Summary | ZeroBOX

idu9A98.exe

Code injection Escalate priviledges ScreenShot KeyLogger AntiDebug PE File OS Processor Check PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6402 June 29, 2021, 9:55 a.m. June 29, 2021, 9:57 a.m.
Size 2.0MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 16493223940cd99199a672e44dec05d6
SHA256 7b844cc75f594f536f486b137817a497407b689725ab45c7904444e82374d4ac
CRC32 9FF135F5
ssdeep 24576:m92KPqd9u0yepqI5DpBa4w3JhGdvpJhHmAc+dYTTRKwUvC5YYGayq1FOXTK8HidV:s2fyepz5DpLwnaxbc1t4iCaDvkKpdV
Yara
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.217.25.14 Active Moloch
172.241.27.226 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .flat
process idu9a98.exe
description Escalate priviledges rule Escalate_priviledges
description Run a KeyLogger rule KeyLogger
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
buffer Buffer with sha1: 2b98c071f876aba59c0bb0b876c1c561381e142e
host 172.217.25.14
host 172.241.27.226
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 7528
region_size: 565248
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x011b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000048
1 0 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $YUjR444L—44^4Þ;Y4Þ;[4Þ; 4Ïo4Ïo4Ïo4Rich4PELå"Ú`à bЀ @4ƒŒ0ð€ .textèab `.rdata’ € f@@.dataöôp@À.reloc0d@B
base_address: 0x011b0000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ‡hˆRˆ,‰‰‰úˆâˆÊˆ®ˆœˆ†ˆFˆ:ˆ.ˆâ…ð…† ††&†2†B†P†f†z†Œ†¨†¶†Ê†Ü†ì†ü†‡"ˆ&‡<‡N‡^‡l‡~‡Œ‡ ‡¶‡Ê‡à‡ö‡ˆˆvˆÀ…ª…v‰b‰”…ˆ…x…J‰.…… …`…T…ô„ê„à„kernel32.dllCreateProcessWCreateProcessAadvapi32.dllCreateProcessAsUserWCreateProcessAsUserANTDLL.DLLLdrLoadDllLdrGetProcedureAddressNtProtectVirtualMemoryNTDLL.DLLå"Ú` è ‚ hC.textP˜].text$mn€ .idata$5 ì.rdata ‚è.rdata$zzzdbgø‚<.xdata$x4ƒx.idata$2¬ƒ.idata$3Àƒ .idata$4à„².idata$6ô.data„.bssÿÿÿÿ#6@)6@ÿÿÿÿ´b@Äb@ÿÿÿÿ¸]@È]@ÿÿÿÿ V@7V@¼„J…ü€¤„ž…䀌„Ø…Ì€Àƒ<‰€´„V‰ô€˜„†‰Ø€‡hˆRˆ,‰‰‰úˆâˆÊˆ®ˆœˆ†ˆFˆ:ˆ.ˆâ…ð…† ††&†2†B†P†f†z†Œ†¨†¶†Ê†Ü†ì†ü†‡"ˆ&‡<‡N‡^‡l‡~‡Œ‡ ‡¶‡Ê‡à‡ö‡ˆˆvˆÀ…ª…v‰b‰”…ˆ…x…J‰.…… …`…T…ô„ê„à„HmemsetFmemcpy‘NtUnmapViewOfSectionàZwClose RtlNtStatusToDosErroriZwQueryInformationProcessntdll.dll–RtlUnwind5NtQueryVirtualMemory:PathCombineW6StrRChrAStrChrASHLWAPI.dllEnumProcessModulesGetModuleFileNameExAPSAPI.DLLDLocalAllocKLocalReAllocHLocalFree%WriteFileRCloseHandleNlstrlenW‚CreateEventAtOpenEventAGetModuleFileNameWGetModuleHandleA¨CreateProcessWExpandEnvironmentStringsWCreateFileWGetComputerNameW¼SwitchToThreadGetLastErrorResumeThread²SleepGetModuleHandleW¢GetVersionÁGetCurrentProcessIdEGetProcAddresséVirtualAllocìVirtualFreeêVirtualAllocEx€OpenProcessÀGetCurrentProcess©CreateRemoteThreadÃReadProcessMemory.WriteProcessMemoryùWaitForSingleObjectðGetFileSizeÀReadFilefSetFilePointerDlstrcmpiAGlstrcpyA>lstrcatAMlstrlenAGetModuleFileNameAˆCreateFileAWMapViewOfFileŒCreateFileMappingWïVirtualProtectâInitializeCriticalSectionîEnterCriticalSection9LeaveCriticalSectionÑDeleteCriticalSectionAlstrcmpAbFreeLibrary<LoadLibraryAKERNEL32.dll2wsprintfAUSER32.dllÃSHGetFolderPathWShellExecuteASHELL32.dll
