C:\src\cecil\symbols\mdb\obj\Release\net40\Mono.Cecil.Mdb.pdb
Overview
overview
10Static
static
10RedLine St...er.exe
windows7-x64
6RedLine St...er.exe
windows10-2004-x64
6RedLine St...db.dll
windows7-x64
1RedLine St...db.dll
windows10-2004-x64
1RedLine St...db.dll
windows7-x64
1RedLine St...db.dll
windows10-2004-x64
1RedLine St...ks.dll
windows7-x64
1RedLine St...ks.dll
windows10-2004-x64
1RedLine St...il.dll
windows7-x64
1RedLine St...il.dll
windows10-2004-x64
1RedLine St...ub.exe
windows7-x64
10RedLine St...ub.exe
windows10-2004-x64
10RedLine St...CF.dll
windows7-x64
1RedLine St...CF.dll
windows10-2004-x64
1RedLine St...om.exe
windows7-x64
3RedLine St...om.exe
windows10-2004-x64
3RedLine St...er.exe
windows7-x64
4RedLine St...er.exe
windows10-2004-x64
4RedLine St...).docx
windows7-x64
4RedLine St...).docx
windows10-2004-x64
1RedLine St...).docx
windows7-x64
4RedLine St...).docx
windows10-2004-x64
1RedLine St...el.exe
windows7-x64
10RedLine St...el.exe
windows10-2004-x64
10RedLine St...me.exe
windows7-x64
6RedLine St...me.exe
windows10-2004-x64
6RedLine St...48.exe
windows7-x64
7RedLine St...48.exe
windows10-2004-x64
7RedLine St...ar.exe
windows7-x64
1RedLine St...ar.exe
windows10-2004-x64
1RedLine St...da.exe
windows7-x64
9RedLine St...da.exe
windows10-2004-x64
9Behavioral task
behavioral1
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Kurome.Builder.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Kurome.Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Mdb.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Mdb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Pdb.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Pdb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Rocks.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Rocks.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/stub.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/stub.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/Kurome.WCF.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/Kurome.WCF.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/dr-farfar.com.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/dr-farfar.com.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Loader/Kurome.Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Loader/Kurome.Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/FAQ (English).docx
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/FAQ (English).docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/FAQ(RUS).docx
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/FAQ(RUS).docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Panel/Panel.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Panel/Panel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/Chrome.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/Chrome.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/NetFramework48.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/NetFramework48.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/WinRar.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/WinRar.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
RedLine Stealer V20.2 CRACKED/Themida/Themida.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
RedLine Stealer V20.2 CRACKED/Themida/Themida.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_49b72743681e7a6aaf7750fe6389c416a22101624b6b5fd9dbe9788faf0dace5
-
Size
67.8MB
-
MD5
0010ad9c257e03162e8319ca88c6c65b
-
SHA1
0d4ac42550ca4f34349a24dfe84bb3aa3d7d7e44
-
SHA256
49b72743681e7a6aaf7750fe6389c416a22101624b6b5fd9dbe9788faf0dace5
-
SHA512
76f3adf72dfbaed0392dccec0e206aa0034eae5350d61f49f38c2f866172ae736b299d0009ca16fb90744fddf158f654e92c6f82e53939d7a295c271e1f808ef
-
SSDEEP
1572864:hqe1UJUU5rG7A2X95pxTBplRI7s0gcoES20Nci8EgMr:qmi8A27/o7sbEmNci8E
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule static1/unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/stub.dll family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule static1/unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/stub.dll family_sectoprat -
Sectoprat family
-
Unsigned PE 21 IoCs
Checks for missing Authenticode signature.
resource unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Kurome.Builder.exe unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Mdb.dll unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Pdb.dll unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Rocks.dll unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.dll unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/stub.dll unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/Kurome.WCF.dll unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/dr-farfar.com.exe unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Loader/Kurome.Loader.exe unpack001/RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Panel/Panel.exe unpack001/RedLine Stealer V20.2 CRACKED/Themida/Themida.exe unpack001/RedLine Stealer V20.2 CRACKED/Themida/Themida64.exe unpack001/RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.dll unpack001/RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.dll unpack001/RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/TestPlugin.dll unpack001/RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Visual Basic/Vb6NoOpt.bak unpack001/RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/SecureEngineSDK32.dll unpack001/RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/SecureEngineSDK64.dll unpack001/RedLine Stealer V20.2 CRACKED/Themida/WinlicenseSDK.dll unpack001/RedLine Stealer V20.2 CRACKED/Themida/demangler.dll unpack001/RedLine Stealer V20.2 CRACKED/Themida/libspv.dll
Files
-
JaffaCakes118_49b72743681e7a6aaf7750fe6389c416a22101624b6b5fd9dbe9788faf0dace5.7z
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Kurome.Builder.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 471KB - Virtual size: 470KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Kurome.Builder.exe.config
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Kurome.Builder.pdb
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Mdb.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Mdb.pdb
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Pdb.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\src\cecil\symbols\pdb\obj\Release\net40\Mono.Cecil.Pdb.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Pdb.pdb
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Rocks.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\src\cecil\rocks\obj\Release\net40\Mono.Cecil.Rocks.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.Rocks.pdb
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\src\cecil\obj\Release\net40\Mono.Cecil.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/Mono.Cecil.pdb
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Builder/stub.dll.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/Kurome.WCF.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Kurome.WCF.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/Kurome.WCF.dll.config
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/dr-farfar.com.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Kurome.Host.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Host/dr-farfar.com.exe.config
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Loader/Kurome.Loader.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Kurome.Loader.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Kurome.Loader/Kurome.Loader.exe.config.xml
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/FAQ (English).docx.docx office2007
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/FAQ(RUS).docx.docx office2007
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/FAQ.txt
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Panel/Panel.exe.exe windows:4 windows x64 arch:x64
ff0093a37f82601d29534d94095923e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetEnvironmentVariableA
lstrcmpiW
SetLastError
HeapFree
GetProcessHeap
HeapReAlloc
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
GetUserDefaultUILanguage
FindResourceExA
CompareStringW
GetCurrentProcessId
CloseHandle
SetEvent
GetLastError
WaitForSingleObject
CompareStringA
lstrcpyW
GetSystemTimeAsFileTime
FindFirstFileW
FindClose
lstrcatW
FormatMessageA
WriteFile
SetFileTime
GetModuleFileNameW
ReadFile
CreateFileA
IsBadReadPtr
CreateEventA
GetModuleFileNameA
SetFilePointer
GetCurrentProcess
GetWindowsDirectoryA
GetVolumeInformationA
FlushInstructionCache
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
IsBadWritePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetFileType
SetHandleCount
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetCPInfo
RtlVirtualUnwind
HeapCreate
HeapSetInformation
GetStdHandle
FlsAlloc
TlsSetValue
GetCurrentThreadId
FlsFree
TlsFree
FlsSetValue
FlsGetValue
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
GetStartupInfoW
RtlCaptureContext
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemInfo
VirtualAlloc
CreateThread
ResumeThread
ExitThread
GetThreadLocale
GetLocaleInfoA
GetACP
HeapSize
HeapDestroy
GetVersionExA
RaiseException
VirtualProtect
VirtualQuery
lstrcmpiA
Sleep
FreeLibrary
GetTickCount
SetEnvironmentVariableW
WideCharToMultiByte
GetModuleHandleA
lstrlenW
lstrcmpA
MultiByteToWideChar
ExitProcess
LoadLibraryA
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
LockResource
LoadResource
SizeofResource
FindResourceA
lstrcpyA
lstrlenA
user32
UnregisterClassA
TranslateMessage
DrawIcon
DispatchMessageA
LoadIconA
CreateDialogIndirectParamA
SetTimer
EndPaint
KillTimer
DestroyWindow
EndDialog
GetDC
FillRect
GetClientRect
ReleaseDC
SetClassLongA
PtInRect
GetWindowRect
SetCursor
GetWindowLongA
LoadCursorA
GetSystemMetrics
SetWindowLongA
GetParent
GetCursorPos
GetDesktopWindow
LoadStringA
GetMessageA
MapWindowPoints
SetWindowPos
SendMessageA
SetForegroundWindow
ReleaseCapture
PostMessageA
EnableWindow
GetActiveWindow
UpdateWindow
AdjustWindowRectEx
SetWindowLongPtrA
CreateWindowExA
RegisterClassExA
OffsetRect
DefWindowProcA
LoadImageA
ShowWindow
ScreenToClient
