Summary | ZeroBOX

kak.exe

Lazarus Family Trojan_PWS_Stealer Gen1 Emotet Credential User Data UltraVNC Themida Generic Malware SQLite Cookie Malicious Library ASPack Antivirus Admin Tool (Sysinternals etc ...) UPX Malicious Packer PWS VNC Anti_VM
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 5, 2021, 9:05 a.m. Nov. 5, 2021, 9:07 a.m.
Size 748.7KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 3b25bb47c77da6404c1b75133ccf2b1f
SHA256 e9a3c66d5e14cf9e6a50183cbd85e3b2ea157094f7f65c7666a0ff20cf1c73e3
CRC32 A113FFD8
ssdeep 6144:d/QiQXC3tQQ5m+ksmpk3U9j0Im4soxvjFEOTb9WmZX/8shzdsY4CpHPhnTxnV1:VQi3mQc6m6UR0Ilp1hf39Wkv8xwJBn
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
requestimedout.com 162.255.117.78
apps.identrust.com 23.216.159.81
twitter.com 104.244.42.65
www.hzradiant.com 194.163.158.120
ipinfo.io 34.117.59.81
connectini.net 162.0.210.44
file.ekkggr3.com 172.67.162.110
telegram.org 149.154.167.99
eguntong.com 194.87.185.127
ip-api.com 208.95.112.1
www.listincode.com 149.28.253.196
www.mrwenshen.com 103.155.92.29
yandex.ru 77.88.55.50
htagzdownload.pw 35.205.61.67
google.com 172.217.161.78
privacytoolzfor-you6000.top 5.8.76.207
litidack.com 104.21.2.71
iplogger.org 88.99.66.31
www.profitabletrustednetwork.com 192.243.59.12
staticimg.youtuuee.com 45.136.151.102
el5en1977834657.s3.ap-south-1.amazonaws.com 52.219.158.22
d.gogamed.com 104.21.59.236
tambisup.com 91.206.15.183
dataonestorage.com 45.142.182.152
f.gogamef.com 172.67.136.94
dumancue.com 172.67.134.37
www.google.com 172.217.175.228
source3.boys4dayz.com 104.21.33.188
t.gogamec.com 104.21.85.99
cloutingservicedb.su 104.21.39.127
fouratlinks.com 199.192.17.247
cdn.discordapp.com 162.159.134.233
IP Address Status Action
103.155.92.29 Active Moloch
104.21.59.236 Active Moloch
104.21.66.169 Active Moloch
104.21.72.228 Active Moloch
104.244.42.193 Active Moloch
104.244.42.65 Active Moloch
142.250.204.68 Active Moloch
142.250.207.78 Active Moloch
149.154.167.99 Active Moloch
149.28.253.196 Active Moloch
162.0.210.44 Active Moloch
162.159.135.233 Active Moloch
162.255.117.78 Active Moloch
164.124.101.2 Active Moloch
172.67.128.223 Active Moloch
172.67.134.37 Active Moloch
172.67.145.75 Active Moloch
172.67.148.61 Active Moloch
172.67.204.112 Active Moloch
186.2.171.3 Active Moloch
192.243.59.12 Active Moloch
193.56.146.36 Active Moloch
194.163.158.120 Active Moloch
194.87.185.127 Active Moloch
199.192.17.247 Active Moloch
2.56.59.42 Active Moloch
208.95.112.1 Active Moloch
212.192.241.15 Active Moloch
212.193.30.113 Active Moloch
23.216.159.81 Active Moloch
34.117.59.81 Active Moloch
35.205.61.67 Active Moloch
45.133.1.107 Active Moloch
45.133.1.182 Active Moloch
45.136.151.102 Active Moloch
45.142.182.152 Active Moloch
45.9.20.156 Active Moloch
5.8.76.207 Active Moloch
52.219.156.18 Active Moloch
52.219.66.30 Active Moloch
88.99.66.31 Active Moloch
96.16.99.73 Active Moloch
77.88.55.50 Active Moloch
77.88.55.66 Active Moloch
91.206.15.183 Active Moloch
94.26.249.132 Active Moloch
95.217.123.66 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 199.192.17.247:80 -> 192.168.56.103:49163 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 199.192.17.247:80 -> 192.168.56.103:49169 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 199.192.17.247:80 -> 192.168.56.103:49169 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 199.192.17.247:80 -> 192.168.56.103:49167 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 199.192.17.247:80 -> 192.168.56.103:49167 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49189 -> 192.243.59.12:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49209 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 199.192.17.247:80 -> 192.168.56.103:49169 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49184 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49190 -> 192.243.59.12:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49208 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 199.192.17.247:80 -> 192.168.56.103:49169 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49224 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49224 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49227 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49227 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49229 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49223 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49223 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.103:51084 -> 164.124.101.2:53 2016778 ET DNS Query to a *.pw domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.103:49221 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49215 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49225 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49225 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49230 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49237 -> 104.21.59.236:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49235 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49235 -> 34.117.59.81:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 34.117.59.81:443 -> 192.168.56.103:49235 2025330 ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49236 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49236 -> 34.117.59.81:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 45.133.1.107:80 -> 192.168.56.103:49239 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 45.133.1.107:80 -> 192.168.56.103:49239 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49226 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49232 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 34.117.59.81:443 -> 192.168.56.103:49236 2025330 ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49220 -> 212.192.241.15:80 2034192 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin A Network Trojan was detected
TCP 192.168.56.103:49220 -> 212.192.241.15:80 2034192 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin A Network Trojan was detected
TCP 192.168.56.103:49246 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 104.21.66.169:80 -> 192.168.56.103:49247 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 104.21.66.169:80 -> 192.168.56.103:49247 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49268 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49268 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49276 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49280 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49280 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49294 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49294 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49273 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49295 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49292 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49292 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49299 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49299 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 45.9.20.156:80 -> 192.168.56.103:49255 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 45.9.20.156:80 -> 192.168.56.103:49255 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 45.9.20.156:80 -> 192.168.56.103:49255 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 45.9.20.156:80 -> 192.168.56.103:49255 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49304 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49304 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49305 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49305 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49308 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49308 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49310 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 45.133.1.107:80 -> 192.168.56.103:49240 2014819 ET INFO Packed Executable Download Misc activity
TCP 192.168.56.103:49222 -> 212.192.241.15:80 2034192 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin A Network Trojan was detected
TCP 45.133.1.107:80 -> 192.168.56.103:49240 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 45.133.1.107:80 -> 192.168.56.103:49240 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49319 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49319 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49321 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49238 -> 104.21.72.228:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49222 -> 212.192.241.15:80 2034192 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin A Network Trojan was detected
TCP 192.168.56.103:49263 -> 172.67.145.75:80 2014170 ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related Potentially Bad Traffic
TCP 192.168.56.103:49274 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49274 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49285 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49291 -> 193.56.146.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.103:49290 -> 193.56.146.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.103:49254 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.103:49252 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49262 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49264 -> 212.192.241.15:80 2034192 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin A Network Trojan was detected
TCP 192.168.56.103:49334 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49265 -> 212.192.241.15:80 2034192 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin A Network Trojan was detected
TCP 192.168.56.103:49326 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49272 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49272 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49258 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49281 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49284 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
UDP 192.168.56.103:50676 -> 8.8.8.8:53 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related Potentially Bad Traffic
TCP 192.168.56.103:49256 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49339 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49339 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49267 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49271 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49271 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49340 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49277 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49277 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49279 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49279 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49293 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49293 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49282 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49282 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49286 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49287 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49287 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49296 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49298 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49311 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49298 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49301 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49306 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49306 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49307 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49307 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49309 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49317 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49317 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49315 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49315 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49318 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49318 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49303 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49302 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49302 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49316 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49316 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49320 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49320 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49324 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49324 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49327 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49330 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49341 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49291 -> 193.56.146.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.103:49290 -> 193.56.146.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.103:49343 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49343 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49329 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 193.56.146.36:80 -> 192.168.56.103:49291 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 193.56.146.36:80 -> 192.168.56.103:49291 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 193.56.146.36:80 -> 192.168.56.103:49290 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 193.56.146.36:80 -> 192.168.56.103:49290 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49357 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49354 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49354 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49353 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49360 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49348 -> 172.67.134.37:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49348 -> 172.67.134.37:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49355 -> 172.67.134.37:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49355 -> 172.67.134.37:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49351 -> 5.8.76.207:80 2022896 ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 A Network Trojan was detected
TCP 192.168.56.103:49351 -> 5.8.76.207:80 2023882 ET INFO HTTP Request to a *.top domain Potentially Bad Traffic
TCP 192.168.56.103:49322 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49322 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49333 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49333 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49337 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49337 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.103:61970 -> 8.8.8.8:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.103:49345 -> 172.67.134.37:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.134.37:80 -> 192.168.56.103:49345 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49366 -> 172.67.148.61:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49325 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49332 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49332 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49367 -> 5.8.76.207:80 2022896 ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 A Network Trojan was detected
TCP 192.168.56.103:49336 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49378 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49378 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49382 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49382 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49389 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49369 -> 172.67.134.37:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49369 -> 172.67.134.37:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49400 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49398 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49372 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49372 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49383 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49383 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49384 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 162.159.135.233:80 -> 192.168.56.103:49381 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49385 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49385 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49370 -> 172.67.134.37:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49395 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49393 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49393 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49392 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49373 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 103.155.92.29:80 -> 192.168.56.103:49365 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49402 -> 172.67.134.37:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 103.155.92.29:80 -> 192.168.56.103:49347 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49394 -> 172.67.134.37:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49359 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49364 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49368 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49368 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49377 -> 5.8.76.207:80 2022896 ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 A Network Trojan was detected
TCP 192.168.56.103:49406 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.159.135.233:80 -> 192.168.56.103:49406 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49407 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 162.159.135.233:80 -> 192.168.56.103:49411 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49414 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49416 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49379 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49379 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49380 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49388 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49388 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49391 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49391 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49401 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 194.87.185.127:80 -> 192.168.56.103:49376 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49405 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49404 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 5.8.76.207:80 -> 192.168.56.103:49377 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.8.76.207:80 -> 192.168.56.103:49377 2023464 ET HUNTING Possible EXE Download From Suspicious TLD Misc activity
TCP 192.168.56.103:49419 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49420 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49422 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49371 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49374 -> 5.8.76.207:80 2022896 ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 A Network Trojan was detected
TCP 192.168.56.103:49403 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49403 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49410 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49408 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49415 -> 172.67.134.37:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 45.142.182.152:443 -> 192.168.56.103:49417 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49426 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 5.8.76.207:80 -> 192.168.56.103:49374 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.8.76.207:80 -> 192.168.56.103:49374 2023464 ET HUNTING Possible EXE Download From Suspicious TLD Misc activity
TCP 194.87.185.127:80 -> 192.168.56.103:49375 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49424 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49432 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49432 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49429 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49433 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 45.142.182.152:443 -> 192.168.56.103:49437 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49439 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 45.142.182.152:443 -> 192.168.56.103:49418 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49444 -> 172.67.128.223:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49448 -> 149.154.167.99:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49445 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49449 -> 149.154.167.99:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49447 -> 35.205.61.67:80 2016777 ET INFO HTTP Request to a *.pw domain Potentially Bad Traffic
TCP 149.154.167.99:443 -> 192.168.56.103:49454 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 149.154.167.99:443 -> 192.168.56.103:49453 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49457 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49458 -> 104.244.42.65:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49459 -> 104.244.42.193:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49464 -> 162.159.135.233:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49463 -> 77.88.55.66:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49476 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49477 -> 149.28.253.196:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49479 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49430 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49431 -> 162.159.135.233:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49431 -> 162.159.135.233:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49467 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49486 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49486 -> 34.117.59.81:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 34.117.59.81:443 -> 192.168.56.103:49486 2025330 ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49435 -> 162.159.135.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49438 -> 172.67.204.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49436 -> 45.142.182.152:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 45.142.182.152:443 -> 192.168.56.103:49441 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49462 -> 77.88.55.50:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49488 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49488 -> 34.117.59.81:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 34.117.59.81:443 -> 192.168.56.103:49488 2025330 ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49484 -> 212.192.241.15:80 2034202 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2 A Network Trojan was detected
TCP 192.168.56.103:49481 -> 212.192.241.15:80 2034202 ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2 A Network Trojan was detected
TCP 192.168.56.103:49362 -> 52.219.66.30:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49352 -> 52.219.156.18:80 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49189
192.243.59.12:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com f4:ad:de:a9:4c:23:d2:d3:48:4d:b8:62:d2:58:82:29:82:6e:db:bd
TLSv1
192.168.56.103:49209
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49184
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.103:49190
192.243.59.12:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com f4:ad:de:a9:4c:23:d2:d3:48:4d:b8:62:d2:58:82:29:82:6e:db:bd
TLSv1
192.168.56.103:49208
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.103:49166
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.103:49179
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.103:49215
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb
TLSv1
192.168.56.103:49230
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49237
104.21.59.236:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com b0:c4:b1:fe:56:fd:ec:99:f4:dc:0f:3f:36:63:53:f7:6c:3a:26:7b
TLSv1
192.168.56.103:49235
34.117.59.81:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 CN=ipinfo.io f0:42:a0:3b:5b:a8:0e:51:f4:13:25:f7:fc:7c:dc:35:63:19:75:63
TLSv1
192.168.56.103:49236
34.117.59.81:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 CN=ipinfo.io f0:42:a0:3b:5b:a8:0e:51:f4:13:25:f7:fc:7c:dc:35:63:19:75:63
TLSv1
192.168.56.103:49232
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49221
88.99.66.31:443
None None None
TLSv1
192.168.56.103:49246
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49238
104.21.72.228:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamef.com 5c:36:e8:6e:6d:65:76:95:76:a5:7d:b3:47:fe:54:fe:f3:71:15:1b
TLSv1
192.168.56.103:49285
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49252
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49262
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49258
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49256
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49267
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49286
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49301
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49341
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49329
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49353
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49360
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49366
172.67.148.61:443
C=US, O=Let's Encrypt, CN=R3 CN=*.boys4dayz.com 8d:a4:7e:14:c5:14:28:f1:07:04:40:07:c0:62:ff:97:67:34:d9:f0
TLSv1
192.168.56.103:49325
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49336
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49389
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49400
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49398
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49402
172.67.134.37:443
C=US, O=Let's Encrypt, CN=R3 CN=*.dumancue.com 4a:2b:54:3e:8d:a5:46:7e:82:b4:21:eb:7d:ad:a5:e9:df:a4:cd:16
TLSv1
192.168.56.103:49359
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49364
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49414
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49416
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49380
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49401
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49419
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49420
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49422
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49408
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49410
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49415
172.67.134.37:443
C=US, O=Let's Encrypt, CN=R3 CN=*.dumancue.com 4a:2b:54:3e:8d:a5:46:7e:82:b4:21:eb:7d:ad:a5:e9:df:a4:cd:16
TLSv1
192.168.56.103:49426
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49444
172.67.128.223:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 8e:5a:12:fe:f0:75:65:35:6e:4d:a8:b6:d4:88:53:8c:02:1a:7c:99
TLSv1
192.168.56.103:49445
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49457
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLS 1.2
192.168.56.103:49464
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 54:e1:a7:9d:cc:c8:60:86:f1:a5:da:74:0e:5a:ab:45:df:37:8a:78
TLSv1
192.168.56.103:49463
77.88.55.66:443
C=RU, O=Yandex LLC, OU=Yandex Certification Authority, CN=Yandex CA C=RU, L=Moscow, OU=ITO, O=Yandex LLC, CN=*.yandex.az 2b:13:52:0c:b0:c6:8c:c9:e3:05:6e:11:91:74:4d:65:ce:3a:64:29
TLSv1
192.168.56.103:49476
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49477
149.28.253.196:443
C=CN, O=TrustAsia Technologies, Inc., OU=Domain Validated SSL, CN=TrustAsia TLS RSA CA CN=listincode.com 84:23:95:42:66:09:11:39:0d:e6:22:7f:eb:b3:cc:79:dd:fa:36:ed
TLSv1
192.168.56.103:49479
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb
TLSv1
192.168.56.103:49430
162.159.135.233:443
None None None
TLSv1
192.168.56.103:49467
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49486
34.117.59.81:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 CN=ipinfo.io f0:42:a0:3b:5b:a8:0e:51:f4:13:25:f7:fc:7c:dc:35:63:19:75:63
TLSv1
192.168.56.103:49435
162.159.135.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49438
172.67.204.112:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gogamec.com ee:4c:93:4c:ed:a7:33:d6:e8:4b:a4:7f:af:73:91:a4:cf:9b:23:b1
TLSv1
192.168.56.103:49462
77.88.55.50:443
C=RU, O=Yandex LLC, OU=Yandex Certification Authority, CN=Yandex CA C=RU, L=Moscow, OU=ITO, O=Yandex LLC, CN=*.yandex.az 2b:13:52:0c:b0:c6:8c:c9:e3:05:6e:11:91:74:4d:65:ce:3a:64:29
TLSv1
192.168.56.103:49488
34.117.59.81:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 CN=ipinfo.io f0:42:a0:3b:5b:a8:0e:51:f4:13:25:f7:fc:7c:dc:35:63:19:75:63