base_address: 0x011b8000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ä1s1ã1ý12¡2¶2ò233+3?3Ô3à3í34*414[4y4Ÿ4´4Ì4Ö45Ý56.6T6b6v6œ6Ù6ã6·7ò7ü7 88)8/8N8k8…8™8£8³8Ç8þ89G9d9v9~9¿9Ü9þ9:$:Q:v:£:Ç:Ì:í:;?;l;³;Õ;ã;4<`<k<u<Œ<Å<ä<õ<==6=G=L=R=e=j=…=œ=«=°=·=¼=â=>>}>†>™>Ÿ>ª>å>? ?)?k?‡?¬?¼? 10:0K0Q0\0”0®0¶0Ü061„1¤1û12:2C2K2Q2X2^2h2n2y2†22–2£2¬2³2À2É2Ô2í2ö2þ23 333 31393@3Q3Y3`3q3y3„3Â3Ø3ð3¥5«5Ø5Þ5 66ï6õ677!7B7H7:]:q:¾:É: ;;<û<=I=R=d=w=~=¡=©=®=¼=Á=Ï=Ô=Û=î=÷=> >D>z>>‰>Ÿ>¤>ª>³>å>ï>÷>? ??"?,?5?<?^?d?p?~?†?‹?œ?¢?¨?®?·?¼?Í?Ó?Ù?ß?ê?ø?0¸0¯0ê01 1O1z1¤1¬1ø1ý1I2í2\3¬346455u5N6æ67797‰7Ù748I8P8`8n8u8„8™8 8°8¾8Å8/9T9€9¾9 ;1;?;¢;¬;Í;Õ;Ú;à;ç;ì;ò; <#<><U<]<b<h<o<t<z<ˆ<¼<Ö<=b=u=³=Ù=á= >>I>P>â>è>?%?*?0?J?R?ž?¤?@Ð00V2A3Ÿ3¦3ç3î3’4™4ô4ú4,525I5`5f55646x6ì67'727A7\7­7ñ78v88µ89:0:®:´:ó:;T;t;™;¾;Õ;ß;ú; <p<¤<·<¿<F=\=v=|=‰=£=©=¶=Ð=Ö=ã=ý=>>*>0>=>W>]>j>„>Š>—>±>·>Ä>Þ>ä>ñ> ???8?>?K?e?k?x?’?˜?¢?¹?¾?Õ?Ú?ñ?ö?Pœ 00)0.0E0J0a0f0}0‚0™0ž0µ0º0Ñ0Ö0í0ò0 1”11±1Ð1ß1û1 2!202U2e2A3G3x33ˆ3–3œ3Å3â3ë3ô3ý3 4&4+4Ð455ž5»56s7E8ô8ú8{9“9î9ô92:m:¶;»;7<½<=5=R=Ÿ= >>¬>ã>í>F?`€¶0Ý0é0 1†1‹1262K2œ2¤2·3Á3$4*444:4@4D4I4N4d4j4t4z4„4Š4”4š4 4¤4©4®4Ä4Ê4Ô4Ú4û4¹5779Â<=ÿ=>>$>+>[>h>n>¼>?9?>?D?K?t?ç?í?pX0Ç0Í0à0Æ1Ì1Ò1Ø1Þ1ä1€ü23 333 3,303p\; ;; ;(;0;<;D;L;X;`;h;t;|;„;;˜; ;´;¼;Ð;Ø;ì;ô;<<<(<4<@<L<X<d<p<|<ˆ<”< <¬<¸<Ä<Ð<€@3D3H3
base_address: 0x01239000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: $ÿuè
base_address: 0x011b1118
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ,dÿ5
base_address: 0x011b1173
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ,u‹Q
base_address: 0x011b11e3
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ðƒ#ë SQ
base_address: 0x011b11fd
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ðƒ#‹M‰
base_address: 0x011b1206
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#‹óæ
base_address: 0x011b12a1
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#t+@;
base_address: 0x011b12b6
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: °…#B‹û‡
base_address: 0x011b12f2
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#t*A
base_address: 0x011b1306
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#tHy
base_address: 0x011b1316
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#Aÿë
base_address: 0x011b132b
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#‹9B;
base_address: 0x011b133f
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: °…#‡ …É
base_address: 0x011b13d4
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#…É‹Ñ
base_address: 0x011b13e0
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: l…#90t
base_address: 0x011b13ed
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#‹8B;
base_address: 0x011b1413
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#3À¹°
base_address: 0x011b142a
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: °…#‡é&
base_address: 0x011b1431
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: <€]Â
base_address: 0x011b145b
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: D€]Â
base_address: 0x011b1479
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: @€]Â
base_address: 0x011b149f
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ™‹M
base_address: 0x011b14b4
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: d„#ƒàt
base_address: 0x011b14cc
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ™‹M
base_address: 0x011b14d6
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: `€Pèp
base_address: 0x011b1516
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ܀…À…
