C:\projects\commonservicelocator\src\obj\Release\net45\CommonServiceLocator.pdb
Overview
overview
10Static
static
10discord-st...in.zip
windows7-x64
1discord-st...in.zip
windows10-2004-x64
1discord-st...ibutes
windows7-x64
3discord-st...ibutes
windows10-2004-x64
3discord-st...ICENSE
windows7-x64
1discord-st...ICENSE
windows10-2004-x64
1discord-st...DME.md
windows7-x64
3discord-st...DME.md
windows10-2004-x64
3discord-st...O6.sln
windows7-x64
3discord-st...O6.sln
windows10-2004-x64
6discord-st...config
windows7-x64
3discord-st...config
windows10-2004-x64
3discord-st...rs.xml
windows7-x64
1discord-st...rs.xml
windows10-2004-x64
1discord-st...rs.xsd
windows7-x64
3discord-st...rs.xsd
windows10-2004-x64
3discord-st...e1.png
windows7-x64
3discord-st...e1.png
windows10-2004-x64
3discord-st...ram.cs
windows7-x64
3discord-st...ram.cs
windows10-2004-x64
3discord-st...nfo.cs
windows7-x64
3discord-st...nfo.cs
windows10-2004-x64
3discord-st...er.vbs
windows7-x64
1discord-st...er.vbs
windows10-2004-x64
1discord-st...es.vbs
windows7-x64
1discord-st...es.vbs
windows10-2004-x64
1discord-st...er.vbs
windows7-x64
1discord-st...er.vbs
windows10-2004-x64
1discord-st...ttings
windows7-x64
3discord-st...ttings
windows10-2004-x64
3discord-st...Ex.zip
windows7-x64
1discord-st...Ex.zip
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
discord-stealer-token-grabber-main.zip
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
discord-stealer-token-grabber-main.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
discord-stealer-token-grabber-main/.gitattributes
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
discord-stealer-token-grabber-main/.gitattributes
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
discord-stealer-token-grabber-main/LICENSE
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
discord-stealer-token-grabber-main/LICENSE
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
discord-stealer-token-grabber-main/README.md
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
discord-stealer-token-grabber-main/README.md
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
discord-stealer-token-grabber-main/discordAIO6.sln
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
discord-stealer-token-grabber-main/discordAIO6.sln
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
discord-stealer-token-grabber-main/discordAIO6/App.config
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
discord-stealer-token-grabber-main/discordAIO6/App.config
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
discord-stealer-token-grabber-main/discordAIO6/FodyWeavers.xml
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
discord-stealer-token-grabber-main/discordAIO6/FodyWeavers.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
discord-stealer-token-grabber-main/discordAIO6/FodyWeavers.xsd
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
discord-stealer-token-grabber-main/discordAIO6/FodyWeavers.xsd
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
discord-stealer-token-grabber-main/discordAIO6/Image1.png
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
discord-stealer-token-grabber-main/discordAIO6/Image1.png
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
discord-stealer-token-grabber-main/discordAIO6/Program.cs
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
discord-stealer-token-grabber-main/discordAIO6/Program.cs
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/AssemblyInfo.cs
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/AssemblyInfo.cs
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Resources.Designer.vbs
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Resources.Designer.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Resources.vbs
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Resources.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Settings.Designer.vbs
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Settings.Designer.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Settings.settings
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
discord-stealer-token-grabber-main/discordAIO6/Properties/Settings.settings
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
discord-stealer-token-grabber-main/discordAIO6/Resources/ConfuserEx.zip
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
discord-stealer-token-grabber-main/discordAIO6/Resources/ConfuserEx.zip
Resource
win10v2004-20240611-en
General
-
Target
discord-stealer-token-grabber-main.zip
-
Size
43.4MB
-
MD5
68ebde47ae55789075cca396d13c040b
-
SHA1
0a29f6bced8fa404d5ebb05a060ccb30e2a49fc2
-
SHA256
eae06d67c1c983e5e52075aa40af16739888f452f3bd5055f353b89d1a9f65be
-
SHA512
0f7cf30e8ad19968b8269e840f7f000c1e639cf5f2e586fe437ba08d49e25b2845c5c1d835d63fdedffdd067d783433c44dbf9fe7a79acf7df7260a9d9b5652f
-
SSDEEP
786432:G8ENQH2Y773XDtHBGavlBAdDzvB4JMOptEUqD10ahVgf7CtEUqsSjnh756feJ:GNNhuDtk2BApvoMY5qaahVCE5qht56fC
Malware Config
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule static1/unpack001/discord-stealer-token-grabber-main/discordAIO6/Resources/stub.txt disable_win_def static1/unpack001/discord-stealer-token-grabber-main/discordAIO6/bin/Debug/discordAIO6.exe disable_win_def static1/unpack001/discord-stealer-token-grabber-main/discordAIO6/bin/Release/discordAIO6.exe disable_win_def static1/unpack001/discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.exe disable_win_def static1/unpack001/discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.exe disable_win_def -
Unsigned PE 19 IoCs
Checks for missing Authenticode signature.