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d0178
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d0178
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d00f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d0178
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d0178
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d00f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d00f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d01f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005d01f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057c0f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057c0f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057c178
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c9e70
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c9e70
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c9eb0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0076f308
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0076f308
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0076f348
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00562378
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00562378
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005623b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section CODE
section DATA
section BSS
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
kak+0x816a8 @ 0x4816a8
kak+0x99c13 @ 0x499c13
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xeedface
exception.offset: 46887
exception.address: 0x766fb727
registers.esp: 1637924
registers.edi: 4523332
registers.eax: 1637924
registers.ebp: 1638004
registers.edx: 0
registers.ebx: 0
registers.esi: 2
registers.ecx: 7
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x37bc6ed
0x37bc79a
0x37bc808
0x3730a09
0x3731cba
0x3731290
0x37315cd
0x3748939
0x377d9d7
0x377ddeb
0x37df571
0x37df654
bumperww+0xe9a5 @ 0xd2e9a5
bumperww+0x13f91 @ 0xd33f91
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 7070260
registers.edi: 0
registers.eax: 0
registers.ebp: 7070300
registers.edx: 32
registers.ebx: 7070604
registers.esi: 0
registers.ecx: 5409712
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x37bc6ed
0x37bc79a
0x37bc808
0x3730a09
0x3731cba
0x373129e
0x37315cd
0x3748939
0x377d9d7
0x377ddeb
0x37df571
0x37df654
bumperww+0xe9a5 @ 0xd2e9a5
bumperww+0x13f91 @ 0xd33f91
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 7070260
registers.edi: 0
registers.eax: 0
registers.ebp: 7070300
registers.edx: 32
registers.ebx: 7070604
registers.esi: 0
registers.ecx: 5409712
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x37bc6ed
0x37bc79a
0x37bc808
0x3730a09
0x3731cba
0x3731290
0x37315cd
0x3748939
0x3749831
0x3776065
0x3776d41
0x377dbbe
0x377ddeb
0x37df571
0x37df654
bumperww+0xe9a5 @ 0xd2e9a5
bumperww+0x13f91 @ 0xd33f91
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 7064292
registers.edi: 0
registers.eax: 0
registers.ebp: 7064332
registers.edx: 32
registers.ebx: 7064636
registers.esi: 0
registers.ecx: 5409992
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x37bc6ed
0x37bc79a
0x37bc808
0x3730a09
0x3731cba
0x373129e
0x37315cd
0x3748939
0x3749831
0x3776065
0x3776d41
0x377dbbe
0x377ddeb
0x37df571
0x37df654
bumperww+0xe9a5 @ 0xd2e9a5
bumperww+0x13f91 @ 0xd33f91
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 7064292
registers.edi: 0
registers.eax: 0
registers.ebp: 7064332
registers.edx: 32
registers.ebx: 7064636
registers.esi: 0
registers.ecx: 5409992
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x37bc6ed
0x37bc79a
0x37bc808
0x3730a09
0x3731cba
0x3731290
0x37315cd
0x3748939
0x3749095
0x3776eb3
0x377dbbe
0x377ddeb
0x37df571
0x37df654
bumperww+0xe9a5 @ 0xd2e9a5
bumperww+0x13f91 @ 0xd33f91
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 7064708
registers.edi: 0
registers.eax: 0
registers.ebp: 7064748
registers.edx: 32
registers.ebx: 7065052
registers.esi: 0
registers.ecx: 4973536
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x37bc6ed
0x37bc79a
0x37bc808
0x3730a09
0x3731cba
0x373129e
0x37315cd
0x3748939
0x3749095
0x3776eb3
0x377dbbe
0x377ddeb
0x37df571
0x37df654
bumperww+0xe9a5 @ 0xd2e9a5
bumperww+0x13f91 @ 0xd33f91
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 7064708
registers.edi: 0
registers.eax: 0
registers.ebp: 7064748
registers.edx: 32
registers.ebx: 7065052
registers.esi: 0
registers.ecx: 4973536
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x39cc6ed
0x39cc79a
0x39cc808
0x3940a09
0x3941cba
0x3941290
0x39415cd
0x3958939
0x398d9d7
0x398ddeb
0x39ef571
0x39ef654
ww15_testll_0310_single+0x3eb9 @ 0xb83eb9
ww15_testll_0310_single+0x8eb1 @ 0xb88eb1
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 11067588
registers.edi: 0
registers.eax: 0
registers.ebp: 11067628
registers.edx: 32
registers.ebx: 11067932
registers.esi: 0
registers.ecx: 5595016
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x39cc6ed
0x39cc79a
0x39cc808
0x3940a09
0x3941cba
0x394129e
0x39415cd
0x3958939
0x398d9d7
0x398ddeb
0x39ef571
0x39ef654
ww15_testll_0310_single+0x3eb9 @ 0xb83eb9
ww15_testll_0310_single+0x8eb1 @ 0xb88eb1
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 11067588
registers.edi: 0
registers.eax: 0
registers.ebp: 11067628
registers.edx: 32
registers.ebx: 11067932
registers.esi: 0
registers.ecx: 5595016
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x39cc6ed
0x39cc79a
0x39cc808
0x3940a09
0x3941cba
0x3941290
0x39415cd
0x3958939
0x3959831
0x3986065
0x3986d41
0x398dbbe
0x398ddeb
0x39ef571
0x39ef654
ww15_testll_0310_single+0x3eb9 @ 0xb83eb9
ww15_testll_0310_single+0x8eb1 @ 0xb88eb1
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 11061620
registers.edi: 0
registers.eax: 0
registers.ebp: 11061660
registers.edx: 32
registers.ebx: 11061964
registers.esi: 0
registers.ecx: 5595336
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x39cc6ed
0x39cc79a
0x39cc808
0x3940a09
0x3941cba
0x394129e
0x39415cd
0x3958939
0x3959831
0x3986065
0x3986d41
0x398dbbe
0x398ddeb
0x39ef571
0x39ef654
ww15_testll_0310_single+0x3eb9 @ 0xb83eb9
ww15_testll_0310_single+0x8eb1 @ 0xb88eb1
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 11061620
registers.edi: 0
registers.eax: 0
registers.ebp: 11061660
registers.edx: 32
registers.ebx: 11061964
registers.esi: 0
registers.ecx: 5595336
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x39cc6ed
0x39cc79a
0x39cc808
0x3940a09
0x3941cba
0x3941290
0x39415cd
0x3958939
0x3959095
0x3986eb3
0x398dbbe
0x398ddeb
0x39ef571
0x39ef654
ww15_testll_0310_single+0x3eb9 @ 0xb83eb9
ww15_testll_0310_single+0x8eb1 @ 0xb88eb1
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 11062036
registers.edi: 0
registers.eax: 0
registers.ebp: 11062076
registers.edx: 32
registers.ebx: 11062380
registers.esi: 0
registers.ecx: 5105120
1 0 0

__exception__

stacktrace:
CryptGenRandom+0x26 CryptGetUserKey-0x6a cryptsp+0x4f99 @ 0x73d54f99
0x39cc6ed
0x39cc79a
0x39cc808
0x3940a09
0x3941cba
0x394129e
0x39415cd
0x3958939
0x3959095
0x3986eb3
0x398dbbe
0x398ddeb
0x39ef571
0x39ef654
ww15_testll_0310_single+0x3eb9 @ 0xb83eb9
ww15_testll_0310_single+0x8eb1 @ 0xb88eb1
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 81 78 74 11 11 11 11 75 2d 83 c0 78 50 ff 15 44
exception.instruction: cmp dword ptr [eax + 0x74], 0x11111111
exception.exception_code: 0xc0000005
exception.symbol: CryptEnumProvidersA+0x1dc CheckSignatureInFile-0x9f6 cryptsp+0x34b2
exception.address: 0x73d534b2
registers.esp: 11062036
registers.edi: 0
registers.eax: 0
registers.ebp: 11062076
registers.edx: 32
registers.ebx: 11062380
registers.esi: 0
registers.ecx: 5105120
1 0 0

__exception__

stacktrace:
z7cnf_kncwqg5qs37fhaootp+0x42fd16 @ 0x173fd16
z7cnf_kncwqg5qs37fhaootp+0x3e9349 @ 0x16f9349