base_address: 0x011b15dd
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ˜z#€ý
base_address: 0x011b161a
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: 쀍EèP
base_address: 0x011b162e
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: d€‰Eüƒ
base_address: 0x011b1654
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ´z#…€ý
base_address: 0x011b1662
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: 쀍UèR
base_address: 0x011b1676
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: d€‰Eüƒ
base_address: 0x011b169c
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: L€‹UèR
base_address: 0x011b16d9
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: L€jèb
base_address: 0x011b16e3
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p€UÜR
base_address: 0x011b17b7
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: Ôz#UðR
base_address: 0x011b17f2
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ô€ƒÄ ‹
base_address: 0x011b17fc
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: Øz#MðQ
base_address: 0x011b180b
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ô€ƒÄ h
base_address: 0x011b1815
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: Üz#ÿh€
base_address: 0x011b1829
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h€jh
base_address: 0x011b182f
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: l€‰Eüƒ
base_address: 0x011b184e
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: \€ÇEè
base_address: 0x011b186b
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: P€ÑàP
base_address: 0x011b1885
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: H€‹EüP
base_address: 0x011b1899
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: L€MðQ
base_address: 0x011b18a3
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: T€‰Eä
base_address: 0x011b18b3
process_identifier: 7528
process_handle: 0x00000048
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $YUjR444L—44^4Þ;Y4Þ;[4Þ; 4Ïo4Ïo4Ïo4Rich4PELå"Ú`à bЀ @4ƒŒ0ð€ .textèab `.rdata’ € f@@.dataöôp@À.reloc0d@B
base_address: 0x011b0000
process_identifier: 7528
process_handle: 0x00000048
1 1 0
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
Cylance Unsafe
APEX Malicious
Kaspersky VHO:Trojan-Ransom.Win32.Crypmodng.gen
McAfee-GW-Edition BehavesLike.Win32.Generic.vh
FireEye Generic.mg.16493223940cd991
Microsoft Program:Win32/Wacapew.C!ml
AhnLab-V3 Malware/Win32.Generic.C3185944
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_87%
BitDefenderTheta Gen:NN.ZexaF.34770.cA0@aCppeVfk
Cybereason malicious.966705
Process injection Process 1836 called NtSetContextThread to modify thread in remote process 7528
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 18552784
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000040
process_identifier: 7528
1 0 0
Process injection Process 1836 resumed a thread in remote process 7528
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000040
suspend_count: 1
process_identifier: 7528
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 5776
thread_handle: 0x00000040
process_identifier: 1836
current_directory:
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\idu9A98.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x00000044
1 1 0

