order.exe

Is DLL Packer Anti Debug Anti VM Signed XOR AntiVirus 4/54 Related 2134
File details Download PDF Report
File type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
File size: 117.50 KB (120320 bytes)
Compile time: 2016-08-02 23:57:23
MD5: 58fa7de17498e8b68f95358e58fa5e46
SHA1: fa37e67a6dba84b6f2e2d8a117070f5a1d49fcbd
SHA256: 458da1e65ea922240b9e07c8d3355fc0b4dd2c8762a518151e8da8ded5b76c61
Import hash: f34d5f2d4577ed6d9ceec516c1f5a744
Sections 3 .text .rsrc .reloc
Directories 3 import resource relocation
First submission: 2016-08-03 09:27:02
Last submission: 2016-08-03 09:27:02
Filename detected: - order.exe (1)
URL file hosting
hXXp://[www].songphuongrninh.com/janta/order.exeVirusTotal
Antivirus Report
Report Date Detection Ratio Permalink Update
2016-08-03 07:10:10 [4/54] VirusTotal
PE Sections 2 suspicious
Name VAddress VSize Size MD5 SHA1
.text 0x2000 0x1cbc4 117760 0cf8e3ff6982065484f6f996247312d7 8057bb4606cc7c0b25edc50e829032f9c40a7fc6
.rsrc 0x20000 0x600 1536 180cb89db095dcc208f90cb167ff5b5a 20f38374af0d7ca7ed25ba7e00001b63ce9e02a0
.reloc 0x22000 0xc 512 38be2c966d799835c42793f9ad10e444 05eeeeed9ff1c4b0819a856b2051b3caff7c9851
PE Resources
Name Offset Size Language Sublanguage Data
RT_VERSION 0x200a0 830 LANG_NEUTRAL SUBLANG_NEUTRAL
RT_MANIFEST 0x203e0 490 LANG_NEUTRAL SUBLANG_NEUTRAL
  • API Alert
  • Anti Debug
Meta Info
LegalCopyright: Copyright \xa9 2016
Assembly Version: 12.2.5.1
InternalName: sunpop.exe
FileVersion: 12.2.5.1
CompanyName:
LegalTrademarks:
Comments:
ProductName: sunpop.Properties
ProductVersion: 12.2.5.1
FileDescription: sunpop.Properties
Translation: 0x0000 0x04b0
OriginalFilename: sunpop.exe
XOR
No XOR informations found in this file.
Signature
This file isn't digitally signed
Packer(s)
Microsoft Visual C# / Basic .NET
Microsoft Visual Studio .NET
.NET executable
Microsoft Visual C# v7.0 / Basic .NET
File found
FIle type: Library
mscoree.dll
IP Found
12.2.5.1
URL(s)
No URL found
axr2KPLyc2kaznI91
axr2KPLyc2kaznI90
12.2.5.1
Comments
_Encrypted$
PublicKeyToken=
InternalName
c3VucG9wKg==
dynamic method does not support fault clause
unexpected OperandType
StringFileInfo
Translation
VarFileInfo
publickeytoken=
Assembly Version
FileVersion
Copyright
VS_VERSION_INFO
sunpop.Properties
000004b0
ProductVersion
FileDescription
OriginalFilename
LegalCopyright
c3VucG9wJQ==
CompanyName
sunpop.exe
LegalTrademarks
M9X6LQ757iNYWB3a
ProductName
c3VucG9wJA==
2016
_8 (
}/[*<
-73
*7_F
>r:-
c7fbe0041f698ebcfcfd9524ff53ce1b9
PNG
}dWm
Va'D
H4"kc
(Q| ~zt
get_OutputBlockSize
C5vL-
{a:`
K)q7'2
ResolveTypeHandle
]6iP
*sq
ACLw
Wy;u`!
>;<X
]BO?-
set_Capacity
c9f23a04c52ad809b0d43369b4b7834ff
Substring
2H]c
~fi
#{tz
get_MemberType
Fs*
\y]JL
Rq)x
:6NlOT
)nrV
c18b4fc5eef212521d47128a516f719fd
<Q\h
hs=b=R
it~6
Ye9HEi
^ {j
@ /w
q"3p
fYh'
.cctor
AsyncCallback
W ]&
n+nl%9
:(`E
Q5@w
{ (7h
doVP
System.Security
ca5c502bc54ec9d74ac6818d1809849be
SD<u
cV A
c8e2654effb93dd4672f317570b96552f
Q5@i
System.Reflection.Emit
m:$#
4>I;H\
,X&&+%&
c438c8da05bc0c68901d960568456a227
`48!