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc e9 6c f4 e1 8a 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x766fb727
registers.esp: 2948288
registers.edi: 20299776
registers.eax: 2948288
registers.ebp: 2948368
registers.edx: 2130566132
registers.ebx: 32
registers.esi: 1999795243
registers.ecx: 3678273536
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 fd 6d 01 00 03 f0 e5 9a 5f 42 e9 7e 00 00
exception.symbol: z7cnf_kncwqg5qs37fhaootp+0x448f5d
exception.instruction: in eax, dx
exception.module: Z7cnF_KncwQG5qs37FHAoOtp.exe
exception.exception_code: 0xc0000096
exception.offset: 4493149
exception.address: 0x1758f5d
registers.esp: 2948408
registers.edi: 22569755
registers.eax: 1750617430
registers.ebp: 20299776
registers.edx: 5462102
registers.ebx: 0
registers.esi: 13
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 34 1e 00 00 c3 e9 91 d9 fc ff a0 c4 99 0e
exception.symbol: z7cnf_kncwqg5qs37fhaootp+0x44b8b5
exception.instruction: in eax, dx
exception.module: Z7cnF_KncwQG5qs37FHAoOtp.exe
exception.exception_code: 0xc0000096
exception.offset: 4503733
exception.address: 0x175b8b5
registers.esp: 2948408
registers.edi: 22569755
registers.eax: 1447909480
registers.ebp: 20299776
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5

exception.instruction_r: 89 08 50 45 43 6f 6d 70 61 63 74 32 00 6c ee 7e
exception.symbol: jg1_1faf+0x1016
exception.instruction: mov dword ptr [eax], ecx
exception.module: jg1_1faf.exe
exception.exception_code: 0xc0000005
exception.offset: 4118
exception.address: 0x401016
registers.esp: 1638276
registers.edi: 0
registers.eax: 0
registers.ebp: 1638292
registers.edx: 4198400
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:
srjwwlbhrcg3hgooq2d7fgcu+0x416912 @ 0x10b6912
srjwwlbhrcg3hgooq2d7fgcu+0x422ccc @ 0x10c2ccc

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc e9 ba 25 78 8a 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x766fb727
registers.esp: 4454520
registers.edi: 13549568
registers.eax: 4454520
registers.ebp: 4454600
registers.edx: 2130566132
registers.ebx: 32
registers.esi: 1999795243
registers.ecx: 3357671424
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 9c 55 03 00 ce f7 18 00 00 00 09 00 00 80
exception.symbol: srjwwlbhrcg3hgooq2d7fgcu+0x40e8a9
exception.instruction: in eax, dx
exception.module: sRJwwLbHRcg3hgOoQ2d7FGcu.exe
exception.exception_code: 0xc0000096
exception.offset: 4253865
exception.address: 0x10ae8a9
registers.esp: 4454640
registers.edi: 16201465
registers.eax: 1750617430
registers.ebp: 13549568
registers.edx: 2130532438
registers.ebx: 0
registers.esi: 15688064
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 68 3d 00 00 c3 e9 8b 97 fe ff 53 12 21 43
exception.symbol: srjwwlbhrcg3hgooq2d7fgcu+0x45117a
exception.instruction: in eax, dx
exception.module: sRJwwLbHRcg3hgOoQ2d7FGcu.exe
exception.exception_code: 0xc0000096
exception.offset: 4526458
exception.address: 0x10f117a
registers.esp: 4454640
registers.edi: 16201465
registers.eax: 1447909480
registers.ebp: 13549568
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 15688064
registers.ecx: 10
1 0 0

