Attention: please enable javascript in order to properly view and use this malware analysis service.

Incident Response

Risk Assessment

Spyware
POSTs files to a webserver
Persistence
Writes data to a remote process
Fingerprint
Reads the active computer name
Reads the cryptographic machine GUID

Indicators

Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.

  • Malicious Indicators 7

  • Anti-Detection/Stealthyness
  • External Systems
    • Detected Emerging Threats Alert
      details
      Detected alert "ETPRO TROJAN W32/Emotet.v4 Checkin" (SID: 2827279, Rev: 5, Severity: 1) categorized as "A Network Trojan was detected" (Backdoor, ransomware, trojans, etc.)
      Detected alert "ETPRO TROJAN W32/Emotet.v4 Checkin 2" (SID: 2827580, Rev: 7, Severity: 1) categorized as "A Network Trojan was detected" (Backdoor, ransomware, trojans, etc.)
      Detected alert "ETPRO TROJAN W32/Emotet.v4 Checkin 3" (SID: 2828008, Rev: 2, Severity: 1) categorized as "A Network Trojan was detected" (Backdoor, ransomware, trojans, etc.)
      source
      Suricata Alerts
      relevance
      10/10
    • Sample was identified as malicious by a large number of Antivirus engines
      details
      38/66 Antivirus vendors marked sample as malicious (57% detection rate)
      source
      External System
      relevance
      10/10
    • Sample was identified as malicious by at least one Antivirus engine
      details
      38/66 Antivirus vendors marked sample as malicious (57% detection rate)
      source
      External System
      relevance
      8/10
  • General
  • Installation/Persistance
    • Writes data to a remote process
      details
      "<Input Sample>" wrote 32 bytes to a remote process "C:\41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe" (Handle: 156)
      "<Input Sample>" wrote 52 bytes to a remote process "C:\41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe" (Handle: 156)
      "<Input Sample>" wrote 4 bytes to a remote process "C:\41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe" (Handle: 156)
      source
      API Call
      relevance
      6/10
  • Hiding 1 Malicious Indicators
    • All indicators are available only in the private webservice or standalone version
  • Suspicious Indicators 16

  • Anti-Detection/Stealthyness
  • Anti-Reverse Engineering
  • Environment Awareness
    • Reads the active computer name
      details
      "<Input Sample>" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
      source
      Registry Access
      relevance
      5/10
    • Reads the cryptographic machine GUID
      details
      "<Input Sample>" (Path: "HKLM\SOFTWARE\MICROSOFT\CRYPTOGRAPHY"; Key: "MACHINEGUID")
      source
      Registry Access
      relevance
      10/10
  • External Systems
    • Detected Emerging Threats Alert
      details
      Detected alert "ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1" (SID: 2018358, Rev: 7, Severity: 2) categorized as "Potentially Bad Traffic"
      source
      Suricata Alerts
      relevance
      10/10
  • General
    • Opened the service control manager
      details
      "<Input Sample>" called "OpenSCManager" requesting access rights "0X6"
      source
      API Call
      relevance
      10/10
    • POSTs files to a webserver
      details
      "POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 209.140.18.37:8080Content-Length: 372Connection: Keep-AliveCache-Control: no-cache" with no payload
      source
      Network Traffic
      relevance
      5/10
    • Requested access to a system service
      details
      "<Input Sample>" called "OpenService" to access the "ALG" service
      source
      API Call
      relevance
      10/10
  • Installation/Persistance
    • Creates new processes
      details
      "<Input Sample>" is creating a new process (Name: "C:\41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe", Handle: 156)
      source
      API Call
      relevance
      8/10
  • Network Related
  • System Destruction
    • Marks file for deletion
      details
      "C:\41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe" marked "%WINDIR%\System32\wlanscreen.exe:Zone.Identifier" for deletion
      source
      API Call
      relevance
      10/10
    • Opens file with deletion access rights
      details
      "<Input Sample>" opened "C:\41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe" with delete access
      "<Input Sample>" opened "%WINDIR%\system32\wlanscreen.exe:Zone.Identifier" with delete access
      source
      API Call
      relevance
      7/10
  • Unusual Characteristics
    • Imports suspicious APIs
      details
      GetCommandLineA
      source
      Static Parser
      relevance
      1/10
    • Installs hooks/patches the running process
      details
      "<Input Sample>" wrote bytes "4053157758581677186a1677653c17770000000000bfb7750000000056ccb775000000007ccab7750000000037683b756a2c1777d62d17770000000020693b750000000029a6b77500000000a48d3b7500000000f70eb77500000000" to virtual address "0x75AE1000" (part of module "NSI.DLL")
      source
      Hook Detection
      relevance
      10/10
  • Hiding 1 Suspicious Indicators
    • All indicators are available only in the private webservice or standalone version
  • Informative 9