resource unpack002/CommonServiceLocator.dll unpack002/Confuser.CLI.exe unpack002/Confuser.Core.dll unpack002/Confuser.DynCipher.dll unpack002/Confuser.Protections.dll unpack002/Confuser.Renamer.dll unpack002/Confuser.Runtime.dll unpack002/ConfuserEx.exe unpack002/GalaSoft.MvvmLight.Extras.dll unpack002/GalaSoft.MvvmLight.Platform.dll unpack002/GalaSoft.MvvmLight.dll unpack002/NDesk.Options.dll unpack002/Ookii.Dialogs.Wpf.dll unpack002/dnlib.dll unpack001/discord-stealer-token-grabber-main/discordAIO6/bin/Debug/discordAIO6.exe unpack001/discord-stealer-token-grabber-main/discordAIO6/bin/Release/discordAIO6.exe unpack001/discord-stealer-token-grabber-main/discordAIO6/obj/Debug/TempPE/Properties.Resources.Designer.cs.dll unpack001/discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.exe unpack001/discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.exe
Files
-
discord-stealer-token-grabber-main.zip.zip
-
discord-stealer-token-grabber-main/.gitattributes
-
discord-stealer-token-grabber-main/LICENSE
-
discord-stealer-token-grabber-main/README.md
-
discord-stealer-token-grabber-main/discordAIO6.sln
-
discord-stealer-token-grabber-main/discordAIO6/App.config
-
discord-stealer-token-grabber-main/discordAIO6/FodyWeavers.xml
-
discord-stealer-token-grabber-main/discordAIO6/FodyWeavers.xsd
-
discord-stealer-token-grabber-main/discordAIO6/Image1.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Program.cs
-
discord-stealer-token-grabber-main/discordAIO6/Properties/AssemblyInfo.cs
-
discord-stealer-token-grabber-main/discordAIO6/Properties/Resources.Designer.cs.vbs
-
discord-stealer-token-grabber-main/discordAIO6/Properties/Resources.resx.vbs
-
discord-stealer-token-grabber-main/discordAIO6/Properties/Settings.Designer.cs.vbs
-
discord-stealer-token-grabber-main/discordAIO6/Properties/Settings.settings
-
discord-stealer-token-grabber-main/discordAIO6/Resources/ConfuserEx.zip.zip
-
CommonServiceLocator.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Confuser.CLI.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\projects\confuserex\Confuser.CLI\obj\Release\net461\Confuser.CLI.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Confuser.CLI.exe.config.xml
-
Confuser.Core.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\projects\confuserex\Confuser.Core\obj\Release\net461\Confuser.Core.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Confuser.DynCipher.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\projects\confuserex\Confuser.DynCipher\obj\Release\net461\Confuser.DynCipher.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Confuser.Protections.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\projects\confuserex\Confuser.Protections\obj\Release\net461\Confuser.Protections.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Confuser.Renamer.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\projects\confuserex\Confuser.Renamer\obj\Release\net461\Confuser.Renamer.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Confuser.Runtime.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\projects\confuserex\Confuser.Runtime\obj\Release\net20\Confuser.Runtime.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ConfuserEx.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\projects\confuserex\ConfuserEx\obj\Release\net461\ConfuserEx.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ConfuserEx.exe.config.xml
-
GalaSoft.MvvmLight.Extras.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\lbugn\Documents\MVVMLight\GalaSoft.MvvmLight\GalaSoft.MvvmLight.Extras (PCL)\obj\Release\GalaSoft.MvvmLight.Extras.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
GalaSoft.MvvmLight.Platform.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\lbugn\Documents\MVVMLight\GalaSoft.MvvmLight\GalaSoft.MvvmLight.Platform (NET45)\obj\Release\GalaSoft.MvvmLight.Platform.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
GalaSoft.MvvmLight.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\lbugn\Documents\MVVMLight\GalaSoft.MvvmLight\GalaSoft.MvvmLight (PCL)\obj\Release\GalaSoft.MvvmLight.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Microsoft.DiaSymReader.Native.amd64.dll.dll regsvr32 windows:6 windows x64 arch:x64
c125d12aa68a74fb5955b04e53443789
Code Sign
