliary modules.
2020-06-30 13:37:25,734 [root] DEBUG: Terminate Event: CAPE shutdown complete for process 460
2020-06-30 13:37:25,859 [lib.common.results] WARNING: File C:\SxZDEdf\bin\procmon.xml doesn't exist anymore
2020-06-30 13:37:25,859 [root] INFO: Finishing auxiliary modules.
2020-06-30 13:37:25,859 [root] INFO: Shutting down pipe server and dumping dropped files.
2020-06-30 13:37:25,906 [root] WARNING: Folder at path "C:\SxZDEdf\debugger" does not exist, skip.
2020-06-30 13:37:25,906 [root] INFO: Analysis completed.

Machine

Name Label Manager Started On Shutdown On
win7_4 win7_4 KVM 2020-06-30 13:36:14 2020-06-30 13:41:43

File Details

File Name crypted_pdf.exe
File Size 609792 bytes
File Type PE32 executable (GUI) Intel 80386, for MS Windows
PE timestamp 1992-06-19 22:22:17
MD5 a157d3c44279f7d4cdf79fea9dd3d8a9
SHA1 a808177004e18b1059d9721ba8249073b4833496
SHA256 c1a7770be72ce3fdee62b8af207e63e32cdfd6cb7a29fc7b9761fc1fb8bf678e
SHA512 b3373b239a0d7e64f61e45b9f1d24f0e6349a1ad20ac270640aebf5f865837c1b0c6ca7882cbde886a9abadb7f266a0a6a2a90e1356da7608a25834a8902bb87
CRC32 5351CE94
Ssdeep 12288:QCbpcLhilrm7G8oclWEAroCo3DQmTsiz6efjV87NolRyJ:XuLhi80Jro7nn5JlEJ
Download Download ZIP Resubmit sample

Signatures

Behavioural detection: Executable code extraction - unpacking
Yara rule detections observed from a process memory dump/dropped files/CAPE
Hit: PID 1088 trigged the Yara rule 'HeavensGate'
Hit: PID 1088 trigged the Yara rule 'Loki'
Hit: PID 4016 trigged the Yara rule 'shellcode_patterns'
Hit: PID 4016 trigged the Yara rule 'HeavensGate'
Hit: PID 4016 trigged the Yara rule 'Loki'
Creates RWX memory
Possible date expiration check, exits too soon after checking local time
process: crypted_pdf.exe, PID 4016
Dynamic (imported) function loading detected
DynamicLoader: IMM32.DLL/ImmCreateContext
DynamicLoader: IMM32.DLL/ImmDestroyContext
DynamicLoader: IMM32.DLL/ImmNotifyIME
DynamicLoader: IMM32.DLL/ImmAssociateContext
DynamicLoader: IMM32.DLL/ImmReleaseContext
DynamicLoader: IMM32.DLL/ImmGetContext
DynamicLoader: IMM32.DLL/ImmGetCompositionStringA
DynamicLoader: IMM32.DLL/ImmSetCompositionStringA
DynamicLoader: IMM32.DLL/ImmGetCompositionStringW
DynamicLoader: IMM32.DLL/ImmSetCompositionStringW
DynamicLoader: IMM32.DLL/ImmSetCandidateWindow
DynamicLoader: kernel32.dll/GetDiskFreeSpaceExA
DynamicLoader: oleaut32.dll/VariantChangeTypeEx
DynamicLoader: oleaut32.dll/VarNeg
DynamicLoader: oleaut32.dll/VarNot
DynamicLoader: oleaut32.dll/VarAdd
DynamicLoader: oleaut32.dll/VarSub
DynamicLoader: oleaut32.dll/VarMul
DynamicLoader: oleaut32.dll/VarDiv
DynamicLoader: oleaut32.dll/VarIdiv
DynamicLoader: oleaut32.dll/VarMod
DynamicLoader: oleaut32.dll/VarAnd
DynamicLoader: oleaut32.dll/VarOr
DynamicLoader: oleaut32.dll/VarXor
DynamicLoader: oleaut32.dll/VarCmp
DynamicLoader: oleaut32.dll/VarI4FromStr
DynamicLoader: oleaut32.dll/VarR4FromStr
DynamicLoader: oleaut32.dll/VarR8FromStr
DynamicLoader: oleaut32.dll/VarDateFromStr
DynamicLoader: oleaut32.dll/VarCyFromStr
DynamicLoader: oleaut32.dll/VarBoolFromStr
DynamicLoader: oleaut32.dll/VarBstrFromCy
DynamicLoader: oleaut32.dll/VarBstrFromDate
DynamicLoader: oleaut32.dll/VarBstrFromBool
DynamicLoader: USER32.dll/GetMonitorInfoA
DynamicLoader: USER32.dll/GetSystemMetrics
DynamicLoader: USER32.dll/EnumDisplayMonitors
DynamicLoader: USER32.dll/AnimateWindow
DynamicLoader: comctl32.dll/InitializeFlatSB
DynamicLoader: comctl32.dll/UninitializeFlatSB
DynamicLoader: comctl32.dll/FlatSB_GetScrollProp
DynamicLoader: comctl32.dll/FlatSB_SetScrollProp
DynamicLoader: comctl32.dll/FlatSB_EnableScrollBar
DynamicLoader: comctl32.dll/FlatSB_ShowScrollBar
DynamicLoader: comctl32.dll/FlatSB_GetScrollRange
DynamicLoader: comctl32.dll/FlatSB_GetScrollInfo
DynamicLoader: comctl32.dll/FlatSB_GetScrollPos
DynamicLoader: comctl32.dll/FlatSB_SetScrollPos
DynamicLoader: comctl32.dll/FlatSB_SetScrollInfo
DynamicLoader: comctl32.dll/FlatSB_SetScrollRange
DynamicLoader: USER32.dll/SetLayeredWindowAttributes
DynamicLoader: kernel32.dll/GetSystemTimeAsFileTime
DynamicLoader: kernel32.dll/FileTimeToSystemTime
DynamicLoader: CRYPTSP.dll/CryptAcquireContextW
DynamicLoader: CRYPTSP.dll/CryptCreateHash
DynamicLoader: CRYPTSP.dll/CryptHashData
DynamicLoader: CRYPTSP.dll/CryptGetHashParam
DynamicLoader: CRYPTSP.dll/CryptDestroyHash
DynamicLoader: CRYPTSP.dll/CryptReleaseContext
DynamicLoader: nss3.dll/NSS_Init
DynamicLoader: nss3.dll/NSS_Shutdown
DynamicLoader: nss3.dll/PK11_GetInternalKeySlot
DynamicLoader: nss3.dll/PK11_FreeSlot
DynamicLoader: nss3.dll/PK11_Authenticate
DynamicLoader: nss3.dll/PK11SDR_Decrypt
DynamicLoader: nss3.dll/PK11_CheckUserPassword
DynamicLoader: nss3.dll/SECITEM_FreeItem
DynamicLoader: kernel32.dll/FlsGetValue
DynamicLoader: kernel32.dll/SetThreadDescription
DynamicLoader: kernel32.dll/InitializeCriticalSectionEx
DynamicLoader: softokn3.dll/NSC_GetFunctionList
DynamicLoader: softokn3.dll/NSC_ModuleDBFunc
DynamicLoader: softokn3.dll/NSC_GetFunctionList
DynamicLoader: freebl3.dll/FREEBL_GetVector
DynamicLoader: CRYPTBASE.dll/SystemFunction001
DynamicLoader: CRYPTBASE.dll/SystemFunction002
DynamicLoader: CRYPTBASE.dll/SystemFunction003
DynamicLoader: CRYPTBASE.dll/SystemFunction004
DynamicLoader: CRYPTBASE.dll/SystemFunction005
DynamicLoader: CRYPTBASE.dll/SystemFunction028
DynamicLoader: CRYPTBASE.dll/SystemFunction029
DynamicLoader: CRYPTBASE.dll/SystemFunction034
DynamicLoader: CRYPTBASE.dll/SystemFunction036
DynamicLoader: CRYPTBASE.dll/SystemFunction040
DynamicLoader: CRYPTBASE.dll/SystemFunction041
DynamicLoader: kernel32.dll/FlsFree
DynamicLoader: kernel32.dll/FlsFree
DynamicLoader: vaultcli.dll/VaultEnumerateItems
DynamicLoader: vaultcli.dll/VaultEnumerateVaults
DynamicLoader: vaultcli.dll/VaultFree
DynamicLoader: vaultcli.dll/VaultGetItem
DynamicLoader: vaultcli.dll/VaultOpenVault
DynamicLoader: vaultcli.dll/VaultCloseVault
DynamicLoader: sechost.dll/LookupAccountSidLocalW
DynamicLoader: NETAPI32.DLL/NetUserGetInfo
DynamicLoader: CRYPTSP.dll/CryptImportKey
DynamicLoader: CRYPTSP.dll/CryptSetKeyParam
DynamicLoader: CRYPTSP.dll/CryptDecrypt
DynamicLoader: CRYPTSP.dll/CryptDestroyKey
DynamicLoader: NETAPI32.DLL/NetUserGetInfo
DynamicLoader: NETAPI32.DLL/NetUserGetInfo
CAPE extracted potentially suspicious content
crypted_pdf.exe: Unpacked Shellcode
crypted_pdf.exe: Loki Payload: 32-bit executable
crypted_pdf.exe: Loki
crypted_pdf.exe: Unpacked Shellcode
crypted_pdf.exe: Unpacked Shellcode
Attempts to mimic the file extension of a PDF document by having 'pdf' in the file name.
HTTP traffic contains suspicious features which may be indicative of malware related traffic
post_no_referer: HTTP traffic contains a POST request with no referer header
http_version_old: HTTP traffic uses version 1.0
ip_hostname: HTTP connection was made to an IP address rather than domain name
suspicious_request: http://195.69.140.147/.op/cr.php/SczbkxCQZQyVr
Queries or connects to DNS-Over-HTTPS/DNS-Over-TLS domain or IP address
ip: 1.1.1.1
Performs some HTTP requests
url: http://195.69.140.147/.op/cr.php/SczbkxCQZQyVr
The binary contains an unknown PE section name indicative of packing
unknown section: name: CODE, entropy: 6.53, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x00056c00, virtual_size: 0x00056bb4
unknown section: name: DATA, entropy: 4.61, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x0000da00, virtual_size: 0x0000d8e4
unknown section: name: BSS, entropy: 0.00, characteristics: IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000000, virtual_size: 0x00000e49
The binary likely contains encrypted or compressed data.
section: name: .rsrc, entropy: 7.10, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ, raw_size: 0x00027800, virtual_size: 0x00027658
Authenticode signature is invalid
authenticode error: No signature found. SignTool Error File not valid C\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe
Behavioural detection: Injection (Process Hollowing)
Injection: crypted_pdf.exe(4016) -> crypted_pdf.exe(1088)
Executed a process and injected code into it, probably while unpacking
Injection: crypted_pdf.exe(4016) -> crypted_pdf.exe(1088)
Deletes its original binary from disk
Behavioural detection: Injection (inter-process)
Attempts to repeatedly call a single API many times in order to delay analysis time
Spam: services.exe (460) called API GetSystemTimeAsFileTime 1213714 times
Steals private information from local Internet browsers
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\pkcs11.txt
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\logins.json
file: C:\Users\Rebecca\AppData\Local\Google\Chrome\User Data\Default\Login Data
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db
file: C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\profiles.ini
CAPE detected the Loki malware family
Creates a copy of itself
copy: C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
Harvests credentials from local FTP client softwares
file: C:\Users\Rebecca\AppData\Roaming\FileZilla\sitemanager.xml
file: C:\Users\Rebecca\AppData\Roaming\FileZilla\recentservers.xml
file: C:\Users\Rebecca\AppData\Roaming\Far Manager\Profile\PluginsData\42E4AEB1-A230-44F4-B33C-F195BB654931.db
file: C:\Users\Rebecca\AppData\Roaming\FTPGetter\servers.xml
file: C:\Program Files\FTPGetter\Profile\servers.xml
file: C:\Users\Rebecca\AppData\Roaming\Estsoft\ALFTP\ESTdb2.dat
key: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
key: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
key: HKEY_CURRENT_USER\Software\Ghisler\Total Commander
key: HKEY_CURRENT_USER\Software\LinasFTP\Site Manager
Harvests information related to installed instant messenger clients
file: C:\Users\Rebecca\AppData\Roaming\.purple\accounts.xml
Harvests information related to installed mail clients
key: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
key: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook
key: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
Collects information to fingerprint the system
Anomalous binary characteristics
anomaly: Timestamp on binary predates the release date of the OS version it requires by at least a year
Created network traffic indicative of malicious activity
signature: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
signature: ET JA3 Hash - Possible Malware - Various Malspam/RigEK
signature: ET MALWARE LokiBot Checkin
signature: ET MALWARE LokiBot User-Agent (Charon/Inferno)
signature: ET MALWARE LokiBot Request for C2 Commands Detected M2
signature: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
signature: ET MALWARE LokiBot Request for C2 Commands Detected M1
Creates Lokibot mutexes
mutex: D4D5A6DF569DD66C39E6EB85

Screenshots


Hosts

Direct IP Country Name
Y 8.8.8.8 [VT] United States
Y 195.69.140.147 [VT] unknown
Y 1.1.1.1 [VT] Australia

DNS

No domains contacted.