  • Environment Awareness
    • Queries volume information
      details
      "<Input Sample>" queries volume information of "C:\" at 00041110-00003452-0000010C-93851937
      source
      API Call
      relevance
      2/10
    • Queries volume information of an entire harddrive
      details
      "<Input Sample>" queries volume information of "C:\" at 00041110-00003452-0000010C-93851937
      source
      API Call
      relevance
      8/10
    • Reads the registry for installed applications
      details
      "<Input Sample>" (Path: "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\41211EADD2124022E54ACEC029C3E2D8D8C35D191955D5805472F201D0C2BE04.EXE")
      "<Input Sample>" (Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\41211EADD2124022E54ACEC029C3E2D8D8C35D191955D5805472F201D0C2BE04.EXE")
      source
      Registry Access
      relevance
      10/10
  • General
    • Contains PDB pathways
      details
      "eeeEEEerrR123\G.pdb"
      source
      String
      relevance
      1/10
    • Creates mutants
      details
      "\Sessions\1\BaseNamedObjects\M43A41700"
      "M43A41700"
      "\Sessions\1\BaseNamedObjects\Global\IC477DEE1"
      "\Sessions\1\BaseNamedObjects\Global\MC477DEE1"
      "Global\MC477DEE1"
      "Global\IC477DEE1"
      source
      Created Mutant
      relevance
      3/10
    • Spawns new processes
      details
      Spawned process "<Input Sample>" (Show Process)
      source
      Monitored Target
      relevance
      3/10
  • Installation/Persistance
    • Connects to LPC ports
      details
      "<Input Sample>" connecting to "\ThemeApiPort"
      source
      API Call
      relevance
      1/10
    • Touches files in the Windows directory
      details
      "<Input Sample>" touched file "%WINDIR%\System32\en-US\setupapi.dll.mui"
      "<Input Sample>" touched file "%WINDIR%\Globalization\Sorting\SortDefault.nls"
      "<Input Sample>" touched file "%WINDIR%\System32\en-US\shell32.dll.mui"
      "<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches"
      "<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\cversions.1.db"
      "<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x000000000000000c.db"
      "<Input Sample>" touched file "%WINDIR%\System32\rsaenh.dll"
      "<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches"
      "<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\cversions.1.db"
      "<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x000000000000000c.db"
      source
      API Call
      relevance
      7/10
  • System Security

File Details

All Details:

41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04

Filename
41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04
Size
124KiB (126976 bytes)
Type
peexe executable
Description
PE32 executable (GUI) Intel 80386, for MS Windows
Architecture
WINDOWS
SHA256
41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04Copy SHA256 to clipboard
MD5
2259bead7bd71fcf56aee294fb54f4a8Copy MD5 to clipboard
SHA1
306506fdd8e91ca6613d0375de34cc6a04b21482Copy SHA1 to clipboard
ssdeep
3072:5n4nMn0R4705ars1d13udp7Smm6LauFQ:5n4PzjAdlMc Copy ssdeep to clipboard
imphash
982febcfd3b5a3e57c4255345c736c84 Copy imphash to clipboard
authentihash
ab054716b8b68ce00e8eafcae649eb0016ff65c1dde53e5e9693dae282c68a73 Copy authentihash to clipboard
PDB Pathway