RWi PW
EndInvoke
IEnumerator
-"&
S={a
6UP:n
c384f7dd00d6d373d6595e738fa8b9e45
>)Z~
}zCy
c4HE
sPe#
c89b836b8cb6d81e977dac0b6a6ca0ef8
h[f(n
QY 5
,#& $
c1eb435811d9e41500e36dbefa587e6d8
.7Cw
K>8%50
AssemblyCompanyAttribute
)oB1
FP5M
)^&6tN
+&cQ
iDb9
L5 UYt
&*(L
='ziSM
o56r
:yU
&*(W
?]w5
t gz@
B`3<
tta
Ttd2
&*(#
< a$
AppDomain
A{C
w0Am
_aTp
v 8%J
f~k>
get_CurrentDomain
oV<a
ce3d52464b91e77a8c94127ec06a28414
WM2+2
get_InputBlockSize
Rt0L
T77+
DynamicILInfo
-f+d
PF{GX
,E&+
7TT8R=
hVE`
FromBase64String
HCQS
;Oi%
):_O
oX
AssemblyTrademarkAttribute
}ogL#
ConstructorInfo
=J ;(
]=Q?
~'(c%
^) j
73q+^
ccbbf585d9d42a4d848e7b1157f9ede53
#Blob
Control
get_OperandType
SignatureHelper
nb4 Z
nD*m
t9 @h
.K5M
0).Sj
i3Hg/D
c50550a18785ed5764d13dc21ebe54e5a
mzVM
~l8Yg
1Bs,
,aDH
ZRY1
|o7e
'#lBI
4`<(vc
Type
fJO.
|zg
yO_'
c38ceef3cb8c79589235182495068bd40
*7( %+h&l5
(j3|
WG_u
ilG~
n``c
Ppdh
g#8k
1D)C
`IZ`
4uK6=
%$t5
NC$V
=/ X
fopR6[,
CT4
S<:~
0'7w2
c1e8e2f5b7b904f7cfb078be32fa6cb9d
sRBXU
get_Name
CreateDelegate
_So[n
UEvW
\aWd|B
QR-k
rLU5
IDATx^
HashAlgorithm
0<JI
(E
B_o:
< L@
v_ p>
=4k{
9T3(
ResolveType
G0H8
Kaxa
Xh+"X
*`K
#u\<
5UUG
h$,
0Pp
GetParameters
,SQ}5Z
bUpx
wUb
DialogResult
ToDouble
.text
\|{ $
@ym3
_*{{@
)T+\
Component
KHWiXi
+p. xi
g1yHI^
Convert
object
5YfX4|7
0-]4
a< ;
8PFX#
GK[$
aaLrX
z{6<m
W4s{
ps |j
+f.5
I{_V
LKjJ
R-z9
7qK^
Monitor
g-Y0
q Lp
cc8ef45a41126770584f8dafc1fd602b8
$RxU
)z<f
'gww
CipherMode
{ ip
\.5?