TranslateAcceleratorA
SetFocus
GetWindowTextLengthA
DrawFocusRect
SetWindowTextA
DrawTextA
GetWindowTextA
SetCapture
DrawEdge
InvalidateRect
GetClassNameA
GetWindowLongPtrA
CallWindowProcA
PostQuitMessage
TrackMouseEvent
SetActiveWindow
IsDialogMessageA
MessageBoxA
wsprintfA
BeginPaint
gdi32
GetObjectA
SelectObject
GetDIBColorTable
StretchBlt
DeleteObject
CreateDIBSection
TextOutA
CreateCompatibleBitmap
SetBkMode
GetStockObject
SetTextColor
SetDIBColorTable
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
LineTo
DeleteDC
MoveToEx
CreatePen
GetTextExtentPointA
BitBlt
advapi32
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
ole32
CoCreateInstance
CoInitializeEx
CreateStreamOnHGlobal
CoSetProxyBlanket
oleaut32
GetErrorInfo
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
SafeArrayDestroy
SysAllocString
SysFreeString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringLen
VariantInit
VariantClear
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
shlwapi
StrRChrW
gdiplus
GdiplusStartup
GdipFree
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipDeleteGraphics
GdipAlloc
GdipDisposeImage
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageGraphicsContext
GdipCloneImage
GdipBitmapUnlockBits
GdipBitmapLockBits
GdiplusShutdown
GdipDrawImageI
GdipGetImagePaletteSize
GdipGetImageWidth
msimg32
TransparentBlt
AlphaBlend
iphlpapi
GetAdaptersInfo
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 423KB - Virtual size: 422KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Panel/Panel.exe.config
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Panel/chromeBrowsers.txt
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Panel/geckoBrowsers.txt
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/Chrome.exe.exe windows:5 windows x86 arch:x86
0ffb0c1b03081ee555711ca0c1201c9d
Code Sign
47:97:4d:78:73:a5:bc:ab:0d:2f:b3:70:19:2f:ce:5eCertificate
IssuerCN=thawte Primary Root CA,OU=Certification Services Division+OU=(c) 2006 thawte\, Inc. - For authorized use only,O=thawte\, Inc.,C=USNot Before08-02-2010 00:00Not After07-02-2020 23:59SubjectCN=Thawte Code Signing CA - G2,O=Thawte\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
14:f8:fd:d1:67:f9:24:02:b1:57:0b:5d:c4:95:c8:15Certificate
IssuerCN=Thawte Code Signing CA - G2,O=Thawte\, Inc.,C=USNot Before29-11-2016 00:00Not After21-11-2019 23:59SubjectCN=Google Inc,O=Google Inc,L=Mountain View,ST=California,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
03:01:9a:02:3a:ff:58:b1:6b:d6:d5:ea:e6:17:f0:66Certificate
IssuerCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before22-10-2014 00:00Not After22-10-2024 00:00SubjectCN=DigiCert Timestamp Responder,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
06:fd:f9:03:96:03:ad:ea:00:0a:eb:3f:27:bb:ba:1bCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before10-11-2006 00:00Not After10-11-2021 00:00SubjectCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
01Certificate
IssuerCN=Unknown issuerNot Before01-01-2013 10:00Not After01-04-2013 10:00SubjectCN=Dummy certificateExtended Key Usages
Key Usages
KeyUsageCertSign
0c:15:be:4a:15:bb:09:03:c9:01:b1:d6:c2:65:30:2fCertificate
IssuerCN=DigiCert SHA2 Assured ID Code Signing CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before07-11-2018 00:00Not After17-11-2021 12:00SubjectCN=Google LLC,O=Google LLC,L=Mountain View,ST=ca,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
04:09:18:1b:5f:d5:bb:66:75:53:43:b5:6f:95:50:08Certificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before22-10-2013 12:00Not After22-10-2028 12:00SubjectCN=DigiCert SHA2 Assured ID Code Signing CA,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
09:c0:fc:46:c8:04:42:13:b5:59:8b:af:28:4f:4e:41Certificate
IssuerCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before04-01-2017 00:00Not After18-01-2028 00:00SubjectCN=DigiCert SHA2 Timestamp Responder,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
0a:a1:25:d6:d6:32:1b:7e:41:e4:05:da:36:97:c2:15Certificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before07-01-2016 12:00Not After07-01-2031 12:00SubjectCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
a1:22:2a:27:33:34:02:ba:14:55:24:64:ab:8b:8c:4c:a6:63:00:97:b7:c7:12:a3:e6:9f:ff:78:0a:6b:54:bdSigner
Actual PE Digesta1:22:2a:27:33:34:02:ba:14:55:24:64:ab:8b:8c:4c:a6:63:00:97:b7:c7:12:a3:e6:9f:ff:78:0a:6b:54:bdDigest Algorithmsha256PE Digest Matchestruede:c9:1f:ac:a1:0c:4b:be:20:88:a0:3e:0e:d2:66:30:72:52:13:16Signer
Actual PE Digestde:c9:1f:ac:a1:0c:4b:be:20:88:a0:3e:0e:d2:66:30:72:52:13:16Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
mi_exe_stub.pdb
Imports
kernel32
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
OutputDebugStringW
CloseHandle
HeapAlloc
HeapFree
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
GetExitCodeProcess
CreateProcessW
WaitForSingleObject
SetFilePointer
CreateDirectoryW
SizeofResource
RemoveDirectoryW
GetTempPathW
FormatMessageW
LockResource
DeleteFileW
FindResourceExW
LoadResource
FindResourceW
HeapDestroy
LocalFree
VerSetConditionMask
CopyFileW
VerifyVersionInfoW
GetTempFileNameW
lstrcmpiW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
VirtualQuery
ReadFile
shlwapi
PathQuoteSpacesW
PathAppendW
ole32
CoUninitialize
CoInitializeEx
shell32
SHGetFolderPathW
ord680
user32
MessageBoxW
CharLowerBuffW
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 985KB - Virtual size: 985KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/NetFramework48.exe.exe windows:5 windows x86 arch:x86
9b2f6a441f9ff8df98ae6e9e6b5d4271
Code Sign
33:00:00:01:b1:dd:ed:ba:54:e9:65:b8:5f:00:01:00:00:01:b1Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before12-07-2018 20:11Not After26-07-2019 20:11SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
33:00:00:00:f8:97:e7:60:fb:03:a3:90:c1:00:00:00:00:00:f8Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before23-08-2018 20:20Not After23-11-2019 20:20SubjectCN=Microsoft Time-Stamp Service,OU=Microsoft Operations Puerto Rico+OU=Thales TSS ESN:C0F4-3086-DEF8,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31-08-2010 22:19Not After31-08-2020 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03-04-2007 12:53Not After03-04-2021 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:01:03:5e:25:1c:99:1f:a3:1e:b8:00:00:00:00:01:03Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before12-07-2018 20:08Not After26-07-2019 20:08SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08-07-2011 20:59Not After08-07-2026 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
d0:c4:14:71:51:60:46:e6:05:3a:14:69:74:84:56:eb:85:52:ba:7d:9a:70:b1:7c:1c:b8:b6:77:ee:73:0a:4dSigner
Actual PE Digestd0:c4:14:71:51:60:46:e6:05:3a:14:69:74:84:56:eb:85:52:ba:7d:9a:70:b1:7c:1c:b8:b6:77:ee:73:0a:4dDigest Algorithmsha256PE Digest Matchestruef0:3e:80:e5:63:5b:c3:18:22:45:35:62:7c:4b:b2:90:ef:bb:7a:baSigner
Actual PE Digestf0:3e:80:e5:63:5b:c3:18:22:45:35:62:7c:4b:b2:90:ef:bb:7a:baDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\NetFXDev1\binaries\x86ret\bin\i386\VSSetup\Utils\boxstub.pdb
Imports
advapi32
CreateWellKnownSid
InitializeSecurityDescriptor
SetEntriesInAclW
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
DecryptFileW
kernel32
GetTickCount
SetEnvironmentVariableW
GetLastError
ExpandEnvironmentStringsW
CreateProcessW
Sleep
WaitForSingleObject
GetExitCodeProcess
CloseHandle
SetFileAttributesW
InitializeCriticalSection
CreateEventW
GetEnvironmentVariableW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetCommandLineW
lstrlenW
CompareStringW
LocalFree
CreateDirectoryW
QueryDosDeviceW
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
GetDriveTypeW
CreateFileW
DeviceIoControl
SetErrorMode
RemoveDirectoryW
MoveFileExW
GetProcAddress
GetSystemDirectoryW
LoadLibraryW
GetModuleHandleW
CreateThread
LocalAlloc
RaiseException
ExitThread
WaitForMultipleObjects
ResetEvent
CreateEventA
GetSystemInfo
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetModuleHandleA
GetVersionExA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetEndOfFile
DuplicateHandle
ReadFile
SetFilePointerEx
GlobalFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
LCMapStringW
FreeLibrary
InterlockedExchange
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
GetStringTypeW
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
SetStdHandle
WriteConsoleW
FlushFileBuffers
CreateFileA
GetLocalTime
GetComputerNameW
lstrlenA
FormatMessageW
GetSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
DeleteFileW
GetFileAttributesW
FindFirstFileW
FindNextFileW
FindClose
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcessHeap
GlobalAlloc
LoadLibraryA
comctl32
ord17
rpcrt4
UuidToStringW
UuidCreate
RpcStringFreeW
shell32
CommandLineToArgvW
SHBrowseForFolderW
SHGetPathFromIDListW
shlwapi
PathRemoveExtensionW
user32
MessageBoxW
GetTopWindow
GetWindowThreadProcessId
GetWindow
SendMessageW
PostMessageW
DialogBoxParamW
GetDlgItem
SetWindowTextW
EndDialog
PostQuitMessage
LoadStringW
SetWindowLongW
GetWindowLongW
CharUpperW
oleaut32
SysAllocString
VariantClear
Exports
Exports
?dwPlaceholder@@3PAEA
_DecodePointerInternal@4
_EncodePointerInternal@4
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.boxld01 Size: 512B - Virtual size: 182B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/Panel/RedLine_20_2/Tools/WinRar.exe.exe windows:5 windows x64 arch:x64
629fae0a56e3262e208711dda6ae6b1d
Code Sign
7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21-12-2012 00:00Not After30-12-2020 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18-10-2012 00:00Not After29-12-2020 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
52:9e:3f:9f:cf:7d:58:d5:20:d6:07:ab:74:39:50:02Certificate
IssuerCN=COMODO RSA Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before02-06-2017 00:00Not After01-06-2020 23:59SubjectCN=win.rar GmbH,O=win.rar GmbH,POSTALCODE=10117,STREET=Marienstrasse 12,L=Berlin,ST=Berlin,C=DEExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
27:66:ee:56:eb:49:f3:8e:ab:d7:70:a2:fc:84:de:22Certificate