33:00:00:00:c1:09:f8:02:41:bb:4d:aa:dc:00:00:00:00:00:c1Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/09/2016, 17:58Not After07/09/2018, 17:58SubjectCN=Microsoft Time-Stamp Service,OU=AOC+OU=nCipher DSE ESN:12E7-3064-6112,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:78:25:5a:b5:cd:23:c6:5f:95:00:01:00:00:01:78Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:11Not After11/08/2018, 20:11SubjectCN=Microsoft Corporation,OU=AOC,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:c3:0e:9b:a7:d8:b2:dc:f7:2c:00:00:00:00:00:c3Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:20Not After11/08/2018, 20:20SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0a:18:b0:2b:63:19:ad:7e:e4:68:25:ff:9f:ba:3b:40:9d:9c:7e:42:49:ce:5a:e4:65:a5:1c:dd:54:80:8b:73Signer
Actual PE Digest0a:18:b0:2b:63:19:ad:7e:e4:68:25:ff:9f:ba:3b:40:9d:9c:7e:42:49:ce:5a:e4:65:a5:1c:dd:54:80:8b:73Digest Algorithmsha256PE Digest Matchestrue6e:17:6e:f1:6c:dc:b2:d0:25:37:e2:89:88:5b:f9:60:65:b2:93:65Signer
Actual PE Digest6e:17:6e:f1:6c:dc:b2:d0:25:37:e2:89:88:5b:f9:60:65:b2:93:65Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Microsoft.DiaSymReader.Native.amd64.pdb
Imports
kernel32
GetLastError
FreeLibrary
WaitForSingleObjectEx
ResetEvent
SetEvent
LoadLibraryExA
VirtualQuery
VirtualProtect
MapViewOfFileEx
GetFileSizeEx
GetFullPathNameW
ExpandEnvironmentStringsW
DeviceIoControl
WriteFile
SetFilePointerEx
SetEndOfFile
ReadFile
GetFileType
DeleteFileW
VirtualFree
VirtualAlloc
WideCharToMultiByte
SetFileAttributesW
GetFileAttributesW
MapViewOfFile
CreateFileMappingW
GetFileSize
CreateFileW
UnmapViewOfFile
CloseHandle
MultiByteToWideChar
GetSystemInfo
DisableThreadLibraryCalls
GetEnvironmentVariableW
LCMapStringW
FormatMessageW
LocalFree
RtlPcToFileHeader
LoadLibraryExW
GetProcAddress
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RaiseException
EncodePointer
SetLastError
InterlockedFlushSList
RtlUnwindEx
TerminateProcess
GetCurrentProcess
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
LocalAlloc
GetCurrentThreadId
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetTickCount
CreateEventW
InitializeCriticalSection
ole32
CoTaskMemAlloc
CoTaskMemFree
api-ms-win-crt-heap-l1-1-0
free
_calloc_base
malloc
_callnewh
_free_base
calloc
api-ms-win-crt-utility-l1-1-0
qsort
bsearch
api-ms-win-crt-string-l1-1-0
strcpy_s
wcscpy_s
_wcsdup
towlower
wcsncat_s
wcsncpy_s
strncpy_s
wcscat_s
_wcsicmp
_wcsnicmp
strcat_s
_stricmp
wcsncmp
strncmp
strcmp
_memicmp
api-ms-win-crt-runtime-l1-1-0
_execute_onexit_table
abort
_initialize_onexit_table
_initialize_narrow_environment
_register_onexit_function
_cexit
_initterm_e
__doserrno
_initterm
terminate
_configure_narrow_argv
_invalid_parameter_noinfo
_seh_filter_dll
_errno
_crt_atexit
api-ms-win-crt-stdio-l1-1-0
_wfsopen
__stdio_common_vsnwprintf_s
_open_osfhandle
ftell
_write
fread
_get_osfhandle
__stdio_common_vfprintf
fclose
_wfopen_s
_chsize_s
fflush
fseek
__stdio_common_vswprintf
__acrt_iob_func
_wsopen_s
__stdio_common_vsscanf
__stdio_common_vsnprintf_s
_lseeki64
__stdio_common_vswprintf_s
_close
__stdio_common_vsprintf_s
_filelengthi64
_read
api-ms-win-crt-convert-l1-1-0
wcstoul
atoi
atol
_wtoi
api-ms-win-crt-filesystem-l1-1-0
_wmakepath_s
_fullpath
_wstat64
_wsplitpath_s
_wfullpath
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-environment-l1-1-0
_wdupenv_s
api-ms-win-crt-multibyte-l1-1-0
_mbscmp
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
Exports
Exports
CreateNGenPdbWriter
CreateSymReader
CreateSymWriter
DllCanUnloadNow
DllGetClassObject
DllGetClassObjectInternal
DllRegisterServer
DllUnregisterServer
VSDllRegisterServer
VSDllUnregisterServer
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Microsoft.DiaSymReader.Native.x86.dll.dll regsvr32 windows:6 windows x86 arch:x86
2750e561997e3d2f8e185972112eba29
Code Sign
33:00:00:00:d8:e4:75:f9:45:6f:48:f7:ae:00:00:00:00:00:d8Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before02/10/2017, 22:57Not After02/01/2019, 22:57SubjectCN=Microsoft Time-Stamp Service,OU=AOC+OU=Thales TSS ESN:70DD-4B5B-4568,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:78:25:5a:b5:cd:23:c6:5f:95:00:01:00:00:01:78Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:11Not After11/08/2018, 20:11SubjectCN=Microsoft Corporation,OU=AOC,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:c3:0e:9b:a7:d8:b2:dc:f7:2c:00:00:00:00:00:c3Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:20Not After11/08/2018, 20:20SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