Summary

C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.ENU
C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.ENU.DLL
C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.EN
C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.EN.DLL
C:\Program Files\Mozilla Firefox\nss3.dll
C:\Users\Rebecca\AppData\Local\Temp\mozglue.dll
C:\Windows\System32\mozglue.dll
C:\Windows\system\mozglue.dll
C:\Windows\mozglue.dll
C:\Python27\mozglue.dll
C:\Python27\Scripts\mozglue.dll
C:\Windows\System32\wbem\mozglue.dll
C:\Windows\System32\WindowsPowerShell\v1.0\mozglue.dll
C:\ProgramData\chocolatey\bin\mozglue.dll
C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32\Scripts\mozglue.dll
C:\Users\Rebecca\AppData\Local\Programs\Python\Python38-32\mozglue.dll
C:\Users\Rebecca\AppData\Roaming\Python\Scripts\mozglue.dll
C:\Program Files\Mozilla Firefox\mozglue.dll
C:\Users\Rebecca\AppData\Local\Temp\VERSION.dll
C:\Windows\System32\version.dll
C:\Users\Rebecca\AppData\Local\Temp\dbghelp.dll
C:\Windows\System32\dbghelp.dll
C:\Users\Rebecca\AppData\Local\Temp\MSVCP140.dll
C:\Windows\System32\msvcp140.dll
C:\Users\Rebecca\AppData\Local\Temp\VCRUNTIME140.dll
C:\Windows\System32\VCRUNTIME140.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-runtime-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-runtime-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\ucrtbase.DLL
C:\Windows\System32\ucrtbase.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-timezone-l1-1-0.dll
C:\Windows\System32\api-ms-win-core-timezone-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-file-l2-1-0.dll
C:\Windows\System32\api-ms-win-core-file-l2-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-localization-l1-2-0.dll
C:\Windows\System32\api-ms-win-core-localization-l1-2-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-processthreads-l1-1-1.dll
C:\Windows\System32\api-ms-win-core-processthreads-l1-1-1.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-core-file-l1-2-0.dll
C:\Windows\System32\api-ms-win-core-file-l1-2-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-string-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-string-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-heap-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-heap-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-stdio-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-stdio-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-convert-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-convert-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-locale-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-locale-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-math-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-math-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-multibyte-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-multibyte-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-time-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-time-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-filesystem-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-filesystem-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-environment-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-environment-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\api-ms-win-crt-utility-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-utility-l1-1-0.dll
C:\Users\Rebecca\AppData\Local\Temp\WINMM.dll
C:\Windows\System32\winmm.dll
C:\Users\Rebecca\AppData\Local\Temp\WSOCK32.dll
C:\Windows\System32\wsock32.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\profiles.ini
C:\Program Files\Mozilla Firefox\softokn3.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\pkcs11.txt
C:\Program Files\Mozilla Firefox\freebl3.dll
C:\Windows\System32\api-ms-win-core-sysinfo-l1-2-1.DLL
C:\
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db-journal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db-wal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db-journal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db-wal
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\nssckbi.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons.sqlite
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\logins.json
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons.txt
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons2.txt
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\signons3.txt
C:\Program Files\NETGATE\Black Hawk
C:\Program Files\Lunascape\Lunascape6\plugins\{9BDD5314-20A6-4d98-AB30-8325A95771EE}
C:\Users\Rebecca\AppData\Local\Comodo\Dragon\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Comodo\Dragon\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalComodo\Dragon\Login Data
C:\Users\Rebecca\AppData\LocalComodo\Dragon\Default\Login Data
C:\Users\Rebecca\AppData\Local\MapleStudio\ChromePlus\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\MapleStudio\ChromePlus\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalMapleStudio\ChromePlus\Login Data
C:\Users\Rebecca\AppData\LocalMapleStudio\ChromePlus\Default\Login Data
C:\Users\Rebecca\AppData\Local\Google\Chrome\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Nichrome\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Nichrome\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalNichrome\Login Data
C:\Users\Rebecca\AppData\LocalNichrome\Default\Login Data
C:\Users\Rebecca\AppData\Local\RockMelt\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\RockMelt\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalRockMelt\Login Data
C:\Users\Rebecca\AppData\LocalRockMelt\Default\Login Data
C:\Users\Rebecca\AppData\Local\Spark\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Spark\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalSpark\Login Data
C:\Users\Rebecca\AppData\LocalSpark\Default\Login Data
C:\Users\Rebecca\AppData\Local\Chromium\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Chromium\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalChromium\Login Data
C:\Users\Rebecca\AppData\LocalChromium\Default\Login Data
C:\Users\Rebecca\AppData\Local\Titan Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Titan Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalTitan Browser\Login Data
C:\Users\Rebecca\AppData\LocalTitan Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\Torch\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Torch\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalTorch\Login Data
C:\Users\Rebecca\AppData\LocalTorch\Default\Login Data
C:\Users\Rebecca\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalYandex\YandexBrowser\Login Data
C:\Users\Rebecca\AppData\LocalYandex\YandexBrowser\Default\Login Data
C:\Users\Rebecca\AppData\Local\Epic Privacy Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Epic Privacy Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalEpic Privacy Browser\Login Data
C:\Users\Rebecca\AppData\LocalEpic Privacy Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\CocCoc\Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\CocCoc\Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalCocCoc\Browser\Login Data
C:\Users\Rebecca\AppData\LocalCocCoc\Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\Vivaldi\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Vivaldi\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalVivaldi\Login Data
C:\Users\Rebecca\AppData\LocalVivaldi\Default\Login Data
C:\Users\Rebecca\AppData\Local\Comodo\Chromodo\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Comodo\Chromodo\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalComodo\Chromodo\Login Data
C:\Users\Rebecca\AppData\LocalComodo\Chromodo\Default\Login Data
C:\Users\Rebecca\AppData\Local\Superbird\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Superbird\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalSuperbird\Login Data
C:\Users\Rebecca\AppData\LocalSuperbird\Default\Login Data
C:\Users\Rebecca\AppData\Local\Coowon\Coowon\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Coowon\Coowon\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalCoowon\Coowon\Login Data
C:\Users\Rebecca\AppData\LocalCoowon\Coowon\Default\Login Data
C:\Users\Rebecca\AppData\Local\Mustang Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Mustang Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalMustang Browser\Login Data
C:\Users\Rebecca\AppData\LocalMustang Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\360Browser\Browser\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\360Browser\Browser\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Local360Browser\Browser\Login Data
C:\Users\Rebecca\AppData\Local360Browser\Browser\Default\Login Data
C:\Users\Rebecca\AppData\Local\CatalinaGroup\Citrio\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\CatalinaGroup\Citrio\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalCatalinaGroup\Citrio\Login Data
C:\Users\Rebecca\AppData\LocalCatalinaGroup\Citrio\Default\Login Data
C:\Users\Rebecca\AppData\Local\Google\Chrome SxS\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Google\Chrome SxS\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalGoogle\Chrome SxS\Login Data
C:\Users\Rebecca\AppData\LocalGoogle\Chrome SxS\Default\Login Data
C:\Users\Rebecca\AppData\Local\Orbitum\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Orbitum\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalOrbitum\Login Data
C:\Users\Rebecca\AppData\LocalOrbitum\Default\Login Data
C:\Users\Rebecca\AppData\Local\Iridium\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Local\Iridium\User Data\Default\Web Data
C:\Users\Rebecca\AppData\LocalIridium\Login Data
C:\Users\Rebecca\AppData\LocalIridium\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera\Opera Next\data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\Login Data
C:\Users\Rebecca\AppData\Roaming\Opera Software\Opera Stable\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir\setting\modules\ChromiumViewer\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\User Data\Default\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\User Data\Default\Web Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\Login Data
C:\Users\Rebecca\AppData\Roaming\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer\Default\Login Data
C:\Users\Rebecca\AppData\Local\QupZilla\profiles\default\browsedata.db
C:\Users\Rebecca\AppData\Roaming\Opera
C:\Users\Rebecca\AppData\Roaming\.purple\accounts.xml
C:\Users\Rebecca\Documents\SuperPutty
C:\Program Files\FTPShell\ftpshell.fsi
C:\Users\Rebecca\AppData\Roaming\Notepad++\plugins\config\NppFTP\NppFTP.xml
C:\Program Files\oZone3D\MyFTP\myftp.ini
C:\Users\Rebecca\AppData\Roaming\FTPBox\profiles.conf
C:\Program Files\Sherrod Computers\sherrod FTP\favorites
C:\Program Files\FTP Now\sites.xml
C:\Program Files\NexusFile\userdata\ftpsite.ini
C:\Users\Rebecca\AppData\Roaming\NexusFile\ftpsite.ini
C:\Users\Rebecca\Documents\NetSarang\Xftp\Sessions
C:\Users\Rebecca\AppData\Roaming\NetSarang\Xftp\Sessions
C:\Program Files\EasyFTP\data
C:\Users\Rebecca\AppData\Roaming\SftpNetDrive
C:\Program Files\AbleFTP7\encPwd.jsd
C:\Program Files\AbleFTP7\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP7\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP8\encPwd.jsd
C:\Program Files\AbleFTP8\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP8\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP9\encPwd.jsd
C:\Program Files\AbleFTP9\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP9\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP10\encPwd.jsd
C:\Program Files\AbleFTP10\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP10\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP11\encPwd.jsd
C:\Program Files\AbleFTP11\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP11\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP12\encPwd.jsd
C:\Program Files\AbleFTP12\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP12\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP13\encPwd.jsd
C:\Program Files\AbleFTP13\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP13\data\settings\ftpProfiles-j.jsd
C:\Program Files\AbleFTP14\encPwd.jsd
C:\Program Files\AbleFTP14\data\settings\sshProfiles-j.jsd
C:\Program Files\AbleFTP14\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp7\encPwd.jsd
C:\Program Files\JaSFtp7\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp7\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp8\encPwd.jsd
C:\Program Files\JaSFtp8\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp8\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp9\encPwd.jsd
C:\Program Files\JaSFtp9\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp9\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp10\encPwd.jsd
C:\Program Files\JaSFtp10\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp10\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp11\encPwd.jsd
C:\Program Files\JaSFtp11\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp11\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp12\encPwd.jsd
C:\Program Files\JaSFtp12\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp12\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp13\encPwd.jsd
C:\Program Files\JaSFtp13\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp13\data\settings\ftpProfiles-j.jsd
C:\Program Files\JaSFtp14\encPwd.jsd
C:\Program Files\JaSFtp14\data\settings\sshProfiles-j.jsd
C:\Program Files\JaSFtp14\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize7\encPwd.jsd
C:\Program Files\Automize7\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize7\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize8\encPwd.jsd
C:\Program Files\Automize8\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize8\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize9\encPwd.jsd
C:\Program Files\Automize9\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize9\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize10\encPwd.jsd
C:\Program Files\Automize10\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize10\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize11\encPwd.jsd
C:\Program Files\Automize11\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize11\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize12\encPwd.jsd
C:\Program Files\Automize12\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize12\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize13\encPwd.jsd
C:\Program Files\Automize13\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize13\data\settings\ftpProfiles-j.jsd
C:\Program Files\Automize14\encPwd.jsd
C:\Program Files\Automize14\data\settings\sshProfiles-j.jsd
C:\Program Files\Automize14\data\settings\ftpProfiles-j.jsd
C:\Users\Rebecca\AppData\Roaming\Cyberduck
C:\Users\Rebecca\AppData\Roaming\iterate_GmbH
C:\Users\Rebecca\.config\fullsync\profiles.xml
C:\Users\Rebecca\AppData\Roaming\FTPInfo\ServerList.xml
C:\Users\Rebecca\AppData\Roaming\FTPInfo\ServerList.cfg
C:\Program Files\FileZilla\Filezilla.xml
C:\Users\Rebecca\AppData\Roaming\FileZilla\filezilla.xml
C:\Users\Rebecca\AppData\Roaming\FileZilla\recentservers.xml
C:\Users\Rebecca\AppData\Roaming\FileZilla\sitemanager.xml
C:\Program Files\Staff-FTP\sites.ini
C:\Users\Rebecca\AppData\Roaming\BlazeFtp\site.dat
C:\Program Files\Fastream NETFile\My FTP Links
C:\Program Files\GoFTP\settings\Connections.txt
C:\Users\Rebecca\AppData\Roaming\Estsoft\ALFTP\ESTdb2.dat
C:\Program Files\DeluxeFTP\sites.xml
C:\Windows\wcx_ftp.ini
C:\Users\Rebecca\AppData\Roaming\wcx_ftp.ini
C:\Users\Rebecca\wcx_ftp.ini
C:\Users\Rebecca\AppData\Roaming\GHISLER\wcx_ftp.ini
C:\Program Files\FTPGetter\Profile\servers.xml
C:\Users\Rebecca\AppData\Roaming\FTPGetter\servers.xml
C:\Program Files\WS_FTP\WS_FTP.INI
C:\Windows\WS_FTP.INI
C:\Users\Rebecca\AppData\Roaming\Ipswitch
C:\Users\Rebecca\site.xml
C:\Users\Rebecca\AppData\Local\PokerStars*
C:\Users\Rebecca\AppData\Local\ExpanDrive
C:\Users\Rebecca\AppData\Roaming\Steed\bookmarks.txt
C:\Users\Rebecca\AppData\Roaming\FlashFXP
C:\ProgramData\FlashFXP
C:\Users\Rebecca\AppData\Local\INSoftware\NovaFTP\NovaFTP.db
C:\Users\Rebecca\AppData\Roaming\NetDrive\NDSites.ini
C:\Users\Rebecca\AppData\Roaming\NetDrive2\drives.dat
C:\ProgramData\NetDrive2\drives.dat
C:\Users\Rebecca\AppData\Roaming\SmartFTP
C:\Users\Rebecca\AppData\Roaming\Far Manager\Profile\PluginsData\42E4AEB1-A230-44F4-B33C-F195BB654931.db
C:\Users\Rebecca\Documents\*.tlp
C:\Users\Rebecca\Documents\*.bscp
C:\Users\Rebecca\Documents\*.vnc
C:\Users\Rebecca\Desktop\*.vnc
C:\Users\Rebecca\Documents\mSecure
C:\ProgramData\Syncovery
C:\Program Files\FreshWebmaster\FreshFTP\FtpSites.SMF
C:\Users\Rebecca\AppData\Roaming\BitKinex\bitkinex.ds
C:\Users\Rebecca\AppData\Roaming\UltraFXP\sites.xml
C:\Users\Rebecca\AppData\Roaming\FTP Now\sites.xml
C:\Program Files\Odin Secure FTP Expert\QFDefault.QFQ
C:\Program Files\Odin Secure FTP Expert\SiteInfo.QFP
C:\Program Files\Foxmail\mail
C:\Foxmail*
C:\Users\Rebecca\AppData\Roaming\Pocomail\accounts.ini
C:\Users\Rebecca\Documents\Pocomail\accounts.ini
C:\Users\Rebecca\AppData\Roaming\GmailNotifierPro\ConfigData.xml
C:\Users\Rebecca\AppData\Roaming\DeskSoft\CheckMail
C:\Program Files\WinFtp Client\Favorites.dat
C:\Windows\32BitFtp.TMP
C:\Windows\32BitFtp.ini
C:\FTP Navigator\Ftplist.txt
C:\Softwarenetz\Mailing\Daten\mailing.vdt
C:\Users\Rebecca\AppData\Roaming\Opera Mail\Opera Mail\wand.dat
C:\Users\Rebecca\Documents\*Mailbox.ini
C:\Users\Rebecca\Documents\yMail2\POP3.xml
C:\Users\Rebecca\Documents\yMail2\SMTP.xml
C:\Users\Rebecca\Documents\yMail2\Accounts.xml
C:\Users\Rebecca\Documents\yMail\ymail.ini
C:\Users\Rebecca\AppData\Roaming\TrulyMail\Data\Settings\user.config
C:\Users\Rebecca\Documents\*.spn
C:\Users\Rebecca\Desktop\*.spn
C:\Users\Rebecca\AppData\Roaming\To-Do DeskList\tasks.db
C:\Users\Rebecca\AppData\Roaming\stickies\images
C:\Users\Rebecca\AppData\Roaming\stickies\rtf
C:\Users\Rebecca\AppData\Roaming\NoteFly\notes
C:\Users\Rebecca\AppData\Roaming\Conceptworld\Notezilla\Notes8.db
C:\Users\Rebecca\AppData\Roaming\Microsoft\Sticky Notes\StickyNotes.snt
C:\Users\Rebecca\Documents
C:\Users\Rebecca\Documents\*.kdbx
C:\Users\Rebecca\Desktop
C:\Users\Rebecca\Desktop\*.kdbx
C:\Users\Rebecca\Documents\*.kdb
C:\Users\Rebecca\Desktop\*.kdb
C:\Users\Rebecca\Documents\Enpass
C:\Users\Rebecca\Documents\My RoboForm Data
C:\Users\Rebecca\Documents\1Password
C:\Users\Rebecca\AppData\Local\Temp\Mikrotik\Winbox
C:\Users\Rebecca\AppData\Local\Temp\NETAPI32.DLL
C:\Windows\System32\netapi32.dll
C:\Users\Rebecca\AppData\Local\Temp\netutils.dll
C:\Windows\System32\netutils.dll
C:\Users\Rebecca\AppData\Local\Temp\srvcli.dll
C:\Windows\System32\srvcli.dll
C:\Users\Rebecca\AppData\Roaming\F569DD
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Users\Rebecca\AppData\Roaming\Microsoft\Credentials
C:\Users\Rebecca\AppData\Roaming\Microsoft\Credentials\*
C:\Users\Rebecca\AppData\Local\Microsoft\Credentials
C:\Users\Rebecca\AppData\Local\Microsoft\Credentials\*
C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
C:\Windows\Temp
C:\Windows\System32\LogFiles\Scm\a1cfa52f-06f2-418d-addb-cd6456d66f43
C:\Program Files\Mozilla Firefox\nss3.dll
C:\Program Files\Mozilla Firefox\mozglue.dll
C:\Windows\System32\version.dll
C:\Windows\System32\dbghelp.dll
C:\Windows\System32\msvcp140.dll
C:\Windows\System32\VCRUNTIME140.dll
C:\Windows\System32\api-ms-win-crt-runtime-l1-1-0.dll
C:\Windows\System32\ucrtbase.dll
C:\Windows\System32\api-ms-win-core-timezone-l1-1-0.dll
C:\Windows\System32\api-ms-win-core-file-l2-1-0.dll
C:\Windows\System32\api-ms-win-core-localization-l1-2-0.dll
C:\Windows\System32\api-ms-win-core-processthreads-l1-1-1.dll
C:\Windows\System32\api-ms-win-core-file-l1-2-0.dll
C:\Windows\System32\api-ms-win-crt-string-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-heap-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-stdio-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-convert-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-locale-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-math-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-multibyte-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-time-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-filesystem-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-environment-l1-1-0.dll
C:\Windows\System32\api-ms-win-crt-utility-l1-1-0.dll
C:\Windows\System32\winmm.dll
C:\Windows\System32\wsock32.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\profiles.ini
C:\Program Files\Mozilla Firefox\softokn3.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\pkcs11.txt
C:\Program Files\Mozilla Firefox\freebl3.dll
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\cert9.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\key4.db
C:\Users\Rebecca\AppData\Roaming\Mozilla\Firefox\Profiles\48wgv2fv.default\logins.json
C:\Users\Rebecca\AppData\Local\Google\Chrome\User Data\Default\Login Data
C:\Windows\System32\netapi32.dll
C:\Windows\System32\netutils.dll
C:\Windows\System32\srvcli.dll
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Windows\System32\LogFiles\Scm\a1cfa52f-06f2-418d-addb-cd6456d66f43
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.exe
C:\Users\Rebecca\AppData\Roaming\F569DD\D66C39.lck
C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLEAUT
HKEY_CURRENT_USER
DisableUserModeCallbackFilter
HKEY_CURRENT_USER\Software\Borland\Locales
HKEY_LOCAL_MACHINE\Software\Borland\Locales
HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\CustomLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\ExtendedLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Windows Error Reporting\WMR
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography
\x5a60\x170EY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\75.0 (x86 en-GB)\Main
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\75.0 (x86 en-GB)\Main\Install Directory
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\SideBySide
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\SOFTWARE\ComodoGroup\IceDragon\Setup
HKEY_LOCAL_MACHINE\SOFTWARE\Apple Computer, Inc.\Safari
HKEY_LOCAL_MACHINE\SOFTWARE\K-Meleon
HKEY_LOCAL_MACHINE\SOFTWARE\mozilla.org\SeaMonkey
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\SeaMonkey
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Flock
HKEY_CURRENT_USER\Software\QtWeb.NET\QtWeb Internet Browser\AutoComplete
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2
HKEY_LOCAL_MACHINE\SOFTWARE\8pecxstudios\Cyberfox86
HKEY_LOCAL_MACHINE\SOFTWARE\8pecxstudios\Cyberfox
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Pale Moon
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Waterfox
HKEY_CURRENT_USER\Software\LinasFTP\Site Manager
HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
HKEY_CURRENT_USER\Software\Ghisler\Total Commander
HKEY_CURRENT_USER\Software
HKEY_CURRENT_USER\Software\7-Zip
HKEY_CURRENT_USER\Software\Adobe
HKEY_CURRENT_USER\Software\AppDataLow
HKEY_CURRENT_USER\Software\Clients
HKEY_CURRENT_USER\Software\Google
HKEY_CURRENT_USER\Software\IM Providers
HKEY_CURRENT_USER\Software\JavaSoft
HKEY_CURRENT_USER\Software\Macromedia
HKEY_CURRENT_USER\Software\Michael Herf
HKEY_CURRENT_USER\Software\Microsoft
HKEY_CURRENT_USER\Software\Mozilla
HKEY_CURRENT_USER\Software\Netscape
HKEY_CURRENT_USER\Software\ODBC
HKEY_CURRENT_USER\Software\Piriform
HKEY_CURRENT_USER\Software\Policies
HKEY_CURRENT_USER\Software\Python
HKEY_CURRENT_USER\Software\WinRAR
HKEY_CURRENT_USER\Software\WinRAR SFX
HKEY_CURRENT_USER\Software\Classes
HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
HKEY_CURRENT_USER\Software\Bitvise\BvSshClient
HKEY_CURRENT_USER\Software\VanDyke\SecureFX
HKEY_LOCAL_MACHINE\Software\NCH Software\Fling\Accounts
HKEY_CURRENT_USER\Software\NCH Software\Fling\Accounts
HKEY_LOCAL_MACHINE\Software\NCH Software\ClassicFTP\FTPAccounts
HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions
HKEY_LOCAL_MACHINE\Software\SimonTatham\PuTTY\Sessions
HKEY_LOCAL_MACHINE\Software\9bis.com\KiTTY\Sessions
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Thunderbird
HKEY_CURRENT_USER\Software\IncrediMail\Identities
HKEY_LOCAL_MACHINE\Software\IncrediMail\Identities
HKEY_CURRENT_USER\Software\Martin Prikryl
HKEY_LOCAL_MACHINE\Software\Martin Prikryl
HKEY_LOCAL_MACHINE\SOFTWARE\Postbox\Postbox
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\FossaMail
HKEY_CURRENT_USER\Software\WinChips\UserAccounts
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook
HKEY_CURRENT_USER\SOFTWARE\flaska.net\trojita
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\LanmanWorkstation\Parameters\RpcCacheTimeout
HKEY_LOCAL_MACHINE\\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x450\xfffd\x41c\xfffd\x44f\xfffd\xfffd\x42c\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ImagePath
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir
HKEY_USERS\S-1-5-18
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_USERS\.DEFAULT\Environment
HKEY_USERS\.DEFAULT\Volatile Environment
HKEY_USERS\.DEFAULT\Volatile Environment\0
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\Environment
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\RequiredPrivileges
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ObjectName
DisableUserModeCallbackFilter
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
\x5a60\x170EY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\75.0 (x86 en-GB)\Main\Install Directory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\LanmanWorkstation\Parameters\RpcCacheTimeout
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ImagePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\Environment
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\RequiredPrivileges
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Audiosrv\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\p2pimsvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ObjectName
kernel32.dll.FlsAlloc
kernel32.dll.FlsGetValue
kernel32.dll.FlsSetValue
kernel32.dll.FlsFree
kernelbase.dll.InitializeCriticalSectionAndSpinCount
kernel32.dll.ProcessIdToSessionId
imm32.dll.ImmCreateContext
imm32.dll.ImmDestroyContext
imm32.dll.ImmNotifyIME
imm32.dll.ImmAssociateContext
imm32.dll.ImmReleaseContext
imm32.dll.ImmGetContext
imm32.dll.ImmGetCompositionStringA
imm32.dll.ImmSetCompositionStringA
imm32.dll.ImmGetCompositionStringW
imm32.dll.ImmSetCompositionStringW
imm32.dll.ImmSetCandidateWindow
kernel32.dll.GetDiskFreeSpaceExA
oleaut32.dll.VariantChangeTypeEx
oleaut32.dll.VarNeg
oleaut32.dll.VarNot
oleaut32.dll.VarAdd
oleaut32.dll.VarSub
oleaut32.dll.VarMul
oleaut32.dll.VarDiv
oleaut32.dll.VarIdiv
oleaut32.dll.VarMod
oleaut32.dll.VarAnd
oleaut32.dll.VarOr
oleaut32.dll.VarXor
oleaut32.dll.VarCmp
oleaut32.dll.VarI4FromStr
oleaut32.dll.VarR4FromStr
oleaut32.dll.VarR8FromStr
oleaut32.dll.VarDateFromStr
oleaut32.dll.VarCyFromStr
oleaut32.dll.VarBoolFromStr
oleaut32.dll.VarBstrFromCy
oleaut32.dll.VarBstrFromDate
oleaut32.dll.VarBstrFromBool
user32.dll.GetMonitorInfoA
user32.dll.GetSystemMetrics
user32.dll.EnumDisplayMonitors
user32.dll.AnimateWindow
comctl32.dll.InitializeFlatSB
comctl32.dll.UninitializeFlatSB
comctl32.dll.FlatSB_GetScrollProp
comctl32.dll.FlatSB_SetScrollProp
comctl32.dll.FlatSB_EnableScrollBar
comctl32.dll.FlatSB_ShowScrollBar
comctl32.dll.FlatSB_GetScrollRange
comctl32.dll.FlatSB_GetScrollInfo
comctl32.dll.FlatSB_GetScrollPos
comctl32.dll.FlatSB_SetScrollPos
comctl32.dll.FlatSB_SetScrollInfo
comctl32.dll.FlatSB_SetScrollRange
user32.dll.SetLayeredWindowAttributes
kernel32.dll.GetSystemTimeAsFileTime
kernel32.dll.FileTimeToSystemTime
cryptsp.dll.CryptAcquireContextW
cryptsp.dll.CryptCreateHash
cryptsp.dll.CryptHashData
cryptsp.dll.CryptGetHashParam
cryptsp.dll.CryptDestroyHash
cryptsp.dll.CryptReleaseContext
nss3.dll.NSS_Init
nss3.dll.NSS_Shutdown
nss3.dll.PK11_GetInternalKeySlot
nss3.dll.PK11_FreeSlot
nss3.dll.PK11_Authenticate
nss3.dll.PK11SDR_Decrypt
nss3.dll.PK11_CheckUserPassword
nss3.dll.SECITEM_FreeItem
kernel32.dll.InitializeCriticalSectionEx
softokn3.dll.NSC_GetFunctionList
softokn3.dll.NSC_ModuleDBFunc
freebl3.dll.FREEBL_GetVector
cryptbase.dll.SystemFunction001
cryptbase.dll.SystemFunction002
cryptbase.dll.SystemFunction003
cryptbase.dll.SystemFunction004
cryptbase.dll.SystemFunction005
cryptbase.dll.SystemFunction028
cryptbase.dll.SystemFunction029
cryptbase.dll.SystemFunction034
cryptbase.dll.SystemFunction036
cryptbase.dll.SystemFunction040
cryptbase.dll.SystemFunction041
vaultcli.dll.VaultEnumerateItems
vaultcli.dll.VaultEnumerateVaults
vaultcli.dll.VaultFree
vaultcli.dll.VaultGetItem
vaultcli.dll.VaultOpenVault
vaultcli.dll.VaultCloseVault
sechost.dll.LookupAccountSidLocalW
netapi32.dll.NetUserGetInfo
cryptsp.dll.CryptImportKey
cryptsp.dll.CryptSetKeyParam
cryptsp.dll.CryptDecrypt
cryptsp.dll.CryptDestroyKey
"C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe"
C:\Windows\system32\lsass.exe
D4D5A6DF569DD66C39E6EB85
VaultSvc

PE Information

Image Base Entry Point Reported Checksum Actual Checksum Minimum OS Version Compile Time Import Hash Icon Icon Exact Hash Icon Similarity Hash
0x00400000 0x00457b6c 0x00000000 0x000a454f 4.0 1992-06-19 22:22:17 24f26e153c9b6068c0a4770547eb6d9e 4cf760beac787663dc2db01e7654eb2e eb7d7358ac4a8bf108c694ceccf9017d

