Created
March 6, 2023 11:30
-
-
Save usualsuspect/2028e50097023266fc3ae8fb02acd8b9 to your computer and use it in GitHub Desktop.
Decrypted strings for GraphicalNeutrino sample e957326b2167fa7ccd508cbf531779a28bfce75eb2635ab81826a522979aeb98
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36 | |
| c:\windows\system32\ | |
| content-type: application/json | |
| accept: application/json | |
| notion-version: 2022-06-28 | |
| authorization: Bearer secret_X92sXCVWoTk63aPgGKlPBBmHVmuKXJ2geugKa7Ogj7s | |
| api.notion.com | |
| GetProcessImageFileNameA | |
| RegOpenKeyExA | |
| RegSetValueExA | |
| rundll32.exe | |
| Software\Microsoft\Windows\CurrentVersion\Run | |
| BugSplatRc64.dll,InitiateDs" | |
| C:\Windows\System32\rundll32.exe " | |
| object | |
| 37089abc0926463182bb5343bce252cc | |
| v1/databases/37089abc0926463182bb5343bce252cc/query |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment