shadowbrokers-exploits/oddjob/Not-For-Release/oddjob_v3_x86.exestrings.txt

731 lines
8.1 KiB
Text
Raw Normal View History

QQSVW
SVW3
pSVW
CDPP
h`9A
Shh9A
_[t
uXhx9A
PWVj
@@f;
uM!E
SVWh
Phx8A
@@f;
h|4A
h 9A
QSVWhX6A
t1WPV
tdVSP
tB9}
PWWV
u39]
tUSh
54 A
Shp6A
uXjHSh
PWWh
t-Wj
uq9}
PSWWW
PSWj
AAHHJu
Wj Y
j=Yf
j=Yf
u 9E
YY9}
4891r)
D$$
D$hSP
D$`P
D$ P
D$ P
QQSV
54 A
u#jHj
t;8]
u6jD
PVVh
It&It
@@f;
@@f;
AAf;
@@f;
hP5A
vMh@4A
hP4A
=x A
SSSS
w6SSj
=x A
SSSS
w9SSj
SVW3
PjYjCV
QQVW
jUY3
9A;M
SuPW
@@f;
@@f;
t!SWP
@@f;
t>Sj
_^9]
jUZ3
PSSSSSSh
PSSj
h@:A
=8|A
t VP
h`:A
;5(|A
GGBBf
SSSSS
AAf9
WWWWW
=8|A
uaVj
uL9=HgA
AAFFf
=8|A
;5(|A
wIVSP
9=HgA
FVSj
VVVVV
r f=Z
r f=Z
CCGG
t=f;
CCGG
95xgA
VVVVV
r f=Z
r f=Z
GGBB
8VVVVV
f91t
AAKu
AAGGf;
_^[]
=h_A
MZu3
YQPj
5``A
=\`A
%P`A
-L`A
h("A
VVVVV
VVVVV
% |A
5P A
ueSj
=4|A
5 |A
5$|A
5 |A
5$|A
@_^[
VW}
j?^;
Y__^[
9csm
h@"A
h0"A
VVVVV
VVVVV
YYu6h
F95(dA
5$dA
Yh "A
5(dA
QQSV3
SSSSS
PPPPP
SSSSS
SSSSS
SSSSS
5DgA
_[^]
_^[]
VVVV
5hZA
5tZA
5pZA
RPSV
90tN
@t7f
PPPPP
h (A
5pSA
5pSA
hd(A
hT(A
5pSA
5pSA
hd(A
ht(A
5pSA
5PgA
5pSA
5XgA
h(;A
hd(A
t$hT(A
ht(A
5tSA
5pSA
YYt1V
5tSA
5TgA
hH;A
Whd(A
=LgA
=PgA
=TgA
5TgA
5PgA
5LgA
5PgA
5TgA
5XgA
5LgA
5tSA
5TgA
hp;A
0A@@Ju
95\gA
E`gA
Wto=
Y_^[]
_^[]
Fpt"
8csm
S99t
~du
w f
"u 3
SVW3
0@@f
=d_A
t.WSR
PPPPP
5d_A
%d_A
j"AA
AACf
9"uI
t69]
t+f
SVWh
@@f9
@@f9
t.SSj
@@f;
5$!A
j$j _W
Nj$j
t<!E
9MZu+
@\f=
WWWWW
t!h\)A
h4)A
URPQQh
L$,3
UVWS
[_^]
SVWj
_^[]
9MZt
_^[]
h0<A
hP<A
j hp<A
t+Ht
PPPPP
SVW
SSSSS
hx)A
tm95
SSSSS
0SSSSS
_^[]
0SSSSS
_^[]
VVVVV
WWWWW
WWWWW
VVVVV
VVVVV
GGAAf
@@FFf
@@FF
WWWWW
VVVVV
= dA
VVVVV
VVVVV
Yt"V
Yt.V
Yt"V
Yt.V
Yt"V
YYt}
~%9M
QVj
r 8^
v N+D$
oV f
o^0f
of@f
onPf
ov`f
o~pf
u8SS3
u$SS
t!VV9u u
9] SS
v$;5
PPPPPPPP
_^[]
0SSSSS
PPPPPPPP
5\!A
u6SSj
t @@;
uR9]
9] u
9E Yt
5x A
SSSS
=X!A
txVS
t0WWWWW
Af#E
SVW3
0WWWWW
BBFFf;
_^[]
SVWUj
]_^[
;t$,v-
UQPXY]Y[
VW|[;
_^[]
VVVVV
h(=A
95$^A
=L_A
=$^A
5$^A
hH=A
~,WPV
hh=A
98t^
tVPV
t/9U
~"WP
^SSSSS
j"^SSSSS
QSWVj
WWWWW
<Xt
u,9E
u29u
=x A
SSSSV
t<Vj
t+SSVPV
WWWWW
u:h\)A
SVW}
5d!A
E 9}
WWWW
tb9} u
@h44A
WWWWW
_^[]
WWWWW
SSSSS
WWWWW
WWWWW
^_[3
%\ A
%` A
%d A
%@!A
CorExitProcess
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
R6034
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
R6033
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
R6032
- not enough space for locale information
R6031
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
R6030
- CRT not initialized
R6028
- unable to initialize heap
R6027
- not enough space for lowio initialization
R6026
- not enough space for stdio initialization
R6025
- pure virtual function call
R6024
- not enough space for _onexit/atexit table
R6019
- unable to open console device
R6018
- unexpected heap error
R6017
- unexpected multithread lock error
R6016
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
R6009
- not enough space for environment
R6008
- not enough space for arguments
R6002
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
(null)
Invalid parameter passed to C runtime function.