Resources

Language
ENGLISH
Icon
Sample Icon

Visualization

Input File (PortEx)
PE Visualization

Version Info

LegalCopyright
Microsoft Corporation. All rights reserved.
InternalName
qmgrprxy.dll
FileVersion
7.5.7600.16385 (win7_rtm.090713-1255)
CompanyName
Microsoft Corporation
ProductName
Microsoft Windows Operating System
ProductVersion
7.5.7600.16385
FileDescription
Background Intelligent Transfer Service Proxy
OriginalFilename
qmgrprxy.dll
Translation
0x0409 0x04b0

Classification (TrID)

  • 50.0% (.EXE) Generic Win/DOS Executable
  • 49.9% (.EXE) DOS Executable Generic

File Sections

File Resources

File Imports

GetSidSubAuthority
CreatePolyPolygonRgn
FlsFree
FreeConsole
GetCommandLineA
GetConsoleCP
GetConsoleOutputCP
GetCurrentProcess
GetEnvironmentStrings
GetEnvironmentStringsW
GetProcessHeap
SearchPathA
No API names/ordinals defined for this module import
OleSaveToStream
GetActiveObject
VectorFromBstr
SetupDiGetClassInstallParamsA
No API names/ordinals defined for this module import
GetCursorInfo
GetMessagePos
inet_addr
WSACleanup

Screenshots

Loading content, please wait...

Hybrid Analysis

Tip: Click an analysed process below to view more details.

Analysed 2 processes in total.

Network Analysis

DNS Requests

No relevant DNS requests were made.

Contacted Hosts

No relevant hosts were contacted.

HTTP Traffic

Endpoint Request URL
209.140.18.37:8080 POST 209.140.18.37/

Suricata Alerts

Event Category Description SID
local -> 209.140.18.37:8080 (TCP) A Network Trojan was detected ETPRO TROJAN W32/Emotet.v4 Checkin 2827279
local -> 209.140.18.37:8080 (TCP) A Network Trojan was detected ETPRO TROJAN W32/Emotet.v4 Checkin 2 2827580
local -> 209.140.18.37:8080 (TCP) A Network Trojan was detected ETPRO TROJAN W32/Emotet.v4 Checkin 3 2828008
local -> 209.140.18.37:8080 (TCP) Potentially Bad Traffic ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 2018358
ET rules applied using Suricata. Find out more about proofpoint ET Intelligence here.