`E%v
}PSF
c0639509c5b69c235666730474fff8950
! 5_
b ,7
h.1JMb
45yN
zpMc
N@1
_`HfnzC
2# o
<igC
cd9141f591ab863e8140d82709c69dd02
c4713705f620fc295f35dc822451b4118
yoAh7
ObKT
`.rsrc
7j1j
,!&
SetCode
Y4t''|
%n c
wZB(
result
Rvt Y
,:&&&&~
p {4
*!`]
An\c
Rgj8
|;bzy
kdi`Vs]
c45e270720655d717483d23ef7a341d57
cTMd
9 f{J
hf{q8M
Tm$#_
Coj7,\
0x}c+
zI0ik}
Y$@T
cd1ad8dd476f9c70d3716882715522894
Zk?w
eGpS"
X$8MsV
v9r+ `r
MA h
P6$y
>;t
,>+T&
tDO'b
,6ct-
GetEnumerator
2!pI
DY;-_
){-<
E$?I
get_ParameterType
bRNa
8/
GetBytes
.npq
/i6[O1
Process
Otc
6.8$
[vX
P$d&K
{'d~
Ct]LZ
j.\MU
Write
set_AutoScaleDimensions
c0b7c65060fd8873efecffa4725b17bf9
$"K;
vo5$l
m'b2
jYio
,#& \
,B~&%
E^.=2
I=F9L#
_C^\
@TO
KPE
}&KK
CiZ{Rkg5 u
System.IO
WrapNonExceptionThrows
{U<A
SetExceptions
SiSQ
J~Hx
U/ ;
w}o}
A8oS
+zH`
H(9!<
>Of5
sRMb
get_IsStatic
RuntimeFieldHandle
Ew w3!f
3~:7
y"{R
hIDATx^
5~c~
2pvG
7VLqn
STAThreadAttribute
JXYb
"8K~
IHDR
Rj36
.`taX~
[rN%r G
TM >
(]t3
~FaW
>09cj
~h-{
r`OqZ
c207a84da980ea577a0ff6b53dbc8dfd5
qg~Q{-
caad49e83272b95f04e5bb4f890380496
vj~@
o1C]
/'/
k/u>
/(K`
cae5a8fd949b6b41205e7dcb7a8c24e23
System
EventArgs
Application
5? P
o{=-A
cde48851f174a76ec8603f1bd524508a0
Y$Cv
TransformBlock
Oym
c1085d50f9277149bb596b567f323c1e8
^ARg
qJCB=
;AZ
;%&J
c8c478fe026b2bf4c685a4977c300f469
RPLs
K!%d
c8b8443beee61814c811049fd386e6b58
Reverse
MethodBase
#Strings
&|4=
q("Y
System.Collections
ix;8
+) 8
Enter
Environment
c0eda93aa8ee0d9d7abdd89dc8e9b767b
}iJl
jnI :o-<
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2"> <security> <requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3"> <requestedExecutionLevel level="asInvoker" uiAccess="false"/> </requestedPrivileges> </security> </trustInfo> </assembly>
XOi0y
2=@t
0vZ
<[S
s-.R
EkT
6IDC
jGOa
,P&&&&&s
y@"{
PRb:}
dERB,!
W[ a [
@-$M
>9iLd
get_Position
-7Pc
!!Giwt
u`Rz
E]Bn
c488c790c64428e0eb4a405188ffc94ef
b-R"
zb }
|c#t
U$xk?
hvS}
'n Z>
1Xm
] l
$kjO
L0Q|L
wdQ N
n`D!!
Zw0<
b0P~
*:`N
;Y)x
Zq"O
KY0xSejtbl3iYHlT.Resources.resources
?Wt|
get_FieldHandle
r*pd
%sO8
Intern
MD5CryptoServiceProvider
W"t2
<T,[
)9ugt
get_UTF8
UUt{
5gE&
caf7998db60fc96a14f13660fd06f147f
m|*$
]R#5-
<Lg.H+J
BxAw
8C+7VVjr
hSystem.Drawing.Bitmap, System.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3aPADPAD
}P1)
kU|`
IEnumerator`1
BWHp/
:j|~
m8$Y
jzch?
m!nF
izq2
c0a375c25f3a593073f0803d4706ebcab
Form
-BP1)
:z\T
get_MethodHandle
Tz0[
|Rz_
g*44
c504947e6139e9ea6460f9935bd8d8330
Delegate
'h/;
}Ok,
9mAK7
G)i4
^ dn
YHN?