__exception__

stacktrace:
proliv041+0x41ecc5 @ 0x108ecc5
proliv041+0x432527 @ 0x10a2527

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc e9 6d e0 7c 8a 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x766fb727
registers.esp: 2488488
registers.edi: 13352960
registers.eax: 2488488
registers.ebp: 2488568
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 1999795243
registers.ecx: 4075814912
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 12 60 01 00 2d a4 83 e9 d5 4b 31 80 01 00
exception.symbol: proliv041+0x449f63
exception.instruction: in eax, dx
exception.module: proliv041.exe
exception.exception_code: 0xc0000096
exception.offset: 4497251
exception.address: 0x10b9f63
registers.esp: 2488608
registers.edi: 16008782
registers.eax: 1750617430
registers.ebp: 13352960
registers.edx: 22614
registers.ebx: 0
registers.esi: 15515389
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 b6 86 ff ff c3 e9 f0 aa ff ff d9 1d c2 14
exception.symbol: proliv041+0x44fc5f
exception.instruction: in eax, dx
exception.module: proliv041.exe
exception.exception_code: 0xc0000096
exception.offset: 4521055
exception.address: 0x10bfc5f
registers.esp: 2488608
registers.edi: 16008782
registers.eax: 1447909480
registers.ebp: 13352960
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 15515389
registers.ecx: 10
1 0 0
suspicious_features GET method with no useragent header suspicious_request GET http://fouratlinks.com/stockmerchandise/zillaCPM/r4XZt5MYHpEdcdmzqr2D.exe
suspicious_features GET method with no useragent header suspicious_request GET http://fouratlinks.com/stockmerchandise/serious_punch_upd/HttpTwcyK3R6gQj7t7EY.exe
suspicious_features GET method with no useragent header suspicious_request GET http://fouratlinks.com/stockmerchandise/total_out_hand/v8hBqWuKscbjZRqNatPw.exe
suspicious_features GET method with no useragent header suspicious_request GET http://fouratlinks.com/Widgets/FolderShare.exe
suspicious_features POST method with no referer header, POST method with no useragent header suspicious_request POST http://requestimedout.com/xenocrates/zoroaster
suspicious_features GET method with no useragent header suspicious_request GET http://www.google.com/
suspicious_features Connection to IP address suspicious_request GET http://45.133.1.107/server.txt
suspicious_features Connection to IP address suspicious_request GET http://212.192.241.15/base/api/statistics.php
suspicious_features POST method with no referer header, Connection to IP address suspicious_request POST http://212.192.241.15/base/api/getData.php
suspicious_features Connection to IP address suspicious_request HEAD http://45.133.1.107/download/NiceProcessX64.bmp
suspicious_features Connection to IP address suspicious_request GET http://45.133.1.107/download/NiceProcessX64.bmp
suspicious_features GET method with no useragent header suspicious_request GET http://file.ekkggr3.com/lqosko/p18j/cust51.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://45.9.20.156/pub.php?pub=five
suspicious_features POST method with no referer header suspicious_request POST http://staticimg.youtuuee.com/api/?sid=578995&key=b4a44f7ae92b9b3dfe2bcb545627cb4d
suspicious_features GET method with no useragent header suspicious_request GET http://cloutingservicedb.su/campaign2/autosubplayer.exe
suspicious_features Connection to IP address suspicious_request HEAD http://193.56.146.36/udptest.exe
suspicious_features Connection to IP address suspicious_request GET http://193.56.146.36/udptest.exe
suspicious_features GET method with no useragent header suspicious_request GET http://htagzdownload.pw/SaveData/SaveData.php?ezzabour=%7B%22NameOffer%22:%22BumperWw%22,%22ip%22:%22%22,%22country%22:%22KR%22,%22DateTime%22:%222021-11-05%2012:47%22,%22Device%22:%22TEST22-PC%22,%22PCName%22:%22test22%22,%22postcheck%22:%22False%22,%22tag%22:%22kenpachi2_lylaShare1_folderlyla1_foldershare_goodchannel_registry_goodchannel_installrox2_BumperWw%22,%22Os%22:%22WIN7%22,%22Browser%22:%22Internet%20explorer%22%7D
suspicious_features Connection to IP address suspicious_request GET http://45.133.1.182/proxies.txt
suspicious_features POST method with no referer header, Connection to IP address suspicious_request POST http://212.192.241.15/service/communication.php
suspicious_features Connection to IP address suspicious_request GET http://186.2.171.3/seemorebty/il.php?e=jg1_1faf
suspicious_features POST method with no referer header, POST method with no useragent header suspicious_request POST https://connectini.net/Series/SuperNitouDisc.php
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/S2S/Disc/Disc.php?ezok=folderlyla1&tesla=7
suspicious_features POST method with no referer header, POST method with no useragent header suspicious_request POST https://connectini.net/Series/Conumer4Publisher.php
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/Series/publisher/1/KR.json
suspicious_features POST method with no referer header, POST method with no useragent header suspicious_request POST https://connectini.net/Series/Conumer2kenpachi.php
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/Series/kenpachi/2/goodchannel/KR.json
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/Series/configPoduct/2/goodchannel.json
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_installrox2_BumperWw
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/ip/check.php?duplicate=kenpachi2_non-search_goodchannel_lyloutta_Traffic
suspicious_features GET method with no useragent header suspicious_request GET https://cdn.discordapp.com/attachments/905701898806493199/905826613411864596/BumperWW.exe
suspicious_features GET method with no useragent header suspicious_request GET https://iplogger.org/13LYu7
suspicious_features GET method with no useragent header suspicious_request GET https://iplogger.org/12AVi7
suspicious_features GET method with no useragent header suspicious_request GET https://d.gogamed.com/userhome/25/any.exe
suspicious_features GET method with no useragent header suspicious_request GET https://f.gogamef.com/userhome/25/1bec5879a5da641fb388046719b3c83e.exe
suspicious_features GET method with no useragent header suspicious_request GET https://iplogger.org/1Xxky7
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_lylal_piyyyyWW
suspicious_features GET method with no useragent header suspicious_request GET https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_adxpertmedia_advancedmanager
suspicious_features GET method with no useragent header suspicious_request GET https://source3.boys4dayz.com/installer.exe
suspicious_features GET method with no useragent header suspicious_request GET https://cdn.discordapp.com/attachments/893177342426509335/905791554113912932/uglinesses.jpg
request HEAD http://fouratlinks.com/installpartners/ShareFolder.exe
request GET http://fouratlinks.com/installpartners/ShareFolder.exe
request GET http://fouratlinks.com/stockmerchandise/zillaCPM/r4XZt5MYHpEdcdmzqr2D.exe
request GET http://fouratlinks.com/stockmerchandise/serious_punch_upd/HttpTwcyK3R6gQj7t7EY.exe
request GET http://fouratlinks.com/stockmerchandise/total_out_hand/v8hBqWuKscbjZRqNatPw.exe
request GET http://fouratlinks.com/Widgets/FolderShare.exe
request POST http://requestimedout.com/xenocrates/zoroaster
request GET http://www.google.com/
request GET http://apps.identrust.com/roots/dstrootcax3.p7c
request GET http://45.133.1.107/server.txt
request GET http://212.192.241.15/base/api/statistics.php
request POST http://212.192.241.15/base/api/getData.php
request HEAD http://45.133.1.107/download/NiceProcessX64.bmp
request GET http://45.133.1.107/download/NiceProcessX64.bmp
request GET http://file.ekkggr3.com/lqosko/p18j/cust51.exe
request GET http://ip-api.com/json/
request GET http://45.9.20.156/pub.php?pub=five
request GET http://staticimg.youtuuee.com/api/fbtime
request POST http://staticimg.youtuuee.com/api/?sid=578995&key=b4a44f7ae92b9b3dfe2bcb545627cb4d
request GET http://cloutingservicedb.su/campaign2/autosubplayer.exe
request HEAD http://193.56.146.36/udptest.exe
request GET http://193.56.146.36/udptest.exe
request HEAD http://www.hzradiant.com/askhelp42/askinstall42.exe
request HEAD http://www.mrwenshen.com/askhelp59/askinstall59.exe
request HEAD http://dataonestorage.com/search_hyperfs_204.exe
request HEAD http://privacytoolzfor-you6000.top/downloads/toolspab2.exe
request HEAD http://eguntong.com/pub33.exe
request HEAD http://www.mrwenshen.com/askinstall59.exe
request HEAD http://www.hzradiant.com/askinstall42.exe
request GET http://privacytoolzfor-you6000.top/downloads/toolspab2.exe
request GET http://eguntong.com/pub33.exe
request GET http://www.mrwenshen.com/askhelp59/askinstall59.exe
request GET http://www.mrwenshen.com/askinstall59.exe
request GET http://www.hzradiant.com/askhelp42/askinstall42.exe
request GET http://www.hzradiant.com/askinstall42.exe
request GET http://dataonestorage.com/search_hyperfs_204.exe
request GET http://htagzdownload.pw/SaveData/SaveData.php?ezzabour=%7B%22NameOffer%22:%22BumperWw%22,%22ip%22:%22%22,%22country%22:%22KR%22,%22DateTime%22:%222021-11-05%2012:47%22,%22Device%22:%22TEST22-PC%22,%22PCName%22:%22test22%22,%22postcheck%22:%22False%22,%22tag%22:%22kenpachi2_lylaShare1_folderlyla1_foldershare_goodchannel_registry_goodchannel_installrox2_BumperWw%22,%22Os%22:%22WIN7%22,%22Browser%22:%22Internet%20explorer%22%7D
request GET http://45.133.1.182/proxies.txt
request POST http://212.192.241.15/service/communication.php
request GET http://186.2.171.3/seemorebty/il.php?e=jg1_1faf
request POST https://connectini.net/Series/SuperNitouDisc.php
request GET https://connectini.net/S2S/Disc/Disc.php?ezok=folderlyla1&tesla=7
request POST https://connectini.net/Series/Conumer4Publisher.php
request GET https://connectini.net/Series/publisher/1/KR.json
request POST https://connectini.net/Series/Conumer2kenpachi.php
request GET https://connectini.net/Series/kenpachi/2/goodchannel/KR.json
request GET https://connectini.net/Series/configPoduct/2/goodchannel.json
request GET https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_installrox2_BumperWw
request GET https://connectini.net/ip/check.php?duplicate=kenpachi2_non-search_goodchannel_lyloutta_Traffic
request GET https://cdn.discordapp.com/attachments/905701898806493199/905826613411864596/BumperWW.exe
request POST http://requestimedout.com/xenocrates/zoroaster
request POST http://212.192.241.15/base/api/getData.php
request POST http://staticimg.youtuuee.com/api/?sid=578995&key=b4a44f7ae92b9b3dfe2bcb545627cb4d
request POST http://212.192.241.15/service/communication.php
request POST https://connectini.net/Series/SuperNitouDisc.php
request POST https://connectini.net/Series/Conumer4Publisher.php
request POST https://connectini.net/Series/Conumer2kenpachi.php
domain htagzdownload.pw description Palau domain TLD
domain yandex.ru description Russian Federation domain TLD
domain cloutingservicedb.su description Soviet Union domain TLD
domain privacytoolzfor-you6000.top description Generic top level domain TLD
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2336
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2336
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2336
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 385024
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040f000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2416
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1236
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000061d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 1835008
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000008f0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000a30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2bb1000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e30000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e30000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e30000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e30000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e30000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e31000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e31000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e31000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e31000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2e2e000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00022000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 589824
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff20000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000da000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00012000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00023000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000ea000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00112000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000ed000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0002c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00160000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00024000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00161000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00162000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00163000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00164000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00025000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00165000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000db000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
description ww15_testLL_0310_single.exe tried to sleep 141 seconds, actually delayed analysis time by 141 seconds
description BumperWW.exe tried to sleep 122 seconds, actually delayed analysis time by 122 seconds
description Lixygaevymi.exe tried to sleep 250 seconds, actually delayed analysis time by 250 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 8845791232
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Explorer
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 0
root_path: \\?\C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\
total_number_of_bytes: 0
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 0
root_path: \\?\C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\
total_number_of_bytes: 0
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 0
root_path: \\?\C:\Users\test22\AppData\Roaming\AW Manager\
total_number_of_bytes: 0
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 9219698688
free_bytes_available: 9219698688
root_path: \\?\C:\Users\test22\AppData\Roaming\
total_number_of_bytes: 9219698688
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 9219489792
free_bytes_available: 9219489792
root_path: \\?\C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\
total_number_of_bytes: 9219489792
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 9214152704
free_bytes_available: 9214152704
root_path: \\?\C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\
total_number_of_bytes: 9214152704
1 1 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 36\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 65\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 62\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 3\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 24\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 75\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 98\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 28\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 93\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 92\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 97\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 47\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 74\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 21\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 83\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 17\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 69\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 50\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 57\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 63\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 66\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 34\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 80\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 84\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 77\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 64\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 8\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 31\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 4\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 35\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 6\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 72\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 13\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 53\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 23\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 25\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 61\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 82\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 7\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 12\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 95\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 22\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 70\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 73\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 18\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 56\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 55\Cookies
domain ipinfo.io
domain ip-api.com
file C:\Users\test22\AppData\Roaming\proliv041.exe
file C:\Users\test22\Pictures\Adobe Films\zCTtYs2X6MIXPu1iAb3QcQKE.exe
file C:\Program Files\Windows Defender\EOUZNQTEXE\foldershare.exe
file C:\Users\test22\Pictures\Adobe Films\Fb7m5lwjGGqZjFSI1NI5IT0S.exe
file C:\Program Files (x86)\Company\NewProduct\cutm3.exe
file C:\Users\test22\Pictures\Adobe Films\tqfipZFUbzH_ujfiAYSlnmpT.exe
file C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp\_isetup\_shfoldr.dll
file C:\Users\test22\Pictures\Adobe Films\gnTt31FBU2RkXESFsLvMLV95.exe
file C:\Users\test22\Pictures\Adobe Films\2EEBa_J1cdykvsX9ogWTty98.exe
file C:\Users\test22\AppData\Local\Temp\4a-841a7-6ec-3f1a8-c322fd916228f\Hyvacaerufe.exe
file C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp\DYbALA.exe
file C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp\idp.dll
file C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll
file C:\Users\test22\Pictures\Adobe Films\An8eXpLsiRZjE_jKCIY0weAL.exe
file C:\Users\test22\Pictures\Adobe Films\Yy1UpurwsHhgAxyvFO1fsEJc.exe
file C:\Users\test22\Pictures\Adobe Films\Z7cnF_KncwQG5qs37FHAoOtp.exe
file C:\Users\test22\AppData\Local\Temp\ab-479ac-814-bb8a8-11130f0847f23\Lixygaevymi.exe
file C:\Program Files (x86)\Company\NewProduct\Uninstall.exe
file C:\Users\test22\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dll
file C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe
file C:\Users\test22\Documents\T9aZunTSaNJLBVfIkgF5mtQo.dll
file C:\Users\test22\AppData\Roaming\Underdress.exe
file C:\Users\test22\Pictures\Adobe Films\csoCH3pRbI_GagnhR3A9twXi.exe
file C:\Users\test22\Pictures\Adobe Films\PagDyspdvNDek1mPUjFhavf9.exe
file C:\Users\test22\Pictures\Adobe Films\1AI7Qh_cSRFpTbDT02aao5Mm.exe
file C:\Users\test22\Pictures\Adobe Films\zl1mb9Yk6lVkb6lKpr0u1iAW.exe
file C:\Users\test22\Pictures\Adobe Films\vFZoCgl35XxVzh8qqcJB1_ox.exe
file C:\Users\test22\Pictures\Adobe Films\60K7gDPwg8mtUnq7PXG9pdlx.exe
file C:\Users\test22\Pictures\Adobe Films\11E7MDGSktAZAwVCAJlPDyeF.exe
file C:\Users\test22\Pictures\Adobe Films\Ii72a58i44lVrXJwb4bUZxN2.exe
file C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi
file C:\Users\test22\Pictures\Adobe Films\xQPPSQ1BqNk9eqt6i4rvB9H7.exe
file C:\Users\test22\Pictures\Adobe Films\sRJwwLbHRcg3hgOoQ2d7FGcu.exe
file C:\Program Files (x86)\Microsoft Analysis Services\Xibijozhana.exe
file C:\Users\test22\Pictures\Adobe Films\v86hR6bOp_cjN_kGHlJ96iWJ.exe
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk
cmdline cmd.exe /k C:\Users\test22\AppData\Local\Temp\wdg0lsza.mbf\BumperWW.exe & exit
cmdline cmd.exe /k C:\Users\test22\AppData\Local\Temp\mnykrj0q.fnf\installer.exe /qn CAMPAIGN=654 & exit
cmdline cmd.exe /k C:\Users\test22\AppData\Local\Temp\cxkdphvb.w33\any.exe & exit
cmdline cmd.exe /k C:\Users\test22\AppData\Local\Temp\tx20rfg2.f30\customer51.exe & exit
cmdline "C:\Windows\System32\cmd.exe" /k C:\Users\test22\AppData\Local\Temp\cxkdphvb.w33\any.exe & exit
cmdline "C:\Windows\System32\cmd.exe" /k C:\Users\test22\AppData\Local\Temp\mnykrj0q.fnf\installer.exe /qn CAMPAIGN=654 & exit
cmdline cmd.exe /c taskkill /f /im chrome.exe
cmdline "C:\Windows\System32\cmd.exe" /k C:\Users\test22\AppData\Local\Temp\3a4dsbox.5nj\ww15_testLL_0310_single.exe & exit
cmdline "C:\Windows\System32\cmd.exe" /k C:\Users\test22\AppData\Local\Temp\wdg0lsza.mbf\BumperWW.exe & exit
cmdline "C:\Windows\System32\cmd.exe" /k C:\Users\test22\AppData\Local\Temp\tx20rfg2.f30\customer51.exe & exit
cmdline cmd.exe /k C:\Users\test22\AppData\Local\Temp\3a4dsbox.5nj\ww15_testLL_0310_single.exe & exit
cmdline "C:\Windows\System32\cmd.exe" /k C:\Users\test22\AppData\Local\Temp\wpr4byow.xse\gcleaner.exe /mixfive & exit
cmdline cmd.exe /k C:\Users\test22\AppData\Local\Temp\wpr4byow.xse\gcleaner.exe /mixfive & exit
cmdline cmd.exe /k C:\Users\test22\AppData\Local\Temp\0euy33ek.tqo\autosubplayer.exe /S & exit
cmdline "C:\Windows\System32\cmd.exe" /k C:\Users\test22\AppData\Local\Temp\0euy33ek.tqo\autosubplayer.exe /S & exit
file C:\Users\test22\AppData\Local\Temp\ab-479ac-814-bb8a8-11130f0847f23\Lixygaevymi.exe
file C:\Users\test22\AppData\Local\Temp\4a-841a7-6ec-3f1a8-c322fd916228f\Hyvacaerufe.exe
file C:\Program Files\Windows Defender\EOUZNQTEXE\foldershare.exe
file C:\Users\test22\Pictures\Adobe Films\Yy1UpurwsHhgAxyvFO1fsEJc.exe
file C:\Users\test22\Pictures\Adobe Films\zl1mb9Yk6lVkb6lKpr0u1iAW.exe
file C:\Users\test22\Pictures\Adobe Films\tqfipZFUbzH_ujfiAYSlnmpT.exe
file C:\Users\test22\Pictures\Adobe Films\Fb7m5lwjGGqZjFSI1NI5IT0S.exe
file C:\Users\test22\Pictures\Adobe Films\60K7gDPwg8mtUnq7PXG9pdlx.exe
file C:\Users\test22\Pictures\Adobe Films\An8eXpLsiRZjE_jKCIY0weAL.exe
file C:\Users\test22\Pictures\Adobe Films\zCTtYs2X6MIXPu1iAb3QcQKE.exe
file C:\Users\test22\Pictures\Adobe Films\vFZoCgl35XxVzh8qqcJB1_ox.exe
file C:\Users\test22\Pictures\Adobe Films\11E7MDGSktAZAwVCAJlPDyeF.exe
file C:\Users\test22\Pictures\Adobe Films\xQPPSQ1BqNk9eqt6i4rvB9H7.exe
file C:\Users\test22\Pictures\Adobe Films\Z7cnF_KncwQG5qs37FHAoOtp.exe
file C:\Users\test22\Pictures\Adobe Films\sRJwwLbHRcg3hgOoQ2d7FGcu.exe
file C:\Users\test22\Pictures\Adobe Films\Ii72a58i44lVrXJwb4bUZxN2.exe
file C:\Users\test22\Pictures\Adobe Films\1AI7Qh_cSRFpTbDT02aao5Mm.exe
file C:\Users\test22\Pictures\Adobe Films\PagDyspdvNDek1mPUjFhavf9.exe
file C:\Users\test22\Pictures\Adobe Films\gnTt31FBU2RkXESFsLvMLV95.exe
file C:\Users\test22\Pictures\Adobe Films\2EEBa_J1cdykvsX9ogWTty98.exe
file C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe
file C:\Program Files (x86)\Company\NewProduct\cutm3.exe
file C:\Users\test22\AppData\Local\Temp\ab-479ac-814-bb8a8-11130f0847f23\Lixygaevymi.exe
file C:\Users\test22\AppData\Local\Temp\4a-841a7-6ec-3f1a8-c322fd916228f\Hyvacaerufe.exe
file C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp\DYbALA.exe
file C:\Users\test22\AppData\Local\Temp\is-0EQ3T.tmp\kak.tmp
file C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll
file C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp\_isetup\_shfoldr.dll
file C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp\idp.dll
file C:\Users\test22\AppData\Roaming\Underdress.exe
file C:\Users\test22\AppData\Roaming\proliv041.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /k C:\Users\test22\AppData\Local\Temp\wdg0lsza.mbf\BumperWW.exe & exit
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /k C:\Users\test22\AppData\Local\Temp\3a4dsbox.5nj\ww15_testLL_0310_single.exe & exit
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /k C:\Users\test22\AppData\Local\Temp\cxkdphvb.w33\any.exe & exit
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /k C:\Users\test22\AppData\Local\Temp\tx20rfg2.f30\customer51.exe & exit
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /k C:\Users\test22\AppData\Local\Temp\wpr4byow.xse\gcleaner.exe /mixfive & exit
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /k C:\Users\test22\AppData\Local\Temp\0euy33ek.tqo\autosubplayer.exe /S & exit
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /k C:\Users\test22\AppData\Local\Temp\mnykrj0q.fnf\installer.exe /qn CAMPAIGN=654 & exit
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Yy1UpurwsHhgAxyvFO1fsEJc.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Yy1UpurwsHhgAxyvFO1fsEJc.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\zl1mb9Yk6lVkb6lKpr0u1iAW.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\zl1mb9Yk6lVkb6lKpr0u1iAW.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\tqfipZFUbzH_ujfiAYSlnmpT.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\tqfipZFUbzH_ujfiAYSlnmpT.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\csoCH3pRbI_GagnhR3A9twXi.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\csoCH3pRbI_GagnhR3A9twXi.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Fb7m5lwjGGqZjFSI1NI5IT0S.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Fb7m5lwjGGqZjFSI1NI5IT0S.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\60K7gDPwg8mtUnq7PXG9pdlx.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\60K7gDPwg8mtUnq7PXG9pdlx.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\An8eXpLsiRZjE_jKCIY0weAL.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\An8eXpLsiRZjE_jKCIY0weAL.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\zCTtYs2X6MIXPu1iAb3QcQKE.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\zCTtYs2X6MIXPu1iAb3QcQKE.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\vFZoCgl35XxVzh8qqcJB1_ox.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\vFZoCgl35XxVzh8qqcJB1_ox.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\11E7MDGSktAZAwVCAJlPDyeF.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\11E7MDGSktAZAwVCAJlPDyeF.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\xQPPSQ1BqNk9eqt6i4rvB9H7.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\xQPPSQ1BqNk9eqt6i4rvB9H7.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Z7cnF_KncwQG5qs37FHAoOtp.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Z7cnF_KncwQG5qs37FHAoOtp.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\sRJwwLbHRcg3hgOoQ2d7FGcu.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\sRJwwLbHRcg3hgOoQ2d7FGcu.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Ii72a58i44lVrXJwb4bUZxN2.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Ii72a58i44lVrXJwb4bUZxN2.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\1AI7Qh_cSRFpTbDT02aao5Mm.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\1AI7Qh_cSRFpTbDT02aao5Mm.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Yy1UpurwsHhgAxyvFO1fsEJc.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Yy1UpurwsHhgAxyvFO1fsEJc.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\xQPPSQ1BqNk9eqt6i4rvB9H7.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\xQPPSQ1BqNk9eqt6i4rvB9H7.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\PagDyspdvNDek1mPUjFhavf9.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\PagDyspdvNDek1mPUjFhavf9.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\csoCH3pRbI_GagnhR3A9twXi.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\csoCH3pRbI_GagnhR3A9twXi.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\zCTtYs2X6MIXPu1iAb3QcQKE.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\zCTtYs2X6MIXPu1iAb3QcQKE.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\vFZoCgl35XxVzh8qqcJB1_ox.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\vFZoCgl35XxVzh8qqcJB1_ox.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\1AI7Qh_cSRFpTbDT02aao5Mm.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\1AI7Qh_cSRFpTbDT02aao5Mm.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Z7cnF_KncwQG5qs37FHAoOtp.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Z7cnF_KncwQG5qs37FHAoOtp.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Fb7m5lwjGGqZjFSI1NI5IT0S.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Fb7m5lwjGGqZjFSI1NI5IT0S.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\sRJwwLbHRcg3hgOoQ2d7FGcu.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\sRJwwLbHRcg3hgOoQ2d7FGcu.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\Ii72a58i44lVrXJwb4bUZxN2.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\Ii72a58i44lVrXJwb4bUZxN2.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\An8eXpLsiRZjE_jKCIY0weAL.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\An8eXpLsiRZjE_jKCIY0weAL.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\gnTt31FBU2RkXESFsLvMLV95.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\gnTt31FBU2RkXESFsLvMLV95.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\11E7MDGSktAZAwVCAJlPDyeF.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\11E7MDGSktAZAwVCAJlPDyeF.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\tqfipZFUbzH_ujfiAYSlnmpT.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\tqfipZFUbzH_ujfiAYSlnmpT.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\zl1mb9Yk6lVkb6lKpr0u1iAW.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\zl1mb9Yk6lVkb6lKpr0u1iAW.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\60K7gDPwg8mtUnq7PXG9pdlx.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\60K7gDPwg8mtUnq7PXG9pdlx.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\Pictures//Adobe Films\2EEBa_J1cdykvsX9ogWTty98.exe
parameters:
filepath: C:\Users\test22\Pictures\Adobe Films\2EEBa_J1cdykvsX9ogWTty98.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe
parameters:
filepath: C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Program Files (x86)\Company\NewProduct\cutm3.exe
parameters:
filepath: C:\Program Files (x86)\Company\NewProduct\cutm3.exe
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 16 (PAGE_EXECUTE)
base_address: 0x05fc0000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL'þúà" 0L¼¾j €@ ` @…pjK€x¸@  H.textÄJ L `.rsrcx¸€ºN@@.reloc @  @B jH@æ0„˜+DqÙ),—%$KÕ-–‰×sL~%’þƒ½~82„êÉTGwŽŒ7, üm,p^.k-°|%Yàł®IšT£K ¸)Ãý·Ž!ɦQÁ›ð OČ+d z ÁÓý3ä™Ï ¥Ð¹…>2;ã; L¤ÐöõkðFK}àáÆÉ­¶¢¿z*à}Üӓ €ÂåàZxÎy ϑóÚJÊIB‘Äւo®‘8)<ê°²“}œK÷ø]ÜX4}—|zDxÒ¤X›íBÚóùAsñ=>ÂMŽqƒôkŽE“ñÕª_W ½{Ju¦·C—› +{øSíjƒ}ºØ]ž›0T°¥q0¯‚ ÿ7‰Ê¡{Õkq§OäMiœøzØõ¢úOqè¥qþÖCØÕ¬‹“1=j¥ uÄê²ñ=å“KrÝwƒvÓ´š-Í@ezòaw^ (/µxČú‡¥ö°!îƒËu+”+-‡ô1 _’eç6À-¾%FÔ~ÏÇɑ8}þùBY¾1ïûð‘&ÊV¶=G®M/à!Gàá÷Ã?i
request_handle: 0x00cc000c
1 1 0