74:c7:89:0c:ca:76:a2:a2:df:f4:32:36:58:11:7b:17:64:4f:20:f8:9b:a5:3b:ae:53:9e:3f:43:a1:04:1f:89Signer
Actual PE Digest74:c7:89:0c:ca:76:a2:a2:df:f4:32:36:58:11:7b:17:64:4f:20:f8:9b:a5:3b:ae:53:9e:3f:43:a1:04:1f:89Digest Algorithmsha256PE Digest Matchestrue62:bc:ea:ec:38:b2:c7:42:45:0d:0a:8a:25:44:ac:fc:cb:e1:75:36Signer
Actual PE Digest62:bc:ea:ec:38:b2:c7:42:45:0d:0a:8a:25:44:ac:fc:cb:e1:75:36Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Microsoft.DiaSymReader.Native.x86.pdb
Imports
kernel32
GetLastError
FreeLibrary
WaitForSingleObjectEx
ResetEvent
SetEvent
LoadLibraryExA
VirtualQuery
VirtualProtect
MapViewOfFileEx
GetFileSizeEx
GetFullPathNameW
ExpandEnvironmentStringsW
DeviceIoControl
WriteFile
SetFilePointerEx
SetEndOfFile
ReadFile
GetFileType
DeleteFileW
VirtualFree
VirtualAlloc
WideCharToMultiByte
SetFileAttributesW
GetFileAttributesW
MapViewOfFile
CreateFileMappingW
GetFileSize
CreateFileW
UnmapViewOfFile
CloseHandle
MultiByteToWideChar
GetSystemInfo
DisableThreadLibraryCalls
GetTickCount
GetEnvironmentVariableW
LCMapStringW
FormatMessageW
LocalFree
RaiseException
LoadLibraryExW
GetProcAddress
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
SetLastError
InterlockedFlushSList
RtlUnwind
TerminateProcess
GetCurrentProcess
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
LocalAlloc
GetCurrentThreadId
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateEventW
ole32
CoTaskMemAlloc
CoTaskMemFree
api-ms-win-crt-heap-l1-1-0
_calloc_base
_callnewh
_free_base
free
malloc
calloc
api-ms-win-crt-utility-l1-1-0
bsearch
qsort
api-ms-win-crt-string-l1-1-0
wcsncmp
wcscpy_s
_wcsdup
wcscat_s
_wcsicmp
_wcsnicmp
strcat_s
_stricmp
strncpy_s
towlower
wcsncat_s
strcpy_s
strncmp
wcsncpy_s
_memicmp
api-ms-win-crt-runtime-l1-1-0
_initterm
_errno
_crt_atexit
_cexit
abort
__doserrno
_execute_onexit_table
_initterm_e
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_invalid_parameter_noinfo
_seh_filter_dll
terminate
api-ms-win-crt-stdio-l1-1-0
_get_osfhandle
_close
_chsize_s
__stdio_common_vsnwprintf_s
__stdio_common_vfprintf
_wfsopen
_wfopen_s
fread
fseek
fflush
__stdio_common_vswprintf
__acrt_iob_func
ftell
_wsopen_s
__stdio_common_vsscanf
_open_osfhandle
__stdio_common_vswprintf_s
_read
__stdio_common_vsprintf_s
_filelengthi64
fclose
_lseeki64
__stdio_common_vsnprintf_s
_write
api-ms-win-crt-convert-l1-1-0
atoi
wcstoul
atol
_wtoi
api-ms-win-crt-filesystem-l1-1-0
_wstat64
_wfullpath
_wsplitpath_s
_wmakepath_s
_fullpath
api-ms-win-crt-environment-l1-1-0
_wdupenv_s
api-ms-win-crt-multibyte-l1-1-0
_mbscmp
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
api-ms-win-crt-time-l1-1-0
_time32
Exports
Exports
CreateNGenPdbWriter
CreateSymReader
CreateSymWriter
DllCanUnloadNow
DllGetClassObject
DllGetClassObjectInternal
DllRegisterServer
DllUnregisterServer
VSDllRegisterServer
VSDllUnregisterServer
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Microsoft.Win32.Registry.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:01:87:72:17:72:15:59:40:c7:09:00:00:00:00:01:87Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/03/2020, 18:39Not After03/03/2021, 18:39SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
f7:b6:99:b4:22:72:5d:60:72:4d:cd:e6:ad:87:41:f4:90:42:b8:ac:9a:00:ba:37:a8:a2:d1:9d:fe:22:40:daSigner
Actual PE Digestf7:b6:99:b4:22:72:5d:60:72:4d:cd:e6:ad:87:41:f4:90:42:b8:ac:9a:00:ba:37:a8:a2:d1:9d:fe:22:40:daDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
/_/artifacts/obj/Microsoft.Win32.Registry/net461-Windows_NT-Release/Microsoft.Win32.Registry.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
NDesk.Options.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\Documents\Visual Studio 2019\Projects\NDesk.Options\src\obj\Debug\net461\NDesk.Options.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Ookii.Dialogs.Wpf.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
/_/src/Ookii.Dialogs.Wpf/obj/Release/net45/Ookii.Dialogs.Wpf.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
System.IO.Packaging.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:02:13:8c:0c:1c:31:35:bc:d2:5f:00:00:00:00:02:13Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/02/2021, 20:09Not After10/02/2022, 20:09SubjectCN=.NET,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