get_Unicode
R_[[
ce2a24069648779356e1ae1e47cc98f5c
m.Mg
DSw3
Z+}]K
|h/'
ModuleHandle
#GUID
InitializeArray
[it_:
LocalVariableInfo
W=42
cOl}
2:z[
ZD4
DY/J
set_Name
Vt3i6e
j`{+
gKMn
]FY)
I,lYU
E0dV
c968d1e16ecb7d00a24e8b45b38780bfa
Byte
get_Length
Qt<V15f
c \Ol
DESCryptoServiceProvider
D@d0
*(-<
OR"`
UL8X
W*uEE
Ld7m
ResumeLayout
E*=&
ca534d33e717b0ff158edff3b13c7eb4e
\9K7
FE(FZ
Fd8c
'tP6B
c8ba2adb920186276948afa879575bc96
GuidAttribute
@`"%=H
,, k
U$%,U
RD}1T
3o1j:
ow^S
PV+BDV
eR%-
5= M[
L8*W
XU1sp
~+Dli
Nlo4
Vz`D9J
3"Vz}^E!_c
%Rw_
Z \
Y4 >Ot
E2=o
_Zml*
fj
Czg1b
\g
M8G^
c3c0589e0813d7448d2ad3185364c17cc
YpB#6
dLOj
{[k^
-ozPa
Parse
cff7c7521f2b89c17d768de56c1d1bcd1
Occ*
;}T0'
rVlC
%o8h
J#}]
6B3o
%fb;
VR#(
)i>K
"dJ{
Y@2"
X-f>
)5HEO
RTcb
j?/r
c623cdc15bc2da3f2ef6ac104f4bdb49c
ICryptoTransform
\6,b
M,?V
c1cf77158acbc57735b4e581d2a9ca325
AssemblyTitleAttribute
M8Cc{
V4n/r
_Ryim
Ty4l
mOnJ
,RY;
c6336148d7a82e4447864a840ed34926d
rVgNsp
c6267308129830bdab8192dfa802e373a
sunpop
System.Security.Cryptography
W3~-
add_Load
MemberInfo
7l6<q
iv*FdT
X]j#
VO H
yiik
n6z
'Bb=
`is
cfd0ecf1152e190b60bd8f21795037185
FhlhB~ $E
2f g
!EoZ
t%(v
Data
pxrx
ihQ,
Int64
5Oi'
<\Mp
GetTokenFor
pHYs
.ctor
,,& P
ZEf{
Container
4O['
)jm:k
(m85
Invoke
.'f%=
c55ba2a6397478cd623b474f18bf1ad0c
[SXR79
z^-E
'EKX
vix0
c5b02a50c3070237518ac64be290290ae
wwX
cdd66f312355554749181b7c8065961cf
* 8s
#C
)~/'}
Module
c693bdb554a6d7191d774d74e17f38225
c45e3dae0346a0c44572a049f608cb108
Array
v7><
"' i
2d{D
@.reloc
cb29d9e057cc106ce39ef66e588eed952
IU[C'
5Vm2
T4s=g
pC~J
yAm!
+ & X
|b0t
|6j,wC
n%.[y
GetProcessesByName
<~xF
yR/20g=p
get_Chars
:bkV
MoveNext
OperandType
% Ou
>bMW
System.Diagnostics
DynamicMethod
k; ]
mq|)
AddArgument
NumberStyles
\u0Y I)
16;}
d. '
S&MW 6
MessageBox
k!/>bCT
System.Drawing
0nK~
yV;
V8&7
,-&
n8T9
H^_ct
L P8C
NsND
},'_`
`2BPr
d:UY
vnOY
?52[
` {?
,xa
Ev }`T
,Dm9
XC E
+$ oX
RuntimeCompatibilityAttribute
3[<>
V9Su
ymvq
X(v
Assembly
o"oE
&& 8
AssemblyInfoAttribute
; A3!B
yb3
xv@a{
}+;4
IDisposable
)1.V
r'4u
get_ReturnType
GCJ V-
J 6)r
]wIh
SuspendLayout
set_Text
&& |
khNe[
&Sz6
IZv;4u
Size
DNE)`
b9*{c:3
c28475edc8054a3f8a57308b8c593b1bc
cd8378def29b2b0d41d590f5e84fe7b9d
c583b9404e5a80b027e53568022220352
set_AutoScaleMode
ioL
C]\~
g k!!
MakeByRefType
rRI,
Ecf_G
hBoB@ x
24wB
wB;)5
6Z%
$Z|
`/:4P
?~KJ
cf7a68c41ca70b920ddd51ae4cd84e613
*'S_V
v a8p
V5Kf
g`Kx
E|x
K'O!
AOC0
2;ZJQ
ad t1
bt^v<
&/r?
H/SMR
Sq]lGJ
4+R4.
7 $
3a0x
-__@=
+ha?FA
Ne;=
0 5q
mff0p
c9a019b7a824f62d84892ee69cc1bbab1
| RG
/s}@
<o"@
\.fN'
i]_x
XCC:6
G;q_
GetExecutingAssembly
P P"/
y#cE
c0c25f5971fd1c2232bd9c0615eeccb18
RTo~P
1C,,
G=o+q
a)a{
,r&M
x,PV
$29eff007-8c1e-4c0e-b452-d6c4fc85b8d4
ContainerControl
k|0Z
ciK)
t7fm
-(&&o
xq c
9ryg
ReadByte
>x1at
+ & (
q
bwLi
GetExportedTypes
r ;i !_
'Zcvi
sI K n
XCk:
{>\3
[KNl
,5
AssemblyCopyrightAttribute
`$Z}
YC=/
LY~ {j
tF`[0I
0ZY|
OpCodes
" Y
c5695f55fbb20c8b8f9f6b6e1f8b89dcb
Empty
8` Z
," \
_{ @
cd27f15fe508adbc683125d761b840b06
\o$?
w6S0|Nj
d^0x
?<cG
Tmui`
BZDT
mL8#9g
?I|C
IndexOf
UGo:
Ya3V
< h'S
BindingFlags
-tH
2QF.