IssuerCN=AddTrust External CA Root,OU=AddTrust External TTP Network,O=AddTrust AB,C=SENot Before30-05-2000 10:48Not After30-05-2020 10:48SubjectCN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
2e:7c:87:cc:0e:93:4a:52:fe:94:fd:1c:b7:cd:34:afCertificate
IssuerCN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before09-05-2013 00:00Not After08-05-2028 23:59SubjectCN=COMODO RSA Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
52:9e:3f:9f:cf:7d:58:d5:20:d6:07:ab:74:39:50:02Certificate
IssuerCN=COMODO RSA Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before02-06-2017 00:00Not After01-06-2020 23:59SubjectCN=win.rar GmbH,O=win.rar GmbH,POSTALCODE=10117,STREET=Marienstrasse 12,L=Berlin,ST=Berlin,C=DEExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
27:66:ee:56:eb:49:f3:8e:ab:d7:70:a2:fc:84:de:22Certificate
IssuerCN=AddTrust External CA Root,OU=AddTrust External TTP Network,O=AddTrust AB,C=SENot Before30-05-2000 10:48Not After30-05-2020 10:48SubjectCN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
2e:7c:87:cc:0e:93:4a:52:fe:94:fd:1c:b7:cd:34:afCertificate
IssuerCN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before09-05-2013 00:00Not After08-05-2028 23:59SubjectCN=COMODO RSA Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12-01-2016 00:00Not After11-01-2031 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23-12-2017 00:00Not After22-03-2029 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
ca:05:77:9a:83:94:f1:c2:84:3b:d1:35:92:02:9e:08:73:69:34:94:e8:62:49:32:6d:ca:10:c8:55:9e:d9:9bSigner
Actual PE Digestca:05:77:9a:83:94:f1:c2:84:3b:d1:35:92:02:9e:08:73:69:34:94:e8:62:49:32:6d:ca:10:c8:55:9e:d9:9bDigest Algorithmsha256PE Digest Matchestrueed:14:78:6d:47:d9:55:27:5a:d1:dd:f1:22:3e:ed:fc:47:98:f7:f9Signer
Actual PE Digested:14:78:6d:47:d9:55:27:5a:d1:dd:f1:22:3e:ed:fc:47:98:f7:f9Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb
Imports
kernel32
GetLastError
SetLastError
GetCurrentProcess
DeviceIoControl
SetFileTime
CloseHandle
CreateDirectoryW
RemoveDirectoryW
CreateFileW
DeleteFileW
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
MoveFileW
GetFileType
GetStdHandle
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
FindNextFileW
GetVersionExW
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
GetModuleFileNameW
GetModuleHandleW
FindResourceW
FreeLibrary
GetProcAddress
GetCurrentProcessId
ExitProcess
SetThreadExecutionState
Sleep
LoadLibraryW
GetSystemDirectoryW
CompareStringW
AllocConsole
FreeConsole
AttachConsole
WriteConsoleW
GetProcessAffinityMask
CreateThread
SetThreadPriority
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventW
CreateSemaphoreW
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GetTickCount
LockResource
GlobalLock
GlobalUnlock
GlobalFree
LoadResource
SizeofResource
SetCurrentDirectoryW
GetExitCodeProcess
GetLocalTime
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetCommandLineW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetTempPathW
MoveFileExW
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
GetNumberFormatW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
QueryPerformanceFrequency
TerminateProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
HeapReAlloc
GetStringTypeW
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
gdiplus
GdiplusShutdown
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GdipDisposeImage
GdipCloneImage
GdipFree
GdipAlloc
Sections
.text Size: 203KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 152KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/RedLine_21_1_crack/ReadMe.txt
-
RedLine Stealer V20.2 CRACKED/Themida/LICENSE.TXT
-
RedLine Stealer V20.2 CRACKED/Themida/TMLicenseA1.dat
-
RedLine Stealer V20.2 CRACKED/Themida/Themida.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
Sections
Size: 5.5MB - Virtual size: 15.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 15KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 71KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 39KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1011B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 142B - Virtual size: 179B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 92B - Virtual size: 93B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 733KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 3.1MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.exports Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 23.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 17.0MB - Virtual size: 17.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
.taggant Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/Themida.ini
-
RedLine Stealer V20.2 CRACKED/Themida/Themida64.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
Sections
Size: 5.5MB - Virtual size: 15.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 15KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 71KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 39KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1011B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 142B - Virtual size: 179B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 92B - Virtual size: 93B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 733KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 3.1MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.exports Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 23.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 17.0MB - Virtual size: 17.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
.taggant Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaGuiSettings.ini
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaHelp.chm.chm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.dll.dll windows:5 windows x86 arch:x86
495a630d3f51271d065fe43464b32a56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
X:\Problematic Apps\Benjamin\Problem 2\C\Debug\TestPlugin.pdb
Imports
user32
MessageBoxA
kernel32
GetEnvironmentStringsW
IsProcessorFeaturePresent
GetCurrentThreadId
DecodePointer
GetCommandLineA
RaiseException
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetLastError
InterlockedDecrement
GetCurrentThread
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
HeapAlloc
GetProcessHeap
GetModuleFileNameW
VirtualQuery
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
SetConsoleCtrlHandler
InterlockedExchange
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
WriteFile
RtlUnwind
LCMapStringW
GetStringTypeW
HeapSize
Exports
Exports
_SecureEngineFinalize@0
_SecureEngineGetEncryptionKey@8
_SecureEngineInitialize@0
_SecureEngineShowCustomMessageA@8
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.exp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.ilk
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.lib
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/Debug/TestPlugin.pdb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin.sln
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin.suo
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin/TestPlugin.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin/TestPlugin.vcproj.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin/TestPlugin.vcxproj
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin/stdafx.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin/stdafx.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.dll.dll windows:5 windows x64 arch:x64
b40181f3c6a466635a4a737ec1a5f37b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
X:\Problematic Apps\Benjamin\Problem 2\C\x64\Debug\TestPlugin.pdb
Imports
user32
MessageBoxA
kernel32
GetTickCount
HeapSize
GetCurrentThreadId
FlsSetValue
GetCommandLineA
RtlUnwindEx
EncodePointer
FlsGetValue
FlsFree
SetLastError
GetLastError
GetCurrentThread
FlsAlloc
HeapFree
Sleep
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
IsDebuggerPresent
MultiByteToWideChar
lstrlenA
LoadLibraryW
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameW
GetProcessHeap
VirtualQuery
LCMapStringW
GetStringTypeW
Exports
Exports
SecureEngineFinalize
SecureEngineGetEncryptionKey
SecureEngineInitialize
SecureEngineShowCustomMessageA
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 738B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.exp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.ilk
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.lib
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/C/x64/Debug/TestPlugin.pdb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/TestPlugin.dll.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
SecureEngineFinalize
SecureEngineGetEncryptionKey
SecureEngineInitialize
SecureEngineShowCustomMessageA
madTraceProcess
Sections
CODE Size: 688KB - Virtual size: 687KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 7KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 225B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/TestPlugin.dpr
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/TestPlugin.res
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/Unit1.ddp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/Unit1.dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/Unit1.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Include/C/CustomMessagesConstantsDefinitions.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Plugins/Include/Delphi/CustomMessagesConstantsDefinitions.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.bpr.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.cpp.js
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.obj
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.res
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.ddp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.obj
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.~cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.~ddp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.~dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Unit1.~h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/StdAfx.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/StdAfx.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/UpgradeLog.XML.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/UpgradeLog2.XML.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/resource.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/small.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.aps