recv

buffer: HTTP/1.1 200 OK Date: Fri, 05 Nov 2021 00:05:56 GMT Server: Apache Last-Modified: Mon, 01 Nov 2021 16:41:58 GMT ETag: "59a00-5cfbcdaf76180" Accept-Ranges: bytes Content-Length: 367104 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: application/x-msdos-program MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELž €aà" 0x î–  @ à@…˜–S ØÀ  H.textôv x `.rsrcØ z@@.reloc À˜@BЖHÐsÈ"’>Y0¢{¾7îV™<V’ú8è;Ù´¬4«–ʧa!;†Øi×ðS匋yñ³)”vrd“6«‹‡ìeJ½U•ùuCR†yص•žgSWfW!Jà ®}¸ÒàÒ=¹Á_¡;¼äҎ£Öå œï ^7ÆÍb¢»+ÐO2 ¡%…˜ p…î'O0\_@Ó²ã=‡Ÿ¥ßb™òìÇÿx¡ŽsÚü>Þðj’êÂÂB˜H0çŒÁËwI¦êÂ-ø½·H"½U»CQùÇÒîvÐI¢bâ°ûŽï ÕÚÑh•ýEñòC=Ĝ7HǞ@,½«F°Äfæì箛ªU¾ ¨zîÐu‹—Œüª•†·‘I‡ â‘3éR,üÙAÒµ£ŽàgîÖ$Êr,0ûYR9+âÓïENh‚áü[³u‹ô6›Jž¬NÏ××NoÒþH]—“¢*êoÐX‰aÀDôêì]mÁ£N¯!)äͿ͵oåµ'{Ài5‹Àð6Uƒ·Ià¦E5\ü÷ØTuu~¿í¸IQD Å»QG›°ûB-RÚ\N\ž¥`ahøüs|{E¶¼)8¾Á*ÀŠ°bgÞ¶I”¾9(#ÂÑùqÞÒOë‘ù™«ô1ÌnÒ.õô‹Tñҍ×$¹[ˆÒû̔û’ÄCg7qǞ }"•D »9 Qé8Þ4AÞM-eOPÄÒÞi Cg뼌æWíYÖæë9.þºïZR/¿òcJîD½]Xn¤IÚWœ‡LIø‘dòçá—ûٛìäp¹-}+„î៯'à”Eì¼¢$GއRßD1ðˆUÀ†‹­~{¶T}ÂHkc]»ÿÚ¨bŠ'|IÛ ÕK÷8´ºØ¥Wõ:ò*w .+ˆúšXQ#3‚fU”Úp/öŽ—:`æ¬Ðã÷£%¿!yVdñXÉL‹l—‚ ¥Ð€Å’C0¶¬ù%Å°óKÑ_´³zH^êúÞ™æg6×Y¶{t2|ãœâ,éöÔ)ô5€ÑãÉ_ˆ[Ø¥±œc9Ò²¾O§¼ÀÓOÅSO&2¬Þ×ÔÈÏ_@*a×½H«ÏÌå¶zìišäΖ‡æ[|§Ó˜ŒTãZ?#”žFn42¼ÙFÚj7Å ~ÇSuŒmkY³7r€S¼Î°&ÞÒ¢˜w<ÓýϕÀ”¡²Ù(^ö*µàfÆÍW”í!Ó=»»;Ӓùþg 8‡¾"7@^0u!{Ç¡A09.Ór¼2N =à¦Ò#s«~¨‚?ÇÁE,GŽ_LSÖ_eµÊg’Ε•º ñ¯ðd°2XÍù˜ÌŽ¤0$3 ÷)$'C’9Em#s«~¨‚?ÇÁE,Ò?(éÐv“ð—ß,ãñÆ —*¿+HÚ,P›ÓsÒyoºýÜN̂)òmLà,bÕ§É#¨`S#×ÛÀ“ÊÈ ££ðí®û¾xÒÒ!mBŸ‚å.¶«'"¶rÕžÛõheæb–÷pçÙÓsy=ç·U¸Éé_U%û¤RéW „ñCP'O‚wìQ0yÇ 8µ¹ÕU’=SÐÿ¿KŠÏKá´­¡1g-fà 6<lRh½aGU¬¾+8$…¹)È Â“ÏŠMΉÞOPðór)¨·¥PÖ;á|cÖV쇵.î³ô&[ûä ¾-†àÊùÅÚ5¨€•ŠSP-¬6QüHu;›`ûã5&£¡/ψ%¥Ý¸æh”%êŒ÷äáró`Ú¼wÌ®Bdíܾ“±[Ô¢ÐÛBM,.>^±¾ÙOÝEQ3·¤ó'îß xr«~ÿóZRR…g©© *&5"LÍA©¿Â½/fÌÔ 4+óðHöé·×» –bñnbö؁‰ƒëCi¦ø`f ×{{³Ö.\9Çné%Š“Ý9̔èþrãûGô!Cÿ&éÌ’»^GyK©7â>*ì?`jméhÛMï].)Ú.¶àG›Yì#äœËxµ ¶¹ó=]Tó !‚æèÌÌ%jð¬vb™Ìž:íV}Ž‘rž â¦LF™d®é©çu¹î§%Áy‰ÎØ»©ÊøÞ¶œúÇiåc¸$þ˜8ØjsÚ%b5vØÿÂhN ¬ó¬# ò†ˆxÑ~øŒ‹O¹±ðäU/ÙAº»rE,š”潪Ê>réƒz·™KÕ)بH p•íY¡O${~¢ü˜æ”y‚#/mØÌ7Ë·ò¹¢z<‰1(HÜLÓÀXX“ê—4˜³”A) ©ª£Óc A¤I0Ù¯ÈÅ^M„§êwÒ‘úºeò7U–^÷bõ±ÖR` #î´¸”ꥨ¦6'4±½•¬J¤gt÷šÝ xí¾(Ïu¨"œŠ®©XÂ&\ߘ }ïÃÕMÓüO:3“¬™l¡0]•Â€>iC\ë=ŽXÁãßk¶ÞþõÍwwQ7ñ,Š õi襝}PrYl¶ý î89›{º¯Dr£ä=MÄé {àÿ;·þC…á9¼ ¥®¡ö,õàûJ¾*m5Pbü1'nÆ«S(\&úÁëz`çÓaŸqß­dTBÛ´,¾#-œJ0’m„““üu„*ðYÌYªu»á™Ë&KŒú~ŽF8*Ÿ™$°¸Øã{Ð J
received: 2920
socket: 1444
1 2920 0