Sections

Name RAW Address Virtual Address Virtual Size Size of Raw Data Characteristics Entropy
CODE 0x00000400 0x00001000 0x00056bb4 0x00056c00 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.53
DATA 0x00057000 0x00058000 0x0000d8e4 0x0000da00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 4.61
BSS 0x00064a00 0x00066000 0x00000e49 0x00000000 IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.00
.idata 0x00064a00 0x00067000 0x00001ffe 0x00002000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 5.02
.tls 0x00066a00 0x00069000 0x00000010 0x00000000 IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.00
.rdata 0x00066a00 0x0006a000 0x00000018 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 0.21
.reloc 0x00066c00 0x0006b000 0x00006994 0x00006a00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 6.65
.rsrc 0x0006d600 0x00072000 0x00027658 0x00027800 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 7.10

Resources

Name Offset Size Language Sub-language Entropy File type
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_CURSOR 0x000762b8 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL 2.92 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_BITMAP 0x00077620 0x000000e8 LANG_NEUTRAL SUBLANG_NEUTRAL 2.85 None
RT_ICON 0x00077708 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US 3.32 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_MENU 0x00095868 0x000001e4 LANG_ENGLISH SUBLANG_ENGLISH_US 0.00 None
RT_DIALOG 0x00095a4c 0x00000052 LANG_NEUTRAL SUBLANG_NEUTRAL 2.56 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_STRING 0x00098b00 0x000002c4 LANG_NEUTRAL SUBLANG_NEUTRAL 3.18 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.12 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.12 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.12 None
RT_RCDATA 0x000994c8 0x000000ef LANG_ENGLISH SUBLANG_ENGLISH_US 7.12 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_CURSOR 0x00099630 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL 2.02 None
RT_GROUP_ICON 0x00099644 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US 1.84 None

Imports

0x46713c VirtualFree
0x467140 VirtualAlloc
0x467144 LocalFree
0x467148 LocalAlloc
0x46714c GetVersion
0x467150 GetCurrentThreadId
0x46715c VirtualQuery
0x467160 WideCharToMultiByte
0x467164 MultiByteToWideChar
0x467168 lstrlenA
0x46716c lstrcpynA
0x467170 LoadLibraryExA
0x467174 GetThreadLocale
0x467178 GetStartupInfoA
0x46717c GetProcAddress
0x467180 GetModuleHandleA
0x467184 GetModuleFileNameA
0x467188 GetLocaleInfoA
0x46718c GetCommandLineA
0x467190 FreeLibrary
0x467194 FindFirstFileA
0x467198 FindClose
0x46719c ExitProcess
0x4671a0 WriteFile
0x4671a8 RtlUnwind
0x4671ac RaiseException
0x4671b0 GetStdHandle
0x4671b8 GetKeyboardType
0x4671bc LoadStringA
0x4671c0 MessageBoxA
0x4671c4 CharNextA
0x4671cc RegQueryValueExA
0x4671d0 RegOpenKeyExA
0x4671d4 RegCloseKey
0x4671dc SysFreeString
0x4671e0 SysReAllocStringLen
0x4671e4 SysAllocStringLen
0x4671ec TlsSetValue
0x4671f0 TlsGetValue
0x4671f4 LocalAlloc
0x4671f8 GetModuleHandleA
0x467200 RegQueryValueExA
0x467204 RegOpenKeyExA
0x467208 RegCloseKey
0x467210 lstrcpyA
0x467214 WriteFile
0x46721c WaitForSingleObject
0x467220 VirtualQuery
0x467224 VirtualAlloc
0x467228 Sleep
0x46722c SizeofResource
0x467230 SetThreadPriority
0x467234 SetThreadLocale
0x467238 SetFilePointer
0x46723c SetEvent
0x467240 SetErrorMode
0x467244 SetEndOfFile
0x467248 ResetEvent
0x46724c ReadFile
0x467250 MulDiv
0x467254 LockResource
0x467258 LoadResource
0x46725c LoadLibraryA
0x467268 GlobalUnlock
0x46726c GlobalReAlloc
0x467270 GlobalHandle
0x467274 GlobalLock
0x467278 GlobalFree
0x46727c GlobalFindAtomA
0x467280 GlobalDeleteAtom
0x467284 GlobalAlloc
0x467288 GlobalAddAtomA
0x46728c GetVersionExA
0x467290 GetVersion
0x467294 GetTickCount
0x467298 GetThreadLocale
0x46729c GetTempPathA
0x4672a0 GetSystemInfo
0x4672a4 GetStringTypeExA
0x4672a8 GetStdHandle
0x4672ac GetProcAddress
0x4672b0 GetModuleHandleA
0x4672b4 GetModuleFileNameA
0x4672b8 GetLocaleInfoA
0x4672bc GetLocalTime
0x4672c0 GetLastError
0x4672c4 GetFullPathNameA
0x4672c8 GetFileSize
0x4672cc GetDiskFreeSpaceA
0x4672d0 GetDateFormatA
0x4672d4 GetCurrentThreadId
0x4672d8 GetCurrentProcessId
0x4672dc GetCPInfo
0x4672e0 GetACP
0x4672e4 FreeResource
0x4672e8 InterlockedExchange
0x4672ec FreeLibrary
0x4672f0 FormatMessageA
0x4672f4 FindResourceA
0x4672f8 EnumCalendarInfoA
0x467304 CreateThread
0x467308 CreateFileA
0x46730c CreateEventA
0x467310 CopyFileA
0x467314 CompareStringA
0x467318 CloseHandle
0x467320 VerQueryValueA
0x467328 GetFileVersionInfoA
0x467330 UnrealizeObject
0x467334 StretchBlt
0x467338 SetWindowOrgEx
0x46733c SetViewportOrgEx
0x467340 SetTextColor
0x467344 SetStretchBltMode
0x467348 SetROP2
0x46734c SetPixel
0x467350 SetDIBColorTable
0x467354 SetBrushOrgEx
0x467358 SetBkMode
0x46735c SetBkColor
0x467360 SelectPalette
0x467364 SelectObject
0x467368 SaveDC
0x46736c RestoreDC
0x467370 RectVisible
0x467374 RealizePalette
0x467378 PatBlt
0x46737c MoveToEx
0x467380 MaskBlt
0x467384 LineTo
0x467388 IntersectClipRect
0x46738c GetWindowOrgEx
0x467390 GetTextMetricsA
0x46739c GetStockObject
0x4673a0 GetPixel
0x4673a4 GetPaletteEntries
0x4673a8 GetObjectA
0x4673ac GetDeviceCaps
0x4673b0 GetDIBits
0x4673b4 GetDIBColorTable
0x4673b8 GetDCOrgEx
0x4673c0 GetClipBox
0x4673c4 GetBrushOrgEx
0x4673c8 GetBitmapBits
0x4673cc ExcludeClipRect
0x4673d0 DeleteObject
0x4673d4 DeleteDC
0x4673d8 CreateSolidBrush
0x4673dc CreatePenIndirect
0x4673e0 CreatePalette
0x4673e8 CreateFontIndirectA
0x4673ec CreateDIBitmap
0x4673f0 CreateDIBSection
0x4673f4 CreateCompatibleDC
0x4673fc CreateBrushIndirect
0x467400 CreateBitmap
0x467404 BitBlt
0x46740c CreateWindowExA
0x467410 WindowFromPoint
0x467414 WinHelpA
0x467418 WaitMessage
0x46741c UpdateWindow
0x467420 UnregisterClassA
0x467424 UnhookWindowsHookEx
0x467428 TranslateMessage
0x467430 TrackPopupMenu
0x467438 ShowWindow
0x46743c ShowScrollBar
0x467440 ShowOwnedPopups
0x467444 ShowCursor
0x467448 SetWindowsHookExA
0x46744c SetWindowPos
0x467450 SetWindowPlacement
0x467454 SetWindowLongA
0x467458 SetTimer
0x46745c SetScrollRange
0x467460 SetScrollPos
0x467464 SetScrollInfo
0x467468 SetRect
0x46746c SetPropA
0x467470 SetParent
0x467474 SetMenuItemInfoA
0x467478 SetMenu
0x46747c SetForegroundWindow
0x467480 SetFocus
0x467484 SetCursor
0x467488 SetClassLongA
0x46748c SetCapture
0x467490 SetActiveWindow
0x467494 SendMessageA
0x467498 ScrollWindow
0x46749c ScreenToClient
0x4674a0 RemovePropA
0x4674a4 RemoveMenu
0x4674a8 ReleaseDC
0x4674ac ReleaseCapture
0x4674b8 RegisterClassA
0x4674bc RedrawWindow
0x4674c0 PtInRect
0x4674c4 PostQuitMessage
0x4674c8 PostMessageA
0x4674cc PeekMessageA
0x4674d0 OffsetRect
0x4674d4 OemToCharA
0x4674d8 MessageBoxA
0x4674dc MapWindowPoints
0x4674e0 MapVirtualKeyA
0x4674e4 LoadStringA
0x4674e8 LoadKeyboardLayoutA
0x4674ec LoadIconA
0x4674f0 LoadCursorA
0x4674f4 LoadBitmapA
0x4674f8 KillTimer
0x4674fc IsZoomed
0x467500 IsWindowVisible
0x467504 IsWindowEnabled
0x467508 IsWindow
0x46750c IsRectEmpty
0x467510 IsIconic
0x467514 IsDialogMessageA
0x467518 IsChild
0x46751c InvalidateRect
0x467520 IntersectRect
0x467524 InsertMenuItemA
0x467528 InsertMenuA
0x46752c InflateRect
0x467534 GetWindowTextA
0x467538 GetWindowRect
0x46753c GetWindowPlacement
0x467540 GetWindowLongA
0x467544 GetWindowDC
0x467548 GetTopWindow
0x46754c GetSystemMetrics
0x467550 GetSystemMenu
0x467554 GetSysColorBrush
0x467558 GetSysColor
0x46755c GetSubMenu
0x467560 GetScrollRange
0x467564 GetScrollPos
0x467568 GetScrollInfo
0x46756c GetPropA
0x467570 GetParent
0x467574 GetWindow
0x467578 GetMenuStringA
0x46757c GetMenuState
0x467580 GetMenuItemInfoA
0x467584 GetMenuItemID
0x467588 GetMenuItemCount
0x46758c GetMenu
0x467590 GetLastActivePopup
0x467594 GetKeyboardState
0x46759c GetKeyboardLayout
0x4675a0 GetKeyState
0x4675a4 GetKeyNameTextA
0x4675a8 GetIconInfo
0x4675ac GetForegroundWindow
0x4675b0 GetFocus
0x4675b4 GetDlgItem
0x4675b8 GetDesktopWindow
0x4675bc GetDCEx
0x4675c0 GetDC
0x4675c4 GetCursorPos
0x4675c8 GetCursor
0x4675cc GetClientRect
0x4675d0 GetClassNameA
0x4675d4 GetClassInfoA
0x4675d8 GetCapture
0x4675dc GetActiveWindow
0x4675e0 FrameRect
0x4675e4 FindWindowA
0x4675e8 FillRect
0x4675ec EqualRect
0x4675f0 EnumWindows
0x4675f4 EnumThreadWindows
0x4675f8 EndPaint
0x4675fc EnableWindow
0x467600 EnableScrollBar
0x467604 EnableMenuItem
0x467608 DrawTextA
0x46760c DrawMenuBar
0x467610 DrawIconEx
0x467614 DrawIcon
0x467618 DrawFrameControl
0x46761c DrawEdge
0x467620 DispatchMessageA
0x467624 DestroyWindow
0x467628 DestroyMenu
0x46762c DestroyIcon
0x467630 DestroyCursor
0x467634 DeleteMenu
0x467638 DefWindowProcA
0x46763c DefMDIChildProcA
0x467640 DefFrameProcA
0x467644 CreatePopupMenu
0x467648 CreateMenu
0x46764c CreateIcon
0x467650 ClientToScreen
0x467654 CheckMenuItem
0x467658 CallWindowProcA
0x46765c CallNextHookEx
0x467660 BeginPaint
0x467664 CharNextA
0x467668 CharLowerA
0x46766c CharToOemA
0x467670 AdjustWindowRectEx
0x46767c Sleep
0x467684 SafeArrayPtrOfIndex
0x467688 SafeArrayGetUBound
0x46768c SafeArrayGetLBound
0x467690 SafeArrayCreate
0x467694 VariantChangeType
0x467698 VariantCopy
0x46769c VariantClear
0x4676a0 VariantInit
0x4676b0 ImageList_Write
0x4676b4 ImageList_Read
0x4676c4 ImageList_DragMove
0x4676c8 ImageList_DragLeave
0x4676cc ImageList_DragEnter
0x4676d0 ImageList_EndDrag
0x4676d4 ImageList_BeginDrag
0x4676d8 ImageList_Remove
0x4676dc ImageList_DrawEx
0x4676e0 ImageList_Draw
0x4676f0 ImageList_Add
0x4676f8 ImageList_Destroy
0x4676fc ImageList_Create
0x467700 InitCommonControls
0x467708 GetOpenFileNameA