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.dsp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.dsw
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.plg.html
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.rc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.res
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.sln
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.sln.old
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.suo
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.suo.old
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.vcproj.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.vcproj.7.10.old.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.vcxproj
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.vcxproj.filters
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.vcxproj.user
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/Project1.cfg
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/Project1.dpr
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/Project1_Icon.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/SecureEngineSDK.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/SecureEngineSDK_CustomVMsImplementation.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/SecureEngineSDK_CustomVMsInterface.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/Unit1.dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Functions/Unit1.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Inline Assembly/Project1.cfg
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Inline Assembly/Project1.dpr
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Inline Assembly/Project1_Icon.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Inline Assembly/Unit1.dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Delphi/Via Inline Assembly/Unit1.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/PureBasic/ThemidaSDKMacros.pbi
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/PureBasic/example.pb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Assembly/Example.asm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Assembly/MAKEFILE
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Project1.bpr.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Project1.cpp.js
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Project1.res
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Unit1.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Unit1.ddp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Unit1.dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Unit1.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/StdAfx.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/StdAfx.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/resource.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/small.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.dsp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.dsw
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.rc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.res
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.sln
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.sln.old
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.suo
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.vcproj.xml
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.vcxproj
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.vcxproj.filters
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.vcxproj.user
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/StdAfx.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/StdAfx.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/resource.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/small.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.aps
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.cpp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.dsp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.dsw
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.rc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.res
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.sln
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.suo
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++/vc_example.vcxproj
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/Project1.dpr
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/Project1.res
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/Project1_Icon.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/SecureEngineSDK.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/SecureEngineSDK_CustomVMsImplementation.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/SecureEngineSDK_CustomVMsInterface.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/Unit1.dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Functions/Unit1.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/Project1.dpr
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/Project1_Icon.ico
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/Unit1.dfm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/Unit1.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/VM_FISH_RED_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/VM_FISH_RED_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/VM_FISH_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/VM_FISH_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/VM_TIGER_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Delphi/Via Inline Assembly/VM_TIGER_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Golang/main.go
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Golang/readme.txt
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/PureBasic/ThemidaSDK.pbi
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/PureBasic/example.pb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/PureBasic/x64/MacrosExample.pb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/PureBasic/x64/SecureEngineMacrosX64.pb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Visual Basic/Form1.frm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Visual Basic/Project1.vbp
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Visual Basic/Project1.vbw
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Visual Basic/Settings.log
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/ExamplesSDK/Protection Macros/Visual Basic/Vb6NoOpt.bak.exe windows:4 windows x86 arch:x86
f3f8180173763f2738502b414e6a3a17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaFreeVarList
_adj_fdiv_m64
_adj_fprem1
__vbaHresultCheckObj
_adj_fdiv_m32
ord595
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
ord644
_CIlog
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarDup
_CIatan
_allmul
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Assembly/SecureEngineCustomVMs_fasm32.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Assembly/SecureEngineCustomVMs_fasm64.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Assembly/SecureEngineCustomVMs_masm32.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Assembly/SecureEngineCustomVMs_masm64.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Assembly/ThemidaSDK_masm.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/Readme.txt
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/SecureEngineCustomVMs.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/SecureEngineCustomVMs_BorlandC_inline.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/SecureEngineCustomVMs_GNU_inline.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/SecureEngineCustomVMs_ICL_inline.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/SecureEngineCustomVMs_LCC_inline.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/SecureEngineCustomVMs_VC_inline.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/ThemidaSDK.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/Via ASM module/How to add ASM files in your Solution.pdf.pdf
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/Via ASM module/Readme.txt
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/Via ASM module/SecureEngineCustomVMsMacros.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/Via ASM module/SecureEngineCustomVmMacros.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/Via ASM module/SecureEngineMacros.asm
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/C/Via ASM module/SecureEngineMacros.h
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/D language/SecureEngineCustomVMs32.d
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/D language/SecureEngineCustomVMs64.d
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/D language/ThemidaSDK.d
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CheckCodeIntegrity_Epilog.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CheckCodeIntegrity_Prolog.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CheckProtection_Epilog.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CheckProtection_Prolog.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CheckVirtualPC_Epilog.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CheckVirtualPC_Prolog.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Clear_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Clear_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CodeReplace_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/CodeReplace_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Encode_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Encode_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Mutate_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Mutate_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Registered_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Registered_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/SecureEngineSDK.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/SecureEngineSDK_CustomVMsImplementation.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/SecureEngineSDK_CustomVMsInterface.pas