CreateProcessInternalW

thread_identifier: 7144
thread_handle: 0x00000040
process_identifier: 7528
current_directory:
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\idu9A98.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000048
1 1 0

NtUnmapViewOfSection

base_address: 0x011b0000
region_size: 4096
process_identifier: 7528
process_handle: 0x00000048
1 0 0

NtAllocateVirtualMemory

process_identifier: 7528
region_size: 565248
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x011b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000048
1 0 0

WriteProcessMemory

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $YUjR444L—44^4Þ;Y4Þ;[4Þ; 4Ïo4Ïo4Ïo4Rich4PELå"Ú`à bЀ @4ƒŒ0ð€ .textèab `.rdata’ € f@@.dataöôp@À.reloc0d@B
base_address: 0x011b0000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer:
base_address: 0x011b1000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ‡hˆRˆ,‰‰‰úˆâˆÊˆ®ˆœˆ†ˆFˆ:ˆ.ˆâ…ð…† ††&†2†B†P†f†z†Œ†¨†¶†Ê†Ü†ì†ü†‡"ˆ&‡<‡N‡^‡l‡~‡Œ‡ ‡¶‡Ê‡à‡ö‡ˆˆvˆÀ…ª…v‰b‰”…ˆ…x…J‰.…… …`…T…ô„ê„à„kernel32.dllCreateProcessWCreateProcessAadvapi32.dllCreateProcessAsUserWCreateProcessAsUserANTDLL.DLLLdrLoadDllLdrGetProcedureAddressNtProtectVirtualMemoryNTDLL.DLLå"Ú` è ‚ hC.textP˜].text$mn€ .idata$5 ì.rdata ‚è.rdata$zzzdbgø‚<.xdata$x4ƒx.idata$2¬ƒ.idata$3Àƒ .idata$4à„².idata$6ô.data„.bssÿÿÿÿ#6@)6@ÿÿÿÿ´b@Äb@ÿÿÿÿ¸]@È]@ÿÿÿÿ V@7V@¼„J…ü€¤„ž…䀌„Ø…Ì€Àƒ<‰€´„V‰ô€˜„†‰Ø€‡hˆRˆ,‰‰‰úˆâˆÊˆ®ˆœˆ†ˆFˆ:ˆ.ˆâ…ð…† ††&†2†B†P†f†z†Œ†¨†¶†Ê†Ü†ì†ü†‡"ˆ&‡<‡N‡^‡l‡~‡Œ‡ ‡¶‡Ê‡à‡ö‡ˆˆvˆÀ…ª…v‰b‰”…ˆ…x…J‰.…… …`…T…ô„ê„à„HmemsetFmemcpy‘NtUnmapViewOfSectionàZwClose RtlNtStatusToDosErroriZwQueryInformationProcessntdll.dll–RtlUnwind5NtQueryVirtualMemory:PathCombineW6StrRChrAStrChrASHLWAPI.dllEnumProcessModulesGetModuleFileNameExAPSAPI.DLLDLocalAllocKLocalReAllocHLocalFree%WriteFileRCloseHandleNlstrlenW‚CreateEventAtOpenEventAGetModuleFileNameWGetModuleHandleA¨CreateProcessWExpandEnvironmentStringsWCreateFileWGetComputerNameW¼SwitchToThreadGetLastErrorResumeThread²SleepGetModuleHandleW¢GetVersionÁGetCurrentProcessIdEGetProcAddresséVirtualAllocìVirtualFreeêVirtualAllocEx€OpenProcessÀGetCurrentProcess©CreateRemoteThreadÃReadProcessMemory.WriteProcessMemoryùWaitForSingleObjectðGetFileSizeÀReadFilefSetFilePointerDlstrcmpiAGlstrcpyA>lstrcatAMlstrlenAGetModuleFileNameAˆCreateFileAWMapViewOfFileŒCreateFileMappingWïVirtualProtectâInitializeCriticalSectionîEnterCriticalSection9LeaveCriticalSectionÑDeleteCriticalSectionAlstrcmpAbFreeLibrary<LoadLibraryAKERNEL32.dll2wsprintfAUSER32.dllÃSHGetFolderPathWShellExecuteASHELL32.dll
base_address: 0x011b8000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer:
base_address: 0x011b9000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ä1s1ã1ý12¡2¶2ò233+3?3Ô3à3í34*414[4y4Ÿ4´4Ì4Ö45Ý56.6T6b6v6œ6Ù6ã6·7ò7ü7 88)8/8N8k8…8™8£8³8Ç8þ89G9d9v9~9¿9Ü9þ9:$:Q:v:£:Ç:Ì:í:;?;l;³;Õ;ã;4<`<k<u<Œ<Å<ä<õ<==6=G=L=R=e=j=…=œ=«=°=·=¼=â=>>}>†>™>Ÿ>ª>å>? ?)?k?‡?¬?¼? 10:0K0Q0\0”0®0¶0Ü061„1¤1û12:2C2K2Q2X2^2h2n2y2†22–2£2¬2³2À2É2Ô2í2ö2þ23 333 31393@3Q3Y3`3q3y3„3Â3Ø3ð3¥5«5Ø5Þ5 66ï6õ677!7B7H7:]:q:¾:É: ;;<û<=I=R=d=w=~=¡=©=®=¼=Á=Ï=Ô=Û=î=÷=> >D>z>>‰>Ÿ>¤>ª>³>å>ï>÷>? ??"?,?5?<?^?d?p?~?†?‹?œ?¢?¨?®?·?¼?Í?Ó?Ù?ß?ê?ø?0¸0¯0ê01 1O1z1¤1¬1ø1ý1I2í2\3¬346455u5N6æ67797‰7Ù748I8P8`8n8u8„8™8 8°8¾8Å8/9T9€9¾9 ;1;?;¢;¬;Í;Õ;Ú;à;ç;ì;ò; <#<><U<]<b<h<o<t<z<ˆ<¼<Ö<=b=u=³=Ù=á= >>I>P>â>è>?%?*?0?J?R?ž?¤?@Ð00V2A3Ÿ3¦3ç3î3’4™4ô4ú4,525I5`5f55646x6ì67'727A7\7­7ñ78v88µ89:0:®:´:ó:;T;t;™;¾;Õ;ß;ú; <p<¤<·<¿<F=\=v=|=‰=£=©=¶=Ð=Ö=ã=ý=>>*>0>=>W>]>j>„>Š>—>±>·>Ä>Þ>ä>ñ> ???8?>?K?e?k?x?’?˜?¢?¹?¾?Õ?Ú?ñ?ö?Pœ 00)0.0E0J0a0f0}0‚0™0ž0µ0º0Ñ0Ö0í0ò0 1”11±1Ð1ß1û1 2!202U2e2A3G3x33ˆ3–3œ3Å3â3ë3ô3ý3 4&4+4Ð455ž5»56s7E8ô8ú8{9“9î9ô92:m:¶;»;7<½<=5=R=Ÿ= >>¬>ã>í>F?`€¶0Ý0é0 1†1‹1262K2œ2¤2·3Á3$4*444:4@4D4I4N4d4j4t4z4„4Š4”4š4 4¤4©4®4Ä4Ê4Ô4Ú4û4¹5779Â<=ÿ=>>$>+>[>h>n>¼>?9?>?D?K?t?ç?í?pX0Ç0Í0à0Æ1Ì1Ò1Ø1Þ1ä1€ü23 333 3,303p\; ;; ;(;0;<;D;L;X;`;h;t;|;„;;˜; ;´;¼;Ð;Ø;ì;ô;<<<(<4<@<L<X<d<p<|<ˆ<”< <¬<¸<Ä<Ð<€@3D3H3