3e:7e:8a:18:10:ab:e7:7a:fa:ad:af:23:51:2a:6e:ea:1e:b7:4b:a5:45:b0:d0:f8:dc:66:4e:88:ed:6b:d0:05Signer
Actual PE Digest3e:7e:8a:18:10:ab:e7:7a:fa:ad:af:23:51:2a:6e:ea:1e:b7:4b:a5:45:b0:d0:f8:dc:66:4e:88:ed:6b:d0:05Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
/_/artifacts/obj/System.IO.Packaging/net461-Release/System.IO.Packaging.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
System.Security.AccessControl.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:01:87:72:17:72:15:59:40:c7:09:00:00:00:00:01:87Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/03/2020, 18:39Not After03/03/2021, 18:39SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
c9:59:91:9a:ad:1d:21:b1:8b:d6:39:9e:9d:f8:26:6b:7d:ca:d6:00:90:a6:45:96:75:11:71:e2:68:64:59:2fSigner
Actual PE Digestc9:59:91:9a:ad:1d:21:b1:8b:d6:39:9e:9d:f8:26:6b:7d:ca:d6:00:90:a6:45:96:75:11:71:e2:68:64:59:2fDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
/_/artifacts/obj/System.Security.AccessControl/net461-Windows_NT-Release/System.Security.AccessControl.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
System.Security.Principal.Windows.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:01:87:72:17:72:15:59:40:c7:09:00:00:00:00:01:87Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/03/2020, 18:39Not After03/03/2021, 18:39SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
15:1f:de:b6:f3:56:f1:80:ad:c0:ff:4f:a8:55:41:ad:fa:07:51:b3:2c:1f:9e:57:30:1f:5d:fa:af:6c:1b:68Signer
Actual PE Digest15:1f:de:b6:f3:56:f1:80:ad:c0:ff:4f:a8:55:41:ad:fa:07:51:b3:2c:1f:9e:57:30:1f:5d:fa:af:6c:1b:68Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
/_/artifacts/obj/System.Security.Principal.Windows/net461-Windows_NT-Release/System.Security.Principal.Windows.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
System.ValueTuple.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:00:ba:6a:36:de:1a:ad:bd:3c:1f:00:00:00:00:00:baCertificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/09/2016, 17:58Not After07/09/2018, 17:58SubjectCN=Microsoft Time-Stamp Service,OU=AOC+OU=nCipher DSE ESN:F6FF-2DA7-BB75,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:79:7c:2e:57:4e:52:e1:ca:d6:00:01:00:00:01:79Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:11Not After11/08/2018, 20:11SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:c4:e9:89:f8:7a:81:50:e9:ff:00:00:00:00:00:c4Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:20Not After11/08/2018, 20:20SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
b5:f7:dc:6e:a3:44:06:87:6b:2d:53:8d:56:b5:d6:e7:39:dd:cc:c3:a5:39:d3:a3:fe:47:82:a0:6d:68:65:bdSigner
Actual PE Digestb5:f7:dc:6e:a3:44:06:87:6b:2d:53:8d:56:b5:d6:e7:39:dd:cc:c3:a5:39:d3:a3:fe:47:82:a0:6d:68:65:bdDigest Algorithmsha256PE Digest Matchestrue0f:84:b3:92:ab:c7:bc:13:73:70:a1:ea:99:ad:92:f8:93:78:19:acSigner
Actual PE Digest0f:84:b3:92:ab:c7:bc:13:73:70:a1:ea:99:ad:92:f8:93:78:19:acDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
E:\A\_work\39\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.ValueTuple\netfx\System.ValueTuple.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
System.Windows.Interactivity.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:00:9d:1e:8d:27:ae:b8:f3:d8:38:00:01:00:00:00:9dCertificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/09/2012, 21:42Not After04/03/2013, 21:42SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:02:8e:42:00:00:00:00:00:1fCertificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before09/01/2012, 22:25Not After09/04/2013, 22:25SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:F528-3777-8A76,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:08:e2:79:fa:0d:25:58:45:ea:00:00:00:00:00:08Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/07/2012, 00:14Not After07/10/2013, 00:14SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
3e:ee:d8:f6:58:e3:82:0a:29:a6:0d:4d:da:4f:ed:6b:c4:34:50:1b:a8:8c:42:82:1a:79:91:a0:3a:90:87:f2Signer
Actual PE Digest3e:ee:d8:f6:58:e3:82:0a:29:a6:0d:4d:da:4f:ed:6b:c4:34:50:1b:a8:8c:42:82:1a:79:91:a0:3a:90:87:f2Digest Algorithmsha256PE Digest Matchestrue12:e5:b0:a2:ba:03:46:7f:56:92:05:89:ed:0e:65:b2:33:e9:07:1fSigner
Actual PE Digest12:e5:b0:a2:ba:03:46:7f:56:92:05:89:ed:0e:65:b2:33:e9:07:1fDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