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/StrEncryptW_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/StrEncryptW_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/StrEncrypt_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/StrEncrypt_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Unprotected_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/Unprotected_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_DOLPHIN_BLACK_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_DOLPHIN_BLACK_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_DOLPHIN_RED_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_DOLPHIN_RED_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_DOLPHIN_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_DOLPHIN_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_EAGLE_BLACK_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_EAGLE_BLACK_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_EAGLE_RED_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_EAGLE_RED_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_EAGLE_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_EAGLE_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_End.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_FISH_BLACK_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_FISH_BLACK_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_FISH_RED_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_FISH_RED_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_FISH_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_FISH_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_MUTATE_ONLY_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_MUTATE_ONLY_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_PUMA_BLACK_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_PUMA_BLACK_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_PUMA_RED_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_PUMA_RED_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_PUMA_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_PUMA_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_SHARK_BLACK_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_SHARK_BLACK_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_SHARK_RED_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_SHARK_RED_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_SHARK_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_SHARK_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_Start.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_Start_WithLevel.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_TIGER_BLACK_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_TIGER_BLACK_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_TIGER_RED_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_TIGER_RED_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_TIGER_WHITE_END.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Delphi/VM_TIGER_WHITE_START.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Go language/SecureEngineSDK_386.go
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/Go language/SecureEngineSDK_amd64.go
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PowerBasic/SecureEngineCustomVMs32.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PowerBasic/SecureEngineCustomVMs64.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PowerBasic/ThemidaSDK.inc
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PureBasic/Readme.txt
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PureBasic/SecureEngineCustomVMs32.pb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PureBasic/SecureEngineCustomVMs32.pbi
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PureBasic/SecureEngineCustomVMs64.pb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PureBasic/SecureEngineCustomVMs64.pbi
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PureBasic/SecureEngineMacrosX64.pb
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Include/PureBasic/ThemidaSDK.pbi
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Lib/COFF/SecureEngineSDK32.lib
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Lib/COFF/SecureEngineSDK64.lib
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Lib/OMF/SecureEngineSDK32.lib
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/Lib/OMF/SecureEngineSDK64.lib
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/SecureEngineSDK32.dll.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
ClearEnd
ClearStart
CodeReplaceEnd
CodeReplaceStart
CustomVM00000100_End
CustomVM00000100_Start
CustomVM00000101_End
CustomVM00000101_Start
CustomVM00000102_End
CustomVM00000102_Start
CustomVM00000103_End
CustomVM00000103_Start
CustomVM00000104_End
CustomVM00000104_Start
CustomVM00000105_End
CustomVM00000105_Start
CustomVM00000106_End
CustomVM00000106_Start
CustomVM00000107_End
CustomVM00000107_Start
CustomVM00000108_End
CustomVM00000108_Start
CustomVM00000109_End
CustomVM00000109_Start
CustomVM00000110_End
CustomVM00000110_Start
CustomVM00000111_End
CustomVM00000111_Start
CustomVM00000112_End
CustomVM00000112_Start
CustomVM00000113_End
CustomVM00000113_Start
CustomVM00000114_End
CustomVM00000114_Start
CustomVM00000115_End
CustomVM00000115_Start
CustomVM00000116_End
CustomVM00000116_Start
CustomVM00000117_End
CustomVM00000117_Start
CustomVM00000118_End
CustomVM00000118_Start
CustomVM00000119_End
CustomVM00000119_Start
CustomVM00000120_End
CustomVM00000120_Start
CustomVM00000121_End
CustomVM00000121_Start
CustomVM00000122_End
CustomVM00000122_Start
CustomVM00000123_End
CustomVM00000123_Start
CustomVM00000124_End
CustomVM00000124_Start
CustomVM00000125_End
CustomVM00000125_Start
CustomVM00000126_End
CustomVM00000126_Start
CustomVM00000127_End
CustomVM00000127_Start
CustomVM00000128_End
CustomVM00000128_Start
CustomVM00000129_End
CustomVM00000129_Start
CustomVM00000130_End
CustomVM00000130_Start
CustomVM00000131_End
CustomVM00000131_Start
CustomVM00000132_End
CustomVM00000132_Start
CustomVM00000133_End
CustomVM00000133_Start
CustomVM00000134_End
CustomVM00000134_Start
CustomVM00000135_End
CustomVM00000135_Start
CustomVM00000136_End
CustomVM00000136_Start
CustomVM00000137_End
CustomVM00000137_Start
CustomVM00000138_End
CustomVM00000138_Start
CustomVM00000139_End
CustomVM00000139_Start
CustomVM00000140_End
CustomVM00000140_Start
CustomVM00000141_End
CustomVM00000141_Start
CustomVM00000142_End
CustomVM00000142_Start
CustomVM00000143_End
CustomVM00000143_Start
CustomVM00000144_End
CustomVM00000144_Start
CustomVM00000145_End
CustomVM00000145_Start
CustomVM00000146_End
CustomVM00000146_Start
CustomVM00000147_End
CustomVM00000147_Start
CustomVM00000148_End
CustomVM00000148_Start
CustomVM00000149_End
CustomVM00000149_Start
CustomVM00000150_End
CustomVM00000150_Start
CustomVM00000151_End
CustomVM00000151_Start
CustomVM00000152_End
CustomVM00000152_Start
CustomVM00000153_End
CustomVM00000153_Start
CustomVM00000154_End
CustomVM00000154_Start
CustomVM00000155_End
CustomVM00000155_Start
CustomVM00000156_End
CustomVM00000156_Start
CustomVM00000157_End
CustomVM00000157_Start
CustomVM00000158_End
CustomVM00000158_Start
CustomVM00000159_End
CustomVM00000159_Start
CustomVM00000160_End
CustomVM00000160_Start
CustomVM00000161_End
CustomVM00000161_Start
CustomVM00000162_End
CustomVM00000162_Start
CustomVM00000163_End
CustomVM00000163_Start
CustomVM00000164_End
CustomVM00000164_Start
CustomVM00000165_End
CustomVM00000165_Start
CustomVM00000166_End
CustomVM00000166_Start
CustomVM00000167_End
CustomVM00000167_Start
CustomVM00000168_End
CustomVM00000168_Start
CustomVM00000169_End
CustomVM00000169_Start
CustomVM00000170_End
CustomVM00000170_Start
CustomVM00000171_End
CustomVM00000171_Start
CustomVM00000172_End
CustomVM00000172_Start
CustomVM00000173_End
CustomVM00000173_Start
CustomVM00000174_End
CustomVM00000174_Start
CustomVM00000175_End
CustomVM00000175_Start
CustomVM00000176_End
CustomVM00000176_Start
CustomVM00000177_End
CustomVM00000177_Start
CustomVM00000178_End
CustomVM00000178_Start
CustomVM00000179_End
CustomVM00000179_Start
CustomVM00000180_End
CustomVM00000180_Start
CustomVM00000181_End
CustomVM00000181_Start
CustomVM00000182_End
CustomVM00000182_Start
CustomVM00000183_End
CustomVM00000183_Start
CustomVM00000184_End
CustomVM00000184_Start
CustomVM00000185_End
CustomVM00000185_Start
CustomVM00000186_End
CustomVM00000186_Start
CustomVM00000187_End
CustomVM00000187_Start
CustomVM00000188_End
CustomVM00000188_Start
CustomVM00000189_End
CustomVM00000189_Start
CustomVM00000190_End
CustomVM00000190_Start
CustomVM00000191_End
CustomVM00000191_Start
CustomVM00000192_End
CustomVM00000192_Start
CustomVM00000193_End
CustomVM00000193_Start
CustomVM00000194_End
CustomVM00000194_Start
CustomVM00000195_End
CustomVM00000195_Start
CustomVM00000196_End
CustomVM00000196_Start
CustomVM00000197_End
CustomVM00000197_Start
CustomVM00000198_End
CustomVM00000198_Start
CustomVM00000199_End
CustomVM00000199_Start
CustomVM00000200_End
CustomVM00000200_Start
CustomVM00000201_End
CustomVM00000201_Start
CustomVM00000202_End
CustomVM00000202_Start
CustomVM00000203_End
CustomVM00000203_Start
CustomVM00000204_End
CustomVM00000204_Start
CustomVM00000205_End
CustomVM00000205_Start
CustomVM00000206_End
CustomVM00000206_Start
CustomVM00000207_End
CustomVM00000207_Start
CustomVM00000208_End
CustomVM00000208_Start
CustomVM00000209_End
CustomVM00000209_Start
CustomVM00000210_End
CustomVM00000210_Start
CustomVM00000211_End
CustomVM00000211_Start
CustomVM00000212_End
CustomVM00000212_Start
CustomVM00000213_End
CustomVM00000213_Start
CustomVM00000214_End
CustomVM00000214_Start
CustomVM00000215_End
CustomVM00000215_Start
CustomVM00000216_End
CustomVM00000216_Start
CustomVM00000217_End
CustomVM00000217_Start
CustomVM00000218_End
CustomVM00000218_Start
CustomVM00000219_End
CustomVM00000219_Start
CustomVM00000220_End
CustomVM00000220_Start