Extracted Strings

All Details:
"slw"n:2^
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
-w_._.
Ansi based on Image Processing (screen_0.png)
.text
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
0 0$0,0004080P0T0X0\0`0h0l0p0t0
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
0____,,
Ansi based on Image Processing (screen_0.png)
0C3#$GGG
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
1 1$1(1@1D1H1L1P1X1\1`1d1|1
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
1Xu_<Xu
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe , 00040576-00003344.00000000.41080.0013D000.00000002.mdmp)
2024282<2@2H2L2P2T2l2p2t2x2|2
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
209.140.18.37
Ansi based on PCAP Processing (PCAP)
3 3$3(3,30383<3@3D3\3`3d3h3l3t3x3|3
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
3%1vva
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
4 4(4,40444L4P4T4
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
5E;P>?d?
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
5U".m]*vZAg
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
6C13C4D
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
6xOsN5y
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
7.5.7600.16385
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
7.5.7600.16385 (win7_rtm.090713-1255)
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
7Cv#Z
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
:\:d:p:|:
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
;x6O'
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
??????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
?????????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
????????????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
???????_????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
@.reloc
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
@.rsrc
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
\Sessions\1\Windows\ApiPort
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
\ThemeApiPort
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
_,____L_L,,_,_
Ansi based on Image Processing (screen_0.png)
__,;,
Ansi based on Image Processing (screen_0.png)
__,___V_'___,,_;=L@__,_,,,
Ansi based on Image Processing (screen_0.png)
_____?'?M_L_
Ansi based on Image Processing (screen_0.png)
_________,,
Ansi based on Image Processing (screen_0.png)
__r?m?_?_?___,_q_?_,,m,_??mu_n?__?_v__,,,_,,
Ansi based on Image Processing (screen_0.png)
__yBR
Ansi based on Image Processing (screen_0.png)
_J_m_m,,,
Ansi based on Image Processing (screen_0.png)
`.data
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
`\??\Volume{8177f4e4-b53f-11e4-a9c2-806e6f6e6963}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
`\??\Volume{8177f4e5-b53f-11e4-a9c2-806e6f6e6963}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ADVAPI32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
AlwaysShowExt
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ANALY5l5
Ansi based on Image Processing (screen_0.png)
Attributes
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
AuthenticodeEnabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
AutoCheckSelect
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Background Intelligent Transfer Service Proxy
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
BrowseInPlace
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
CallForAttributes
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Category
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
CEIPEnable
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Com+Enabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Common Desktop
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
CompanyName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ComputerName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Content Type
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Corporation
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
CreatePolyPolygonRgn
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
CWDIllegalInDLLSearch
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DebugHeapFlags
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DefaultAccessPermission
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Description
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DevicePath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Disable
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableEngine
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableImprovedZoneCheck
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableLocalOverride
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableMetaFiles
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableProcessIsolation
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableUserModeCallbackFilter
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DocObject
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DontPrettyPath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
eeeEEEerrR123\G.pdb
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
en-US
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Enabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
EW!223E
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FileDescription
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FileVersion
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Filter
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
FipsAlgorithmPolicy
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
FlsFree
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe , 00040576-00003344.00000000.41080.0013D000.00000002.mdmp)
FolderTypeID
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
FreeConsole
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FweeW
Unicode based on Hybrid Analysis (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GDI32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Generation
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
GetCommandLineA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetConsoleCP
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetConsoleOutputCP
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCurrentProcess
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCursorInfo
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetEnvironmentStrings
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetEnvironmentStringsW
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetMessagePos
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetProcessHeap
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetSidSubAuthority
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GEWgW!232fWE
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GlobalSession
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
GwEW!23Ge@
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
HasNavigationEnum
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
hEWWEeww@@3#
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Hidden
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideFileExt
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideFolderVerbs
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideIcons
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideInWebView
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideOnDesktopPerUser
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
hWehWEHW##g
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Hww##ffQgQ12@3
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
HWW#34$gg
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
IconsOnly
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Image Path
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
InfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
InitFolderHandler
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
InprocServer32
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
InternalName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
IsShortcut
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
JVF,@:{VT9
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
KERNEL32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Kp8ti
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
LdapClientIntegrity
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LegalCopyright
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
LoadAppInit_DLLs
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LocalizedName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LocalRedirectOnly
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
m.090713-1255)
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
MachineGuid
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MachinePreferredUILanguages
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MachineThrottling
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MapNetDriveVerbs
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MapNetDrvBtn
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MartaExtension
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MaxRpcSize
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MaxSxSHashCount