d:\ExprUpdate2\Blend\SDK\BlendWPFSDK\Build\Intermediate\Release\Libraries\System.Windows.Interactivity\System.Windows.Interactivity.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
dnlib.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\a\dnlib\dnlib\src\obj\Release\net45\dnlib.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
discord-stealer-token-grabber-main/discordAIO6/Resources/d1.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/d2.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/d3.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/d4.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/daioRPC2.ico
-
discord-stealer-token-grabber-main/discordAIO6/Resources/none.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/none2.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/none3.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/none4.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/overlay.png.png
-
discord-stealer-token-grabber-main/discordAIO6/Resources/stub.txt.js
-
discord-stealer-token-grabber-main/discordAIO6/app.manifest
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/DiscordRPC.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/GPUCache/data_0
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/GPUCache/data_1
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/GPUCache/data_2
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/GPUCache/data_3
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/GPUCache/index
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/ICSharpCode.SharpZipLib.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Leaf.xNet.xml.js .xml polyglot
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.AspNetCore.WebUtilities.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.Bcl.AsyncInterfaces.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.Extensions.DependencyInjection.Abstractions.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.Extensions.Logging.Abstractions.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.Extensions.Logging.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.Extensions.Options.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.Extensions.Primitives.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Microsoft.Net.Http.Headers.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/Newtonsoft.Json.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/ScintillaNET.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/System.Buffers.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/System.Diagnostics.DiagnosticSource.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/System.Runtime.CompilerServices.Unsafe.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/System.Text.Encodings.Web.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/System.Threading.Tasks.Extensions.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/debug.log
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/discordAIO6.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\danio\Desktop\discordAIO6\discordAIO6\obj\Debug\discordAIO6.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/discordAIO6.exe.config
-
discord-stealer-token-grabber-main/discordAIO6/bin/Debug/discordAIO6.pdb
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/DiscordRPC.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/ICSharpCode.SharpZipLib.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Leaf.xNet.xml.js .xml polyglot
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.AspNetCore.WebUtilities.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.Bcl.AsyncInterfaces.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.Extensions.DependencyInjection.Abstractions.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.Extensions.Logging.Abstractions.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.Extensions.Logging.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.Extensions.Options.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.Extensions.Primitives.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Microsoft.Net.Http.Headers.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/Newtonsoft.Json.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/ScintillaNET.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/System.Buffers.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/System.Diagnostics.DiagnosticSource.xml.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/System.Runtime.CompilerServices.Unsafe.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/System.Text.Encodings.Web.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/System.Threading.Tasks.Extensions.xml