CustomVM00000221_End
CustomVM00000221_Start
CustomVM00000222_End
CustomVM00000222_Start
CustomVM00000223_End
CustomVM00000223_Start
CustomVM00000224_End
CustomVM00000224_Start
CustomVM00000225_End
CustomVM00000225_Start
CustomVM00000226_End
CustomVM00000226_Start
CustomVM00000227_End
CustomVM00000227_Start
CustomVM00000228_End
CustomVM00000228_Start
CustomVM00000229_End
CustomVM00000229_Start
CustomVM00000230_End
CustomVM00000230_Start
CustomVM00000231_End
CustomVM00000231_Start
CustomVM00000232_End
CustomVM00000232_Start
CustomVM00000233_End
CustomVM00000233_Start
CustomVM00000234_End
CustomVM00000234_Start
CustomVM00000235_End
CustomVM00000235_Start
CustomVM00000236_End
CustomVM00000236_Start
CustomVM00000237_End
CustomVM00000237_Start
CustomVM00000238_End
CustomVM00000238_Start
CustomVM00000239_End
CustomVM00000239_Start
CustomVM00000240_End
CustomVM00000240_Start
CustomVM00000241_End
CustomVM00000241_Start
CustomVM00000242_End
CustomVM00000242_Start
CustomVM00000243_End
CustomVM00000243_Start
CustomVM00000244_End
CustomVM00000244_Start
CustomVM00000245_End
CustomVM00000245_Start
CustomVM00000246_End
CustomVM00000246_Start
CustomVM00000247_End
CustomVM00000247_Start
CustomVM00000248_End
CustomVM00000248_Start
CustomVM00000249_End
CustomVM00000249_Start
CustomVM00000250_End
CustomVM00000250_Start
CustomVM00000251_End
CustomVM00000251_Start
CustomVM00000252_End
CustomVM00000252_Start
CustomVM00000253_End
CustomVM00000253_Start
CustomVM00000254_End
CustomVM00000254_Start
CustomVM00000255_End
CustomVM00000255_Start
CustomVM00000256_End
CustomVM00000256_Start
CustomVM00000257_End
CustomVM00000257_Start
CustomVM00000258_End
CustomVM00000258_Start
CustomVM00000259_End
CustomVM00000259_Start
CustomVM00000260_End
CustomVM00000260_Start
CustomVM00000261_End
CustomVM00000261_Start
CustomVM00000262_End
CustomVM00000262_Start
CustomVM00000263_End
CustomVM00000263_Start
CustomVM00000264_End
CustomVM00000264_Start
CustomVM00000265_End
CustomVM00000265_Start
CustomVM00000266_End
CustomVM00000266_Start
CustomVM00000267_End
CustomVM00000267_Start
CustomVM00000268_End
CustomVM00000268_Start
CustomVM00000269_End
CustomVM00000269_Start
CustomVM00000270_End
CustomVM00000270_Start
CustomVM00000271_End
CustomVM00000271_Start
CustomVM00000272_End
CustomVM00000272_Start
CustomVM00000273_End
CustomVM00000273_Start
CustomVM00000274_End
CustomVM00000274_Start
CustomVM00000275_End
CustomVM00000275_Start
CustomVM00000276_End
CustomVM00000276_Start
CustomVM00000277_End
CustomVM00000277_Start
CustomVM00000278_End
CustomVM00000278_Start
CustomVM00000279_End
CustomVM00000279_Start
CustomVM00000280_End
CustomVM00000280_Start
CustomVM00000281_End
CustomVM00000281_Start
CustomVM00000282_End
CustomVM00000282_Start
CustomVM00000283_End
CustomVM00000283_Start
CustomVM00000284_End
CustomVM00000284_Start
CustomVM00000285_End
CustomVM00000285_Start
CustomVM00000286_End
CustomVM00000286_Start
CustomVM00000287_End
CustomVM00000287_Start
CustomVM00000288_End
CustomVM00000288_Start
CustomVM00000289_End
CustomVM00000289_Start
CustomVM00000290_End
CustomVM00000290_Start
CustomVM00000291_End
CustomVM00000291_Start
CustomVM00000292_End
CustomVM00000292_Start
CustomVM00000293_End
CustomVM00000293_Start
CustomVM00000294_End
CustomVM00000294_Start
CustomVM00000295_End
CustomVM00000295_Start
CustomVM00000296_End
CustomVM00000296_Start
CustomVM00000297_End
CustomVM00000297_Start
CustomVM00000298_End
CustomVM00000298_Start
CustomVM00000299_End
CustomVM00000299_Start
CustomVM00000300_End
CustomVM00000300_Start
CustomVM00000301_End
CustomVM00000301_Start
CustomVM00000302_End
CustomVM00000302_Start
CustomVM00000303_End
CustomVM00000303_Start
CustomVM00000304_End
CustomVM00000304_Start
CustomVM00000305_End
CustomVM00000305_Start
CustomVM00000306_End
CustomVM00000306_Start
CustomVM00000307_End
CustomVM00000307_Start
CustomVM00000308_End
CustomVM00000308_Start
CustomVM00000309_End
CustomVM00000309_Start
CustomVM00000310_End
CustomVM00000310_Start
CustomVM00000311_End
CustomVM00000311_Start
CustomVM00000312_End
CustomVM00000312_Start
CustomVM00000313_End
CustomVM00000313_Start
CustomVM00000314_End
CustomVM00000314_Start
CustomVM00000315_End
CustomVM00000315_Start
CustomVM00000316_End
CustomVM00000316_Start
CustomVM00000317_End
CustomVM00000317_Start
CustomVM00000318_End
CustomVM00000318_Start
CustomVM00000319_End
CustomVM00000319_Start
CustomVM00000320_End
CustomVM00000320_Start
CustomVM00000321_End
CustomVM00000321_Start
CustomVM00000322_End
CustomVM00000322_Start
CustomVM00000323_End
CustomVM00000323_Start
CustomVM00000324_End
CustomVM00000324_Start
CustomVM00000325_End
CustomVM00000325_Start
CustomVM00000326_End
CustomVM00000326_Start
CustomVM00000327_End
CustomVM00000327_Start
CustomVM00000328_End
CustomVM00000328_Start
CustomVM00000329_End
CustomVM00000329_Start
CustomVM00000330_End
CustomVM00000330_Start
CustomVM00000331_End
CustomVM00000331_Start
CustomVM00000332_End
CustomVM00000332_Start
CustomVM00000333_End
CustomVM00000333_Start
CustomVM00000334_End
CustomVM00000334_Start
CustomVM00000335_End
CustomVM00000335_Start
CustomVM00000336_End
CustomVM00000336_Start
CustomVM00000337_End
CustomVM00000337_Start
CustomVM00000338_End
CustomVM00000338_Start
CustomVM00000339_End
CustomVM00000339_Start
CustomVM00000340_End
CustomVM00000340_Start
CustomVM00000341_End
CustomVM00000341_Start
CustomVM00000342_End
CustomVM00000342_Start
CustomVM00000343_End
CustomVM00000343_Start
CustomVM00000344_End
CustomVM00000344_Start
CustomVM00000345_End
CustomVM00000345_Start
CustomVM00000346_End
CustomVM00000346_Start
CustomVM00000347_End
CustomVM00000347_Start
Sections
.text Size: 1024B - Virtual size: 910B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/ThemidaSDK/SecureEngineSDK64.dll.dll windows:4 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
ClearEnd
ClearStart
CodeReplaceEnd
CodeReplaceStart
CustomVM00000100_End
CustomVM00000100_Start
CustomVM00000101_End
CustomVM00000101_Start
CustomVM00000102_End
CustomVM00000102_Start
CustomVM00000103_End
CustomVM00000103_Start
CustomVM00000104_End
CustomVM00000104_Start
CustomVM00000105_End
CustomVM00000105_Start
CustomVM00000106_End
CustomVM00000106_Start
CustomVM00000107_End
CustomVM00000107_Start
CustomVM00000108_End
CustomVM00000108_Start
CustomVM00000109_End
CustomVM00000109_Start
CustomVM00000110_End
CustomVM00000110_Start
CustomVM00000111_End
CustomVM00000111_Start
CustomVM00000112_End
CustomVM00000112_Start
CustomVM00000113_End
CustomVM00000113_Start
CustomVM00000114_End
CustomVM00000114_Start
CustomVM00000115_End
CustomVM00000115_Start
CustomVM00000116_End
CustomVM00000116_Start
CustomVM00000117_End
CustomVM00000117_Start
CustomVM00000118_End
CustomVM00000118_Start
CustomVM00000119_End
CustomVM00000119_Start
CustomVM00000120_End
CustomVM00000120_Start
CustomVM00000121_End
CustomVM00000121_Start
CustomVM00000122_End
CustomVM00000122_Start
CustomVM00000123_End
CustomVM00000123_Start
CustomVM00000124_End
CustomVM00000124_Start
CustomVM00000125_End
CustomVM00000125_Start
CustomVM00000126_End
CustomVM00000126_Start
CustomVM00000127_End
CustomVM00000127_Start
CustomVM00000128_End
CustomVM00000128_Start
CustomVM00000129_End
CustomVM00000129_Start
CustomVM00000130_End
CustomVM00000130_Start
CustomVM00000131_End
CustomVM00000131_Start
CustomVM00000132_End
CustomVM00000132_Start
CustomVM00000133_End
CustomVM00000133_Start
CustomVM00000134_End
CustomVM00000134_Start
CustomVM00000135_End
CustomVM00000135_Start
CustomVM00000136_End
CustomVM00000136_Start
CustomVM00000137_End
CustomVM00000137_Start
CustomVM00000138_End
CustomVM00000138_Start
CustomVM00000139_End
CustomVM00000139_Start
CustomVM00000140_End
CustomVM00000140_Start
CustomVM00000141_End
CustomVM00000141_Start
CustomVM00000142_End
CustomVM00000142_Start
CustomVM00000143_End
CustomVM00000143_Start
CustomVM00000144_End
CustomVM00000144_Start
CustomVM00000145_End
CustomVM00000145_Start
CustomVM00000146_End
CustomVM00000146_Start
CustomVM00000147_End
CustomVM00000147_Start
CustomVM00000148_End
CustomVM00000148_Start
CustomVM00000149_End
CustomVM00000149_Start
CustomVM00000150_End
CustomVM00000150_Start
CustomVM00000151_End
CustomVM00000151_Start
CustomVM00000152_End
CustomVM00000152_Start
CustomVM00000153_End
CustomVM00000153_Start
CustomVM00000154_End
CustomVM00000154_Start
CustomVM00000155_End
CustomVM00000155_Start
CustomVM00000156_End
CustomVM00000156_Start
CustomVM00000157_End
CustomVM00000157_Start
CustomVM00000158_End
CustomVM00000158_Start
CustomVM00000159_End
CustomVM00000159_Start
CustomVM00000160_End
CustomVM00000160_Start
CustomVM00000161_End
CustomVM00000161_Start
CustomVM00000162_End
CustomVM00000162_Start
CustomVM00000163_End
CustomVM00000163_Start
CustomVM00000164_End
CustomVM00000164_Start
CustomVM00000165_End
CustomVM00000165_Start
CustomVM00000166_End
CustomVM00000166_Start
CustomVM00000167_End
CustomVM00000167_Start
CustomVM00000168_End
CustomVM00000168_Start
CustomVM00000169_End
CustomVM00000169_Start
CustomVM00000170_End
CustomVM00000170_Start
CustomVM00000171_End
CustomVM00000171_Start
CustomVM00000172_End
CustomVM00000172_Start
CustomVM00000173_End
CustomVM00000173_Start
CustomVM00000174_End
CustomVM00000174_Start
CustomVM00000175_End
CustomVM00000175_Start
CustomVM00000176_End
CustomVM00000176_Start
CustomVM00000177_End
CustomVM00000177_Start
CustomVM00000178_End
CustomVM00000178_Start
CustomVM00000179_End
CustomVM00000179_Start
CustomVM00000180_End
CustomVM00000180_Start
CustomVM00000181_End
CustomVM00000181_Start
CustomVM00000182_End
CustomVM00000182_Start
CustomVM00000183_End
CustomVM00000183_Start
CustomVM00000184_End
CustomVM00000184_Start
CustomVM00000185_End
CustomVM00000185_Start
CustomVM00000186_End
CustomVM00000186_Start
CustomVM00000187_End
CustomVM00000187_Start
CustomVM00000188_End
CustomVM00000188_Start
CustomVM00000189_End
CustomVM00000189_Start
CustomVM00000190_End
CustomVM00000190_Start
CustomVM00000191_End
CustomVM00000191_Start
CustomVM00000192_End
CustomVM00000192_Start
CustomVM00000193_End
CustomVM00000193_Start
CustomVM00000194_End
CustomVM00000194_Start
CustomVM00000195_End
CustomVM00000195_Start
CustomVM00000196_End