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MaxUndoItems
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Microsoft
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Microsoft Corporation
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Microsoft Corporation. All rights reserved.
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Ansi based on PCAP Processing (PCAP)
msi.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe , 00040576-00003344.00000000.41080.0013D000.00000002.mdmp)
ndern32un!
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
NdrOleExtDLL
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NeverShowExt
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoFileFolderConnection
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoFileFolderJunction
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoNetCrawling
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoOplock
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ole32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
OLEAUT32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
OleSaveToStream
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
OOBEInProgress
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Operating System
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
OriginalFilename
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
osoft Corporation. All rights reserved.
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
PageAllocatorSystemHeapIsPrivate
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PageAllocatorUseSystemHeap
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ParentFolder
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ParsingName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PinToNameSpaceTree
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 209.140.18.37:8080Content-Length: 372Connection: Keep-AliveCache-Control: no-cacheR
Ansi based on PCAP Processing (network.pcap)
PreCreate
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PreferExternalManifest
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PreferredUILanguages
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivateKeyLifetimeSeconds
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivKeyCacheMaxItems
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivKeyCachePurgeIntervalSeconds
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ProductName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ProductVersion
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
PublishExpandedPath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
pyright
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Q;!a#{9u
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
qmgrprxy.dll
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
QueryForInfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
QueryForOverlay
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
qy^?B+`pO
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
r_?__0__,_m,
Ansi based on Image Processing (screen_0.png)
RaiseDefaultAuthnLevel
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RelativePath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RemoteRpcDll
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RestrictedAttributes
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ription
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Roamable
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
roductName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
round Intelligent Transfer Service Proxy
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SafeDllSearchMode
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SafeProcessSearchMode
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SearchPathA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Security
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Security_HKLM_only
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SeparateProcess
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SETUPAPI.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SetupDiGetClassInstallParamsA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SHELL32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ShellState
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowCompColor
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowInfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowSuperHidden
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowTypeOverlay
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SourcePath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SQMServiceList
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Stream
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
StreamResource
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
StreamResourceType
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
StringFileInfo
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SYSTEM
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
system32
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SystemSetupInProgress
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ThemeApiConnectionRequest
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
This pro W
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ThreadingModel
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Translation
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
TransparentEnabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseDropHandler
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseHostnameAsAlias
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseInProcHandlerCache
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseOldHostResolutionOrder
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseOutOfProcHandlerCache
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
USER32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
VarFileInfo
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
VS_VERSION_INFO
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
WantsAliasedNotifications
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsFORDISPLAY
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsFORPARSING
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsParseDisplayName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsUniversalDelegate
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WebView
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Win31FileSystem
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Windows
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WS2_32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Wy8^qta-9
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
xI9p l@J;wh
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
zzlRDJwgF
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
~\KmB
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
~^v!Yq
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
209.140.18.37
Ansi based on PCAP Processing (PCAP)
41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
7.5.7600.16385 (win7_rtm.090713-1255)
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
:\:d:p:|:
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
\Sessions\1\Windows\ApiPort
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
\ThemeApiPort
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
`\??\Volume{8177f4e4-b53f-11e4-a9c2-806e6f6e6963}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
`\??\Volume{8177f4e5-b53f-11e4-a9c2-806e6f6e6963}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Background Intelligent Transfer Service Proxy
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Com+Enabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Common Desktop
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
CompanyName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ComputerName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Description
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableLocalOverride
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableProcessIsolation
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
eeeEEEerrR123\G.pdb
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FileDescription
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FileVersion
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCommandLineA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetConsoleCP
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetConsoleOutputCP
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCurrentProcess
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCursorInfo
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetEnvironmentStrings
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetEnvironmentStringsW
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetMessagePos
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetProcessHeap
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetSidSubAuthority
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
InfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LocalizedName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LocalRedirectOnly
