3.0.taskmgr.exe.8f0000.1.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
3.0.taskmgr.exe.8f0000.1.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
3.0.taskmgr.exe.8f0000.1.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
3.0.taskmgr.exe.8f0000.1.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
3.0.taskmgr.exe.8f0000.1.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
3.2.taskmgr.exe.8f0000.0.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
3.2.taskmgr.exe.8f0000.0.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
3.2.taskmgr.exe.8f0000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
3.2.taskmgr.exe.8f0000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
3.2.taskmgr.exe.8f0000.0.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
0.0.shitgame.exe.640000.0.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
0.0.shitgame.exe.640000.0.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
0.0.shitgame.exe.640000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.0.shitgame.exe.640000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
0.0.shitgame.exe.640000.0.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
0.2.shitgame.exe.640000.0.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
0.2.shitgame.exe.640000.0.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
4.0.shitgame.exe.ce0000.0.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
0.2.shitgame.exe.640000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
4.0.shitgame.exe.ce0000.0.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
4.0.shitgame.exe.ce0000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.shitgame.exe.640000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
0.2.shitgame.exe.640000.0.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
4.0.shitgame.exe.ce0000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
4.0.shitgame.exe.ce0000.0.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
4.2.shitgame.exe.ce0000.0.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
4.2.shitgame.exe.ce0000.0.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
4.2.shitgame.exe.ce0000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
4.2.shitgame.exe.ce0000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
4.2.shitgame.exe.ce0000.0.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
3.0.taskmgr.exe.8f0000.0.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
3.0.taskmgr.exe.8f0000.0.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
3.0.taskmgr.exe.8f0000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
3.0.taskmgr.exe.8f0000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
3.0.taskmgr.exe.8f0000.0.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
3.0.taskmgr.exe.8f0000.2.unpack | MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth | - 0x5b594:$x1: Quasar.Common.Messages
- 0x5ec4d:$x1: Quasar.Common.Messages
- 0x6aedc:$x4: Uninstalling... good bye :-(
- 0x6c601:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
|
3.0.taskmgr.exe.8f0000.2.unpack | JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | |
3.0.taskmgr.exe.8f0000.2.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
3.0.taskmgr.exe.8f0000.2.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x6a880:$f1: FileZilla\recentservers.xml
- 0x6a8c0:$f2: FileZilla\sitemanager.xml
- 0x6a902:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
- 0x6aa80:$b1: Chrome\User Data\
- 0x6abf6:$b2: Mozilla\Firefox\Profiles
- 0x6acf2:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x761eb:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x6ad8e:$b4: Opera Software\Opera Stable\Login Data
- 0x6adf8:$b5: YandexBrowser\User Data\
- 0x6ac46:$s4: logins.json
- 0x6aaec:$a1: username_value
- 0x6ab0a:$a2: password_value
- 0x6ac86:$a3: encryptedUsername
- 0x7612f:$a3: encryptedUsername
- 0x6acaa:$a4: encryptedPassword
- 0x7614d:$a4: encryptedPassword
- 0x760cb:$a5: httpRealm
|
3.0.taskmgr.exe.8f0000.2.unpack | MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen | - 0x2cd2e:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
- 0x2cdd9:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
- 0x6afc6:$s3: Process already elevated.
- 0x5b462:$s4: get_PotentiallyVulnerablePasswords
- 0x561e4:$s5: GetKeyloggerLogsDirectory
- 0x5ea08:$s5: GetKeyloggerLogsDirectory
- 0x5b485:$s6: set_PotentiallyVulnerablePasswords
- 0x7793f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
|
Click to see the 35 entries |