!1I=
-&5
ob!ro
;z-
lpm0n
?P 0
GbP
mEQ/b
YFk
:>c
Read
d5q^8
ucZ]
P75v
c0f7b2f6fea53099afb2e493082607d76
?0o;v3,
i!o5R
@qT
XVP;
hse
8t$77f
cceb1970499f771c248b4bb8a9b6df101
07~6NO
c98a36126c455031cab8fd6bef44c39dd
gAMA
ToSingle
o{dl
dFXe;
! A!
c60354d5c507d930edb2fffca8a4e916b
NQG.
AutoScaleMode
]$.
`A.:
cf8a50b822ca16c4fbf1b3ced7d3fa5cf
y.*s8g
vq|Fv
)E.T
-
mscorlib
AL/ P
wg+|v
;ZR9
Q}S)
Z=7u5
ResolveMethodHandle
c20b7971204c2278c9bc25970b065b8cd
Jy8hy
^@~8g
n1"
rG;
)"@F
?I*@
d1'|mQV
_pAg
ijCk
c4bfb0827bf0184bf67a80df62149fc3f
'*|m
LBX{Z
;PV-
cdef78bafd6f8d9440ff0a75414528c25
fN3
@_-%~
System.Reflection
6P*C+O-cx!
p3".X
RuntimeTypeHandle
c0b7b13e99fc5fd123012a102e15fe27a
_B?]
5Vcm
SetLocalSignature
P J9P.
0XU.
oq
0.O '
ToInt64
.&j7G
jm=<h
m3~uC
c945f2c3659d8410be3a03b8bcf513c23
fiTC
dEj~
IList`1
get_LocalVariables
c kmA$
+.0i
d B4
WWl.
^{")K
0R{D
'EZ
VD 1Zk
AssemblyDescriptionAttribute
m4L2
cd562f66f96dbd78c5c47b9baf1daf286
2u)
p8ox+
c8b28a9955759333a4a178bd0c9d523bd
cc2307856380a4710f805cb98f6768634
qkXP!
>HWa
zg Ugwy
(*
ResolveField
1kJV%
88]t
cf57fe77d713106851659983cae9192f4
lxCB
ResolveString
_ ;a
{weg
I%VN
9&Cc'
2UP]
N15
y q
g~/A
% ATU
M&_j
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
ce8f7d22efa2a65d198e203b474f65570
}fpP
YU(0
s-V
mscoree.dll
!This program cannot be run in DOS mode. $
y;..
callback
System.IO.Compression
WNV~a
e&hb
gUaB
OFz=
+ & T
Dispose
+ & P
+ & L
+ & H
+ & D
+ & @
h<gY;<Gn
+ & |
Kji~
cede02f5010bedb70e6e6fab849a6deea
+ & x
s.]p
i*/
+ & p
ZYE7
p1*lp
+ & h
!(s
c881054db7c66edc901491b0a86a0f6b4
u UB
^>Pt
vW^
w sd
+ &
):V)
set_ClientSize
XMUfM}
GetValue
+ & <
+ & 8
N =\a
+ & 4
+ & 0
T);G
W^ w
+ & ,
K]+?P
8s>|
+ & $
+ &
]Dc@
2[$[
BSJB
L$e1
3> W
WQ:6B
>))]l
IContainer
+FS"
c24e07074b3f900970cd106466e530217
get_DeclaringType
{PrL
b#+
GetManifestResourceStream
5)x
get_ModuleHandle
BitConverter
c7058075a63da9deeead189c50274599b
c19654106e02222e030c3c0737f6901f2
iy|
MfKB(
p11"5k2
m<bz'O%
U7inD
fQ
GetBuffer
pN_6
v9e5>
.@})
W M:g
W0D]
)4{O
2z-`CS
GIb8>J
ResolveMethod
-sJ=
O6 TT
8D1x
_pO,u
6fEOQ
T/!;qM
*{2I
cca36be7e9ca0dec47ed30addc4234bbc
BlockCopy
&&&&~
XWfs
GetModules
@*~K
@s-H
(,
k{SS
zE-g
C7rt
IvXt
jA{ +z
c14d01fb6a23eed472af9b85eab5d3560
vlfV
* /NB
BinaryReader
FXf-
t=,o
caR@ r
k<Kz
set_Key
-#N~
F4.1
i@"Hs
^X>RC
ExceptionHandlingClauseOptions
1;RJ
p*9a)
ae{fc/
cf064f951249d15ce312ab9e55ec5073c
]vU?k4
ca56f638b223864ff4620d481e5181dfb
ca7f8998882f1e3628887923d46b0eb0d
^Jl[
?r- -O
}K%&
6[U{Q
MethodInfo
I?P.