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Ansi based on PCAP Processing (PCAP)
msi.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe , 00040576-00003344.00000000.41080.0013D000.00000002.mdmp)
NoFileFolderConnection
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 209.140.18.37:8080Content-Length: 372Connection: Keep-AliveCache-Control: no-cacheR
Ansi based on PCAP Processing (network.pcap)
PrivateKeyLifetimeSeconds
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivKeyCacheMaxItems
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivKeyCachePurgeIntervalSeconds
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ProductVersion
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
QueryForInfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RemoteRpcDll
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
round Intelligent Transfer Service Proxy
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SafeProcessSearchMode
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SeparateProcess
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SetupDiGetClassInstallParamsA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ShowCompColor
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowInfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SQMServiceList
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
StringFileInfo
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ThemeApiConnectionRequest
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
VarFileInfo
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
VS_VERSION_INFO
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
"slw"n:2^
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
.text
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
0 0$0,0004080P0T0X0\0`0h0l0p0t0
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
0C3#$GGG
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
1 1$1(1@1D1H1L1P1X1\1`1d1|1
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
2024282<2@2H2L2P2T2l2p2t2x2|2
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
3 3$3(3,30383<3@3D3\3`3d3h3l3t3x3|3
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
3%1vva
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
4 4(4,40444L4P4T4
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
5E;P>?d?
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
5U".m]*vZAg
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
6xOsN5y
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
7.5.7600.16385
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
7.5.7600.16385 (win7_rtm.090713-1255)
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
7Cv#Z
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
:\:d:p:|:
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
;x6O'
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
@.reloc
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
@.rsrc
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
`.data
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ADVAPI32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Background Intelligent Transfer Service Proxy
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
CompanyName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Corporation
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
CreatePolyPolygonRgn
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
eeeEEEerrR123\G.pdb
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
EW!223E
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FileDescription
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FileVersion
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FreeConsole
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
FweeW
Unicode based on Hybrid Analysis (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GDI32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCommandLineA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetConsoleCP
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetConsoleOutputCP
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCurrentProcess
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetCursorInfo
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetEnvironmentStrings
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetEnvironmentStringsW
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetMessagePos
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetProcessHeap
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GetSidSubAuthority
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GEWgW!232fWE
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
GwEW!23Ge@
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
hEWWEeww@@3#
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
hWehWEHW##g
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Hww##ffQgQ12@3
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
HWW#34$gg
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
InternalName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
JVF,@:{VT9
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
KERNEL32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Kp8ti
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
LegalCopyright
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
m.090713-1255)
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Microsoft
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Microsoft Corporation
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Microsoft Corporation. All rights reserved.
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ndern32un!
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ole32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
OLEAUT32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
OleSaveToStream
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Operating System
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
OriginalFilename
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
osoft Corporation. All rights reserved.
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ProductName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ProductVersion
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
pyright
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Q;!a#{9u
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
qmgrprxy.dll
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
qy^?B+`pO
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
ription
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
roductName
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
round Intelligent Transfer Service Proxy
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SearchPathA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SETUPAPI.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SetupDiGetClassInstallParamsA
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
SHELL32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
StringFileInfo
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
This pro W
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Translation
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
USER32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
VarFileInfo
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
VS_VERSION_INFO
Unicode based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
WS2_32.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
Wy8^qta-9
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
xI9p l@J;wh
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
zzlRDJwgF
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
~\KmB
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
~^v!Yq
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe.bin)
-w_._.
Ansi based on Image Processing (screen_0.png)
0____,,
Ansi based on Image Processing (screen_0.png)
_,____L_L,,_,_
Ansi based on Image Processing (screen_0.png)
__,;,
Ansi based on Image Processing (screen_0.png)
__,___V_'___,,_;=L@__,_,,,
Ansi based on Image Processing (screen_0.png)
_____?'?M_L_
Ansi based on Image Processing (screen_0.png)
_________,,
Ansi based on Image Processing (screen_0.png)
__r?m?_?_?___,_q_?_,,m,_??mu_n?__?_v__,,,_,,
Ansi based on Image Processing (screen_0.png)
__yBR
Ansi based on Image Processing (screen_0.png)
_J_m_m,,,
Ansi based on Image Processing (screen_0.png)
ANALY5l5
Ansi based on Image Processing (screen_0.png)
r_?__0__,_m,
Ansi based on Image Processing (screen_0.png)
1Xu_<Xu
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe , 00040576-00003344.00000000.41080.0013D000.00000002.mdmp)
????????????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
\Sessions\1\Windows\ApiPort
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
AuthenticodeEnabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
CEIPEnable
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
CWDIllegalInDLLSearch
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DevicePath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Disable
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableEngine
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableLocalOverride
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableMetaFiles
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableUserModeCallbackFilter
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
en-US
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
FlsFree
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe , 00040576-00003344.00000000.41080.0013D000.00000002.mdmp)
LoadAppInit_DLLs
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MachinePreferredUILanguages
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
msi.dll
Ansi based on Memory/File Scan (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe , 00040576-00003344.00000000.41080.0013D000.00000002.mdmp)
PageAllocatorSystemHeapIsPrivate
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PageAllocatorUseSystemHeap
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PreferExternalManifest
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PreferredUILanguages
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SafeDllSearchMode
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SourcePath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SYSTEM
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
TransparentEnabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Win31FileSystem
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
209.140.18.37
Ansi based on PCAP Processing (PCAP)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Ansi based on PCAP Processing (PCAP)
41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
6C13C4D
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
??????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
?????????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
???????_????????
Ansi based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
\ThemeApiPort
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
`\??\Volume{8177f4e4-b53f-11e4-a9c2-806e6f6e6963}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
`\??\Volume{8177f4e5-b53f-11e4-a9c2-806e6f6e6963}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
AlwaysShowExt
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Attributes
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
AutoCheckSelect
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
BrowseInPlace
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
CallForAttributes
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Category
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Com+Enabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Common Desktop
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ComputerName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Content Type
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DebugHeapFlags
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DefaultAccessPermission
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Description
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableImprovedZoneCheck
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DisableProcessIsolation
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DocObject
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
DontPrettyPath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Enabled
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Filter
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
FipsAlgorithmPolicy
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
FolderTypeID
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Generation
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
GlobalSession
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HasNavigationEnum
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Hidden
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideFileExt
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideFolderVerbs
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideIcons
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideInWebView
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
HideOnDesktopPerUser
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
IconsOnly
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Image Path
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
InfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
InitFolderHandler
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
InprocServer32
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
IsShortcut
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LdapClientIntegrity
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LocalizedName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
LocalRedirectOnly
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MachineGuid
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MachineThrottling
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MapNetDriveVerbs
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MapNetDrvBtn
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MartaExtension
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MaxRpcSize
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MaxSxSHashCount
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
MaxUndoItems
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NdrOleExtDLL
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NeverShowExt
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoFileFolderConnection
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoFileFolderJunction
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoNetCrawling
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
NoOplock
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
OOBEInProgress
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ParentFolder
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ParsingName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PinToNameSpaceTree
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PreCreate
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivateKeyLifetimeSeconds
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivKeyCacheMaxItems
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PrivKeyCachePurgeIntervalSeconds
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
PublishExpandedPath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
QueryForInfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
QueryForOverlay
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RaiseDefaultAuthnLevel
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RelativePath
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RemoteRpcDll
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
RestrictedAttributes
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Roamable
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SafeProcessSearchMode
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Security
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Security_HKLM_only
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SeparateProcess
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShellState
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowCompColor
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowInfoTip
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowSuperHidden
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ShowTypeOverlay
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SQMServiceList
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Stream
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
StreamResource
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
StreamResourceType
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
system32
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
SystemSetupInProgress
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ThemeApiConnectionRequest
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
ThreadingModel
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseDropHandler
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseHostnameAsAlias
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseInProcHandlerCache
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseOldHostResolutionOrder
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
UseOutOfProcHandlerCache
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsAliasedNotifications
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsFORDISPLAY
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsFORPARSING
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsParseDisplayName
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WantsUniversalDelegate
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
WebView
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
Windows
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Unicode based on Runtime Data (41211eadd2124022e54acec029c3e2d8d8c35d191955d5805472f201d0c2be04.exe )
POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 209.140.18.37:8080Content-Length: 372Connection: Keep-AliveCache-Control: no-cacheR
Ansi based on PCAP Processing (network.pcap)

Extracted Files

No significant files were extracted.

Notifications

  • Runtime

  • Added comment to Virus Total report

Community