This program must be run under Win32
`DATA
.idata
.rdata
P.reloc
P.rsrc
Boolean
False
Smallint
Integer
Cardinal
String
TObject
TObject
System
IInterface
System
TInterfacedObject
TDateTime
SVWUQ
Z]_^[
YZ]_^[
w;;t$
SVWUQ
Z]_^[
YZ]_^[
_^[YY]
_^[Y]
YZ]_^[
_^[Y]
C<"u1S
Q<"u8S
,$YXZ
~KxI[)
BkU'9
SOFTWARE\Borland\Delphi\RTL
FPUMaskValue
_^[YY]
PPRTj
YZXtp
YZXtm1
ZTUWVSPRTj
t=HtN
t-Rf;
t f;J
SVWRP
Z_^[X
tVSVWU
t1SVW
t-Rf;
t f;J
kernel32.dll
GetLongPathNameA
Software\Borland\Locales
Software\Borland\Delphi\Locales
_^[YY]
FFF;M
^[YY]
Uhe^@
odSelected
odGrayed
odDisabled
odChecked
odFocused
odDefault
odHotLight
odInactive
odNoAccel
odNoFocusRect
odReserved1
odReserved2
odComboBoxEdit
Windows
TOwnerDrawState
_^[Y]
_^[Y]
_^[Y]
Magellan MSWHEEL
MouseZ
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
TFileName
Exception
EHeapException
EOutOfMemory
EInOutError
EExternal
EExternalException
EIntError
EDivByZero
ERangeError
EIntOverflow
EMathError
EInvalidOp
EZeroDivide
EOverflow
EUnderflow
EInvalidCast
EConvertError
EAccessViolation
EPrivilege
EStackOverflow
EControlC
EVariantError
EAssertionFailed
EAbstractError
EIntfCastError
EOSError
ESafecallException
SysUtils
SysUtils
TThreadLocalCounter
$TMultiReadExclusiveWriteSynchronizer
SWSVj
False
_^[Y]
$Z_^[
$Z_^[
^[YY]
<*t"<0r=<9w9i
INFNAN
QS<$t
_^[YY]
_^[YY]
$YZ_^[
t%HtIHtm
AM/PM
_^[YY]
SVWUQ
$Z]_^[
_^[Y]
QQQQQQSVW3
QQQQQSVW
D$PPj
D$LPj
_^[Y]
_^[YY]
TErrorRec
TExceptRec
t<HtH
$YZ^[
$YZ^[
WUWSj
YZ]_^[
_^[Y]
m/d/yy
mmmm d, yyyy
AMPM
AMPM
:mm:ss
kernel32.dll
GetDiskFreeSpaceExA
SVWUQ
(Z]_^[
SVWUQ
;w$t|
Z]_^[
;F$t=
;C$t4
_^[Y]
oleaut32.dll
VariantChangeTypeEx
VarNeg
VarNot
VarAdd
VarSub
VarMul
VarDiv
VarIdiv
VarMod
VarAnd
VarOr
VarXor
VarCmp
VarI4FromStr
VarR4FromStr
VarR8FromStr
VarDateFromStr
VarCyFromStr
VarBoolFromStr
VarBstrFromCy
VarBstrFromDate
VarBstrFromBool
TCustomVariantType
TCustomVariantType
Variants
EVariantInvalidOpError
EVariantTypeCastError
EVariantOverflowError
EVariantInvalidArgError
EVariantBadVarTypeErrorp
EVariantBadIndexError
EVariantArrayLockedError
EVariantArrayCreateError
EVariantNotImplError
EVariantOutOfMemoryError
EVariantUnexpectedError
EVariantDispatchError
t?Htb
QQQQSV
Empty
Smallint
Integer
Single
Double
Currency
OleStr
Dispatch
Error
Boolean
Variant
Unknown
Decimal
ShortInt
LongWord
Int64
String
Array
ByRef
Variants
_^[YY]
_^[Y]
SVWUQ
Z]_^[
t~h$hF
_^[Y]
False
_^[Y]
_^[YY]
$YZ^[
TBiDiMode
bdLeftToRight
bdRightToLeft
bdRightToLeftNoAlign
bdRightToLeftReadingOnly
Classes
ssShift
ssAlt
ssCtrl
ssLeft
ssRight
ssMiddle
ssDouble
Classes
TShiftState
THelpContext
THelpType
htKeyword
htContext
Classes
TShortCut
TNotifyEvent
Sender
TObject
EStreamError
EFileStreamError
EFCreateError
EFOpenError
EFilerError(
EReadError
EWriteError
EClassNotFound
EResNotFound
EListError
EBitsError
EStringListError
EComponentError
EOutOfResourcesX
EInvalidOperation
TList
TThreadListt
TBits
TPersistent
TPersistent
Classes
TInterfacedPersistent
TInterfacedPersistent
Classes
IStringsAdapter,
Classes
TStrings
TStrings
Classes
TStringItem
TStringList|
TStringList
Classes
TStream\
THandleStream
TFileStreamH
TCustomMemoryStream
TMemoryStream
TResourceStream
TStreamAdapter
TClassFinder
TFiler
TReader
EThread
TComponentName
IDesignerNotify,
Classes
TComponent
TComponent
Classes
NameT
TBasicActionLink
TBasicAction
TBasicAction
Classes
TIdentMapEntry
TRegGroup
TRegGroups
YZ]_^[
_^[Y]
_^[Y]
SVWUQ
u%CNu
Z]_^[
SVWUQ
$Z]_^[
SVWUQ
Z]_^[
SVWUQ
Z]_^[
SVWUQ
Z]_^[
SVWUQ
$Z]_^[
UhW1A
_^[YY]
Uh&2A
UhR3A
TIntConst
Uh25A
_^[Y]
_^[Y]
_^[YY]
_^[Y]
UhB9A
Uh#9A
Uh4>A
SVWUQ
Z]_^[
UhBAA
UhNCA
Uh{DA
Uh^DA
W<CNu
PhLMA
Strings
Uh GA
_^[Y]
UhiHA
S$_^[Y]
UhULA
Uh8LA
^[YY]
_^[YY]
SVWUQ
SdZ]_^[
UhGNA
Uh+OA
UhrPA
SVWUQ
$Z]_^[
^[YY]
Uh5]A
Uh_`A
_^[Y]
TPropFixup
TPropIntfFixup
UhNdA
_^[YY]
Owner
UhjfA
UhKfA
Uh3gA
_^[YY]
_^[Y]
C0_^[
Classes
_^[Y]
UhNqA
Uh"qA
UhktA
UhSuA
Uh*vA
False
UhEzA
_^[YY]
QQQQ3
Uh'}A
%s_%d
_^[YY]
^[YY]
QQQQQQQS
SVWUQ
Z]_^[
_^[Y]
S _^[
SVWUQ
Z]_^[
YZ_^[
SVWUQ
Z]_^[
G0_^[
;CDt:
R0_^[]
_^[YY]
TPUtilWindow
TColor
EInvalidGraphic
EInvalidGraphicOperation
TFontPitch
fpDefault
fpVariable
fpFixed
Graphics
TFontName
TFontCharset
TFontStyle
fsBold
fsItalic
fsUnderline
fsStrikeOut
Graphics
TFontStyles
TPenStyle
psSolid
psDash
psDot
psDashDot
psDashDotDot
psClear
psInsideFrame
Graphics
TPenMode
pmBlack
pmWhite
pmNop
pmNot
pmCopy
pmNotCopy
pmMergePenNot
pmMaskPenNot
pmMergeNotPen
pmMaskNotPen
pmMerge
pmNotMerge
pmMask
pmNotMask
pmXor
pmNotXor
Graphics
TBrushStyle
bsSolid
bsClear
bsHorizontal
bsVertical
bsFDiagonal
bsBDiagonal
bsCross
bsDiagCross
Graphics
TGraphicsObject
TGraphicsObject
Graphics
IChangeNotifier,
Graphics
TFont
TFont
Graphics
Charset0
ColorT
HeightP
PitchT
Style
TPen
Graphics
ColorL
StyleT
Width
TBrush
TBrush
Graphics
Color
Style
TCanvas
TCanvas
Graphics
BrushT
CopyMode
Font4
TGraphic
TGraphich
Graphics
TSharedImage
TBitmapImage
TBitmap
TBitmap
Graphics
TIconImage
TIcon
TIconT
Graphics
TResourceManager
^[YY]
_^[YY]
_^[Y]
^[YY]
clBlack
clMaroon
clGreen
clOlive
clNavy
clPurple
clTeal
clGray
clSilver
clRed
clLime
clYellow
clBlue
clFuchsia
clAqua
clWhite
clMoneyGreen
clSkyBlue
clCream
clMedGray
clActiveBorder
clActiveCaption
clAppWorkSpace
clBackground
clBtnFace
clBtnHighlight
clBtnShadow
clBtnText
clCaptionText
clDefault
clGradientActiveCaption
clGradientInactiveCaption
clGrayText
clHighlight
clHighlightText
clHotLight
clInactiveBorder
clInactiveCaption
clInactiveCaptionText
clInfoBk
clInfoText
clMenu
clMenuBar
clMenuHighlight
clMenuText
clNone
clScrollBar
cl3DDkShadow
cl3DLight
clWindow
clWindowFrame
clWindowText
ANSI_CHARSET
DEFAULT_CHARSET
SYMBOL_CHARSET
MAC_CHARSET
SHIFTJIS_CHARSET
HANGEUL_CHARSET
JOHAB_CHARSET
GB2312_CHARSET
CHINESEBIG5_CHARSET
GREEK_CHARSET
TURKISH_CHARSET
HEBREW_CHARSET
ARABIC_CHARSET
BALTIC_CHARSET
RUSSIAN_CHARSET
THAI_CHARSET
EASTEUROPE_CHARSET
OEM_CHARSET
Default
_^[Y]
$YZ^[
E$PVSj
YZ_^[
$Z_^[
_^[YY]
C ;C$s
TBitmapCanvas
TBitmapCanvas
Graphics
@pPV3
_^[YY]
<$BMt
T]_^[
s(;~ t8
D$*Ph
C(_^[Y]
\$4Vj
SVWjH
TPatternManagerSV
_^[YY]
TObjectList
TOrderedList
TStack
comctl32.dll
InitCommonControlsEx
UhM#B
_^[Y]
GetMonitorInfoA
GetSystemMetrics
MonitorFromRect
MonitorFromWindow
MonitorFromPoint
>(r[j
GetMonitorInfo
DISPLAY
>(r[j
GetMonitorInfoA
DISPLAY
>(r[j
GetMonitorInfoW
DISPLAY
EnumDisplayMonitors
USER32.DLL
IHelpSelector,
HelpIntfs
IHelpSystem,
HelpIntfs
ICustomHelpViewer,
HelpIntfs
IExtendedHelpViewer
HelpIntfs
ISpecialWinHelpViewer
HelpIntfs
IHelpManager,
HelpIntfs
EHelpSystemException
THelpViewerNode
THelpManager
UhZ/B
Uhq1B
R(FKu
Uh-3B
Uh#9B
_^[Y]
Uh=;B
SVhT=B
comctl32.dll
InitializeFlatSB
UninitializeFlatSB
FlatSB_GetScrollProp
FlatSB_SetScrollProp
FlatSB_EnableScrollBar
FlatSB_ShowScrollBar
FlatSB_GetScrollRange
FlatSB_GetScrollInfo
FlatSB_GetScrollPos
FlatSB_SetScrollPos
FlatSB_SetScrollInfo
FlatSB_SetScrollRange
TSynchroObject
TCriticalSection
uxtheme.dll
OpenThemeData
CloseThemeData
DrawThemeBackground
DrawThemeText
GetThemeBackgroundContentRect
GetThemePartSize
GetThemeTextExtent
GetThemeTextMetrics
GetThemeBackgroundRegion
HitTestThemeBackground
DrawThemeEdge
DrawThemeIcon
IsThemePartDefined
IsThemeBackgroundPartiallyTransparent
GetThemeColor
GetThemeMetric
GetThemeString
GetThemeBool
GetThemeInt
GetThemeEnumValue
GetThemePosition
GetThemeFont
GetThemeRect
GetThemeMargins
GetThemeIntList
GetThemePropertyOrigin
SetWindowTheme
GetThemeFilename
GetThemeSysColor
GetThemeSysColorBrush
GetThemeSysBool
GetThemeSysSize
GetThemeSysFont
GetThemeSysString
GetThemeSysInt
IsThemeActive
IsAppThemed
GetWindowTheme
EnableThemeDialogTexture
IsThemeDialogTextureEnabled
GetThemeAppProperties
SetThemeAppProperties
GetCurrentThemeName
GetThemeDocumentationProperty
DrawThemeParentBackground
EnableTheming
Uh9JB
UhqJB
UhQKB
IShellFolder,
ShlObj
Uh5LB
TCommonDialog
TCommonDialog
Dialogs
Ctl3D|
HelpContext
OnClose
OnShow
TOpenOption
ofReadOnly
ofOverwritePrompt
ofHideReadOnly
ofNoChangeDir
ofShowHelp
ofNoValidate
ofAllowMultiSelect
ofExtensionDifferent
ofPathMustExist
ofFileMustExist
ofCreatePrompt
ofShareAware
ofNoReadOnlyReturn
ofNoTestFileCreate
ofNoNetworkButton
ofNoLongNames
ofOldStyleDialog
ofNoDereferenceLinks
ofEnableIncludeNotify
ofEnableSizing
ofDontAddToRecent
ofForceShowHidden
Dialogs
TOpenOptions
TOpenOptionEx
ofExNoPlacesBar
Dialogs
TOpenOptionsEx
TOFNotifyEx
TIncludeItemEvent
TOFNotifyEx
Include
Boolean
TOpenDialog
TOpenDialoghPB
Dialogs
FileName
FilterT
FilterIndex
InitialDirHOB
Options
OptionsEx
Title
OnCanClose
OnFolderChange
OnSelectionChange
OnTypeChange
OnIncludeItemSVW
Uh6UB
_^[Y]
UhgVB
Uh9VB
_^[Y]
;Ght4
FileEditStyle
8Z|03
UhE^B
@\@t*U
u"Vh_
Cancel
Abort
Retry
Ignore
NoToAll
YesToAll
commdlg_help
commdlg_FindReplace
WndProcPtr%.8X%.8X
TTimer
ExtCtrls
Enabled
Interval
OnTimerSV
_^[Y]
s'h8jB
Delphi Picture
Delphi Component
UhXkB
MAPI32.DLL
UhDmB
Uh}mB
TConversion
TConversionFormat
TUDAlignButton
udLeft
udRight
ComCtrls
TUDOrientation
udHorizontal
udVertical
ComCtrls
TUDBtnType
btNext
btPrev
ComCtrls
TUpDownDirection
updNone
updUp
updDown
ComCtrls
TUDClickEvent
Sender
TObject
Button
TUDBtnType
TUDChangingEvent
Sender
TObject
AllowChange
Boolean
TUDChangingEventEx
Sender
TObject
AllowChange
Boolean
NewValue
Smallint
Direction
TUpDownDirection
TCustomUpDown
TCustomUpDownhpB
ComCtrls
TUpDown
TUpDown
ComCtrls
AlignButton
Anchorsl
Associate
ArrowKeys
Enabled
Hint<
Increment
ConstraintsTnB
Orientation
ParentShowHint
PopupMenu<
Position
ShowHintd
TabOrder
TabStop
Thousands
Visible
WrapToB
OnChanging
OnChangingExx
OnContextPopup
OnClick
OnEnter
OnExitP
OnMouseDown
OnMouseMoveP
OnMouseUp
THKModifier
hkShift
hkCtrl
hkAlt
hkExt
ComCtrls
THKModifiers
THKInvalidKey
hcNone
hcShift
hcCtrl
hcAlt
hcShiftCtrl
hcShiftAlt
hcCtrlAlt
hcShiftCtrlAlt
ComCtrls
THKInvalidKeys
TCustomHotKey
TCustomHotKey
ComCtrls
THotKey<zB
THotKeyhyB
ComCtrls
Anchors
AutoSize
BiDiMode
Constraints
Enabled
HotKey
InvalidKeys
Modifiers
ParentBiDiMode
ParentShowHint
PopupMenu
ShowHintd
TabOrder
TabStop
Visible
OnChangex
OnContextPopup
OnEnter
OnExitP
OnMouseDown
OnMouseMoveP
OnMouseUp
ECommonCalendarError
TMonthCalColorsd~B
TMonthCalColorsD~B
ComCtrls
BackColor0
TextColor0
TitleBackColor0
TitleTextColor0
MonthBackColor0
TrailingTextColor
TCalDayOfWeek
dowMonday
dowTuesday
dowWednesday
dowThursday
dowFriday
dowSaturday
dowSunday
dowLocaleDefault
ComCtrls
TOnGetMonthInfoEvent
Sender
TObject
Month
Cardinal
MonthBoldInfo
Cardinal
TCommonCalendar
TCommonCalendar
ComCtrls
EMonthCalError
TMonthCalendar
TMonthCalendar|
ComCtrls/
Align
Anchors
AutoSized
BorderWidth
BiDiMode`~B
CalColors
Constraints
MultiSelect
DragCursor0
DragKind
DragMode
Enabled
EndDate|
FirstDayOfWeek
ImeModeT
ImeName
MaxDateT
MaxSelectRange
MinDate
ParentBiDiMode
ParentFont
ParentShowHint
PopupMenu
ShowHint
ShowToday
ShowTodayCircled
TabOrder
TabStop
Visible
WeekNumbers
OnClickx
OnContextPopup
OnDblClick<
OnDragDrop
OnDragOver
OnEndDock
OnEndDrag
OnEnter
OnExit
OnGetMonthInfo,
OnKeyDownx
OnKeyPress,
OnKeyUp
OnStartDock
OnStartDrag
EDateTimeError
TDateTimeKind
dtkDate
dtkTime
ComCtrls
TDTDateMode
dmComboBox
dmUpDown
ComCtrls
TDTDateFormat
dfShort
dfLong
ComCtrls\
TDTCalAlignment
dtaLeft
dtaRight
ComCtrls
TDTParseInputEvent
Sender
TObject
UserString
String
DateAndTime
TDateTime
AllowChange
Boolean
TDateTimePicker
TDateTimePicker\
ComCtrls8
Anchors
BevelEdges
BevelInner
BevelOuter$
BevelKindh
BevelWidth
BiDiModeX
CalAlignment`~B
CalColors
Constraints
Format
ShowCheckbox
Checked0
Color
DateFormat
DateMode
DragCursor0
DragKind
DragMode
Enabled
ImeModeT
ImeName
MaxDate
MinDate
ParseInput
ParentBiDiMode
ParentColor
ParentFont
ParentShowHint
PopupMenu
ShowHintd
TabOrder
TabStop
Visible
OnClick
OnCloseUp
OnChangex
OnContextPopup
OnDropDown
OnDblClick<
OnDragDrop
OnDragOver
OnEndDock
OnEndDrag
OnEnter
OnExit,
OnKeyDownx
OnKeyPress,
OnKeyUp
OnStartDock
OnStartDrag
OnUserInput
comctl32.dll
msctls_updown32
F0;C0
TDBEdit
TDBMemo
_^[Y]
msctls_hotkey32
D$8PS
QQQQQQS
SysMonthCal32
SysDateTimePick32
TThemeServices
Theme manager
2001, 2002 Mike Lischke
^[YY]
!"#$%
THintAction
THintActionX
StdActns
TWinHelpViewer
_^[YY]
_^[YY]
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
_^[Y]
JumpID("","%s")
_^[YY]
_^[Y]
MS_WINHELP
#32770
TCursor
TAlign
alNone
alTop
alBottom
alLeft
alRight
alClient
alCustom
Controls
TDragObject
TDragObjectT
Controls
TBaseDragControlObject
TBaseDragControlObject
Controls
TDragControlObject
TDragControlObjectEx
TDragDockObject(
TDragDockObject
Controls
TDragDockObjectEx
TControlCanvas
TControlCanvas8
Controls
TControlActionLink
TMouseButton
mbLeft
mbRight
mbMiddle
Controls
TDragMode
dmManual
dmAutomatic
Controls
TDragState
dsDragEnter
dsDragLeave
dsDragMove
Controls
TDragKind
dkDrag
dkDock
Controls
TTabOrder
TCaption
TDate
TTime
TAnchorKind
akLeft
akTop
akRight
akBottom
Controls
TAnchors
TConstraintSize
TSizeConstraints
TSizeConstraintsl
Controls
MaxHeight
MaxWidth
MinHeight
MinWidth
TMouseEvent
Sender
TObject
Button
TMouseButton
Shift
TShiftState
Integer
Integer
TMouseMoveEvent
Sender
TObject
Shift
TShiftState
Integer
Integer
TKeyEvent
Sender
TObject
Shift
TShiftState
TKeyPressEvent
Sender
TObject
TDragOverEvent
Sender
TObject
Source
TObject
Integer
Integer
State
TDragState
Accept
Boolean
TDragDropEvent
Sender
TObject
Source
TObject
Integer
Integer
TStartDragEvent
Sender
TObject
DragObject
TDragObject
TEndDragEvent
Sender
TObject
Target
TObject
Integer
Integer
TDockDropEvent
Sender
TObject
Source
TDragDockObject
Integer
Integer
TDockOverEvent
Sender
TObject
Source
TDragDockObject
Integer
Integer
State
TDragState
Accept
Boolean
TUnDockEvent
Sender
TObject
Client
TControl
NewTarget
TWinControl
Allow
Boolean
TStartDockEvent
Sender
TObject
DragObject
TDragDockObject
TGetSiteInfoEvent
Sender
TObject
DockClient
TControl
InfluenceRect
TRect
MousePos
TPoint
CanDock
Boolean
TCanResizeEvent
Sender
TObject
NewWidth
Integer
NewHeight
Integer
Resize
Boolean
TConstrainedResizeEvent
Sender
TObject
MinWidth
Integer
MinHeight
Integer
MaxWidth
Integer
MaxHeight
Integer
TMouseWheelEvent
Sender
TObject
Shift
TShiftState
WheelDelta
Integer
MousePos
TPoint
Handled
Boolean
TMouseWheelUpDownEvent
Sender
TObject
Shift
TShiftState
MousePos
TPoint
Handled
Boolean
TContextPopupEvent
Sender
TObject
MousePos
TPoint
Handled
Boolean
TControl
TControl
Controls
LeftT
WidthT
Height
Cursor
HelpType
HelpKeyword|
HelpContext0
TWinControlActionLink
TImeMode
imDisable
imClose
imOpen
imDontCare
imSAlpha
imAlpha
imHira
imSKata
imKata
imChinese
imSHanguel
imHanguel
Controls
TImeName
TBorderWidth
TBevelCut
bvNone
bvLowered
bvRaised
bvSpace
Controls
TBevelEdge
beLeft
beTop
beRight
beBottom
Controls
TBevelEdges
TBevelKind
bkNone
bkTile
bkSoft
bkFlat
Controls
TBevelWidth
IDockManager,
Controls
TWinControl
TWinControl
Controls
TCustomControl
TCustomControl
Controls
THintWindow
THintWindow<
Controls
TDockZone
TDockTree
TMouse
crDefault
crArrow
crCross
crIBeam
crSizeNESW
crSizeNS
crSizeNWSE
crSizeWE
crUpArrow
crHourGlass
crDrag
crNoDrop
crHSplit
crVSplit
crMultiDrag
crSQLWait
crAppStart
crHelp
crHandPoint
crSizeAll
crSize
TSiteList
_^[YY]
tPHt8
_^[Y]
S$_^[]
;B0t'
;B8t=
CQ tA
YZ_^[
YZ]_^[
YZ_^[
t%Jt?Jt[
%s (%s)
Z:Pjt
YZ]_^[
$:Cat
u$;~|u
;CLtX3
Qh_^[
YZ_^[
YZ_^[
V:P\t
GP t;
_^[YY]
CH+D$
CL+D$
;s0t=;
:_Wt+
f;Pxt
Uh6,C
KHQRP
UhW4C
UhK7C
Ht7Ht
Ph0=C
IsControl
_^[YY]
YZ_^[
UhBHC
_^[YY]
_^[Y]
8]_^[
,]_^[
YZ_^[
Uh,NC
^[YY]
Uh<PC
RD;PD
:_[up
SVWUQ
Z]_^[
C$PVj
C$_^[
:GauOFKu
_^[Y]
DesignSize
UhIdC
_^[YY]
_^[Y]
t2HtY
,;=0kF
]_^[
UhkxC
_^[Y]
_^[Y]
$Z_^[
_^[YY]
_^[Y]
Uh^}C
^[YY]
SVWUQ
Z]_^[
SVWUQ
Z]_^[
SVWUQ
Z]_^[
_^[YY]
;XDt#
SVWUQ
Z]_^[
t&j7j
YZ]_^[
YZ]_^[
YZ]_^[
t4VS
R|FOu
YZ]_^[
^[YY]
S8_^[]
+CH+E
+SL+U
_^[Y]