recv

buffer: HTTP/1.1 200 OK Date: Fri, 05 Nov 2021 00:06:04 GMT Server: Apache Last-Modified: Mon, 01 Nov 2021 16:08:48 GMT ETag: "88400-5cfbc645a6400" Accept-Ranges: bytes Content-Length: 558080 Content-Type: application/x-msdos-program MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELè€aà" 0pΎ  @ à@…€ŽK @À  H.textÔn p `.rsrc@ r@@.reloc À‚@B°ŽHH#8k™Y×ïd’ð‡uÙqø’ß+8_WCr]E÷Ìx:.1\í(ìÄf 5¥Ã[š‚–?m””í­jOc¢áÚaÄ¿ãrÓxt7X£Vu˜T€´Q<Ð4æ¬ËÝ ˆ±ï=Ó­` ÁÈÞr“ˆO­ÖÏävúï&2ìà`ï™ó÷|¾nȑ .r0“ޏE‡êj¸ˆ×):2Y´ÊØWÀ™(b½ÜÿVÄ.ÄCw$ Œ9½wmákB"Éa¦Ñ<š<•nǜ⡢4S üü/1:Lzâ ç8{m0u07¯l={éÏ©êÊã±bëñÌÍ"£•3çï‡|i.I!dç™ ™‚ó+O™ò5õ$÷á»"h¯Ç 4:è,€æ¯Ú@*›š¶¸|ƒ¿ ¶ïNâwҜ™+ÛIyvG|CA‚ãb(Uó§Dáºtü’q=î+sÌAãÇùjÌ[ädéõø%¯@3•Î^E÷G;h­èMv—’ò…†«³ãĶŽvwÓ¢QÈßìàÒ^—òÝ`oéÇ> AÓÁ^wì~F‰³T9ÔÔÂéÛ Æ?|ÊCçoã•ísøê9Ò†¥¡7ÆIº£"ÁØ«ëb¨¨C{/9?TD ބKÓ¤›oÆ Ó0ÂKIa[F±í…å)$¹š”E²@âþBÇçmƒó+Íob>Qªªí+¾$âÄî4 ý»Ô\¥}mÈ0ð?í±ö~™~ðdwҌ½‘iŠÓ¡©;-¯Á{N$øèkŠ{«Ã^ùƒ×Ž}ü¾µ‘ᐉ»Zf[˞°6™ÚŠÂ~Î<®` íFøŠJü½ÔÅ"V¾¹ 9ÎÚȉºYòT…[]ýœ!ê¿H¯Ü·™“ßrµ±SíðYªü …ú©®W‰ý®î!­X ÿáë‘rÀ•`p%‰¼‹#3«nö"Ì}vsÛ°A{0‚UùA°8>£­ÿm]tœ íÓÖK!k…úD_ÒæZ ŒOÈÔñ`Ƈ;»–†ð~O}5Xé%_Lˆ]û¢µô€î·e„Û }6m+9»i!fÄHK^§sµ¯Éýèðۘ`ô6^‘YõåÚÞq£ ’ü±Å›ó*ĪÈx͖“?’Eè¡É(Í£FûŒ'ÐÔ?8 3?x Å¡cJ<hPÌWsƒÿÑÜKìñS½.\XJÍ8îç7±¯0â«ÇÄ?l»ëp!sZ©=•±ō(Šöð RÞyè6ÒöÎñžE@P¶z³©­ÿX®¥«ß܎¿Z}%5%~®™ 7áu<áDiBzÆn(°•îÌi`:™úU&á Óh¾ÑX;7bŒz꧷†nèÑÛ9uso´œ î¬ ús&[ÞWðb^ÜÅÈÏ8d—–gÍ Ud1ªÎ¬9­üEôüŽý‰=Õ}¥ÙÉÒåǼ%՗„#ev,‡qiïÐÜLpsjje¦WgnžAF~÷{ÒAÎß_=tv±5C4O'ñ²£‚[֒“xĕ1¤BƒæQyž:µQBŸóñCYo=7‹’-üG.<X߀ÄÁ,u‚‰"†…Ê+jºq¦TŸŸ RÁö¿ É„“Ñ>{`×EŸÚÀÖØF¹ê«á”œ_h¿Ôr„x~ÖN¸ði®ŽdÄé€UO*‚m<gN‡¶·ÿ6\ñ4'€Ô)F±Ñx«è¤—ƒÈ_·ö>êêƒt¸p¯TCíÀÂA±¼8F/Öp«xʲlí,U±Ÿ‘"K´Ñ%ëcR©RVm•ÊÒèIÿ*#ÍæºO:º×lu±ýؔŽ3#÷¢rê+רѽ †ŠÉ¸™QÒÙ^îôÚɳúiIøæIçfÐœ®–³£åCö&™ âOHq,­_yóªVÌÿk2Ü0ºí<쉳˜O ÞéP+ÕX·+²®d‚b/&ö ë§õ\¹kx͂¤±¹Pð-Ž`¯Å7Ķ‘…Ð6S‚©€ŠÈêû}˜´¨þPŽ!тD†éO„¬Ï§Ìg×­1Ÿ0îô;ˆYHüG¶^1§<ž^Ei×;†Áí+9ˆxá[h}kñþfÊ >µbˉâðéñ”vހ² ï@vŸáUÑu³„¿«¥àt~…¥­‰aû¸)pÌëE£ÞÁ/ÿ&C¡öÒŸÒ€ª|ÕwBØh‚X?Tù9äê¹T¡jųÃÜõžˆCi×öÔô$Fƒî‰ÊÞ4•”lG!ÿ9ŠÊ R ¹rHùõ"| û«íH„ó¦ñ+(|™‚\_k[cK@RJ ºòžþ‘!D!«~ï¾Óςëýá ?è*'J¤•&T ~{oª]õ†¡ízçCàÀ¶XƒMÊcÏ>qZ½ ©ÑÅýž ôJ§•8y‹¡˜UÙ›éYUNõÈTžSÖå}õùÝ}ñI.ua7©Õ‡È$ ¾s h”‡AB™y}ȶävMoå«Q”à#`;b6$€áæù™Ç”"gWO¸£È ª§•¾ª¾«w™Sýá]•H^ãÓ5óy<oK^‡ ï_Á¦ +øMc›gå3b¬±çè™f`ªËp¾~Qþë þ¼Ì( Pnû™!Õïʤ©Q٠ޘ†…ikÏÓ,‚‚䟂¼güz¯hðÑ*'ç38Zx-Ï0ê‰"äM’æ8”(¿%bД²ÃB #ñ9|¤Õoן=ÀêJEàÎQ9´jó}˜ç«¥J
received: 2920
socket: 1444
1 2920 0