EncodePointer
KERNEL32.DLL
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
InitializeCriticalSectionAndSpinCount
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
( 8PX
700WP
`h````
xpxxxx
('8PW
700PP
`h`hhh
xppwpp
!"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
July
June
April
March
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
SetThreadStackGuarantee
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
IsWow64Process
alwo
p PfH
GetSystemTimeAsFileTime
GetModuleFileNameW
SetErrorMode
GetFileAttributesW
GetTempPathW
MoveFileW
GetWindowsDirectoryW
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
GetFileSize
MoveFileExW
WriteFile
ReadFile
CreateFileW
GetLastError
CloseHandle
ExitProcess
VirtualQuery
CreateProcessW
VirtualFree
SetLastError
VirtualAlloc
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetEnvironmentVariableW
GetCurrentProcess
GetComputerNameW
GetModuleHandleW
WideCharToMultiByte
GetVersionExW
GetProcAddress
LocalAlloc
LocalFree
FindResourceW
LoadResource
SizeofResource
LockResource
HeapFree
HeapAlloc
HeapReAlloc
GetVersionExA
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
OutputDebugStringA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
InitializeCriticalSection
RtlUnwind
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
Sleep
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
VirtualProtect
GetSystemInfo
CreateFileA
FlushFileBuffers
KERNEL32.dll
wsprintfW
USER32.dll
CryptAcquireContextW
CryptDeriveKey
CryptReleaseContext
CryptGenRandom
CryptEncrypt
CryptCreateHash
CryptDestroyKey
CryptDecrypt
CryptDestroyHash
CryptHashData
OpenProcessToken
GetUserNameW
GetTokenInformation
EqualSid
AllocateAndInitializeSid
FreeSid
ADVAPI32.dll
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitializeEx
ole32.dll
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PA
5/6L6
848:8V8
:4;G;=<C<P<e<o<{<
0I2h2u2
3\4x4
5[5b5v5
6!6.646A6G6P6t6
6P7`7
9"9k9z9
:(:7:V:i:
;#<5<F>
;.<3<K<p<}<
>8>B>
657b7h7
8E8\8c8n8
9"9q9w9
:&:]:k:I<}<
<4=:=F=
>H?N?r?
"0a0i0~0
4-464<4I4S4^4q4|4
5[5e5
5X6^6d6j6p6v6}6
7!7(7;7W7z7
7-848G8^8d8j8}8
9)9/989K9o9
:$:9:?:F:S:Z:`:h:n:
= =+===P=[=a=g=l=u=
>8>I>O>`>
a2m2
5#5+5A5^5
8C8K8]8e8x8
9$9M9R9]9b9
9%:2:O:
:);N;s;
=9>&?5?P?
:!:%:5:
;#;*;Q;W;b;n;
<"<,<2<?<N<U<b<
=F=l=
>%>/>g>o>
?&?2?7?<?B?F?L?Q?W?_?g?y?
21282<2@2D2H2L2P2T2
3!3<3C3H3L3P3q3
3:4@4D4H4L4
4*5A5
7$7-777n7v7
:':B:J:R:i:
;+;N;
<#=k=
=5>M?S?v?
1o1y1~1
4)4/444<4
5 5-545~5
5#6`6
6(7<7]7c7
8"8J8c8
8:9@9b9
:X:x:
;=;C;L;S;^;j;
<?<X<_<g<l<p<t<
=N=T=X=\=`=
>!>K>}>
>]?i?
2D2R2
3o3x3~3
4"494?4R4W4k4q4
5_5x5
7&7E7]7
:j<;=
>D>Z>
1#11181G1S1h1
2;2c2
8i:y:
>h?r?
3&3H3Z3l3~3
5&5.5<5N5Z5e5
;(;=;];
=(=2=;=F=[=b=h=~=
?!?D?
K0S0
0P2n2
5(5E5q5
6+7m7
7E8X8)9C9I9\9i9q9~9
=S=]=
?B?L?l?
2(2,2
: :X:x:
; ;@;`;l;
<$<(<D<H<d<h<
= =@=`=
3$3,343<3D3L3T3\3d3h3l3
9(989H9l9x9|9
9P:T:X:\:`:d:h:l:p:t:x:
= =$=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
(null)
kernel32.dll
((((( H
h(((( H
H
kernel32
https
https
https
version
%s%s%d%d%s
COMMONPROGRAMFILES(x86)
<Process pid=%d ppid=%d threadCount=%d %s\>
%s\%s
rundll
rundll32
rundll32
BINARY
Microsoft Enhanced Cryptographic Provider v1.0
Microsoft Enhanced Cryptographic Provider v1.0
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-
Microsoft Enhanced Cryptographic Provider v1.0
Microsoft Enhanced Cryptographic Provider v1.0
Process id: %lu
%s/%s%s
%s\Temp\%s
%s%s
%s%d%dupdate.xml
%s/%d%dupdate.xml
%s/uploads/%d%d%d%d%d%d%d%d%d%s
%s %s%s