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/discordAIO6.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\danio\Desktop\discordAIO6\discordAIO6\obj\Release\discordAIO6.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/discordAIO6.exe.config
-
discord-stealer-token-grabber-main/discordAIO6/bin/Release/discordAIO6.pdb
-
discord-stealer-token-grabber-main/discordAIO6/compiler.cs.js
-
discord-stealer-token-grabber-main/discordAIO6/dAIOmain.Designer.cs
-
discord-stealer-token-grabber-main/discordAIO6/dAIOmain.cs
-
discord-stealer-token-grabber-main/discordAIO6/dAIOmain.resx.vbs
-
discord-stealer-token-grabber-main/discordAIO6/daioRPC2.ico
-
discord-stealer-token-grabber-main/discordAIO6/discordAIO6.csproj
-
discord-stealer-token-grabber-main/discordAIO6/notify.Designer.cs
-
discord-stealer-token-grabber-main/discordAIO6/notify.cs
-
discord-stealer-token-grabber-main/discordAIO6/notify.resx.vbs
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/066B9BCBAADE014D100E8077124EE6152B233615.costura.webdriver.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/0E149EB65AF9E3E3B1B95E67B133F6082683AA62.costura.cefsharp.core.runtime.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/14222EECD336E0F21E818A20E062166984F40226.costura.cefsharp.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/2764EC5A271D02B546F73887047245052D29041C.costura.system.text.encodings.web.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/37EFAACD2BBF7AF0545C0C4A55162787CF97CB14.costura.microsoft.aspnetcore.webutilities.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/4E850A0516AE47195DFF08A8E26472199BD79DF4.costura.microsoft.net.http.headers.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/59E72F7CDCDA5807FF710389EE4A5AC5F6231373.costura.microsoft.extensions.options.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/5FC3298F21B4F278E59FE65FF225F96DB7F5F4A3.costura.cefsharp.core.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/6C6000A5EAF8579850AB82A89BD6268776EB51AD.costura.costura.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/6E0B5EECE834578B2EA108EBC3ED54CEDF011E72.costura.microsoft.extensions.logging.abstractions.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/70ED8EE6630E547125267DFB19FD2B14A0875EA6.costura.microsoft.extensions.dependencyinjection.abstractions.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/750F67618DDB7FC876CECCCD76534C3ECBD81609.costura.cefsharp.core.runtime.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/78D398E998B8841460F4BABF410380DE04BFF3F7.costura.cefsharp.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/797D83BFE6A654FE21916806E6CA7BCBB3B4C3FB.costura.icsharpcode.sharpziplib.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/79A73A170BA0596D8E84A432DD2CAA2FAF831BEE.costura.system.threading.tasks.extensions.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/7D8264BE4FCB17F81ACB8B1ADD980CD96A6FD856.costura.microsoft.bcl.asyncinterfaces.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/7E0567258F9D4BE9D0F775BD6C7C295D7B79A86B.costura.openqa.selenium.winium.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/7E7FC6BE5B8DDC4AC9B2A2CB8656FB98EEDCEBCD.costura.webdriver.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/85DC92EDD4B0049ED9049E075C4DEF8A3D64E43B.costura.system.diagnostics.diagnosticsource.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/89662FED195D7B9D65AB7BA8605A3CD953F2B06A.costura.leaf.xnet.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/8D041480B1D1370FC87ADCFFF86BFC5C0E967AB6.costura.microsoft.extensions.logging.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/9435978CC7CD5FFBBFD8AB9E2FD02ED28D0E7124.costura.cefsharp.winforms.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/9ADCF4E692A3DB27DF7695D4A4002B16FB0FE102.costura.cefsharp.winforms.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/A3EAE555D827EAF78AFBBA4D9FFDC59E1E4112B7.costura.microsoft.edge.seleniumtools.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/B23C26AA1739D02BA4216CC5B80A47FD1251AB41.costura.system.runtime.compilerservices.unsafe.