recv

buffer: HTTP/1.1 200 OK Date: Fri, 05 Nov 2021 00:06:09 GMT Server: Apache Last-Modified: Mon, 27 Sep 2021 13:36:56 GMT ETag: "bc800-5ccfa30ca2e00" Accept-Ranges: bytes Content-Length: 772096 Content-Type: application/x-msdos-program MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELå Qaà" 0 ¼Ú( @@  @…ˆ(O@”¸ P'  H.textà  `.rsrc”¸@º @@.reloc Æ @B¼(H´/´hMèÙ6( (*0’rps %rpo r'po r?po rIpo rSpŒ-o rpo o r]po o ¥1, rups zÞo r«p( &Þ*ž{o {o {o (*0(s o 3{o! o" *&&*ò{o# o$ 1{o# o% o& (&*r¹p(' &*0Qrñprpr-p(( s) r1po o r]po o ¥1 Þ ,o* Ü*)E (*0µ{o+ o, rñprps- s. o/ o0 +co1 t 6%r?po2 t6¢%rIpo2 t6¢%r'po2 t6¢s3 {o+ o4 &o5 -•Þ,o* Ü,o* Ü*1o  %…ª 0(s o 3{o! o" *&&*0z{o# o$ 1[{o# o% o6 o7 o8 (9 o6 o7 o8 (9 r?po6 o7 o8 (: &*r¹p(' &*z,{, {o* (; *0I Ð(< s= s> }s? }s? }s? }s@ }s@ }sA }sB } s@ } sB } sC } sA }sA }sD }sC } sB }sD }{ oE {oF { oE {oF (E {oG {oH %{¢%{¢%{¢oI {oJ {oK {.sL oM {sN oO {rYpoP {  ÜsQ oR {oS {oT {oU {oV {r?poW {hoX {rIpoW { oX {rmpoW {}oX {oY {`sL oM {sN oO {rwpoP {WsQ oR {oT {r…po" {oY {@sL oM {sN oO {r¡poP {WsQ oR {oT {r¯po" {oZ {x<sL oM {sN oO {rÉpoP { _sQ oR {oT {råpo" { o[ {  + sL oM { sN oO { rípoP { dsQ oR { oT { rûpo" { o\ { þs] o^ { oY {  sL oM { sN oO { r poP { _sQ oR { oT
received: 2920
socket: 1444
1 2920 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $I4€! Uîr Uîr Uîr>êsUîr>ísUîr>ësŸUîr:êsUîr:ísUîr:ës$Uîr>ïsUîr UïroUîrË:çs UîrË:r UîrË:ìs UîrRich UîrPEd†\Ì<að" zŽ|7@P`TÔ(0è´@œе8¶0¨.text¥yz `.rdataTMN~@@.dataŒà Ì@À.pdata´Ø@@_RDATA” î@@.rsrcè0ð@@.relocœ@ò@BH 9yéÌ$ÌÌÌÌHAíÃÌÌÌÌÌÌÌÌH‰T$L‰D$L‰L$ SVWHƒì0H‹úHt$`H‹ÙèÊÿÿÿE3ÉH‰t$ L‹ÇH‹ÓH‹è<‚HƒÄ0_^[ÃÌÌÌÌÌÌÌÌÌÌÌÌ@SHƒì H‹ÙH‹ÂH õ‚WÀHSH‰ HHèc1H‹ÃHƒÄ [ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌH‹QH%H…ÒHEÂÃÌÌÌÌÌÌÌÌÌÌÌÌÌH‰\$WHƒì H—‚H‹ùH‰‹ÚHƒÁèš1öÃt ºH‹Ïèì#H‹\$0H‹ÇHƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌHQ‚H‰HƒÁéY1ÌÌÌÌÌÌÌÌÌÌÌÌÌH±HÇAH‰AH¾‚H‰H‹ÁÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌHƒìHHL$ èÂÿÿÿH³ÂHL$ è!3Ì@SHƒì H‹ÙH‹ÂH ՁWÀHSH‰ HHèC0HX‚H‰H‹ÃHƒÄ [ÃÌÌÌÌ@SHƒì H‹ÙH‹ÂH •WÀHSH‰ HHè0HH‰H‹ÃHƒÄ [ÃÌÌÌÌH‰\$H‰t$WHìpH‹çÍH3ÄH‰„$`3öÿ<~‹ø3ҍNÿï}H‹ØH‰D$ HƒøÿtF3ÒA¸0HL$0è·4ÇD$00HT$0H‹Ëÿ}…Àt9|$8tHT$0H‹ËÿÁ}ëæ‹t$PHƒûÿt H‹Ëÿ´}‹ÆH‹Œ$`H3Ìè‚Lœ$pI‹[I‹sI‹ã_ÃÌÌÌÌÌÌÌÌÌÌÌÌÌH‰\$WHìH‹ÍH3ÄH‰„$€H‹Ù3ÀH‰H‰AH‰A3ҍHÿ}H‹øH‰D$ Hƒøÿ„‹3ÒA¸0HL$Pèâ3ÇD$P0HT$PH‹Ïÿ¬|…Àt_„LD$XHT$|HL$(èÜH‹ÐH‹KH;Kt è*HƒC(ëL‹ÂH‹ÑH‹Ëè¥HL$(èKHT$PH‹Ïÿ¥|…Àu©Hƒÿÿt H‹Ïÿš|H‹ÃH‹Œ$€H3ÌègH‹œ$¨HÄ_ÃÌÌÌÌÌÌ@SHƒì H‹QH‹ÙHƒú
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: rSÑ<¡ö?ÀЈ:G‘ö?hhö?g6Ÿqö?ù"Qjìaö?£J;…ORö?d! YÈBö?ÞÀŠ¸V3ö?@bwú#ö?”®1h³ö?X`ö?ü-)4döõ?çи[çõ?¥âìÃgØõ?W“+ˆÉõ?‘úGƼºõ?ÀZk¬õ?ªÌ#ñaõ?íX0Ҏõ?`XV€õ?:kP<íqõ?âR|º—cõ?UUUUUUõ?þ‚»æ%Gõ?ëôH 9õ?K¨Vÿ*õ?øâêõ?ÅÄá"õ?PPõ?›LÝbóô?9/§àåô?L,ܾCØô?n¯%‡¸Êô?ᏦÝ>½ô?[¿R Ö¯ô?Jv­¢ô?gвã9•ô?€H"ˆô?{®Gázô?f`Y4Îmô?šÏõÇË`ô?ÊvÇâÙSô?ûÙbeøFô?Mî«0':ô?‡Õ%f-ô?QY^&µ ô?ô?feтô?û°?ûó?¯¥Bîó?©ä¼,âó?Æuª‘ÙÕó?ç«{¤•Éó?U)#Ù`½ó?;±;±ó?"Èz8$¥ó?c,™ó?ŽfÓ"ó?88ó?îEÉÑ[uó?HÞóió?ø*Ÿ_Î]ó?Áx+ûRó?Fà¬yFó?²¼W[ä:ó?újí\/ó?¿+Jã#ó?¶ëéXwó?Ñ0 ó?`Ä*Èó?h/¡½„öò?KÑþ¡Nëò?—€KÀ%àò? P- Õò? ,MûÉò?7ZŽù¾ò?@+­´ò?Áó’©ò?žä)Ažò?¥¸[r“ò?°ˆ°ˆò?MΡ8ú}ò?5'¸Psò?'Ö|³hò?ñ’€p"^ò?²w‘~Sò?’$I’$Iò?[`—·>ò?ß¼šxV4ò?* "*ò?xû!·ò?æUH€yò?ÙÀg G ò?  ò?pÁ}÷ñ?L¸<ôìñ?t¸?;ïâñ?½J.gõØñ?¢­Ïñ?Yàü"Åñ?)íF@J»ñ?ãºòg|±ñ?–{a¹§ñ?žàžñ?œ¢Œ€S”ñ?Û+ƒ°Šñ?ñ?„ÖŠwñ?ysB‰nñ?2üPdñ? 'u_[ñ?ÉÕý£¹Qñ?;Í _Hñ?$G4?ñ?È5È5ñ?¬À퉋,ñ?30]çX#ñ?&H§0ñ?ñ?€¾ûñ?ðþðþð?¢%³úíõð?œækõìð?`‚Uäð?–F¨ Ûð?:ž5VDÒð?;Ú¼OqÉð?qA‹†§Àð?ȝ%ìæ·ð?µì.r/¯ð?§h ¦ð?`ƒ¯¦Ûð?T 9?•ð?âeu³«Œð?„B!„ð?âê¸)Ÿ{ð?Æ÷G &sð?ûyœµjð?ü©ñÒMbð?†ur îYð?4×÷—Qð?ÅdÌIIð?AAð?üG‚·Æ8ð?^µ‘0ð?é)wüd(ð?@ ð?7zQ6$ð?ð?€ð?ð?log10ÿÿÿÿÿÿ?Cÿÿÿÿÿÿ?ÃUnknown exceptionbad array new lengthabcdefghijklmnopqrstuvwxyz0123456789_ABCDEFGHIJKLMNOPQRSTUVWXYZpidhtmpfile.tmp.dllpidHTSIGwbTaskmgr.exekernel32.dll%uLoadLibraryAvector too longstring too longMZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $šˆÞévMÞévMÞévMʂrLÕévMʂuLØévMʂsLGévMՆrLÐévMՆuL×évMՆsLýévMʂwLÝévMÞéwM¼évM†LßévM†‰MßévM†tLßévMRichÞévMPEd† Ì<að" ¶øTZ€`¬z(àà°Üð„X8ÐX0А.textŵ¶ `
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZPÿÿ¸@º´ Í!¸LÍ!This program must be run under Win32 $7PEL^B*àŽ F|hT`@0w³@°˜Üð„àCODEÌDF `DATA”(`*J@ÀBSSõtÀ.idata˜°t@À.tlsÐŒÀ.rdataàŒ@P.reloc„ðŽ@P.rsrcܨ@P ²@P@Byteÿ@ Stringl@l@8.@D.@H.@L.@@.@-@8-@t-@TObjectÿ% ²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%²B‹Àÿ% ²B‹Àÿ%,²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%ü±B‹Àÿ%ø±B‹Àÿ%<²B‹Àÿ%8²B‹Àÿ%4²B‹Àÿ%ô±B‹Àÿ%H²B‹Àÿ%D²B‹Àÿ%ð±B‹Àÿ%ì±B‹ÀSƒÄ¼» Tè¡ÿÿÿöD$,t·\$0‹ÃƒÄD[ËÀÿ%è±B‹Àÿ%ä±B‹Àÿ%à±B‹Àÿ%ܱB‹Àÿ%رB‹Àÿ%Ô±B‹Àÿ%бB‹Àÿ%̱B‹ÀSƒÄô»Ð•Bƒ;uYhDjè¦ÿÿÿ‰D$ƒ|$u3À‰$ëP‹D$‹̕B‰‹D$£Ì•B3À‹ÐҋL$TщT$‹T$‹ ‰ ‹T$‰@ƒødu܋‰D$‹D$‹‰‹D$‰$‹$ƒÄ [ɉ@ËÀSVƒÄø‹ò‹Øèfÿÿÿ‰D$ƒ|$u3Àë:‹‹T$‰B‹F‹T$‰B ‹‰$‹D$‹$‰‹D$‰X‹$‹T$‰P‹D$‰°YZ^[ÃÄø‹P‰$‹‰T$‹$‹L$‰ ‹T$‹ $‰J‹ЕB‰£Ð•BYZËÀSVWUƒÄø‹Ù‹ð‹ü‹‰‹‰‹B‰C‹‹‰D$‹‹R‹Ê‹/M ‹;Èu‹èÿÿÿ‹‹@‰‹‹@ CëC;Ðu‹èqÿÿÿ‹‹@ C‹D$‰;7u®‹Ó‹Æèúþÿÿ„Àu3À‰YZ]_^[Í@SVWUƒÄð‰$‹ô‹‰D$ ‹ ‹‹@;È‚†‹Ø‹>_ ‹ùz;ßrv;Èu!‹B‹A‹B‹)B ‹ƒx uV‹èðþÿÿëM‹Ø‹>_ ‹ùz;ßu ‹B‹)B ë3‹Z‰\$‹>‹‹.} +û‰|$+ȋ‰H T$‹èMþÿÿ„Àu3Àë°ë‹‹‰‹;D$ …Yÿÿÿ3ÀƒÄ]_^[ÐSVW‹Ú‹ðþ}¾ë Æÿÿæ
request_handle: 0x00cc0048
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $¿´ºûiÚéûiÚéûiÚéïÙèñiÚéïßèaiÚéðÞèêiÚéðÙèìiÚéðßèÑiÚéïÞèîiÚéïÛèòiÚéûiÛé†iÚé=ÓèþiÚé=%éúiÚé=ØèúiÚéRichûiÚéPELړeaà ,ðe¤@@P@°ãdè ¸%ˆ¶8À¶@@È.textß+, `.rdata ®@°0@@.dataìð à@À.rsrcèì@@.reloc¸% &î@BU‹ìh؝E¹àFèþhÀ;E贑ƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌS‹ÜƒìƒäðƒÄU‹k‰l$‹ìì¡ðE3ʼnEü3ÀˆEß3ɈMÞ3҈U݊E߈E؊MވMԊU݈UÐÇE¸EšœÇE¼ äÀñ‹E¸‰E ‹M¼‰M¤ÇE°xŸ>XÇE´ÑH­‹U°‰U¨‹E´‰E¬M ‰MÈÇEà7k®œÇEä äÀñÇEèxŸ>XÇEìÑH­3҈U܊E܈EÌ(Eà)E€‹MÈ)E(EfïE€)…pÿÿÿ(…pÿÿÿ‹UÈ‹EȉEċMÄQ¹øFèõhÐ;E諐ƒÄ‹Mü3Íè&Œ‹å]‹ã[ÃÌÌÌÌÌÌÌU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüƒÀP‹MƒÁQ艜ƒÄ‹Eü‹å]ÂÌÌÌÌU‹ìQ‰Mü‹EüÇ4BE‹MüƒÁQèÀœƒÄ‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì‰Mü‹Eüƒxt ‹Mü‹Q‰UøëÇEø¬E‹Eø‹å]ÃÌÌÌÌÌU‹ìQ‰Mü‹EüÇ4BE‹MüƒÁQè`œƒÄ‹Uƒâtj ‹EüPèӏƒÄ‹Eü‹å]ÂÌÌU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüÇ@ÀE‹MüÇ@BE‹UüǼBE‹Eü‹å]ÃU‹ìƒì Môè²ÿÿÿh<âEEôPè_¡‹å]ÃU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüƒÀP‹MƒÁQèI›ƒÄ‹UüÇ@BE‹EüǼBE‹Eü‹å]ÂÌÌU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüƒÀP‹MƒÁQèùšƒÄ‹UüÇ@BE‹Eü‹å]ÂÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì‹E ‹ƒÁ#‹U ‰ ‹E‹‰MôºkÂÿ‹Mô‹‰UøÇEð‹E‹+Mø‰Müƒ}ürƒ}ü#wë è‘Å3Òu÷3Àuå‹M‹Uø‰‹å]ÃÌÌÌÌÌÌÌÌÌÌÌU‹ìjÿhxEd¡Pƒìx¡ðE3ʼnEðPEôd£ÇEœMØè)ÇEüÇEÐÇE̋E‰E˜‹Mƒé‰Mƒ}˜„`‹U ŠˆENjM
request_handle: 0x00cc00a8