f;Pht
_^[Y]
t9;wlt4
YZ_^[
;Bdt*
;Bh|3
R|_^[
_^[Y]
Y_^[]
Y[YY]
t$;C8u
QQQQSVW
;Fdu;
^[YY]
Q8FKu
;Xdt>
t#;^dt
YZ_^[
Y_^[]
^[YY]
+W$;U
+G$;E
_^[Y]
BP_^[]
USER32
WINNLSEnableIME
imm32.dll
ImmGetContext
ImmReleaseContext
ImmGetConversionStatus
ImmSetConversionStatus
ImmSetOpenStatus
ImmSetCompositionWindow
ImmSetCompositionFontA
ImmGetCompositionStringA
ImmIsIME
ImmNotifyIME
YZ_^[
Delphi%.8X
ControlOfs%.8X%.8X
USER32
AnimateWindow
TContainedAction
TContainedAction8
ActnList
Category
TCustomActionList
TCustomActionList\
ActnList
TShortCutList
TShortCutList8
ActnList
TCustomAction
TCustomActionT
ActnList
TActionLinkSV
^[YY]
u*;~8u
R0GNu
SVWUQ
Z]_^[
QLGNu
R0Z_^[
QPFOu
_^[Y]
$:Cjt_
QTGNu
R0Z_^[
Q`FOu
R0]_^[
$;Ctt?
Q\GNu
R0Z_^[
QhGNu
R0Z_^[
QlGNu
R0Z_^[
SVWQf
QpGNu
R0Z_^[
QtFOu
R0]_^[
SVWUQ
$Z]_^[
TChangeLink
TImageIndex
TCustomImageList
TCustomImageListH
ImgList
Rd_^[
s8VV3
S0_^[]
R ;C0|
R,;C4}!
S`]_^[
Bitmap
_^[Y]
comctl32.dll
comctl32.dll
ImageList_WriteEx
EMenuError
TMenuBreak
mbNone
mbBreak
mbBarBreak
Menus
TMenuChangeEvent
Sender
TObject
Source
TMenuItem
Rebuild
Boolean
TMenuDrawItemEvent
Sender
TObject
ACanvas
TCanvas
ARect
TRect
Selected
Boolean
TAdvancedMenuDrawItemEvent
Sender
TObject
ACanvas
TCanvas
ARect
TRect
State
TOwnerDrawState
TMenuMeasureItemEvent
Sender
TObject
ACanvas
TCanvas
Width
Integer
Height
Integer
TMenuItemAutoFlag
maAutomatic
maManual
maParent
Menus
TMenuAutoFlag
Menus
TMenuActionLink<
TMenuItem
TMenuItem<
Menus
Action
AutoCheck
AutoHotkeys
AutoLineReduction
Bitmap
Break
Caption
Checked
SubMenuImages
Default
Enabledl
GroupIndex|
HelpContext
ImageIndex
RadioItem
ShortCut
Visible
OnClickT
OnDrawItem
OnAdvancedDrawItem8
OnMeasureItem
TMenu
TMenu`
Menus
Items
TMainMenu
TMainMenuT
Menus
AutoHotkeys
AutoLineReduction
AutoMerge
BiDiMode
Images
OwnerDraw
ParentBiDiMode
OnChange
TPopupAlignment
paLeft
paRight
paCenter
Menus,
TTrackButton
tbRightButton
tbLeftButton
Menusl
TMenuAnimations
maLeftToRight
maRightToLeft
maTopToBottom
maBottomToTop
maNone
Menus
TMenuAnimation
TPopupMenu
TPopupMenu8
Menus
Alignment
AutoHotkeys
AutoLineReduction
AutoPopup
BiDiMode|
HelpContext
Images
MenuAnimation
OwnerDraw
ParentBiDiMode(
TrackButton
OnChange
OnPopup
TPopupList
TMenuItemStack
1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ
_^[YY]
f;B`t
Uho$D
CPPVj
Uhn%D
Q<]_^[
SVWUQ
:X?s&
X?ENu
Z]_^[
Sh$%D
ShortCutText
UhK.D
_^[Y]
UhW7D
_^[Y]
P?:S?u
:^8tB
:^9tg
Q<_^[
:^?t1
f;P`t
:]:tJ
Q<]_^[
@?:F?v
Q<]_^[
Q<_^[
W<CNu
6h4MD
SpFOu
$YZ]_^[
_^[Y]
_^[Y]
SVWUQ
Z]_^[
_^[YY]
Uhd\D
S0^[]
_^[Y]
_^[Y]
Ih;J4u
_^[Y]
Uh'hD
UhZfD
Uh=fD
UhxgD
Uh[gD
YZ]_^[
S0_^[
S<&uO
^[YY]
TScrollBarInc
TScrollBarStyle
ssRegular
ssFlat
ssHotTrack
FormsLoD
TControlScrollBar
TControlScrollBarLoD
Forms
ButtonSize0
Color
Increment
Margin
ParentColorT
PositionT
Range
SmoothT
StyleT
ThumbSize
Tracking
Visible
TWindowState
wsNormal
wsMinimized
wsMaximized
Forms
TScrollingWinControl
TScrollingWinControl
Forms
HorzScrollBarloD
VertScrollBarxsD
TFormBorderStyle
bsNone
bsSingle
bsSizeable
bsDialog
bsToolWindow
bsSizeToolWin
Forms
IDesignerHook
Forms
IOleForm,
Forms
TFormStyle
fsNormal
fsMDIChild
fsMDIForm
fsStayOnTop
Forms
TBorderIcon
biSystemMenu
biMinimize
biMaximize
biHelp
Forms
TBorderIcons
TPosition
poDesigned
poDefault
poDefaultPosOnly
poDefaultSizeOnly
poScreenCenter
poDesktopCenter
poMainFormCenter
poOwnerFormCenter
Forms
TDefaultMonitor
dmDesktop
dmPrimary
dmMainForm
dmActiveForm
Forms
TPrintScale
poNone
poProportional
poPrintToFit
Forms
TCloseAction
caNone
caHide
caFree
caMinimize
Forms
TCloseEvent
Sender
TObject
Action
TCloseAction
TCloseQueryEvent
Sender
TObject
CanClose
Boolean
TShortCutEvent
TWMKey
Handled
Boolean
THelpEvent
Command
Integer
CallHelp
Boolean
Boolean
TCustomForm
TCustomForm
Forms
TForm
TForm
FormsU
Actionl
ActiveControl
Align
AlphaBlendl
AlphaBlendValue
Anchors
AutoScroll
AutoSize
BiDiMode
BorderIconstsD
BorderStyled
BorderWidth|
CaptionT
ClientHeightT
ClientWidth0
Color
TransparentColor0
TransparentColorValue
Constraints
Ctl3D
UseDockManager
DefaultMonitor
DockSite0
DragKind
DragMode
Enabled
ParentFont
FormStyleT
Height
HelpFileloD
HorzScrollBar
KeyPreview
OldCreateOrder
ObjectMenuItem
ParentBiDiModeT
PixelsPerInch
PopupMenu
Position
PrintScale
Scaled
ScreenSnap
ShowHintT
SnapBufferloD
VertScrollBar
VisibleT
WidthTqD
WindowState
WindowMenu
OnActivate|
OnCanResize
OnClickxvD
OnClose
OnCloseQuery
OnConstrainedResizex
OnContextPopup
OnCreate
OnDblClick
OnDestroy
OnDockDrop
OnDockOver<
OnDragDrop
OnDragOver
OnEndDock
OnGetSiteInfo
OnHide<wD
OnHelp,
OnKeyDownx
OnKeyPress,
OnKeyUpP
OnMouseDown
OnMouseMoveP
OnMouseUp|
OnMouseWheel
OnMouseWheelDown
OnMouseWheelUp
OnPaint
OnResize
OnShortCut
OnShow
OnStartDock8
OnUnDock
TCustomDockForm
TCustomDockForm
Forms
PixelsPerInch
TMonitor
TScreen
TScreen
Forms
TApplication
TApplication
Forms
t:GNu
^[YY]
;S$t6
;S0t6
]_^[
_^[Y]
_^[Y]
PixelsPerInch
TextHeight
IgnoreFontProperty
_^[YY]
S,_^[]
SVWUQ
$Z]_^[
;Cpu'
F(Z_^[
MDICLIENT
_^[Y]
_^[Y]
;ADti
f#CTf
_^[Y]
_^[YY]
t"GNu
$Z_^[
_^[YY]
_^[Y]
Y_^[]
_^[Y]
_^[Y]
_^[YY]
Ch;Ctt
Cd;Cpt
C\_^[
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
layout text
f;sDtsf
PWj W
CHYZ]_^[
RD;PD
_^[YY]
TApplication
MAINICON
XD;PHu
sx;P`u
;B0uGj
_^[YY]
vcltest3.dll
RegisterAutomation
SVWUQ
$Z]_^[
~D_^[Y]
_^[Y]
Uh] E
Uh+!E
_^[Y]
Uhp#E
_^[Y]
;{HtK
YZ_^[
Uhk%E
Y_^[Y]
;^`u0
]_^[
UhW+E
^[YY]
Uh*0E
YZ]_^[
Shx1E
User32.dll
SetLayeredWindowAttributes
Uh32E
TaskbarCreated
EIdException
EIdInvalidServiceName
EIdSocketError
EIdWS2StubError
WhD7E
WSACleanup
accept
closesocket
connect
ioctlsocket
getpeername
getsockname
getsockopt
htonl
htons
inet_addr
inet_ntoa
listen
ntohl
ntohs
recvfrom
select
sendto
setsockopt
shutdown
socket
gethostbyaddr
gethostbyname
gethostname
getservbyport
getservbyname
getprotobynumber
getprotobyname
WSASetLastError
WSAGetLastError
WSAIsBlocking
WSAUnhookBlockingHook
WSASetBlockingHook
WSACancelBlockingCall
WSAAsyncGetServByName
WSAAsyncGetServByPort
WSAAsyncGetProtoByName
WSAAsyncGetProtoByNumber
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
WSACancelAsyncRequest
WSAAsyncSelect
__WSAFDIsSet
WSAAccept
WSACloseEvent
WSAConnect
WSACreateEvent
WSADuplicateSocketA
WSADuplicateSocketW
WSAEnumNetworkEvents
WSAEnumProtocolsA
WSAEnumProtocolsW
WSAEventSelect
WSAGetOverlappedResult
WSAGetQosByName
WSAHtonl
WSAHtons
WSAIoctl
WSAJoinLeaf
WSANtohl
WSANtohs
WSARecv
WSARecvDisconnect
WSARecvFrom
WSAResetEvent
WSASend
WSASendDisconnect
WSASendTo
WSASetEvent
WSASocketA
WSASocketW
WSAWaitForMultipleEvents
WSAAddressToStringA
WSAAddressToStringW
WSAStringToAddressA
WSAStringToAddressW
WSALookupServiceBeginA
WSALookupServiceBeginW
WSALookupServiceNextA
WSALookupServiceNextW
WSALookupServiceEnd
WSAInstallServiceClassA
WSAInstallServiceClassW
WSARemoveServiceClass
WSAGetServiceClassInfoA
WSAGetServiceClassInfoW
WSAEnumNameSpaceProvidersA
WSAEnumNameSpaceProvidersW
WSAGetServiceClassNameByClassIdA
WSAGetServiceClassNameByClassIdW
WSASetServiceA
WSASetServiceW
WSAProviderConfigChange
TransmitFile
AcceptEx
GetAcceptExSockaddrs
WSARecvEx
uAhm'
WS2_32.DLL
WS2_32.DLL
WSAStartup
UhEGE
TIdSocketList
TIdStack
EIdStackError
EIdStackInitializationFailed
EIdStackSetSizeExceededj
Uh0OE
UheOE
TIdSocketListWindows
TIdStackWindowsU
UhjQE
UhLRE
S|Z_^[
Uh[UE
Uh=VE
Uh9YE
IdStackWindows
QQQQSVW
UhiZE
Uh.ZE
Uh.[E
Uh6^E
Uh*_E
UhU`E
IdGlobal
IdGlobal
UhGcE
_^[Y]
FALSE
TIdBaseComponent
TIdBaseComponent4gE
IdBaseComponent
UhGhE
UhTiE
UhUjE
Uh5kE
UhmkE
UhMlE
TIdThreadMgr
TIdThreadMgrTmE
IdThreadMgr
EIdThreadMgrError
EIdThreadClassNotSpecified
UhOoE
TIdThreadMgrPool
TIdThreadMgrPool
IdThreadMgrPool
PoolSize
UhuqE
_^[YY]
UhvsE
DateTimePicker1
MonthCalendar1
HotKey1
UpDown1
IdThreadMgrPool1
OpenDialog1
TForm1
TForm1
Unit1
Uh)wE
ELF.EX
GetSystemTimeAsFileTime
kernel32
FileTimeToSystemTime
Error
Runtime error at 00000000
0123456789ABCDEF
MS Sans Serif
KVMK.E
E5t Hv.E
EQMMXe.E
E)Xjdf`E
MEYjif`M
Yjgf`M
M%Yjcf`M
Xjrf`E
Xjif.
jeXf.
|Qgj.
{=#W.
h&cj.
Xj.f`E
jf_f`}
_jBf`}
}_jM_f`}
}}_jxZ
UsZjuf`U
3)jtf
VVVd
j\Xf`E
Xjvf`E
Xjaf`E
Yjtf`M
M;Yjtf`M
Xjpf`E
MKVf.E
EUMMXe.E
EGXjx
UWjdZf`U
Zjbf`U
Xjnf`
Xjof`
Xjtf`
Xjef`
Xjpf`
Xjaf`
Xjdf`
Xj.f`
jxf`E
VMKV.E
Xjpf`E
Xjbf`E
/b .E
yf9K"
dll..E
Xj2f`E
Xj%f`E
jDf`E
.(Y9E
FPP`E
U?Zj f`U
U5Zj f`U
YjXf`E
Yjxf`M
Yjlf`M
M=Yjrf`E
VVVd
Xjef`E
Xjif`E
RW`FT
eW`F
h&cj~W
YYf;8
Y3 9]
%P;SV
fYXSV
kernel32.dll
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
user32.dll
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32.dll
SysFreeString
SysReAllocStringLen
SysAllocStringLen
kernel32.dll
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32.dll
lstrcpyA
WriteFile
WaitForSingleObjectEx
WaitForSingleObject
VirtualQuery
VirtualAlloc
Sleep
SizeofResource
SetThreadPriority
SetThreadLocale
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResetEvent
ReadFile
MulDiv
LockResource
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetVersionExA
GetVersion
GetTickCount
GetThreadLocale
GetTempPathA
GetSystemInfo
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileSize
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCPInfo
GetACP
FreeResource
InterlockedExchange
FreeLibrary
FormatMessageA
FindResourceA
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateFileA
CreateEventA
CopyFileA
CompareStringA
CloseHandle
version.dll
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
gdi32.dll
UnrealizeObject
StretchBlt
SetWindowOrgEx
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetROP2
SetPixel
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SelectPalette
SelectObject
SaveDC
RestoreDC
RectVisible
RealizePalette
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetTextMetricsA
GetTextExtentPoint32A
GetSystemPaletteEntries
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
ExcludeClipRect
DeleteObject
DeleteDC
CreateSolidBrush
CreatePenIndirect
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateDIBitmap
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
BitBlt
user32.dll
CreateWindowExA
WindowFromPoint
WinHelpA
WaitMessage
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
ShowCursor
SetWindowsHookExA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetParent
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetClassLongA
SetCapture
SetActiveWindow
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassA
RedrawWindow
PtInRect
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
OemToCharA
MessageBoxA
MapWindowPoints
MapVirtualKeyA
LoadStringA
LoadKeyboardLayoutA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsRectEmpty
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetWindow
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursor
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
DrawTextA
DrawMenuBar
DrawIconEx
DrawIcon
DrawFrameControl
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreatePopupMenu
CreateMenu
CreateIcon
ClientToScreen
CheckMenuItem
CallWindowProcA
CallNextHookEx
BeginPaint
CharNextA
CharLowerA
CharToOemA
AdjustWindowRectEx
ActivateKeyboardLayout
kernel32.dll
Sleep
oleaut32.dll
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
comctl32.dll
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Remove
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
InitCommonControls
comdlg32.dll
GetOpenFileNameA
0(0<0T0l0
1,1}1
2&2.262>2F2N2V2^2f2n2v2~2
3&3.3Z3b3j3r3z3
3,434{5
:+:6:A:I:S:]:g:}:
;";/;5;O;V;`;j;t;
<.<F<N<
=1=[>h>
0#0(0.0
1C1O1W1
2(2/242:2M2V2t2z2
3&3F3^3
4 4(4
6-6K6W6_6
737L7e7
8,8n:v:
>+><>X>p>
1%1;1Y1o1
6.666L6d6r6
7C7p7y7
969?9q9x9
9+:7:
<$</<[<p<
= =$=)=0=6=>=I=
>$>.>S>]>g>o>u>
82:;:B;K;
0]2{2
495J5
:4;};
<!<;<D<M<Y<c<
=,=:=?=X=h=y=
=G>S>`>r>x>
>(?>?F?N?V?^?f?n?v?~?
0&0.060>0F0N0V0^0f0n0v0~0
1&1.161>1F1N1V1^1f1n1v1~1
2&2.262>2F2N2V2^2f2n2v2~2
3&3.363>3F3N3V3^3f3n3v3~3
4&4.464>4F4N4V4^4f4n4v4~4
5&5.565>5F5N5V5^5f5n5v5~5
6&6.666>6F6N6V6^6f6n6v6~6
7&7.767>7F7N7V7^7f7n7v7~7
; ;(;0;8;@;H;P;X;`;h;p;x;
< <(<0<8<@<H<P<X<`<h<p<x<
= =([email protected]=H=P=X=`=h=p=x=
> >0><>P>X>\>`>d>h>l>p>t>x>
? ?$?(?,?0?4?8?<?P?p?x?|?
0 0(0,0004080<[email protected]`0
2<2D2H2L2P2T2X2\2`2d2t2
3$3D3L3P3T3X3\3`3d3h3l3|3
4 444T4\4`4d4h4l4p4t4x4|4
5 5$5(5,5054585H5h5p5t5x5|5
6$6(6,6064686<[email protected]
8(858=8L8Y8a8|8
9 9$9(9,90949L9X9\9x9
:F:N:T:
>A?Q?\?i?n?x?
.0A0M0d0p0
0-151
2b6w6
8!8%8)8-81858
;F<u<
3k4)5;6
:@;{;
=L=P=T=X=\=`=d=h=l=p=t=x=|=
?$?8?i?
4K4=5
6N7o7
8B9X9e9j9|9
;C;p;
<*=f>~>
>#?U?
060J0{0
2&2?2Z2
717?7F7^7e7x7
8%8P8_8s8
<%</<5<<<F<K<Q<V<\<a<g<n<t<y<
=<=E=N=T=e=p=u=
>9>\>y>
0)1Y1m1
4?4m4
5)505B5G5W5a5
506F6o6}6
7"7A7O7n7
8"8E8g8v8
:M:f:
<>?W?
0(0L0P0T0X0\0`0d0h0l0p0t0x0|0
1 1$1(1,10181<1D1H1P1T1\1`1h1l1t1x1
2 2(2,[email protected]\2d2h2p2t2|2
3+363J3U3_3j3t3
4&404:4D4N4X4b4l4v4
5"5*525
686E6n6
7F7|7
8=8{8
9_9~9
:":-:3:8:C:I:N:Y:_:d:o:u:z:
;%;*;5;;;@;K;Q;V;a;g;l;w;};
=6=:=>=V=d=h=
>0>P>X>\>`>d>h>l>p>t>x>
? ?$?(?,?0?4?8?<[email protected]?\?|?
0$0D0L0P0T0X0\0`0d0h0l0
1 1$1(1,1014181X1x1
2$2D2L2P2T2X2\2`2d2h2l2
3)3[3
6"696H6_6n6
6 7/7F7
7`:{=
=(>`>
> ?X?o?
%0>0U0
1)1-1115191=1A1E1I1M1Q1U1Y1]1a1e1i1m1q1u1y1}1
5M6d6}6
7"797t7
768R8V8Z8^8b8f8j8n8r8v8z8~8
;!;%;);-;
1!141F1
2 2:2?2
5%5*5_5n5{5
6;6G6S6]6c6m6x6
7"7)7/767H7X7`7h7p7x7
8 8([email protected][8h8z8(9=9
< =$=(=,=0=4=v=
=.>O>S>W>[>_>c>
0#0*040?0Q0b0o0{0
1!1d1v1|1
3,3L3T3X3\3`3d3h3l3p3t3
4 4$444T4\4`4d4h4l4p4t4x4|4
5 5$5(5,505D5d5l5p5t5x5|5
6 6$6(6,6064686<6T6t6|6
8(8H8P8T8X8\8`8d8h8l8p8|8
9=9A9E9]9l9p9x9|9
: :5:X:d:h:x:
; ;.;@;N;R;d;};
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<x<
=0=8=<[email protected]=D=H=L=P=T=X=\=`=d=h=l=p=t=
>$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>x>
? ?$?(?,?0?4?8?<[email protected]?D?H?L?P?T?X?
&0*0.02060:0>0B0F0J0N0R0V0Z0r0
2 2$2(2,2024282F2X2x2
2F3J3N3R3V3Z3^3v3
4&4P4T4X4\4`4d4h4l4p4t4x4|4
5 5(5,5054585<[email protected]\5`5d5h5
6,6>6B6T6p6
7$7,7074787<[email protected]\7|7
:V:]:~:
<-=b=t=
10D0t0y0
1H1M1
2[2h2w2
3$313C3H3f3s3
4#5(5
6)626B6e6p6
93989
9L:o:
>'>j>
4Q4n4
7L7b7
708\8
;+<H<}<
>:>c>
?M?c?
3`4x4)5A5
71888
9^9e9
?6?=?
0,0;0R0
5!585H5U5e5
6>6[6`6z6
6$7)7P7X7g7
9)9x9E:T:
<q=x=
3X3y3
5!5F5
6p7w7
:!:8:c:
>A>`>
3F4K4e4
4%5V5]5
5D6s6"7d7
9 :N:
:Z;a;x;+<
<1=A=
>(>r>
0"090
202a2k2{2
3/3<3K3[3
464S4X4
::;A;Z>
4/5>5n5s5
6<6b6j6
6J7c7o7v7
8,888K8W8a8h8r8y8
9 9([email protected]`9h9p9x9
: :(:0:8:@:H:P:X:`:h:p:x:
;*;0;H;h;p;t;x;|;
<%<P<`<|<
<L=c=
? ?5?X?d?h?t?x?
02060:0S0W0[0r0v0z0
1 1$1(141>1B1S1W1[1s1{1
2 2$2([email protected]]2u2y2}2
3&3.3F3i3q3
4 4,484<4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
5$5,5054585<[email protected]
6 6$6(6,6064686<[email protected]\6`6d6h6l6p6t6x6|6
7(7074787<[email protected]\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<8
;;;m;
<"<4<W<
3F4c4{4
465F5X5
5Q6b6
9F9c9{9
:*:<:
<'<?<P<b<
=.>3>
?&?^?
0.1X1e1
1l2y2
4 4/4
6>6^6x6
6"7z7
7?8q8
:J:z:
>0>S>k>
181!2
;:;l;~;
<&<`<p<
=J=e=
2!375l5z5
5G5T5
556C6
7K8f8
5f5v5
6F7b7
8>8M8R8j8o8z8
:E:U:T;r;
<%</<9<C<M<W<b<l<v<
=)=4=>=I=S=Z=d=k=u=|=
>$>(>,>0>4>8><>@>D>H>L>P>T>d>
0!1/191R1Z1b1j1r1z1
2/3;3H3Z3z3
4Q4Y4_4k4r4
5#5/5p5x5~5
6*6H6Z6
7*7u7}7
7I8Q8W8c8k8
9%9+979G9l9w9=:G:M:Q:W:[:a:e:k:o:u:y:
; ;3;X;i;
<D<V<|<
= =$=(=6=
>'>C>P>T>\>p>x>|>
?$?.?M?x?
0)080
1J1\1
2c2s2 3g3n3
4D4e4n4
7E7g7
8Q8p8
;+;8;J;W;c;j;|;
<"<'<2<7<B<G<U<^<c<h<v<
=$=)=.=<=E=J={>
[email protected]?D?H?L?P?T?X?\?`?d?h?
1!1(1/161=1D1K1R1Y1`1g1n1u1|1
2#202<2J2_2l2q2~2
3 3%32373D3I3V3[3h3m3z3
5*5/5<5A5N5S5`5e5r5w5
:':4:F:S:_:l:~:
;&;3;?;L;^;d;v;
<#<0<B<H<X<d<h<p<t<x<|<
=+=K=q=
=H?[?`?|?
0(0,080<0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1!111V1Z1y1
2+2K2p2
2$323A3O3_3
4"4Q4
6-6I6
:W;_;
;m<y<
=3>s>
1!1(1H1]1
2 2(2,[email protected]_2k2t2}2
3 3$3(3,3034383<[email protected]\3`3d3h3l3t3