2 9Wk
aOBv
lbOT
75(&
W P
CompilationRelaxationsAttribute
9&OiX:A
z%@_
FL=1
c2aaf8397290097667656da7c3a486137
MemoryStream
sp$2@
c20082cbcd300a9e9335657b1d052c30e
1^O3
;M8z
"K,Y
xp0
)x(z$b
D26~:
TEw,
1wFy
x;U8w
cad4373ab0e1f9a4260d2afa46afd1e72
c9d320def501f77714efe8983ebd9ab37
;'tt
q\!
6\6+<
f-/z(U
7WKI
ZFJ.
c3f060f7c8331a62661783822748c1382
&;WQa
IEND
_BA O
Mp8a
=-ua
}5mR
ed=$H
?>m6.
l(u1
L|qx&##$
G""~
:@pZ
]<;{H
cdee943704a4b964bd8ea70e31a495098
* O<
$p@3
]-Xl3#0
!>S^
JPMgQh
get_IsPinned
c89ea68f70c05066e63719610344fe321
Fa8I
Concat
}
H[o
dDAs84/
IVmx2
pk2P_
ca0(
ParameterInfo
j2N{=yP
[-Z*:
O1mud
Fk$L
a&
cacb4f0ad5c98e0a2075217f0e9269de1
CompilerGeneratedAttribute
Ckhh
MemberTypes
get_IsValueType
c6e3cda34258111b9c6db111b3a779501
<8&wr
Cm .Q
% H)4
N00'
!CZ@
n85u}
s+^FzT
OpCode
LOq8.1
+{C}*
AssemblyFileVersionAttribute
System.Text
lSop
,@i{
~Ra
/\ik~
t{kFM
>v r)`
GetString
RuntimeMethodHandle
cafd6fed6fe443908f253d37a3d01813f
<3x2
elW-
45xr
T1Sr
\ ${J
ReadInt32
get_LocalType
12.2.5.1
h*XF/
c(fL Y|Hz
j;W+s
AVwp
m%hs
@!#r
C+ pX
]W7hdq
z/a++
9W>H
c0c76d184f995a6047d1bcef193426c2e
q~2
mI2 G1t
c40fd6097a13371d33557d0ab17ea33e1
_/{F/
Show
p7Cu0
c30be479d40c67e351cdec436256e662c
FieldInfo
A.c384f7dd00d6d373d6595e738fa8b9e45.resources
jX}%
% (G
Hab %(
&&8T
BP79W
TryGetValue
String
_CorExeMain
o;3F
Eb%P
0]BX
co;S#
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
^4'J13
tHDj:
cc4cd33dfcafecf7953f579fd07f1fa0f
dncj
#q:\
`9<.
c3f360a291ede4ecc7f833d9ae5d35e1f
-|<C
DebuggingModes
>8@5
U]|R
0cf :
leL i
KM@0
dC[
vkh.F
{MG:
sunpop.exe
7DVCa
c00c5980334035178d20a987da99ad611
[+Dg
bd1^
%kun
IB0TP&T
SMfGy
I7?&
-Y90B
&:]Y
LRq*
T|zT
@P@
*Z~N"vN
c5b4748ac3608343dca666f856810f5bd
- s!