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/B6606F6BEB39A2F1645E20996307C21DB1C569FA.costura.microsoft.extensions.primitives.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/C4A79AE06E8BE9E5B776DF376130CCA4A6AE24AF.costura.discordrpc.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/CBC510520FCD85DBC1C82B02E82040702ACA9B79.costura.newtonsoft.json.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/DED91B510E7F9CB25FC0E5D8F5337D9F2F95EDCE.costura.openqa.selenium.winium.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/E523519ECE3200133C5077993920D14D436B8484.costura.system.buffers.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/E70E10A18A3AE85CD1CA9BE66A7BB46D99CCCCD3.costura.discordrpc.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/EDF2AB9EE284FA21DBB55E93D082848E800F068B.costura.icsharpcode.sharpziplib.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/F0CD8253B7E64157D39A8DC5FEB8CF7BDA7E8DAE.costura.scintillanet.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/F1EDB00EFA620DE8F2872AFC57C0B6206D6948C1.costura.cefsharp.core.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/Costura/F1F25C01F6ACF33BDD62C4F82D3EF078E76F0906.costura.costura.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/DesignTimeResolveAssemblyReferences.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/DesignTimeResolveAssemblyReferencesInput.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/TempPE/Properties.Resources.Designer.cs.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.Properties.Resources.resources
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.csproj.AssemblyReference.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.csproj.CoreCompileInputs.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.csproj.FileListAbsolute.txt
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.csproj.Fody.CopyLocal.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.csproj.GenerateResource.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.dAIOmain.resources
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\danio\Desktop\discordAIO6\discordAIO6\obj\Debug\discordAIO6.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 5.8MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.notify.resources
-
discord-stealer-token-grabber-main/discordAIO6/obj/Debug/discordAIO6.pdb
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/6C6000A5EAF8579850AB82A89BD6268776EB51AD.costura.costura.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/85DC92EDD4B0049ED9049E075C4DEF8A3D64E43B.costura.system.diagnostics.diagnosticsource.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/89662FED195D7B9D65AB7BA8605A3CD953F2B06A.costura.leaf.xnet.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/C4A79AE06E8BE9E5B776DF376130CCA4A6AE24AF.costura.discordrpc.pdb.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/CBC510520FCD85DBC1C82B02E82040702ACA9B79.costura.newtonsoft.json.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/E70E10A18A3AE85CD1CA9BE66A7BB46D99CCCCD3.costura.discordrpc.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/F0CD8253B7E64157D39A8DC5FEB8CF7BDA7E8DAE.costura.scintillanet.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/Costura/F1F25C01F6ACF33BDD62C4F82D3EF078E76F0906.costura.costura.dll.compressed.compressed
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.Properties.Resources.resources
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.csproj.AssemblyReference.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.csproj.CoreCompileInputs.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.csproj.FileListAbsolute.txt
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.csproj.Fody.CopyLocal.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.csproj.GenerateResource.cache
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.dAIOmain.resources
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\danio\Desktop\discordAIO6\discordAIO6\obj\Release\discordAIO6.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 5.8MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.notify.resources
-
discord-stealer-token-grabber-main/discordAIO6/obj/Release/discordAIO6.pdb
-
discord-stealer-token-grabber-main/discordAIO6/packages.config
-
discord-stealer-token-grabber-main/discordAIO6/randInfo.cs