CustomVM00000196_Start
CustomVM00000197_End
CustomVM00000197_Start
CustomVM00000198_End
CustomVM00000198_Start
CustomVM00000199_End
CustomVM00000199_Start
CustomVM00000200_End
CustomVM00000200_Start
CustomVM00000201_End
CustomVM00000201_Start
CustomVM00000202_End
CustomVM00000202_Start
CustomVM00000203_End
CustomVM00000203_Start
CustomVM00000204_End
CustomVM00000204_Start
CustomVM00000205_End
CustomVM00000205_Start
CustomVM00000206_End
CustomVM00000206_Start
CustomVM00000207_End
CustomVM00000207_Start
CustomVM00000208_End
CustomVM00000208_Start
CustomVM00000209_End
CustomVM00000209_Start
CustomVM00000210_End
CustomVM00000210_Start
CustomVM00000211_End
CustomVM00000211_Start
CustomVM00000212_End
CustomVM00000212_Start
CustomVM00000213_End
CustomVM00000213_Start
CustomVM00000214_End
CustomVM00000214_Start
CustomVM00000215_End
CustomVM00000215_Start
CustomVM00000216_End
CustomVM00000216_Start
CustomVM00000217_End
CustomVM00000217_Start
CustomVM00000218_End
CustomVM00000218_Start
CustomVM00000219_End
CustomVM00000219_Start
CustomVM00000220_End
CustomVM00000220_Start
CustomVM00000221_End
CustomVM00000221_Start
CustomVM00000222_End
CustomVM00000222_Start
CustomVM00000223_End
CustomVM00000223_Start
CustomVM00000224_End
CustomVM00000224_Start
CustomVM00000225_End
CustomVM00000225_Start
CustomVM00000226_End
CustomVM00000226_Start
CustomVM00000227_End
CustomVM00000227_Start
CustomVM00000228_End
CustomVM00000228_Start
CustomVM00000229_End
CustomVM00000229_Start
CustomVM00000230_End
CustomVM00000230_Start
CustomVM00000231_End
CustomVM00000231_Start
CustomVM00000232_End
CustomVM00000232_Start
CustomVM00000233_End
CustomVM00000233_Start
CustomVM00000234_End
CustomVM00000234_Start
CustomVM00000235_End
CustomVM00000235_Start
CustomVM00000236_End
CustomVM00000236_Start
CustomVM00000237_End
CustomVM00000237_Start
CustomVM00000238_End
CustomVM00000238_Start
CustomVM00000239_End
CustomVM00000239_Start
CustomVM00000240_End
CustomVM00000240_Start
CustomVM00000241_End
CustomVM00000241_Start
CustomVM00000242_End
CustomVM00000242_Start
CustomVM00000243_End
CustomVM00000243_Start
CustomVM00000244_End
CustomVM00000244_Start
CustomVM00000245_End
CustomVM00000245_Start
CustomVM00000246_End
CustomVM00000246_Start
CustomVM00000247_End
CustomVM00000247_Start
CustomVM00000248_End
CustomVM00000248_Start
CustomVM00000249_End
CustomVM00000249_Start
CustomVM00000250_End
CustomVM00000250_Start
CustomVM00000251_End
CustomVM00000251_Start
CustomVM00000252_End
CustomVM00000252_Start
CustomVM00000253_End
CustomVM00000253_Start
CustomVM00000254_End
CustomVM00000254_Start
CustomVM00000255_End
CustomVM00000255_Start
CustomVM00000256_End
CustomVM00000256_Start
CustomVM00000257_End
CustomVM00000257_Start
CustomVM00000258_End
CustomVM00000258_Start
CustomVM00000259_End
CustomVM00000259_Start
CustomVM00000260_End
CustomVM00000260_Start
CustomVM00000261_End
CustomVM00000261_Start
CustomVM00000262_End
CustomVM00000262_Start
CustomVM00000263_End
CustomVM00000263_Start
CustomVM00000264_End
CustomVM00000264_Start
CustomVM00000265_End
CustomVM00000265_Start
CustomVM00000266_End
CustomVM00000266_Start
CustomVM00000267_End
CustomVM00000267_Start
CustomVM00000268_End
CustomVM00000268_Start
CustomVM00000269_End
CustomVM00000269_Start
CustomVM00000270_End
CustomVM00000270_Start
CustomVM00000271_End
CustomVM00000271_Start
CustomVM00000272_End
CustomVM00000272_Start
CustomVM00000273_End
CustomVM00000273_Start
CustomVM00000274_End
CustomVM00000274_Start
CustomVM00000275_End
CustomVM00000275_Start
CustomVM00000276_End
CustomVM00000276_Start
CustomVM00000277_End
CustomVM00000277_Start
CustomVM00000278_End
CustomVM00000278_Start
CustomVM00000279_End
CustomVM00000279_Start
CustomVM00000280_End
CustomVM00000280_Start
CustomVM00000281_End
CustomVM00000281_Start
CustomVM00000282_End
CustomVM00000282_Start
CustomVM00000283_End
CustomVM00000283_Start
CustomVM00000284_End
CustomVM00000284_Start
CustomVM00000285_End
CustomVM00000285_Start
CustomVM00000286_End
CustomVM00000286_Start
CustomVM00000287_End
CustomVM00000287_Start
CustomVM00000288_End
CustomVM00000288_Start
CustomVM00000289_End
CustomVM00000289_Start
CustomVM00000290_End
CustomVM00000290_Start
CustomVM00000291_End
CustomVM00000291_Start
CustomVM00000292_End
CustomVM00000292_Start
CustomVM00000293_End
CustomVM00000293_Start
CustomVM00000294_End
CustomVM00000294_Start
CustomVM00000295_End
CustomVM00000295_Start
CustomVM00000296_End
CustomVM00000296_Start
CustomVM00000297_End
CustomVM00000297_Start
CustomVM00000298_End
CustomVM00000298_Start
CustomVM00000299_End
CustomVM00000299_Start
CustomVM00000300_End
CustomVM00000300_Start
CustomVM00000301_End
CustomVM00000301_Start
CustomVM00000302_End
CustomVM00000302_Start
CustomVM00000303_End
CustomVM00000303_Start
CustomVM00000304_End
CustomVM00000304_Start
CustomVM00000305_End
CustomVM00000305_Start
CustomVM00000306_End
CustomVM00000306_Start
CustomVM00000307_End
CustomVM00000307_Start
CustomVM00000308_End
CustomVM00000308_Start
CustomVM00000309_End
CustomVM00000309_Start
CustomVM00000310_End
CustomVM00000310_Start
CustomVM00000311_End
CustomVM00000311_Start
CustomVM00000312_End
CustomVM00000312_Start
CustomVM00000313_End
CustomVM00000313_Start
CustomVM00000314_End
CustomVM00000314_Start
CustomVM00000315_End
CustomVM00000315_Start
CustomVM00000316_End
CustomVM00000316_Start
CustomVM00000317_End
CustomVM00000317_Start
CustomVM00000318_End
CustomVM00000318_Start
CustomVM00000319_End
CustomVM00000319_Start
CustomVM00000320_End
CustomVM00000320_Start
CustomVM00000321_End
CustomVM00000321_Start
CustomVM00000322_End
CustomVM00000322_Start
CustomVM00000323_End
CustomVM00000323_Start
CustomVM00000324_End
CustomVM00000324_Start
CustomVM00000325_End
CustomVM00000325_Start
CustomVM00000326_End
CustomVM00000326_Start
CustomVM00000327_End
CustomVM00000327_Start
CustomVM00000328_End
CustomVM00000328_Start
CustomVM00000329_End
CustomVM00000329_Start
CustomVM00000330_End
CustomVM00000330_Start
CustomVM00000331_End
CustomVM00000331_Start
CustomVM00000332_End
CustomVM00000332_Start
CustomVM00000333_End
CustomVM00000333_Start
CustomVM00000334_End
CustomVM00000334_Start
CustomVM00000335_End
CustomVM00000335_Start
CustomVM00000336_End
CustomVM00000336_Start
CustomVM00000337_End
CustomVM00000337_Start
CustomVM00000338_End
CustomVM00000338_Start
CustomVM00000339_End
CustomVM00000339_Start
CustomVM00000340_End
CustomVM00000340_Start
CustomVM00000341_End
CustomVM00000341_Start
CustomVM00000342_End
CustomVM00000342_Start
CustomVM00000343_End
CustomVM00000343_Start
CustomVM00000344_End
CustomVM00000344_Start
CustomVM00000345_End
CustomVM00000345_Start
CustomVM00000346_End
CustomVM00000346_Start
CustomVM00000347_End
CustomVM00000347_Start
Sections
.text Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/WinlicenseSDK.dll.dll windows:6 windows x86 arch:x86
b78020bd80886ef26c961debfd7fa0fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Z:\Oreans Projects\SecureEngine\src\sdk_dlls\WinLicenseSDK\WinlicenseSDK\Release\WinlicenseSDK.pdb
Imports
kernel32
lstrlenA
GetPrivateProfileStringW
GetLocalTime
ExitProcess
SetEnvironmentVariableA
SystemTimeToFileTime
GetModuleHandleW
GetEnvironmentVariableW
CreateProcessA
DecodePointer
SetEnvironmentVariableW
GetModuleFileNameW
GetPrivateProfileIntW
FreeLibrary
GetProcAddress
LoadLibraryW
LoadLibraryA
GetModuleHandleA
WideCharToMultiByte
GetModuleFileNameA
CreateFileW
WriteConsoleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
MultiByteToWideChar
GetModuleHandleExW
HeapFree
HeapAlloc
GetACP
CompareStringW
LCMapStringW
GetStdHandle
GetFileType
GetTimeZoneInformation
GetStringTypeW
HeapReAlloc
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
ReadFile
ReadConsoleW
SetFilePointerEx
HeapSize
CloseHandle
RaiseException
user32
MessageBoxA
wsprintfW
MessageBoxW
wsprintfA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegCreateKeyExW
RegSetValueExW
RegSetValueExA
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
oleaut32
SysFreeString
SysAllocStringLen
Exports
Exports
ECCGenerateKeys
GenUniqueLicenseHash
WLActCheck
WLActDaysToActivate
WLActExpirationDate
WLActGetInfo
WLActInstall
WLActUninstall
WLBufferCrypt
WLBufferDecrypt
WLCheckVirtualPC
WLGenLicenseDynSmartKey
WLGenLicenseDynSmartKeyW
WLGenLicenseFileKey
WLGenLicenseFileKeyEx
WLGenLicenseFileKeyExW
WLGenLicenseFileKeyW
WLGenLicenseRegistryKey
WLGenLicenseRegistryKeyEx
WLGenLicenseRegistryKeyExW
WLGenLicenseRegistryKeyW
WLGenLicenseSmartKey
WLGenLicenseSmartKeyW
WLGenLicenseTextKey
WLGenLicenseTextKeyEx
WLGenLicenseTextKeyExW
WLGenLicenseTextKeyW
WLGenPassword
WLGenTrialExtensionFileKey
WLGenTrialExtensionRegistryKey
WLGetCurrentCountry
WLGetProtectionDate
WLGetVersion
WLHardwareCheckID
WLHardwareGetFormattedID
WLHardwareGetID
WLHardwareGetIDW
WLHardwareGetIdType
WLHardwareGetNumberUsbDrives
WLHardwareGetUsbIdAt
WLHardwareGetUsbIdAtW
WLHardwareGetUsbNameAt
WLHardwareGetUsbNameAtW
WLHardwareRuntimeCheckU3
WLLoadEncryptedLibrary
WLLoadWinlicenseDll
WLPasswordCheck
WLProtectCheckCodeIntegrity
WLProtectCheckDebugger
WLRegActivateSoftware
WLRegActivateSoftwareOffline
WLRegCheckMachineLocked
WLRegDateDaysLeft
WLRegDaysLeft
WLRegDeactivateSoftware
WLRegDeactivateSoftwareOffline
WLRegDisableCurrentKey
WLRegDisableKeyCurrentInstance
WLRegExecutionsLeft
WLRegExpirationDate
WLRegExpirationTimestamp
WLRegFirstRun
WLRegGetDynSmartKey
WLRegGetLicenseHardwareID
WLRegGetLicenseInfo
WLRegGetLicenseInfoW
WLRegGetLicenseRestrictions
WLRegGetLicenseType
WLRegGetStatus
WLRegGlobalTimeLeft
WLRegLicenseCreationDate
WLRegLicenseName
WLRegLockedCountry
WLRegNetInstancesGet
WLRegNetInstancesMax
WLRegNormalKeyCheck
WLRegNormalKeyCheckW
WLRegNormalKeyInstallToFile
WLRegNormalKeyInstallToFileW
WLRegNormalKeyInstallToRegistry
WLRegNormalKeyInstallToRegistryW
WLRegRemoveCurrentKey
WLRegRuntimeLeft
WLRegSmartKeyCheck
WLRegSmartKeyCheckW
WLRegSmartKeyInstallToFile
WLRegSmartKeyInstallToFileInFolder
WLRegSmartKeyInstallToFileInFolderW
WLRegSmartKeyInstallToFileW
WLRegSmartKeyInstallToRegistry
WLRegSmartKeyInstallToRegistryW
WLRegTotalDays
WLRegTotalExecutions
WLResetLicenseFeatures
WLRestartApplication
WLRestartApplicationArgs
WLSplashHide
WLStringDecrypt