base_address: 0x01239000
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: $ÿuè
base_address: 0x011b1118
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ,dÿ5
base_address: 0x011b1173
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ,u‹Q
base_address: 0x011b11e3
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ðƒ#ë SQ
base_address: 0x011b11fd
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ðƒ#‹M‰
base_address: 0x011b1206
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#‹óæ
base_address: 0x011b12a1
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#t+@;
base_address: 0x011b12b6
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: °…#B‹û‡
base_address: 0x011b12f2
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#t*A
base_address: 0x011b1306
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#tHy
base_address: 0x011b1316
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#Aÿë
base_address: 0x011b132b
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#‹9B;
base_address: 0x011b133f
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: °…#‡ …É
base_address: 0x011b13d4
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#…É‹Ñ
base_address: 0x011b13e0
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: l…#90t
base_address: 0x011b13ed
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p…#‹8B;
base_address: 0x011b1413
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h…#3À¹°
base_address: 0x011b142a
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: °…#‡é&
base_address: 0x011b1431
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: <€]Â
base_address: 0x011b145b
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: D€]Â
base_address: 0x011b1479
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: @€]Â
base_address: 0x011b149f
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ™‹M
base_address: 0x011b14b4
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: d„#ƒàt
base_address: 0x011b14cc
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ™‹M
base_address: 0x011b14d6
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: `€Pèp
base_address: 0x011b1516
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ܀…À…
base_address: 0x011b15dd
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ˜z#€ý
base_address: 0x011b161a
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: 쀍EèP
base_address: 0x011b162e
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: d€‰Eüƒ
base_address: 0x011b1654
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ´z#…€ý
base_address: 0x011b1662
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: 쀍UèR
base_address: 0x011b1676
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: d€‰Eüƒ
base_address: 0x011b169c
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: L€‹UèR
base_address: 0x011b16d9
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: L€jèb
base_address: 0x011b16e3
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: p€UÜR
base_address: 0x011b17b7
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: Ôz#UðR
base_address: 0x011b17f2
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ô€ƒÄ ‹
base_address: 0x011b17fc
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: Øz#MðQ
base_address: 0x011b180b
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: ô€ƒÄ h
base_address: 0x011b1815
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: Üz#ÿh€
base_address: 0x011b1829
process_identifier: 7528
process_handle: 0x00000048
1 1 0

WriteProcessMemory

buffer: h€jh
base_address: 0x011b182f
process_identifier: 7528
process_handle: 0x00000048
1 1 0