5P5_5v5
6$6,646<6D6L6T6\6d6l6t6|6
7$7,747<7D7L7X7\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
9"9,979<9H9P9X9`9h9p9x9
:):0:c:o:|:
; ;$;3;?;S;f;n;x;
<&<K<W<^<i<{<
=$=,=?=R=_=k=x=
>5>T>q>
?I?M?T?
0,080<0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3"3>3F3b3n3
4)414O4W4x4
5'5/5K5S5W5m5u5
6#6E6f6
7/747P7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
9,9<9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:8:E:I:Z:b:f:|:
;);-;1;J;R;p;x;
<-<1<5<P<X<r<z<~<
=#=I=o=
> >$>(>,>0>4>8><>@>D>H>L>`>u>y>
?$?,?M?U?|?
0Y0]0a0h0x0
1 1$1(1,1014181<[email protected]\1`1d1h1l1p1t1x1|1
[email protected]\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<[email protected]\3f3j3
5.5Q5]5s5{5
5!6)6-6C6K6l6t6x6
7)71757L7T7p7x7
8'838I8r8
9)9K9l9
:&:L:l:t:x:|:
: ;<;X;v;
< <,<0<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
= =$=(=,=0=4=8=<=J=\=`=d=h=|=
>7>?>[>c>
?3?;?T?X?\?s?{?
0$0I0l0
131;1?1U1]1a1w1
292A2]2e2i2
3-3P3y3
414U4w4
5)5O5
<1<J<_<
586?6|6
7Z8l8
:$:2:N:j:
;+<8<
>->?>~>
0-141
335w5
<O=[=c=k=w=
3"3&3*3.32363:3>3B3F3J3N3R3V3Z3^3b3f3j3n3r3v3z3~3
3e6D7
8,84888<[email protected]\8`8d8h8l8p8t8x8|8
8C9O9\9n9t9
: :$:(:,:0:4:8:<:@:D:H:L:d:
;4;n;y;
<;<G<`<
>)?V?^?|?
1)1=1n1
405h5
6)6?6K6U6_6d6s6
7(7074787<[email protected]\7`7d7h7l7p7t7
8 8<8X8\8p8
9$9(9,9094989<[email protected]\9`9d9h9l9p9
:$:9:=:P:p:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;`;t;x;
< <$<(<,<0<4<8<<<@<D<H<L<P<h<
<0=H=d=|=
> >0>@>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
?*?2?P?
0!0%0,0k0o0s0x0
0#1'1+1/13171<1
3#3'3+3/33383
3f4j4v4|4
4f5j5n5r5v5|5
6h6l6t6x6
7 7$7(7,7074787<[email protected]\7`7d7h7l7p7t7x7|7
7^8b8f8j8n8r8v8z8~8
9"9&9*9.92969:9>9B9F9J9N9R9V9Z9^9b9f9j9n9r9v9z9~9
:5:=:V:b:u:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
;T<d<
=$===h=
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
0"0&0*0.02060:0>0B0F0J0N0R0V0Z0^0b0f0j0n0r0v0z0~0
1"1&1*1.12161:1>1B1F1J1N1R1V1Z1l1}1
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<[email protected]\3`3d3h3l3p3t3x3|3
4&4*4.424D4U4Y4l4
4`5d5h5l5p5t5x5|5
6 6$6(6,6<6\6d6h6l6p6t6x6|6
7(7.7f7
:T:]:g:w:
=!>:>\>
3I3O3]3n3
4!444>4T4
5U5_5i5r5
5!636<6
7_7i7
8)8.888G8U8a8g8y8
9-979O9`9l9y9
:(:1:Q:[:e:
:b;r;
<5<X<f<
>6>B>T>_>d>l>w>
?(?K?}?
0 03080D0J0R0c0n0y0
3-3S3X3
6(6H6
6!7F7|7
:O;f<
193]3l3
4X4a4l4
6q7x7
;)<:>
?8?P?W?n?w?
6h7v708u8d9r9
=V=k=}=
>F?V?
3M4y4
6l7|7
7P8~8
:&;n;)<
>S?o?
0L0^0
2*3e3n3|3
9K;S;f;5<
8'8^8
1i2}2
;0>P?u?
2.3K3
666M6R6
6!8-8B8Q8k8
<0=x=i?p?
t273I3{3
2H5Z5k5
8&9V9
:4:D:
;(;]<
3t4-52576{6
627O728Q8]8e8q8|8
9#9(9-989=9B9M9R9W9b9g9l9w9
;);4;?;P;a;w;
<;<[<h<r<
=$=/=:=A=O=T=Y=c=s=~=
>(>2><>N>c>o>
? ?$?(?,?0?4?8?<[email protected]?D?H?L?P?T?X?\?`?d?h?l?p?t?x?|?
0 0,00080<[email protected]\0`0d0h0l0p0t0x0|0
1 1$1(1,1014181<[email protected]\1`1d1h1l1p1t1x1|1
2$2(2024282<[email protected]\2`2d2h2l2p2t2x2|2
30383<[email protected]\3`3d3h3l3p3t3x3|3
3g405j5
6.6B6
8L9`9t9
0+171D1V1_1d1o1t1
2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
4P4l4
4)5i6
7+7;7
8#8^8V9
;_;l;|;
<0L0c0s0
2%2P2
4:4J4w4
4S5c5
7G7N7e738?8L8^8d8
8H9L9P9T9
9(:,:4:8:
;8;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
=:=B=`=h=
>9>A>[>c>g>}>
?0?8?<?S?[?_?u?
0 0$00040<[email protected]\0`0d0h0l0p0t0x0|0
1(1014181<[email protected]\1`1d1h1l1p1t1x1|1
232;2?2V2^2w2
3(3C3h3
4 4$4(4,4044484<[email protected]\4`4d4h4l4p4t4x4
4 5D5L5P5g5k5o5
6#6I6l6
7$7(7,7074787<[email protected]
909C9^9y9
:*:O:
; ;9;R;
;b=|=
>G>w>
'1;1n1
3!3-393G3S3b3n3z3
535a5
627X7
7A8N8
:R=e=;>
4^6q6G739\:
<m<w<
2-3?3
3;5a5
<1<q<
6J7Y8
8?9L9u9
3:4O4
5+5E5
7?7k7
8L9y9
9D:Z:n:
= =$=(=,=0=4=8=<[email protected]=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
>">,>6>A>F>Q>V>`>l>v>}>
? ?(?,?0?4?8?<[email protected]?D?H?L?P?T?l?
0'0E0M0h0p0t0
1/171T1o1
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3$3,3L3T3t3
606K6x6
787<7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
8v9z9~9
:":&:*:.:2:6:::>:B:F:J:N:R:V:Z:^:b:f:x:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
<"<*<.<J<R<j<r<
=#=/=F=N=R=l=t=x=
>'>/>3>G>O>r>z>
?:?B?]?
0-05090N0q0y0}0
0%1-111N1w1{1
2,2Q2Y2]2t2
3)31353N3Z3s3
424[4g4~4
585D5]5i5
7=7f7r7
8<8L8X8\8d8h8l8p8t8x8|8
9 9$9(9,9094989<[email protected]\9`9d9h9l9p9t9x9
:4:<:@:D:H:L:P:T:X:\:l:x:|:
;$;;;D;P;T;d;l;p;t;x;|;
<-<5<
>7>@>H>Q>a>h>o>v>
?%?I?_?
1:1I1`1
:?:E:
;?;p;
< =.=D=
=S>c>??
0#3h3
4Z5e5t5
6-6c6h6
7I7]7q7
728t8
;P;v;
;%<u<
=)>^>i>v>|>
0m2$3T3
5\6l6
7f7s7
8(8H8
>&>\>r>
>\?f?
N1]1t1
5#5A5]5
6K6]6{6
859O9y9
?(?7?B?Y?|?
2.2B2
8&949F9Z:f:>;
1X1t1
252u2
343M3
3(4C4h4
6)6k6{6
6A7K7
:,:6:N:d:
;0;5;F;T;f;};
7*797H7u7
:+:>:L:
<'<H<
4L5W5b5|5
6#6:6I6Y6f6l6
8g8y8~8
;-;<;M;`;y;
<<<[<
=0=Y=E>
?$?C?
5T5|6
6j8}8
>*???b?
2(3c3
6%7-7;7[7x7
7%8P:v:
:D;g;
0V1f1q1
2.2>2F2U2_2d2
3 [email protected]`3h3l3p3t3x3|3
4 4([email protected]`4h4p4x4
5 5([email protected]`5h5p5x5
6 6$6(6,6064686<[email protected]
525X5k5
6*6F6U6Z6e6t6
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
9?:^:u:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
<"<3<D<U<f<w<
=!=2=C=T=e=v=
>->;>I>Z>
?#?G?S?`?r?x?
0 0$0(0,0004080<[email protected]\0`0d0h0l0p0t0x0|0
1*1<1L1Z1
2:2~2
2=3Q3f3
3/4D4
555N5
6$7r7
818F8V8b8
9,9L9
9I:_:~:
<?<U<t<
< =;=p=
>)>Z>q>
#0/070?0P0b0j0p0w0
2:3k3x3
4S4q4
5*545?5I5T5^5h5n5x5~5
6#6*6/666A6N6S6_6j6w6|6
7 7$7(7,7074787<[email protected]\7`7x7
878c8o8|8
9+929=9O9b9j9v9
:*:7:C:P:b:o:{:
;#;0;B;O;[;h;z;
<"</<;<H<Z<g<s<
=(=0=4=8=<[email protected]=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
>0>P>X>\>`>d>h>l>p>t>x>
0 0$0(0,0004080<[email protected]
051e1
4 4$4(4,4044484<[email protected]\4`4d4h4l4p4t4x4|4
7$7=7I7W7l7
9 9$9(9,9094989<[email protected]\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;h;s;};
2X2`2h2p2x2
[email protected]\3`3d3h3l3p3t3x3|3
404h4p4x4
5 5([email protected]`5h5p5x5
6 6([email protected]`6h6p6x6
9$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
;$;,;4;<;D;L;
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
? ?$?(?,?0?4?8?<[email protected]?D?H?L?P?T?X?\?`?d?h?l?p?t?x?|?
0 0$0(0,0004080<[email protected]\0`0d0h0l0p0t0x0|0
1 1$1(1,1014181<[email protected]\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<[email protected]\2`2d2h2l2p2t2x2|2
3 3$3(3,[email protected]\3`3d3h3l3p3t3x3|3
p3t3x3|3
4 4$4(4,4044484<[email protected]\4`4d4h4l4p4t4x4|4
5 5$5(5,5054585<[email protected]\5`5d5h5l5p5t5x5|5
6 6$6(6,6064686<[email protected]\6`6d6h6l6p6t6x6|6
7 7$7(7,7074787<[email protected]\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<[email protected]\8`8d8h8l8p8t8x8|8
333333333333333333
33333333?333333
33?33
33338
33333
33833
333338
33333833
33333
333838
3333339
3333333333333338
333333333333333333
334C33333338
33333
33B$3333333
34""C33333833
3B""$33333
4"*""C3338
"C3338
:*"*"$3338
"C338
"*"$33
"*:"$
"J"$3
:33:"$
"C8338
"J"C3333
3333:"$
#33338
33333
"J333333
33333:"$3333338
333333
$3333333
333333:"33333338
3333333
33333333
333333333333333333
33333333?333333
33?33
33338
33333
33833
333338
33333833
33333
333838
3333339
3333333333333338
333333333333333333
33DDDDD3333
33333333333
333333?
333333
333333
3333f3333333?
3336Dc3333338
333>fC333333
c333333
3333333333338
3333Dc3333333
3336fC3333338
333>fC333333
333>fd333333
fC33333
3333>fd333338
334C3
fC333?3
33fd3>fC333
fDFfC338
33>ffffc338
fff3333
33833
33338
3333333333338
4DF334DC33
333*C33
c33*C333
338?3
33338?383
F*F333383
"$c33333
"dc3333833
CjC338
CjC338
D*C33383
33333
3332*
C33333833?33
3333"
3333333
3334JC33333338?333
C3333333
C3333333
3333fc33333338
333333333333?
33333?
333333
333333333333333333
333333333333333333
333333333333
33333
334C33333338
33333
33B$3333333
34""C33333833
3B""$33333
4"*""C3338
"C3338
:*3:"$3338
"C333
3333:"$3333338
33333
"C333333
33333:"$3333338
333333
"C333333
333333:"C3333338
3333333
#3333333
3333333:3333333383
333333333333333333
333DDD33333?
2C4"""D338
2$B""""C38
2""333:"C8
83338
2""#33:DC8
333338
33333
333333333333333
333333DDD3
:DC33:""$8
:"C333
$334B"$3
"DDB""$3
3:"""""
333333
333333333333333333
333333333333333333
333333333333
33333
334C33333338
33333
33B$3333333
34""C33333833
3B""$33333
4"*""C3338
"C3338
:*3:"$3338
"C333
3333:"$3333338
33333
"C333333
33333:"$3333338
333333
"C333333
333333:"C3333338
3333333
#3333333
3333333:3333333383
333333333333333333
33333333
ww"""'wp
ww"*"'wp
%ttttttt
ttttttt
tttttttgO.
U~|\|
ttttttt
nttttttt
Ettttttt!
I$$ttttttt)5
qrMC)
ttttttt
ttttttt
rGTs^9
ttttttt4
ttttttt
ttttttt
ttttttt
lttttttt>
ttttttt
wttttttt
Xttttttt
&ttttttt
o\>LT]
ftttttttP
Wttttttt
Q ttttttt
w$0}}
!xM<-)
7ttttttt
ttttttt )kP
i<"a>
ttttttt
dcln9]
LV-XA
xttttttt
duumq
bttttttt
ttttttt>
tttttttl
tttttttq
lW62T.
ttttttt
2!ttttttt
ttttttt
ttttttt
ttttttt
ttttttt
=t}f*
ttttttt
ttttttt
w3ttttttt
tttttttVt
bttttttt
w93^0C
ttttttt
ttttttt
#ttttttt
H9Nsa
~ ]Dnr
ttttttt
tttttttB
ttttttt
ttttttt}
ULOHg
tttttttq2
tttttttX;
jttttttt$
ttttttt~
a3`9#$
tttttttWN9*
a_XG"
ttttttt
Attttttt[q
ttttttte
ttttttt
W+Ittttttt[[
vUyDRV
ttttttt8I
ttttttt
tttttttC
ttttttt
ttttttt
,Pttttttt
hTttttttt
gI[AT
N2Jttttttt
lttttttt
ttttttt
ttttttt]
ttttttt
ttttttt
ttttttt
ttttttt
ttttttt$
X]',&BU
ttttttt
ttttttt
9/$!/
tttttttb
L/n&P
jttttttt?
ttttttt|*
ttttttt
tttttttG
ttttttt
-0y31
ttttttt
ttttttt
rH\ua
d\%"mv
ttttttt
ttttttt
0'mB`
=ttttttt
Uttttttt
m[A++4
tttttttc
ttttttt,u
F&B]4
Sttttttt
H)pVN
ttttttt
ttttttt
tttttttf
tttttttQ
ttttttt]
/Fttttttt
]nY09
ttttttt
$ttttttt1{
YtttttttJ'
ttttttt^
Iptttttttf
7#\k6
V\`G7
ttttttt
Eo2Y4}a J
ttttttt
ttttttt
ttttttt
ttttttt
tttttttX
x,/#z
{ttttttt!
$L?h"8
ttttttt)
ttttttt
Wttttttt
ttttttt
ttttttt8)
ttttttt
>ttttttt
T>3ttttttt
2ttttttt
tttttttY
!K/pttttttt1
TtttttttS
ttttttts"
s$H78{
ttttttt
Tttttttt
tttttttnQ
ttttttt
ttttttt
Fttttttt
x!|lttttttt^%
|;Vdv+
ttttttt^
(attttttt
$uT&lY
tttttttx
ttttttt
ttttttt
Q4ttttttt
ttttttt
ttttttt
@ttttttt
B|a/
zttttttt
ottttttt;J1p
4eo`5K
ttttttt
k$gO$_p[
ttttttt'-
d1gdAN
hnttttttt
ttttttt
ttttttt p
Re>\-
rMxtttttttD"
\ttttttt
ttttttt
ttttttt
ttttttt
Fz1H3
ttttttt
ttttttt
ttttttt
ttttttt
ttttttt
ttttttt
zOp~TL
}tttttttB
ttttttt
:tttttttY
tttttttk
KnlC~
ttttttt
[%4.%
ttttttto
?WuuL
ttttttt
mC%ttttttt_W
ttttttt
ttttttt
_ttttttt
ttttttt
ttttttt
ttttttt
tttttttO
NjyUJ
5SF!AQ?ttttttt{
6'k q
ttttttt
tttttttw
tttttttt'
pttttttt
ttttttt
ttttttt
1)4L_
ttttttt
ttttttt
ttttttt
A0=kVn"K1
?RWw7
)ttttttt!
ttttttt{
ttttttt
Cttttttt
1_53^
ttttttt
ttttttt6:
ttttttt
attttttt
Wttttttt
ttttttt
uS(pX
ttttttto
ttttttt
sttttttt
]}ttttttt
fmqw.
1LbC]
ttttttt
k;djIV
%ttttttt
~q,FS
ttttttt
AFI;A
ttttttt
w<ttttttt+
_ttttttt
8Xp)P
qttttttt
mYfCqq
ttttttt
o#'D2
ttttttt
tttttttv
H%ttttttt
ttttttt
ttttttt~
ttttttt
Tixttttttt
$9Z8e
ttttttt
Xttttttt
jttttttt
bttttttt
i n<[M
0ttttttt
ttttttt
tttttttG
ttttttt
ttttttt
UtttttttT
|{IKttttttt
+tttttttr2
vttttttt
ttttttt
.ttttttt
2ADttttttt
ttttttt
KERlOPd
CtttttttWu
f0%Rq
ttttttt
ttttttt`
Za951
ttttttt
ttttttt
ttttttt
=}a9~|
tttttttV^"
T-ttttttt
fttttttt
<ttttttt#i
ttttttt
ttttttt
ttttttt
2nG.!
ttttttt!D
3ttttttt(
ttttttth
w*nNEt
Kttttttt
.pK0ttttttt
ttttttt
:@2a0
tttttttx7t
]F< 3*
tttttttP
ttttttt
V1e"g
ttttttt
]}@i>
<ttttttt*
ttttttt
+bOI*
Bttttttt
OkdoV>
jttttttt
)Lui|M
ttttttt$HU
ttttttt
ttttttt?
ttttttt
=T5hO
[8ttttttt
S?;i.f
ttttttt
ttttttt
Mpttttttt
ttttttt
eS`1"
ttttttt
utttttttR(
ttttttt(
ttttttt7
.ttttttt
.:~']
ttttttt
DI{_X
(tttttttb
ttttttt
tttttttD
ttttttt
ttttttt>
ttttttt
tttttttS4D
z6D2Y
ttttttt
ttttttt
ok)7M
ttttttt)
ttttttt
ttttttt
tttttttv
ttttttt
ttttttt
Ftttttttk
ttttttt~
tttttttJc
tttttttq
Oh,K=
ttttttt
yttttttt
$Ac5hw5ttttttt
ttttttt
tttttttK
ttttttt
|H>SS3
MN O5
Vttttttt
U>Y~{
ttttttt
lttttttt
ttttttt^
ttttttt
ttttttt
ttttttt
ttttttt!
ttttttt
ttttttt
ttttttt
ttttttt
pIn^
ttttttt3
Yttttttt
ttttttt
ptttttttF
^`o'O
ttttttt2
ttttttt,
ttttttt;
uF{ttttttt
Xttttttt
ttttttt\
ttttttte
1ttttttt
xtttttttf
ttttttt
tttttttVU
ttttttt"
GVtttttttp`yN
ttttttt
ttttttt
tttttttX
tttttttgEC54
xttttttt
ttttttt
>}YLh
ttttttt
I_Gttttttt;FR
WgkI?
ttttttt98
ttttttt
ttttttt
sttttttt)
ttttttt
63DS6
ttttttt
ttttttt
ttttttt
ttttttt
ttttttt-
Jttttttt
ttttttt7#
J_d2G
vnttttttt
4tttttttk
ttttttt
PIttttttt%
ttttttt]
ttttttt
6sSGD
>h#ttttttt
1vAttttttt
ttttttt
ttttttt
`mttttttt
u0[Fk
5:uttttttt
Uttttttt
ttttttt
ttttttt)
!ttttttt+3
ttttttt
ttttttt
Nwhe)
<ttttttt
^tttttttS;
Ajy3Cttttttt}!
ztttttttg4zLI
K/2Y-)
ttttttt'Y
ttttttt
7k-(C
/ttttttt
ttttttt
Lttttttt5x
ttttttt
oCttttttt
eL#"l
gG;&:
ttttttt+
ttttttt
ttttttt
r6ttttttt!
ttttttt
ttttttt
wttttttt
ttttttt
ttttttt+8
>ttttttt
ttttttt
h|9=S
y#tttttttEFU
ttttttt
Ettttttt
%,^>m
,=[ttttttt
\uttttttt
ttttttt,
DDO2t.
ttttttt
ttttttt
VQC)s7S
ttttttt
ttttttt
ttttttt
ttttttt
tttttttf
ttttttt
ttttttt?gc
ttttttt
G\_te
ttttttt
Httttttt
ttttttt
)Kj8/
tttttttKP
k}:?W
5 ttttttt
*U?.2
|ttttttt
ttttttt5>?d
ttttttt
Fttttttt
MMFenI
klttttttt8f
8Tttttttt
Z529"
Yttttttt
_{%v[
RtttttttH
:Th>]
ttttttt
ttttttt
ttttttt
tttttttCd
[ttttttt
wve!gc{1
n)RU/
cttttttt
tttttttu
tttttttG
FFe3[sSQ
Ottttttt
tttttttF
rttttttt
0;ttttttt
[ttttttt
ttttttt?D
^UL%$
_tttttttVw
ttttttt
ttttttt*t
$~S>"
ttttttt
;oG!5
ttttttt
tttttttK
ttttttt
ttttttt
vD9(ttttttt
Nfy%*gn
ttttttt
tttttttf
V#fbItttttttL
ttttttt1
ttttttt
ttttttt
XV+E}
tttttttfb
#<8W3
ttttttt
ttttttt
tttttttq
;tttttttV
3uDJ4d3t6
ttttttt
wttttttt5r
tttttttA
tttttttR
tttttttf
ZV+ettttttt'(
#Gntttttttm'
ttttttt
ttttttt:
Bopi
.ttttttt
vtttttttk
ttttttt
5IfWX
3tttttttH
ttttttt&
oid*]
ttttttt
ttttttt>
tttttttN
ttttttt
kttttttt/
ttttttt
fPr"f
ttttttt
ttttttt)48
tttttttF
peb.07
J4ttttttt
ttttttt
~:[hz
ttttttt
ttttttt5H
O>ttttttt
l43ob#n
ttttttt
ttttttt
9YN*e
ttttttt
v{Tttttttt
FtttttttZ
tttttttYQ
tttttttH
ttttttt
ttttttt0r
ttttttt
ttttttt<
hf*VA
ttttttt
@AeqC
ttttttt
Utttttttl
6tttttttT
>>*J*
\gttttttt
ttttttt
ttttttt
tttttttV<
41lS]
[ttttttt
RT;YR
ttttttt<N
>]mttttttt&f
E\ttttttt
ttttttt
tttttttQ
ttttttt
|ttttttt
ttttttt
ettttttt
ttttttt
}ttttttt
ttttttt\u&
tttttttw
Dttttttt
/NUo,
ttttttt
b:FYQ#
ttttttt}
ttttttt
Fttttttt
^ttttttt
tttttttz
3^LQ!
ttttttt
tttttttb
tttttttr
Kxttttttt
`CKf9t
ttttttt
ttttttt
ttttttt\
-tttttttK
@>ttttttt
ttttttt
ttttttt0
ttttttt
ttttttt
ttttttt8Zk
K~qAXeA
fuG*y
ttttttt
Yy~P^}e
ttttttt
N1YD=
wttttttt
'{Uttttttt)X
8G}-u
c!tttttttz
ttttttt
ttttttt
ttttttt
ttttttt
M4r:|=o
ttttttt
_ttttttt
ttttttt=
ttttttt
tttttttB
KTx-Pr?
ttttttt
ttttttt
Omttttttts
ttttttt&o
ttttttt
UUoRI
tttttttFT
tttttttg
EL_ttttttt
emattttttt
ttttttt
wY+|
6tH.;|~
tttttttt
ttttttt
ttttttt}
3ttttttt
tttttttc
;ttttttt
ttttttt
ttttttt
utttttttvW
tttttttT
ttttttt
ttttttt
ttttttt
^{$<Za
Bttttttt
cm'5\
attttttt
T+(ttttttt7
Xttttttt
ttttttt
l__wxx
{tttttttZy
kttttttt
ttttttt
ttttttte
tttttttR
ttttttt
dtttttttC
$ttttttt,
ttttttth
tttttttuS
dttttttt
`C4#'
ttttttt~
6'^H0v-!Q
ttttttt
HP3t/\e
$ttttttt(
ttttttt
L=n;7Y
ttttttt
ttttttt
tttttttD
Ittttttt
^PQ,2
ttttttt
zLyh,~
ttttttt
1#QFm
{Z#;,
ttttttt
ittttttt
ttttttt&
-ttttttt
@ttttttt
,ttttttt&YV
?ttttttt
`WctttttttP<
ttttttt
tttttttu
ttttttt
ttttttt
tttttttV_
tttttttC
ttttttt
Fi5ttttttt
o4rKx+
ttttttt
ttttttt!
httttttt
ttttttt
K!>ttttttt
(n1.a
$ttttttt?
tttttttx
ttttttt
cttttttt%
ttttttt
Sttttttt
tttttttOH5
ittttttt
ttttttt
Ottttttt
ttttttt
ttttttt
1C(;*
ttttttt
tttttttI
ttttttt
ttttttt
ttttttt
NtttttttG&
ttttttt
(q$tttttttx
tttttttz
ttttttt
60tttttttdav
ttttttt
0_R3K9K
Nttttttt
q:ttttttt
ttttttt
-U$+ttttttt
ttttttt
4fZy9C
iXttttttt
*ttttttt
ttttttt
3p?EFK
"ttttttt
74\O"
Ottttttt"E2
Pttttttt
ttttttt
"Ah>Tw
@T`US
ttttttt
NaHwZ
z_ttttttt?
u\ttttttt
K;ZAD
ttttttt&
lmBnW
F+ottttttt
Q#Z)@
5ttttttt
ttttttt
lC)*C
-ttttttt
$ttttttt
:hVBn
cttttttt+
ttttttt
ttttttt
ttttttt
}QQ!G
ttttttt
tttttttP
Hkttttttt
ttttttt
tttttttb
ttttttt
ttttttt?
tttttttv&
$Pttttttt
Hw"^ttttttt
-ttttttt
vvo7ttttttt+
nvN"I
)a:7P
ttttttt
wZNqC
amE]%
jttttttt
ttttttt
ttttttt4