WLStringDecryptW
WLTrialCustomCounter
WLTrialCustomCounterDec
WLTrialCustomCounterInc
WLTrialCustomCounterSet
WLTrialDateDaysLeft
WLTrialDaysLeft
WLTrialDebugCheck
WLTrialExecutionsLeft
WLTrialExpirationDate
WLTrialExpirationTimestamp
WLTrialExpireTrial
WLTrialExtGetLevel
WLTrialExtGetStatus
WLTrialExtendExpiration
WLTrialFirstRun
WLTrialGetStatus
WLTrialGetTrialRestrictions
WLTrialGlobalTimeLeft
WLTrialLockedCountry
WLTrialRuntimeLeft
WLTrialStringRead
WLTrialStringReadW
WLTrialStringWrite
WLTrialStringWriteW
WLTrialTotalDays
WLTrialTotalExecutions
_TestWinLicenseSDK@0
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/dolphin32_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/dolphin32_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/dolphin32_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/dolphin64_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/dolphin64_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/dolphin64_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/eagle32_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/eagle32_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/eagle32_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/eagle64_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/eagle64_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/eagle64_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/fish32_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/fish32_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/fish32_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/fish64_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/fish64_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/fish64_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/puma32_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/puma32_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/puma32_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/puma64_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/puma64_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/puma64_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/shark32_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/shark32_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/shark32_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/shark64_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/shark64_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/shark64_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/tiger32_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/tiger32_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/tiger32_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/tiger64_black.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/tiger64_red.vm
-
RedLine Stealer V20.2 CRACKED/Themida/custom_vms/public/tiger64_white.vm
-
RedLine Stealer V20.2 CRACKED/Themida/demangler.dll.dll windows:4 windows x86 arch:x86
137d954e5f75ca12c168e2b9701905b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CreateFileA
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LCMapStringA
LeaveCriticalSection
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
user32
EnumThreadWindows
MessageBoxA
wsprintfA
Exports
Exports
GetUnmangledName
___CPPdebugHook
Sections
.text Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/libspv.dll.dll windows:6 windows x86 arch:x86
66097c572747a4d30465c3691fa556f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
connect
WSAStartup
select
htons
WSACleanup
recv
socket
closesocket
gethostbyname
send
kernel32
GetStdHandle
GetFileType
WriteFile
GetLastError
GetCurrentThreadId
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
CloseHandle
QueryPerformanceCounter
GetTickCount
FreeLibrary
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
GetStringTypeW
OutputDebugStringW
CreateFileW
SetStdHandle
RtlUnwind
CompareStringW
SetEnvironmentVariableA
LCMapStringW
HeapSize
WriteConsoleW
GetCurrentProcessId
EnterCriticalSection
HeapFree
HeapAlloc
ReadFile
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
SetEndOfFile
LeaveCriticalSection
SetConsoleCtrlHandler
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetProcessHeap
GetModuleFileNameW
ReadConsoleW
SetFilePointerEx
DeleteCriticalSection
GetStartupInfoW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
LoadLibraryExW
FlushFileBuffers
GetConsoleCP
user32
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
advapi32
RegisterEventSourceA
DeregisterEventSource
ReportEventA
Exports
Exports
TaggantAddHashRegion
TaggantComputeHashes
TaggantContextFree
TaggantContextNew
TaggantContextNewEx
TaggantFinalizeLibrary
TaggantGetLicenseExpirationDate
TaggantInitializeLibrary
TaggantObjectFree
TaggantObjectNew
TaggantObjectNewEx
TaggantPackerInfo
TaggantPrepare
TaggantPutInfo
TaggantPutTimestamp
Sections
.text Size: 570KB - Virtual size: 569KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 238KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RedLine Stealer V20.2 CRACKED/Themida/vcomp140.dll.dll windows:6 windows x86 arch:x86
8f713adc16efa9ec02a5f6f5397a2922
Code Sign
33:00:00:00:9c:ee:fe:14:55:a9:5d:35:50:00:00:00:00:00:9cCertificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before30-03-2016 19:21Not After30-06-2017 19:21SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:5847-F761-4F70,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:0a:2c:79:ae:d7:79:7b:a6:ac:00:01:00:00:01:0aCertificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04-06-2015 17:42Not After04-09-2016 17:42SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31-08-2010 22:19Not After31-08-2020 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03-04-2007 12:53Not After03-04-2021 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:64:47:84:94:86:db:41:19:38:00:00:00:00:00:64Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before28-10-2015 20:31Not After28-01-2017 20:31SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08-07-2011 20:59Not After08-07-2026 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
8c:95:25:d2:ed:19:ef:c7:60:48:69:df:7a:f5:d4:43:c3:7c:20:61:e5:f2:48:2a:d8:1b:93:de:9c:c0:05:3eSigner
Actual PE Digest8c:95:25:d2:ed:19:ef:c7:60:48:69:df:7a:f5:d4:43:c3:7c:20:61:e5:f2:48:2a:d8:1b:93:de:9c:c0:05:3eDigest Algorithmsha256PE Digest Matchestrue48:dc:f9:d3:e3:0e:d5:27:bd:de:79:fa:3f:9e:b2:cb:b5:de:53:29Signer
Actual PE Digest48:dc:f9:d3:e3:0e:d5:27:bd:de:79:fa:3f:9e:b2:cb:b5:de:53:29Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
vcomp140.i386.pdb
Imports
kernel32
FormatMessageW
OutputDebugStringW
LocalAlloc
LocalFree
GetConsoleWindow
GetConsoleScreenBufferInfo
WriteConsoleW
WideCharToMultiByte
WriteFile
GetLastError
GetCurrentThreadId
HeapFree
GetProcessHeap
UnhandledExceptionFilter
CloseHandle
WaitForSingleObjectEx
SetEvent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapAlloc
TryEnterCriticalSection
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTickCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
Sleep
SwitchToThread
ExitProcess
GetStdHandle
CreateThread
QueueUserWorkItem
CreateEventW
GetNativeSystemInfo
QueryPerformanceFrequency
GetSystemTimeAdjustment
GetEnvironmentVariableW
lstrlenW
lstrcmpiW
GetStringTypeExW
ResetEvent
LoadLibraryExW
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetUserDefaultUILanguage
FindFirstFileW
FindNextFileW
FindClose
GetModuleFileNameW
FindResourceExW
LoadResource
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
MultiByteToWideChar
SetLastError
GetACP
GetStringTypeW
GetCPInfo
FreeLibrary
LCMapStringW
IsValidCodePage
GetOEMCP
SetStdHandle
GetModuleHandleExW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
RaiseException
CreateFileW
RtlUnwind
user32
MessageBoxW
Exports
Exports
C2VectParallel
_vcomp_atomic_add_i1
_vcomp_atomic_add_i2
_vcomp_atomic_add_i4
_vcomp_atomic_add_i8
_vcomp_atomic_add_r4
_vcomp_atomic_add_r8
_vcomp_atomic_and_i1
_vcomp_atomic_and_i2
_vcomp_atomic_and_i4
_vcomp_atomic_and_i8
_vcomp_atomic_div_i1
_vcomp_atomic_div_i2
_vcomp_atomic_div_i4
_vcomp_atomic_div_i8
_vcomp_atomic_div_r4
_vcomp_atomic_div_r8
_vcomp_atomic_div_ui1
_vcomp_atomic_div_ui2
_vcomp_atomic_div_ui4
_vcomp_atomic_div_ui8
_vcomp_atomic_mul_i1
_vcomp_atomic_mul_i2
_vcomp_atomic_mul_i4
_vcomp_atomic_mul_i8
_vcomp_atomic_mul_r4
_vcomp_atomic_mul_r8
_vcomp_atomic_or_i1
_vcomp_atomic_or_i2
_vcomp_atomic_or_i4
_vcomp_atomic_or_i8
_vcomp_atomic_shl_i1
_vcomp_atomic_shl_i2
_vcomp_atomic_shl_i4
_vcomp_atomic_shl_i8
_vcomp_atomic_shr_i1
_vcomp_atomic_shr_i2
_vcomp_atomic_shr_i4
_vcomp_atomic_shr_i8
_vcomp_atomic_shr_ui1
_vcomp_atomic_shr_ui2
_vcomp_atomic_shr_ui4
_vcomp_atomic_shr_ui8
_vcomp_atomic_sub_i1
_vcomp_atomic_sub_i2
_vcomp_atomic_sub_i4
_vcomp_atomic_sub_i8
_vcomp_atomic_sub_r4
_vcomp_atomic_sub_r8
_vcomp_atomic_xor_i1
_vcomp_atomic_xor_i2
_vcomp_atomic_xor_i4
_vcomp_atomic_xor_i8
_vcomp_barrier
_vcomp_copyprivate_broadcast
_vcomp_copyprivate_receive
_vcomp_enter_critsect
_vcomp_flush
_vcomp_for_dynamic_init
_vcomp_for_dynamic_init_i8
_vcomp_for_dynamic_next
_vcomp_for_dynamic_next_i8
_vcomp_for_static_end
_vcomp_for_static_init
_vcomp_for_static_init_i8
_vcomp_for_static_simple_init
_vcomp_for_static_simple_init_i8
_vcomp_fork
_vcomp_get_thread_num
_vcomp_leave_critsect
_vcomp_master_barrier
_vcomp_master_begin
_vcomp_master_end
_vcomp_ordered_begin
_vcomp_ordered_end
_vcomp_ordered_loop_end
_vcomp_reduction_i1
_vcomp_reduction_i2
_vcomp_reduction_i4
_vcomp_reduction_i8
_vcomp_reduction_r4
_vcomp_reduction_r8
_vcomp_reduction_u1
_vcomp_reduction_u2
_vcomp_reduction_u4
_vcomp_reduction_u8
_vcomp_sections_init
_vcomp_sections_next
_vcomp_set_num_threads
_vcomp_single_begin
_vcomp_single_end
omp_destroy_lock
omp_destroy_nest_lock
omp_get_dynamic
omp_get_max_threads
omp_get_nested
omp_get_num_procs
omp_get_num_threads
omp_get_thread_num
omp_get_wtick
omp_get_wtime
omp_in_parallel
omp_init_lock
omp_init_nest_lock
omp_set_dynamic
omp_set_lock
omp_set_nest_lock
omp_set_nested
omp_set_num_threads
omp_test_lock
omp_test_nest_lock
omp_unset_lock
omp_unset_nest_lock
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