NPIsU
JefE
'cba\:
}NHZ
UT4
)C|o
w IO
1K@@
20<dq
Load
uMmv
Attribute
H,*
[g 8
ResolveMember
c48539f8b6d44f8f51760f3aacb25f4f7
A&, '|
get_FullName
set_ShowInTaskbar
"R1A
st?/
K@#hw
Dictionary`2
BeginInvoke
GetDynamicILInfo
^_~LE
Qkg #
DebuggableAttribute
L $
!62<;A
sunpop%
5pSc
H&Grt
z pC
f,0r
ca06c5800b892fb83399d27179c3e62f3
[(XO
r/ >
\3 ]e<c
RuntimeHelpers
%)[{
Hd",T
"_in
Y8m6
gR1[
UserControl
c526936426e5aa1485498ba20731ed8f1
v2.0.50727
G31/
Object
_/K'
?!"f|
, (,
Hr3p#
ComVisibleAttribute
mGW
Ks@o
BadImageFormatException
`6 y
s0Lz
cbc1b5caccac37eadc83901e2500b481c
A7 T
HostProtectionException
f6@ZV
eXH)
,LTQ
c163d43ae39d6b861321818ba0de7001e
S^X;
4@c!
zbL9
(bKL
AssemblyConfigurationAttribute
ummd
{t{2!
: '%
3^x
vX?l
7N^:
G|mn
w7<1
'Vc(
i<$?r
c1e73e1f00b7d8a912d2310b5367c2bd9
HP66
^ vV
cc75d317ad3ed41c9d8abd5741a54aae9
cf06ddd406783da19e951dc1c8a8ce3cb
o-&4
/2`0
c581b5398bcf552996e62d7d44e5e986a
Stream
`2{O
#%2L_
QCMW7
~8i3
%p5B
c54de8e585ef6dfe18bcdcae164bf9878
8 ao
2 b%
Exit
[ -KT)k
cd29045cb70a0377b23d75cdab170e7b2
i4AEo
` PS
c77d41ea904011ccf05c2d0abb549d596
j8])a5
=.s#
QM I?X6
Z[o&
=o)1
k^
r}0}
>aK1V
GetMethodFromHandle
x6 x_
KNO>
*DHAc
1`;#
u1I8j-\
c29838007e914e62e7bf85376e8e3a1cf
%*Wb<W
MZU9
4bh/
2_cHoA
v:d}}o
cb8184574c58804689d698d74df1e9a82
bAA)
{!.4y
@H G
Ay"_
GOkpQ
ACr1y)
System.Threading
cfc31f8d9bcdfd92f167a55bbf2f7ed0f
bcB0X
MFT8
cafb4b8d8590a3a04c232ece76e60315d
C uI
sunpop.Properties
$en'
l*)jEI
3qjq`
c8dc2e7d3abda6c69ac06752529ff49ea
PF+sVE;3
ValueType
*,H W
vyUL
G36N
Q',>.
?-j7>
r(Akh',
Jt_=
**nF6*
0`7tc
Buffer
c1bc7fa2ccb39dd6869addb4d5201ed5a
s B[
NdzE
g&4vq4
2 io
]Pfg
|[R$
Q8E,
v21K
AwdN
5&W;g
t8<f
Jd=h
pc*A
]MF}
c35b3d0409cac68d8f36bcaf1e4d0a554
set_Opacity
Y;mYf
.G=@C
c77dae32bb6ab888a48299682fb0b10c9
| if
c1bc823cd4cd21107de6fdf9b0baa5ee5
z@'=
ppME
MethodBody
.|\6
M [
\]qb;Z
>"7
wCmhC
`r&)V
]uv`l
fw<.:
t ^
3:;\Y
;`l3
H_
+&
Dhl;
9 ?+T
Copyright
Ry(B
}#>!xk
+ &
'|J
a#"@
cdb9f003645ef8c1579365b371d494083
#y[m
!<ym{,9
Vr;q
+d
=B#
)GlE
u ~$P#
cc2874e2959b2f0f1ad76777275044ec2
vP>DkYp
set_Item
CreateDecryptor
gNBP<YA"\ru
n{M~J?9
JdhM
\u]"
c2721f5133128ff5acbb7ec6d9ccdd704
Gph=PSm
B)^J^;
get_TypeHandle
Exception
PF6.c
c1737f0d86514edf08001e5bcde47cc2a
DWo!