50_Mkj
tttttttB
ttttttt
}Tttttttt
M[ttttttt
ttttttt
tttttttqN
YGjtttttttl
"65hE
tttttttr
ttttttt4
ttttttt
ttttttt3
ttttttt
\%tttttttM
Rttttttt
ttttttt
ttttttt
tttttttd
~ttttttt
ttttttt
2H;<}b
Fttttttt
stttttttT
OEqjVttttttt
bCttttttt
ttttttt
ttttttt
ttttttt{+
ttttttt
ttttttt
)Ryru
}}Z~0
Pttttttt
ttttttt
x|ttttttt
ttttttt;VXm
ttttttt$x
U>Rk*
H5ttttttt
-ttttttt[:S\s
bttttttt0
ttttttt
ttttttt
ttttttt:
oX:]C{(sl
ttttttt>
ttttttt
xq?tttttttRy
Zttttttt
O(Mttttttt
*"Jttttttt
ttttttt
4ttttttt
tttttttO
-L,?X ?Zx
ttttttt
ttttttt
ttttttt
ttttttt
CEttttttt
fttttttt
Tttttttt
ttttttt&
ttttttt
[b/Xr
F?ttttttt
yz(I[
Yttttttt7
ttttttt
ttttttt
ttttttt_
(ttttttt=&6N
ttttttt!
nttttttt
mMdhU
ttttttt
ttttttt
hXlz=23k
vbBi_
#ttttttt
rttttttt
ttttttt
K4Ks]
ttttttt
QD,ttttttt
JRjF*
ttttttt
h-lx=
ttttttt
(tttttttj
CTttttttt
ttttttt
tttttttM4
ttttttt
ttttttt}
ttttttt
$e+4]o
ttttttt
ttttttt3z
ttttttt
ttttttt
ttttttt/
tttttttV
ttttttt
ttttttt
rtttttttY
ttttttt
ttttttt
!ttttttt
HQaLXls
etttttttt
ttttttt0
."cAK
tttttttA
Lttttttt6
ttttttt
ttttttt
Rttttttt
tttttttK
ttttttt
pttttttt
ASy.B
ttttttt
;b?1-
ttttttt
Z}9op
5/tttttttz
tttttttv
$:9``
ttttttt
ttttttt
tttttttE
ttttttt
j!!DmAf~
ttttttt
`a(K$
tttttttj
bL!zttttttt0}`ol/
~$cMa
{httttttt=j
M*ttttttt
ttttttt
5lttttttt
ttttttto
tttttttyz
Tttttttto
(ttttttt
tttttttB
;dO3P
cttttttt
ttttttt
tttttttY
fz)n
ttttttt
$M#m(
Httttttt
ttttttt|
\8ttttttt
JkAqG
ttttttt,
{ttttttt
ttttttt
<ttttttt~us
ttttttt
?~rrM
aRttttttt
ttttttt
ttttttt
Ettttttt
$h-M|G#\
^x;fttttttt
ttttttt
#wzttttttt1
ttttttt6D\A
lttttttt
ttttttt
y?ttttttt
ttttttt
}5ttttttt
tttttttyn
?7:d-
vttttttt
XtttttttBW
tttttttu
Jhttttttt
^mttttttt
]h)_iY
8ttttttt
('7]T
%ttttttt>
ttttttt
ttttttt
ttttttt
* `bZ
Pttttttt
tttttttP
U5cbttttttt
ttttttt
xttttttt
\qSJo
sttttttt!
ttttttt[e
e][Jzg4a
ttttttt
L'!Pz
httttttt
$ttttttt-[
ttttttt
Z]hq7g
ttttttt
ttttttt
ofttttttt
ttttttt
OYI9!
"r%AFz
ttttttt
c$tttttttLM
=[4ol
#`Ttr
tttttttv
ttttttt<
N?;{a
OtttttttZ
Vt/+ejqn
ttttttt
3ttttttt
ttttttth
0ttttttt
tttttttxp
ttttttt
ttttttt-
ttttttt
tttttttO
ttttttt
3lTttttttt
-S|v-
7J".z
#ttttttt
ttttttt
ttttttt
stttttttK
ttttttt
ttttttt
Dz~NV
tttttttF!
tttttttQEA
ttttttt
`hMttttttt
Qttttttt
ttttttt7i
ttttttt
Es?PM
9Rttttttt
LIttttttt{
Attttttt
tttttttA
ttttttt
tttttttG
tttttttrk
3tttttttL
)P`1"&`
29ttttttt
)v=)gL
yUsttttttt
ttttttt
]ttttttt
~ttttttt{
if2ttttttt
tttttttU<4?
[ttttttt
_/_U<b
ttttttt
W0(Tq
zg>vj
ttttttt
p*ttttttto
tttttttA+
f8JJ
ttttttt
ttttttt
tttttttGN
uj?l n
ttttttt
Antttttttc
ttttttt$
ttttttt
ttttttt
ttttttt
88)9zP
Zttttttt?O
?ttttttt
xttttttt^
ttttttt
&^ttttttt#
$Ja'v.
ttttttt
ttttttt
SQttttttt
tttttttL
ttttttt
%sNA;
]xTttttttt%
Buyt|&
ttttttt
ttttttt*^8j
ttttttt
,Httttttt
ttttttt
ttttttt
jttttttty_
=D#=3
WqBtttttttO
4ttttttt#nnq5.a
ttttttt
;ttttttt
Httttttt4
rttttttt)W
ottttttt
ttttttt
B1>IS>
ttttttt2l
Wd5r!K
ttttttt
ttttttt.
ttttttt7
',ttttttt
ttttttt"M
ttttttt
ttttttt
a3%#8NU
tttttttQ
>tttttttA0k2\!
ttttttt
9{kzYh
v#!3*
ttttttt5C
Jttttttto
ttttttt
{ttttttt
ab.wU
ttttttt
ttttttt
ttttttt
_72q
")p3"
ttttttto
ttttttt
]vxyf
ttttttt+
CtttttttS-:
F2ttttttt
>a#={07
ttttttte!
11tttttttn
rh'If
tttttttZ\FN\.*
ttttttt
qK[x7c
ttttttt
tttttttw<o
=ttttttt
ttttttt
ttttttt
Ru7VFttttttt
ttttttt
B#ttttttt
ttttttt0
mttttttt/I
ttttttt
=9tttttttf5
ttttttt
5xttttttt
.ttttttt
tttttttJ
ttttttt7
Q"oOL
SI9,ttttttt$
ttttttt
S$E/L
ttttttt
ttttttt^
ttttttt!
]ttttttt
ttttttt!h
ttttttt
-Zq:Y
jttttttt
`sL1.
m ttttttt
ttttttt
ttttttt
ttttttt
",3h-
(ttttttt
Z~h9z
ttttttt{
tttttttf
++B[F
ttttttt\
ipuh-
ttttttt
ttttttt
uttttttt
ttttttt
xobttttttt{
jttttttt:"
ttttttt
ttttttt
kttttttt
Fttttttt0
U(/m.
vttttttt
ttttttt
[$.tttttttBkX
ttttttt
ttttttt
ttttttt
ttttttt2(Xk
tttttttC
,pa[n
1:eUI
W+7g1
@ttttttt
ttttttt
..ttttttt
t99?p
dEqtttttttf)
ttttttt6
ttttttt'R
ttttttt
HtttttttP
)Dttttttt
3\<qs?
roS>z
zr:tttttttz
ttttttt
q<L}J
ttttttt
yyQ5T
%j(ttttttt
ttttttt
tttttttm
N(-Ft
ttttttt~
zecA9
ttttttt
y!0n;
3ttttttt
}Ty2;
ttttttt88
C,W'p
tttttttT
ctttttttLU
ttttttt
Attttttt
Kttttttt
ttttttt
uxttttttt
ttttttt
;ttttttt
rttttttt
{ kjr
rttttttt
ttttttt
tttttttawGG
N##cS
VJttttttt
Wttttttt~
ttttttt
ttttttt*
ttttttt
ttttttt
JO'aJe
lttttttt
wx3vp
ottttttt
ttttttt
ttttttt%
ttttttt
7tttttttF
9ttttttt
.;%5J
6r\CL
ttttttt
#tq_>t
pVttttttt
PP;ttttttty
$ttttttt
2~Idc`
Gttttttt
ttttttt
87(Dr
cp,iQ
$ 3hYWottttttt
jtttttttl
2Ettttttt
tttttttmsyt
ttttttt
QNaBg
Nttttttt
N>"2Y
ttttttt,
U!_nttttttt%
ttttttt[;
ttttttt
tttttttl
ttttttt^
Ittttttt
8dW!Z
ttttttt
_g=QY66
0+ttttttt
ttttttt
ttttttt
tttttttL
ttttttt
s)}X7
ttttttt
ttttttt`Ak
tttttttn9"J+
tttttttFa
F28]o:
tttttttC
ttttttt
^Dkh79}
ttttttt
ttttttt
ztttttttg
7sottttttt
ttttttt
ttttttt
S.oe?
ttttttt
R0ttttttt_
ttttttt
HSWVG
ttttttt5
ttttttt
ttttttth<
?ry4lG
ttttttt
ttttttt
<ttttttt
ttttttte
{ttttttt~H
Arttttttt0
ttttttta
ttttttt
ttttttt/
t:rha
\ttttttt
ttttttt
FtttttttK
ttttttt
t(w{_
~E.y>aE
ttttttt
ttttttt
W3fa6
9cttttttt
IpLJUr
;ttttttt[O
aaeWOr
Gttttttt
uVfH=Vttttttt
6ttttttt
,pj T
ttttttt
ttttttt
Avmxq
tttttttmC
ttttttt0||0
wR#s!Q
]ttttttt
CTttttttt
ttttttt
rtttttttu
ttttttt;*
Xttttttt
fttttttt
ttttttt
@tttttttYF
C+ttttttt
ttttttt
ttttttt
89o'`
ttttttt
ttttttt
ttttttt:
Tmh##
ttttttt1
ttttttt
ttttttt
MM[EzHb
ttttttt
7ttttttt
ttttttt
{_ttttttt
ttttttt
t5-ttttttt
v*@ttttttt4
ttttttt10R
tttttttN
ttttttt
tttttttj
ttttttt
?ttttttt3
j*~7RcO
ttttttt
ttttttt
KEttttttt
zttttttt
ttttttt/
rttttttt
ttttttt
ttttttt
ttttttt
kUt?I
ttttttt
taW}2
ttttttt
.T~tw
ttttttt^
ttttttt
ttttttt
ttttttt
ttttttt
pOl&>4
bttttttt
ttttttt
ttttttt/:
jVttttttt
D0ttttttt
ttttttt
!ttttttt
J;QZ!V
tttttttY
tttttttZ
ttttttt6
Ofttttttt<
8ttttttt/A
7ttttttt
l(Nq:
Z}SyRk
@ttttttt
qttttttt
JDttttttt
ttttttt[
lttttttt
bttttttt
ttttttt
gjJ 6
T3+"-
*wN;B
4>Aettttttt
ttttttt
ttttttt\
`tttttttR
ttttttt
tttttttd:
GC,e,/
Gttttttt7
ttttttt|%
tttttttYv
ttttttt
`attttttt
="ttttttt
ttttttt
ttttttt1
O!ttttttt
Ftttttttt
ttttttt
tttttttj+
0+ZF1
:%YYy
ttttttt
.(G*A
tttttttz7
ttttttt
ttttttt
]Z21rs
&fUBa\R
ttttttt
ttttttt
ttttttt
;IoGj
Ottttttt
ttttttt
M$gJ|
ttttttt
WKEs4g
ttttttt/
tAttttttt
tttttttK
ttttttt
tttttttU
>?ttttttt
;H![s.Zc
<~ettttttt
ttttttt
~Ow7/
yttttttt
ttttttt
S#HPA
ttttttt
Zttttttt
ttttttt
ttttttt
tttttttr
ttttttt
'-ZxW
ttttttt~
44&AR
ttttttt
ttttttt
tttttttL
ttttttt^
ttttttt
ttttttt
X,pU^
ttttttt
ttttttt;
ttttttt
+w8bb
ttttttt
ttttttt
,ttttttt
v7t\K
ttttttt&:
tttttttJVr
Lttttttt
0k!p,F
tttttttY8
ttttttt`
tttttttXR
)ttttttt
}&!LI
ttttttt
tttttttn
7ttttttt
ttttttt
ttttttt
ittttttt
ttttttt&
_]z0/
ttttttt
ttttttt"
tttttttE
ttttttt6G?{
tttttttJ
ttttttt
ttttttt
B]ttttttt
{SQ$#
ttttttt
4tttttttL
bAvn(
tttttttr.d
ttttttt
'_h"D=
*aqA\
U9Rttttttt
{{b8s
VWcttttttt
~U>;x
i~y`z5
ttttttt
bttttttt
%<%r& z
ttttttt
cttttttt
ttttttt
ttttttt
ttttttt
=82ox
/ttttttta
%sa;2
tttttttia
ttttttt
qkttttttt
T"\;(a
5tttttttY
ettttttt
QHttttttt
=ttttttt
uWl3a
ttttttt
tttttttz
ttttttt/
c1Gi| c<
}}ttttttt
ttttttt
\Yttttttt
ttttttt
ttttttt;mQ
<ttttttt=
ttttttt
X"6V6
ttttttt
ttttttt
N=tttttttUl
}ttttttt
ttttttt4
fPYF7i
ttttttt|
ttttttt
Elttttttt
lhR-v
ttttttt`
=aN#HL
+ttttttt
XUb=vD|
tttttttA
kiuUL
ttttttt-`
Jttttttte
ttttttt
tttttttA
tttttttU
tttttttUaT
ttttttt
ttttttt
ttttttto
ttttttt
ttttttt9
tttttttA
ttttttt
Bittttttt^
u!uaA
xttttttt
ttttttt6
&z#>Y
ttttttt
>tttttttW9
ttttttt
)'kttttttt
D[RK!j
ttttttt
tttttttP
ttttttt$
%[f9`~}P
ttttttt
ttttttt
Jttttttt
Uttttttt
ttttttt
lM[op
Z:ttttttt|
ttttttt
|U("5`;
ttttttt
tttttttL?gf
ttttttt-
</08$A
\w26~
tttttttX
tttttttk
[ZMttttttt$Q~
ttttttt
ttttttt~1
ttttttt
}SXtttttttf
ttttttt
tttttttr]
VtttttttC
ttttttt
wfttttttt
_S`GZ2j
ttttttt
*zqQ'
ttttttt
httttttt
Eq1 `.'
ttttttt5
ttttttt
Wttttttth
ttttttt
*ttttttt
'Gz`n
ttttttt
ttttttt
lttttttt
kpzttttttt
@ttttttt5e;
d2!ttttttt!jP
ttttttt
fZC_,
=;INP$
~ottttttt
ttttttt
ttttttt
KuBOR
ttttttt
tttttttQB
8]*3?
tttttttnSO
ttttttt_B
ttttttt
cx3tttttttbe
5ebN>\Fttttttt
$ttttttt
#tttttttz
S)^ttttttt
;et%W
l1ttttttt
Qttttttt
Z00#V!
Vttttttt{
J='MM
ttttttt!
Xttttttt!Y
ttttttt
lttttttt(
xttttttt
ttttttt
;ttttttt
ttttttts5
^c5t"
\Qttttttt2G
y+E6<-gk
".BIttttttt
>tttttttj
ttttttt
ttttttt
ttttttt
gttttttt
ttttttt
ttttttteZ {l
}&![ENttttttt
ttttttt-J
tttttttu
ttttttt
ttttttt
ttttttt
ttttttt
ttttttt
tttttttj
!22vh
ttttttt
]Jttttttt
ttttttt
\D(lc*
ttttttt
ttttttt
ttttttt9
R LBV
ttttttt
ttttttt
ttttttt<
ttttttt
Bttttttt
ttttttt
ttttttt
"D$gh
Vttttttt6
y^StttttttKM
#ttttttt
q!a?*Y,
ttttttt
E+ttttttt
]Z{?G
tttttttr
ttttttt
T ttttttt
Cttttttt
ttttttt0
KztttttttW
LSr!E^
ttttttt
ttttttt
b m>w'+
ttttttt1
ttttttt
ttttttt
ttttttt
tttttttD
ttttttt
ttttttt
ttttttt
ttttttt
0.ttttttt
R>D2x~
ttttttt
ttttttt
e8kh\i
tttttttp
tttttttx
c_ttttttt
*WMrtttttttR
ttttttt
ttttttt
ttttttt
u)XW.G[w
^<&hDJ
'ttttttt
;)gttttttti
tttttttJV$
ttttttto!
ttttttt
SIfeB
ttttttt-
@T\7i_wJ,
,!y>`k
ttttttt
gUU:gt
ttttttt
AkF5M
1Tttttttt
tttttttT
ttttttt
tttttttG
ttttttt
Kttttttt
d%^ O
ttttttt
m2K|4u
Httttttt
ttttttt
tttttttc
ttttttt
WaN?9w
YtttttttK
tttttttX
n["y8
ottttttt
otttttttj
U]T"&#rD2
ttttttt
*wGttttttt<C
=l(vHM3
ttttttt3~
ttttttt
\pBAQ
ttttttt0|
Rttttttt$
ttttttt?
{R_<f
tttttttx
ttttttt
ttttttt
tttttttH<
iC.(=
-nttttttt
ttttttt|/
ttttttt\
tttttttt
ttttttt&
ttttttt
~V%Fy
4ttttttt
<2}oU(
ttttttt
sl6~UN4
ttttttt
$ttttttt{
ttttttt
#+MTE
ttttttt
7 E!1
ettttttt
Httttttt
E2B8:
qDi]]
ttttttt
-W6]\ttttttt
ttttttt
-)~Xv^
ttttttt
Zj[$?
EBttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttD
7Project1
YIdThreadMgrPool
uIdGlobal
IdStackWindows
IdException
System
SysInit
SysUtils
KWindows
UTypes
SysConst
|IdResourceStrings
^Classes
"RTLConsts
3Messages
CVariants
$VarUtils
QTypInfo
sActiveX
yIdStack
@IdStackConsts
)IdWinSock2
8Registry
IniFiles
EIdURI
SyncObjs
IdThread
%IdThreadMgr
+IdTCPServer
IdStrings
IdThreadSafe
IdComponent
IdAntiFreezeBase
IdBaseComponent
mIdSocketHandle
IdTCPConnection
IdStream
IdTCPStream
IdIntercept
BIdIOHandler
IdRFCReply
yIdIOHandlerSocket
jIdSocks
IdAssignedNumbers
IdThreadMgrDefault
IdServerIOHandler
&IdServerIOHandlerSocket
FlatSB
WinHelpViewer
RHelpIntfs
Contnrs
EActnList
Forms
Printers
Consts
WWinSpool
+Graphics
CommCtrl
StdActns
Clipbrd
YStrUtils
*ShellAPI
&Controls
5Themes
nComCtrls
ComStrs
ExtActns
0Mapi
dStdCtrls
vMenus
ImgList
Dialogs
ExtCtrls
IDlgs
3CommDlg
(ShlObj
RegStr
?WinInet
UrlMon
ExtDlgs
Buttons
CUxTheme
RichEdit
ToolWin
ListActns
MultiMon
Unit1
TForm1
Form1
Width
Height
Caption
4lEbTnyH6q9HTvFWfK32kWranFZ0iXk1tUfDDYMuJuCSx6N3uAXdN
Color
clBtnFace
Font.Charset
DEFAULT_CHARSET
Font.Color
clWindowText
Font.Height
Font.Name
MS Sans Serif
Font.Style
OldCreateOrder
PixelsPerInch
TextHeight
TDateTimePicker
DateTimePicker1
Width
Height
TabOrder
TMonthCalendar
MonthCalendar1
Width
Height
TabOrder
THotKey
HotKey1
Width
Height
HotKey
TabOrder
TUpDown
UpDown1
Width
Height
TabOrder
TIdThreadMgrPool
IdThreadMgrPool1
TOpenDialog
OpenDialog1
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX
jjjjjj
ebutton
clock
combobox
explorerbar
header
listview
progress
rebar
scrollbar
startpanel
status
taskband
taskbar
toolbar
tooltip
trackbar
traynotify
treeview
window
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
jjjjj
BBABORT
BBALL
BBCANCEL
BBCLOSE
BBHELP
BBIGNORE
BBRETRY
BBYES
PREVIEWGLYPH
DLGTEMPLATE
DVCLAL
PACKAGEINFO
TFORM1
MAINICON
MS Sans Serif
Connection timed out.
Connection refused."Too many levels of symbolic links.
File name too long.
Host is down.
No route to host.
Directory not empty
Host not found.
Socket type not supported."Operation not supported on socket.
Protocol family not supported.0Address family not supported by protocol family.
Address already in use. Cannot assign requested address.
Network is down.
Network is unreachable. Net dropped connection or reset.!Software caused connection abort.
Connection reset by peer.
No buffer space available.
Socket is already connected.
Socket is not connected..Cannot send or receive after socket is closed.#Too many references, cannot splice.
Socket Error # %d
Interrupted system call.
Bad file number.
Access denied.
Bad address.
Invalid argument.
Too many open files.
Operation would block.
Operation now in progress.
Operation already in progress.
Socket operation on non-socket.
Destination address required.
Message too long.
Protocol wrong type for socket.
Bad protocol option.
Protocol not supported.
%Failed to set maximum selection range$Failed to set calendar min/max range%Failed to set calendar selected range
No help keyword specified.
Winsock Initialization Error.
Set Size Exceeded.
Thread Class Not Specified.*Error on call Winsock2 library function %s&Error on loading Winsock2 library (%s)
Resolving hostname %s.
Connecting to %s.
Connected.
Disconnecting.
Disconnected.
%s is not a valid service.
Info Text
Menu Background
Menu Text
Scroll Bar
3D Dark Shadow
3D Light
Window Background
Window Frame
Window Text %s is already associated with %s=This control requires version 4.70 or greater of COMCTL32.DLL
Date exceeds maximum of %s
Date is less than minimum of %s4You must be in ShowCheckbox mode to set to this date#Failed to set calendar date or time
Active Caption
Application Workspace
Background
Button Face
Button Highlight
Button Shadow
Button Text
Caption Text
Default
Gray Text
Highlight Background
Highlight Text
Inactive Border
Inactive Caption
Inactive Caption Text
Info Background
Purple
Silver
Yellow
Fuchsia
White
Money Green
Sky Blue
Cream
Medium Gray
Active Border
Alt+ Clipboard does not support Icons/Menu '%s' is already being used by another form
Docked control must have a name%Error removing control from dock tree
- Dock zone not found
- Dock zone has no control"Unable to find a Table of Contents
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Black
Maroon
Green
Olive
Enter
Space
Right
Shift+
Ctrl+
Warning
Error
Information
Confirm
Cancel
&Help
&Abort
&Retry
&Ignore
N&o to All
Yes to &All
Sub-menu is not in menu
Not enough timers [email protected] cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active*A control cannot have itself as its parent
Cancel
&Help
&Close
&Ignore
&Retry
Abort
Cannot drag a form
Out of system resources
Canvas does not allow drawing
Invalid image size
Invalid ImageList
Invalid ImageList Index)Failed to read ImageList data from stream(Failed to write ImageList data to stream$Error creating window device context
Error creating window class+Cannot focus a disabled or invisible window!Control '%s' has no parent window
Cannot hide an MDI Child Form)Cannot change Visible in OnShow or OnHide"Cannot make a visible window modal
Menu index out of range
Menu inserted twice
List index out of bounds (%d)+Out of memory while expanding memory stream
Error reading %s%s%s: %s
Stream read error
Property is read-only
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Stream write error
Thread Error: %s (%d)
Bitmap image is not valid
Icon image is not valid!Cannot change the size of an icon
Unsupported clipboard format
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format$''%s'' is not a valid component name
Invalid property path
Invalid property value List capacity out of bounds (%d)
List count out of bounds (%d)
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Ancestor for '%s' not found
Cannot assign a %s to a %s
January
February
March
April
August
September
October
November
December
Assertion failed
Interface not supported
Exception in safecall method
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
A call to an OS function failed
Write$Error creating variant or safe array)Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value!'%s' is not a valid date and time
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow
No antivirus signatures available.
Sorry! No behavior.