sTt_
LLM;J
GetGenericArguments
tbp/
GetTypeFromHandle
IAsyncResult
&8 -JMx
AgTWj-0n
sY]!#yE
c7e05a409dc6f47c40694afa573da1827
LDxE
SymmetricAlgorithm
IZZ^
c2f99cbfe89e2fba8acca213a567d7446
c)f#E|
&s\2U
=A4`
(aO"|
,Tbos
,1Qf
c9d74d3292ac7bcfa587026ed479c54ef
<3|x Q
>Q+ v
c9fc01bdceee4c2ba9fcb189083fe2293
3"`?y
x`anW
Xyh<<
7O>%
3{O;c
f@ym#e
8C'V:
set_Position
u[f%*
System.Collections.Generic
~_rS
VB "
System.Runtime.InteropServices
V'a{
~f>,
/ Gk
vzG%;C
a+\8
Rb]V
1M;52
`-p9
ZV#q/
Kr3&
H*[]
fdmHI
IComponent
System.Runtime.CompilerServices
c1f438361466017c87140f17fb034ddc1
xzGA
GU@Tcx
|c*.
"r ]
@eXN
] 1Z
;k]|
wwqj>
%'16
GetSignature
GetLocalVarSigHelper
7DTOcB
K]&Or
pz ;
TransformFinalBlock
GetMethodBody
y{}Z
EUt#
yY._-
Q<N<}T
E}/z
*nb(
,OW8
}-cf
c74ea6e0cd271d8b4cb4b575d471a1e7a
K{bf{s
Ai$"
get_Current
"F!}
c554698e72718292e513d47fd33bab3e3
`Wf
L_Hm
set_Mode
xnk'
:h^,
CompressionMode
AssemblyProductAttribute
Xbn1)
MlMq
ApML
RMxj
c7ad266dbc1b987bf6d0f6322a781b3ef
<Module>
k.a+s
_X0e1
~W[vi#X
J7RXkj"4
^tvPZ"
~+oq
c4e3279c7fea8d5f653dcccca39b972c8
05:5
MulticastDelegate
pfyt}
ComputeHash
c2c54e2bfbf8d0eebe286ed9995f51cd7
v(Hx>F
SizeF
?nW}
ToInt32
VBvP
2016
c142b022fabd461fea067e1f1696dc7c5
j\H-m0
^e9
}03t
y"8c
:S&x
<PW%
DeflateStream
)| N
u6Y
ResolveSignature
`Z3g
W\+R
(z[n
)))3M
rX8w
J*w4R
|0-(
T\DY2T
/"Ppi
cs&Gc
tr>D
|=#iX
ob"-
ToString
l^=a
cc7734e994a1eb60ef2a1eb8fa3df2fa0
Vjw/
aU $
Um16
; JN
xTg:
c5c0b421ee012d2e6c5e868ffc0e47ded
CgyVX
gQ_i
VB!^
System.Globalization
`[4v
EventHandler
`qU }
E,v:
E)#o
/O^P
7$%+
,U&+5 (
SetValue
?j5p
Encoding
NotSupportedException
SdtY
GetFields
IEnumerable`1
?~-N'
FjL/
set_IV
,o@
)] i
get_Module
$| (
=,vlR
sunpop$
Q@*B
A2"7
hz=+h
Ev5{
Q,Pd
\Iv
mB).07 ?n>=
Zo:~
cf5e9dbfbc35bc4a605b58811c5b439dd
o*"7
21'n4
get_Value
cee770aa3b49acd6161a9dcd02294d9ca
cc40e65a3ab170e26c5790290b5eb687a
get_Size
dLzv8
jDz@Ly
Psh{
6XMM
X)O!
System.ComponentModel
b_
%:CL
!9@@2w
jfl>2
{:bpsI
w`GV
xfH3
t38k0
1]H
cCTM
S!$L_
\J `
W?e/
V4SD
Mqjh
XRwz
ToArray
c121e4f713b5ca98f39390416f1ac9a2d
^eK:
gCW
=h/c
System.Windows.Forms
_I#b
j~dsf
`^@=j]\/
[xS:
b~](
ohr}-
System.Drawing.Bitmap
6bsjC
c9ff3d0abb687956ba3c71dd0d128d2b4
c07a8c737b72010bba9373163aaee10ca
c23e2c700d56b3d120eeaf4bfb5020ba2
&&*(
a4~5dd
ml8,
L~x_v
B-G'
jYioJ
xiIU
m0-
lGcWv}
c98ccde3cb917392246642f7829093f2b
2cz
aU=x
wpnR
M'*FB
lKR4
]hh8C
1VFwt(
"Zws

#infosec #automation

TheSystem Itself @ 2016-08-03 09:27:02