Hosts

Direct IP Country Name
Y 8.8.8.8 [VT] United States
Y 195.69.140.147 [VT] unknown
Y 1.1.1.1 [VT] Australia

TCP

Source Source Port Destination Destination Port
192.168.1.5 49188 195.69.140.147 80
192.168.1.5 49190 195.69.140.147 80
192.168.1.5 49191 195.69.140.147 80

UDP

Source Source Port Destination Destination Port
192.168.1.5 54724 1.1.1.1 53
192.168.1.5 137 192.168.1.255 137
192.168.1.5 54312 8.8.8.8 53

DNS

No domains contacted.

HTTP Requests

URI Data
http://195.69.140.147/.op/cr.php/SczbkxCQZQyVr
POST /.op/cr.php/SczbkxCQZQyVr HTTP/1.0
User-Agent: Mozilla/4.08 (Charon; Inferno)
Host: 195.69.140.147
Accept: */*
Content-Type: application/octet-stream
Content-Encoding: binary
Content-Key: D3945FC8
Content-Length: 192
Connection: close

http://195.69.140.147/.op/cr.php/SczbkxCQZQyVr
POST /.op/cr.php/SczbkxCQZQyVr HTTP/1.0
User-Agent: Mozilla/4.08 (Charon; Inferno)
Host: 195.69.140.147
Accept: */*
Content-Type: application/octet-stream
Content-Encoding: binary
Content-Key: D3945FC8
Content-Length: 165
Connection: close

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

ICMP traffic

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

Timestamp Source IP Source Port Destination IP Destination Port Protocol GID SID REV Signature Category Severity
2020-06-30 13:38:08.602 192.168.1.5 [VT] 49175 13.107.42.23 [VT] 443 TCP 1 2028397 2 ET JA3 Hash - Possible Malware - Various Malspam/RigEK Unknown Traffic 3
2020-06-30 13:38:47.727 192.168.1.5 [VT] 49188 195.69.140.147 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:38:47.727 192.168.1.5 [VT] 49188 195.69.140.147 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:38:48.491 192.168.1.5 [VT] 49188 195.69.140.147 [VT] 80 TCP 1 2024312 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 A Network Trojan was detected 1
2020-06-30 13:38:48.491 192.168.1.5 [VT] 49188 195.69.140.147 [VT] 80 TCP 1 2024317 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 A Network Trojan was detected 1
2020-06-30 13:38:48.729 192.168.1.5 [VT] 49190 195.69.140.147 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:38:48.729 192.168.1.5 [VT] 49190 195.69.140.147 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:38:49.422 192.168.1.5 [VT] 49190 195.69.140.147 [VT] 80 TCP 1 2024312 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 A Network Trojan was detected 1
2020-06-30 13:38:49.422 192.168.1.5 [VT] 49190 195.69.140.147 [VT] 80 TCP 1 2024317 3 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 A Network Trojan was detected 1
2020-06-30 13:38:49.570 192.168.1.5 [VT] 49191 195.69.140.147 [VT] 80 TCP 1 2021641 7 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected 1
2020-06-30 13:38:49.570 192.168.1.5 [VT] 49191 195.69.140.147 [VT] 80 TCP 1 2025381 5 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected 1
2020-06-30 13:38:50.301 192.168.1.5 [VT] 49191 195.69.140.147 [VT] 80 TCP 1 2024313 4 ET MALWARE LokiBot Request for C2 Commands Detected M1 Malware Command and Control Activity Detected 1
2020-06-30 13:38:50.301 192.168.1.5 [VT] 49191 195.69.140.147 [VT] 80 TCP 1 2024318 3 ET MALWARE LokiBot Request for C2 Commands Detected M2 Malware Command and Control Activity Detected 1

Suricata TLS

Timestamp Source IP Source Port Destination IP Destination Port Subject Issuer Fingerprint Version
2020-06-30 13:38:08.642 192.168.1.5 [VT] 49175 13.107.42.23 [VT] 443 CN=edge.skype.com 5c:3b:53:ee:b8:65:a3:2a:66:d4:04:36:67:98:af:88:8d:96:5d:74 TLS 1.2

Suricata HTTP

Timestamp Source IP Source Port Destination IP Destination Port Method Status Hostname URI Content Type User Agent Referrer Length
2020-06-30 13:38:07.596 192.168.1.5 [VT] 49188 195.69.140.147 [VT] 80 404 195.69.140.147 [VT] /.op/cr.php/SczbkxCQZQyVr text/html Mozilla/4.08 (Charon; Inferno) None 4276
2020-06-30 13:38:49.423 192.168.1.5 [VT] 49190 195.69.140.147 [VT] 80 404 195.69.140.147 [VT] /.op/cr.php/SczbkxCQZQyVr text/html Mozilla/4.08 (Charon; Inferno) None 3280
2020-06-30 13:38:50.302 192.168.1.5 [VT] 49191 195.69.140.147 [VT] 80 404 195.69.140.147 [VT] /.op/cr.php/SczbkxCQZQyVr text/html Mozilla/4.08 (Charon; Inferno) None 3348
Sorry! No dropped Suricata Extracted files.

JA3

Source Source Port Destination Destination Port JA3 Hash JA3 Description
192.168.1.5 49175 13.107.42.23 443 3b483d0b34894548b602e8d18cdc24c5 unknown
Sorry! No dropped files.
Sorry! No CAPE files.
Process Name crypted_pdf.exe
PID 1088
Dump Size 647168 bytes
Module Path C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe
Type PE image: 32-bit executable
PE timestamp 2016-06-23 16:04:21
MD5 669fbeeecde64619a0777174f76ae57a
SHA1 45e5dd74e52a7cde483df507e3ec2ff789041d92
SHA256 dd41cc647e6899e45f773bcd34f8c61c36eba57bfab3f9284b0db4dc56f51196
CRC32 0A935F9E
Ssdeep 1536:qzvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqzIzmd:RSHIG6mQwGmfOQd8YhY0/EqUG
Yara
  • HeavensGate - Heaven's Gate: Switch from 32-bit to 64-mode - Author: kevoreilly
CAPE Yara
  • Loki Payload - Author: kevoreilly
Dump Filename dd41cc647e6899e45f773bcd34f8c61c36eba57bfab3f9284b0db4dc56f51196
Download Download Zip
Process Name services.exe
PID 460
Dump Size 258048 bytes
Module Path C:\Windows\System32\services.exe
Type PE image: 32-bit executable
PE timestamp 2015-04-13 01:58:57
MD5 6d32174e07ad335a11d8e44a915a57a6
SHA1 357535ce1b48fd340661505f021c89f7bbc4a389
SHA256 06fdf4aa7ef563fcf938636be5834fe206b1a869bf2f6f3d1556e29bdc482a75
CRC32 D6240FA3
Ssdeep 3072:hwLEkIpkx4VCpaQ/maSfAhobOqfa3sOV45IXFVwBrd7ieL2vWzKmp9EE3/3Ump1e:J5eIQuaMOMacbc2Br+vsKmp9d/3UmT
Dump Filename 06fdf4aa7ef563fcf938636be5834fe206b1a869bf2f6f3d1556e29bdc482a75
Download Download Zip
Process Name crypted_pdf.exe
PID 4016
Dump Size 613888 bytes
Module Path C:\Users\Rebecca\AppData\Local\Temp\crypted_pdf.exe
Type PE image: 32-bit executable
PE timestamp 1992-06-19 22:22:17
MD5 6a905bd249b31c9d4d26d8629ab6cf3b
SHA1 46d3a45d6b95b911ddb3a836e9651a244e2de2ca
SHA256 d813351cf8f35636ff5a7fd4828a540a7b0971afa3fd038dc305da8770e64a4e
CRC32 21F104E3
Ssdeep 12288:qCbpcLhilrm7G8oclWEAroCo3DQS7Tsiz6efjV87NolRy:NuLhi80Jrofnn5JlE
Dump Filename d813351cf8f35636ff5a7fd4828a540a7b0971afa3fd038dc305da8770e64a4e
Download Download Zip
Defense Evasion Credential Access Collection Privilege Escalation
  • T1116 - Code Signing
    • Signature - invalid_authenticode_signature
  • T1055 - Process Injection
    • Signature - InjectionInterProcess
  • T1045 - Software Packing
    • Signature - packer_unknown_pe_section_name
  • T1003 - Credential Dumping
    • Signature - infostealer_browser
  • T1081 - Credentials in Files
    • Signature - infostealer_browser
  • T1005 - Data from Local System
    • Signature - infostealer_browser
  • T1055 - Process Injection
    • Signature - InjectionInterProcess

    Processing ( 16.27 seconds )

    • 7.682 BehaviorAnalysis
    • 5.354 Suricata
    • 1.804 Static
    • 0.604 CAPE
    • 0.183 ProcDump
    • 0.166 VirusTotal
    • 0.116 AnalysisInfo
    • 0.107 NetworkAnalysis
    • 0.078 TargetInfo
    • 0.064 Deduplicate
    • 0.059 Dropped
    • 0.024 Debug
    • 0.02 Strings
    • 0.009 peid

    Signatures ( 0.8130000000000004 seconds )

    • 0.102 antiav_detectreg
    • 0.052 masquerade_process_name
    • 0.048 infostealer_ftp
    • 0.042 antiav_detectfile
    • 0.035 territorial_disputes_sigs
    • 0.028 infostealer_im
    • 0.025 antivm_vbox_libs
    • 0.025 infostealer_bitcoin
    • 0.021 antianalysis_detectfile
    • 0.021 antianalysis_detectreg
    • 0.018 api_spamming
    • 0.018 exec_crash
    • 0.017 antivm_vbox_files
    • 0.016 decoy_document
    • 0.014 ransomware_files
    • 0.013 infostealer_mail
    • 0.012 qulab_files
    • 0.011 NewtWire Behavior
    • 0.011 antivm_vbox_keys
    • 0.011 predatorthethief_files
    • 0.01 Doppelganging
    • 0.01 antiav_avast_libs
    • 0.009 ransomware_extensions
    • 0.007 antivm_vmware_keys
    • 0.007 geodo_banking_trojan
    • 0.006 InjectionCreateRemoteThread
    • 0.006 exploit_getbasekerneladdress
    • 0.006 exploit_gethaldispatchtable
    • 0.006 stealth_timeout
    • 0.006 antidbg_devices
    • 0.006 antivm_parallels_keys
    • 0.006 antivm_vmware_files
    • 0.005 antisandbox_sunbelt_libs
    • 0.005 antivm_vmware_libs
    • 0.005 injection_createremotethread
    • 0.005 antivm_xen_keys
    • 0.004 antiav_bitdefender_libs
    • 0.004 antiav_bullgaurd_libs
    • 0.004 antiav_emsisoft_libs
    • 0.004 antiav_qurb_libs
    • 0.004 antiav_apioverride_libs
    • 0.004 antiav_nthookengine_libs
    • 0.004 antisandbox_sboxie_libs
    • 0.004 antivm_generic_disk
    • 0.004 betabot_behavior
    • 0.004 kibex_behavior
    • 0.004 network_tor
    • 0.004 office_com_load
    • 0.004 shifu_behavior
    • 0.004 antivm_generic_diskreg
    • 0.004 antivm_vpc_keys
    • 0.003 InjectionInterProcess
    • 0.003 antidebug_guardpages
    • 0.003 dynamic_function_loading
    • 0.003 exploit_heapspray
    • 0.003 hawkeye_behavior
    • 0.003 injection_runpe
    • 0.003 kazybot_behavior
    • 0.003 malicious_dynamic_function_loading
    • 0.003 persistence_autorun
    • 0.003 antivm_vbox_devices
    • 0.003 codelux_behavior
    • 0.003 masslogger_files
    • 0.003 rat_pcclient
    • 0.002 InjectionProcessHollowing
    • 0.002 bootkit
    • 0.002 regsvr32_squiblydoo_dll_load
    • 0.002 encrypted_ioc
    • 0.002 infostealer_browser
    • 0.002 mimics_filetime
    • 0.002 office_dotnet_load
    • 0.002 office_vb_load
    • 0.002 office_wmi_load
    • 0.002 reads_self
    • 0.002 stealth_file
    • 0.002 virus
    • 0.002 antivm_hyperv_keys
    • 0.002 bypass_firewall
    • 0.002 network_cnc_http
    • 0.002 obliquerat_files
    • 0.002 sniffer_winpcap
    • 0.001 antiemu_wine_func
    • 0.001 antivm_generic_scsi
    • 0.001 guloader_apis
    • 0.001 dridex_behavior
    • 0.001 hancitor_behavior
    • 0.001 Sodinokibi Behavior
    • 0.001 rat_nanocore
    • 0.001 stack_pivot
    • 0.001 tinba_behavior
    • 0.001 antisandbox_cuckoo_files
    • 0.001 antisandbox_fortinet_files
    • 0.001 antisandbox_joe_anubis_files
    • 0.001 antisandbox_sunbelt_files
    • 0.001 antisandbox_threattrack_files
    • 0.001 antivm_xen_keys
    • 0.001 antivm_generic_bios
    • 0.001 antivm_generic_system
    • 0.001 antivm_vpc_files
    • 0.001 ketrican_regkeys
    • 0.001 banker_cridex
    • 0.001 browser_security
    • 0.001 darkcomet_regkeys
    • 0.001 disables_browser_warn
    • 0.001 azorult_mutexes
    • 0.001 network_tor_service
    • 0.001 revil_mutexes
    • 0.001 dcrat_files
    • 0.001 limerat_regkeys
    • 0.001 modirat_bheavior
    • 0.001 warzonerat_files
    • 0.001 warzonerat_regkeys
    • 0.001 recon_fingerprint
    • 0.001 remcos_files
    • 0.001 remcos_regkeys
    • 0.001 targeted_flame

    Reporting ( 14.147 seconds )

    • 11.195 BinGraph
    • 2.245 JsonDump
    • 0.703 MITRE_TTPS
    • 0.004 PCAP2CERT