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ua÷“™À™À™À~v2À?™À~vÀ3™À~v3À•™Àx À™À˜À™À~v6À™À~vÀ™À~vÀ™ÀRich™ÀPELå[©_à  ¶HKð€Ð@PQX€Œ¹PPˆÑàP0¨t@à.textµ¶ `.data°Jк@À.pakalåðOÒ@À.rsrcˆÑPÒÖ@@.reloceàPf¨@B¼»Ü»ø»¼¼"¼:¼X¼p¼~¼˜¼¬¼¼¼ؼè¼ö¼½½.½D½`½x½ˆ½œ½®½¾½Ú½ð½¾ ¾<¾P¾`¾t¾„¾–¾¸¾оæ¾ö¾¿(¿>¿X¿n¿z¿’¿ª¿¼¿Ê¿ê¿þ¿À*À:ÀPÀ^ÀìÄÜÄÔÀàÀòÀÁ$Á<ÁTÁdÁxÁŒÁ¨ÁÆÁÚÁêÁÂÂ"ÂJÂXÂpŠš°ÂÆÂàÂøÂà Ã:ÃFÃPÃ^ÃjÀÐæöÃÂÃØÃâÃôÃÄÄ.Ä>ÄPÄ\ÄjÄvĎĚĮÄÀÄÐÄúÄ–À†À²À€„CpC€ DðuDà±D@âCГD žEÀŽC?€a:uivscanff:\dd\vctools\crt_bld\self_x86\crt\src\scanf.c(format != NULL)fmodzC¶ŠCOŠC¶ŠCŠC¶ŠCOŠC¶ŠCMŠCMŠCwŠCMŠC¶ŠC¶ŠCOŠC¶ŠCð?ð?33ð¿0C€€ÿ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream),
request_handle: 0x00cc0120
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $Š½@ÊÎÜ.™ÎÜ.™ÎÜ.™Ú·-˜ÞÜ.™Ú·+˜wÜ.™¢¨+˜ŸÜ.™¢¨*˜ÜÜ.™¢¨-˜ÔÜ.™¨&˜ÏÜ.™Ú·*˜ÖÜ.™Ú·(˜ÏÜ.™Ú·/˜ÙÜ.™ÎÜ/™7Ü.™¨*˜ÉÜ.™¨+˜ßÜ.™¨Ñ™ÏÜ.™Îܹ™ÏÜ.™¨,˜ÏÜ.™RichÎÜ.™PELóyƒaà „î³^à@@œ‰ 0(5p¬€P8€ˆ@à .text¡"$ `.gdhjkgaš@* `.gdhjkgadP, `.gdhjkgaÊ`< `.gdhjkgap@ `.gdhjkga]V `.gdhjkga” Z `.gdhjkga© °` `.gdhjkgaÅ À n `.gdhjkgaˆÐz `.rdataZ»à¼Š@@.data¤w .F@À.gdhjkgaP t@À.rsrc(506v@@.reloc¬€p‚¬@BU‹ìj¹(ÌTèaP ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìj¹,ÌTèAP ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìj¹4ñTè!P ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìèˆÇ £ñT]ÃÌU‹ìèxÇ £ñT]ÃÌU‹ìj¹óTèáO ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìh,fR¹ðòTè®E h@/QèŸEƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìhfR¹òTè~E hP/QèoEƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìh$fR¹ØòTèNE h`/Qè?EƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìhfR¹¨òTèE hp/QèEƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìh fR¹ÀòTèîD h€/QèßDƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìjÿh¢Qd¡PƒìD¡D©T3ÅPEôd£ÇóT@Æ óTh€eRhôeREìPè÷ ƒÄ PM°èËÕ ÇEüMàQU°RMäèäL ‹HQ
request_handle: 0x00cc006c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ua÷“™À™À™À~v2À?™À~vÀ3™À~v3À•™Àx À™À˜À™À~v6À™À~vÀ™À~vÀ™ÀRich™ÀPEL§–`à  FK0Ð @ O2äÌPPNˆÑ0O 0èÃ@à.textH `.data°J  @À.nefaå@N"@À.rsrcˆÑPNÒ&@@.relocöc0Odø@Bü  8 F R b z ˜ ° ¾ Ø ì ü  ( 6 H V n „   ¸ È Ü î þ  0 B ` |    ´ Ä Ö ø &6Rh~˜®ºÒêü *>Rjzž, 2Hd|”¤¸Ìè*@RbŠ˜°ÊÚð 8F`z†žªÀÐæö"4FXn~œª¶ÎÚî:ÖÆòÀÓA°ÜAÀoB0ÅB C€1BãB`íCÞA'ga.HÄH¸vscanff:\dd\vctools\crt_bld\self_x86\crt\src\scanf.c(format != NULL)fmodTÉAöÙAÙAöÙATÙAöÙAÙAöÙAÙAÙA·ÙAÙAöÙAöÙAÙAöÙAð?ð?33ð¿0C€€ÿ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream),
request_handle: 0x00cc0048
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ua÷“™À™À™À~v2À?™À~vÀ3™À~v3À•™Àx À™À˜À™À~v6À™À~vÀ™À~vÀ™ÀRich™ÀPELo`à  FKÎ @ OSÜ€¬PPNˆÑ0O0ÐÁ@à.text( `.data°J @À.vomå@N @À.rsrcˆÑPNÒ$@@.relocöc0Odö@BÜü & 2 B Z x  ž ¸ Ì Ü ø   ( 6 N d € ˜ ¨ ¼ Î Þ ú  " @ \ p € ” ¤ ¶ Ø ð   2 H ^ x Ž š ² Ê Ü ê   2 J Z p ~  üô (D\t„˜¬Èæú  2BjxªºÐæ&@Zfp~Š °ÆÖâø&8N^p|Š–®ºÎà𶠦 Ò  ÑAÚA mBÃBÿB`/BðàB@ëCàÛA |haC0Â0¶vscanff:\dd\vctools\crt_bld\self_x86\crt\src\scanf.c(format != NULL)fmod4ÇAÖ×Ao×AÖ×A4×AÖ×Ao×AÖ×Am×Am×A—×Am×AÖ×AÖ×Ao×AÖ×Að?ð?33ð¿0C€€ÿ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream),
request_handle: 0x00cc00e4
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $I4€! Uîr Uîr Uîr>êsUîr>ísUîr>ësŸUîr:êsUîr:ísUîr:ës$Uîr>ïsUîr UïroUîrË:çs UîrË:r UîrË:ìs UîrRich UîrPEd†\Ì<að" zŽ|7@P`TÔ(0è´@œе8¶0¨.text¥yz `.rdataTMN~@@.dataŒà Ì@À.pdata´Ø@@_RDATA” î@@.rsrcè0ð@@.relocœ@ò@BH 9yéÌ$ÌÌÌÌHAíÃÌÌÌÌÌÌÌÌH‰T$L‰D$L‰L$ SVWHƒì0H‹úHt$`H‹ÙèÊÿÿÿE3ÉH‰t$ L‹ÇH‹ÓH‹è<‚HƒÄ0_^[ÃÌÌÌÌÌÌÌÌÌÌÌÌ@SHƒì H‹ÙH‹ÂH õ‚WÀHSH‰ HHèc1H‹ÃHƒÄ [ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌH‹QH%H…ÒHEÂÃÌÌÌÌÌÌÌÌÌÌÌÌÌH‰\$WHƒì H—‚H‹ùH‰‹ÚHƒÁèš1öÃt ºH‹Ïèì#H‹\$0H‹ÇHƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌHQ‚H‰HƒÁéY1ÌÌÌÌÌÌÌÌÌÌÌÌÌH±HÇAH‰AH¾‚H‰H‹ÁÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌHƒìHHL$ èÂÿÿÿH³ÂHL$ è!3Ì@SHƒì H‹ÙH‹ÂH ՁWÀHSH‰ HHèC0HX‚H‰H‹ÃHƒÄ [ÃÌÌÌÌ@SHƒì H‹ÙH‹ÂH •WÀHSH‰ HHè0HH‰H‹ÃHƒÄ [ÃÌÌÌÌH‰\$H‰t$WHìpH‹çÍH3ÄH‰„$`3öÿ<~‹ø3ҍNÿï}H‹ØH‰D$ HƒøÿtF3ÒA¸0HL$0è·4ÇD$00HT$0H‹Ëÿ}…Àt9|$8tHT$0H‹ËÿÁ}ëæ‹t$PHƒûÿt H‹Ëÿ´}‹ÆH‹Œ$`H3Ìè‚Lœ$pI‹[I‹sI‹ã_ÃÌÌÌÌÌÌÌÌÌÌÌÌÌH‰\$WHìH‹ÍH3ÄH‰„$€H‹Ù3ÀH‰H‰AH‰A3ҍHÿ}H‹øH‰D$ Hƒøÿ„‹3ÒA¸0HL$Pèâ3ÇD$P0HT$PH‹Ïÿ¬|…Àt_„LD$XHT$|HL$(èÜH‹ÐH‹KH;Kt è*HƒC(ëL‹ÂH‹ÑH‹Ëè¥HL$(èKHT$PH‹Ïÿ¥|…Àu©Hƒÿÿt H‹Ïÿš|H‹ÃH‹Œ$€H3ÌègH‹œ$¨HÄ_ÃÌÌÌÌÌÌ@SHƒì H‹QH‹ÙHƒú
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: rSÑ<¡ö?ÀЈ:G‘ö?hhö?g6Ÿqö?ù"Qjìaö?£J;…ORö?d! YÈBö?ÞÀŠ¸V3ö?@bwú#ö?”®1h³ö?X`ö?ü-)4döõ?çи[çõ?¥âìÃgØõ?W“+ˆÉõ?‘úGƼºõ?ÀZk¬õ?ªÌ#ñaõ?íX0Ҏõ?`XV€õ?:kP<íqõ?âR|º—cõ?UUUUUUõ?þ‚»æ%Gõ?ëôH 9õ?K¨Vÿ*õ?øâêõ?ÅÄá"õ?PPõ?›LÝbóô?9/§àåô?L,ܾCØô?n¯%‡¸Êô?ᏦÝ>½ô?[¿R Ö¯ô?Jv­¢ô?gвã9•ô?€H"ˆô?{®Gázô?f`Y4Îmô?šÏõÇË`ô?ÊvÇâÙSô?ûÙbeøFô?Mî«0':ô?‡Õ%f-ô?QY^&µ ô?ô?feтô?û°?ûó?¯¥Bîó?©ä¼,âó?Æuª‘ÙÕó?ç«{¤•Éó?U)#Ù`½ó?;±;±ó?"Èz8$¥ó?c,™ó?ŽfÓ"ó?88ó?îEÉÑ[uó?HÞóió?ø*Ÿ_Î]ó?Áx+ûRó?Fà¬yFó?²¼W[ä:ó?újí\/ó?¿+Jã#ó?¶ëéXwó?Ñ0 ó?`Ä*Èó?h/¡½„öò?KÑþ¡Nëò?—€KÀ%àò? P- Õò? ,MûÉò?7ZŽù¾ò?@+­´ò?Áó’©ò?žä)Ažò?¥¸[r“ò?°ˆ°ˆò?MΡ8ú}ò?5'¸Psò?'Ö|³hò?ñ’€p"^ò?²w‘~Sò?’$I’$Iò?[`—·>ò?ß¼šxV4ò?* "*ò?xû!·ò?æUH€yò?ÙÀg G ò?  ò?pÁ}÷ñ?L¸<ôìñ?t¸?;ïâñ?½J.gõØñ?¢­Ïñ?Yàü"Åñ?)íF@J»ñ?ãºòg|±ñ?–{a¹§ñ?žàžñ?œ¢Œ€S”ñ?Û+ƒ°Šñ?ñ?„ÖŠwñ?ysB‰nñ?2üPdñ? 'u_[ñ?ÉÕý£¹Qñ?;Í _Hñ?$G4?ñ?È5È5ñ?¬À퉋,ñ?30]çX#ñ?&H§0ñ?ñ?€¾ûñ?ðþðþð?¢%³úíõð?œækõìð?`‚Uäð?–F¨ Ûð?:ž5VDÒð?;Ú¼OqÉð?qA‹†§Àð?ȝ%ìæ·ð?µì.r/¯ð?§h ¦ð?`ƒ¯¦Ûð?T 9?•ð?âeu³«Œð?„B!„ð?âê¸)Ÿ{ð?Æ÷G &sð?ûyœµjð?ü©ñÒMbð?†ur îYð?4×÷—Qð?ÅdÌIIð?AAð?üG‚·Æ8ð?^µ‘0ð?é)wüd(ð?@ ð?7zQ6$ð?ð?€ð?ð?log10ÿÿÿÿÿÿ?Cÿÿÿÿÿÿ?ÃUnknown exceptionbad array new lengthabcdefghijklmnopqrstuvwxyz0123456789_ABCDEFGHIJKLMNOPQRSTUVWXYZpidhtmpfile.tmp.dllpidHTSIGwbTaskmgr.exekernel32.dll%uLoadLibraryAvector too longstring too longMZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $šˆÞévMÞévMÞévMʂrLÕévMʂuLØévMʂsLGévMՆrLÐévMՆuL×évMՆsLýévMʂwLÝévMÞéwM¼évM†LßévM†‰MßévM†tLßévMRichÞévMPEd† Ì<að" ¶øTZ€`¬z(àà°Üð„X8ÐX0А.textŵ¶ `
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $¿´ºûiÚéûiÚéûiÚéïÙèñiÚéïßèaiÚéðÞèêiÚéðÙèìiÚéðßèÑiÚéïÞèîiÚéïÛèòiÚéûiÛé†iÚé=ÓèþiÚé=%éúiÚé=ØèúiÚéRichûiÚéPELړeaà ,ðe¤@@P@°ãdè ¸%ˆ¶8À¶@@È.textß+, `.rdata ®@°0@@.dataìð à@À.rsrcèì@@.reloc¸% &î@BU‹ìh؝E¹àFèþhÀ;E贑ƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌS‹ÜƒìƒäðƒÄU‹k‰l$‹ìì¡ðE3ʼnEü3ÀˆEß3ɈMÞ3҈U݊E߈E؊MވMԊU݈UÐÇE¸EšœÇE¼ äÀñ‹E¸‰E ‹M¼‰M¤ÇE°xŸ>XÇE´ÑH­‹U°‰U¨‹E´‰E¬M ‰MÈÇEà7k®œÇEä äÀñÇEèxŸ>XÇEìÑH­3҈U܊E܈EÌ(Eà)E€‹MÈ)E(EfïE€)…pÿÿÿ(…pÿÿÿ‹UÈ‹EȉEċMÄQ¹øFèõhÐ;E諐ƒÄ‹Mü3Íè&Œ‹å]‹ã[ÃÌÌÌÌÌÌÌU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüƒÀP‹MƒÁQ艜ƒÄ‹Eü‹å]ÂÌÌÌÌU‹ìQ‰Mü‹EüÇ4BE‹MüƒÁQèÀœƒÄ‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì‰Mü‹Eüƒxt ‹Mü‹Q‰UøëÇEø¬E‹Eø‹å]ÃÌÌÌÌÌU‹ìQ‰Mü‹EüÇ4BE‹MüƒÁQè`œƒÄ‹Uƒâtj ‹EüPèӏƒÄ‹Eü‹å]ÂÌÌU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüÇ@ÀE‹MüÇ@BE‹UüǼBE‹Eü‹å]ÃU‹ìƒì Môè²ÿÿÿh<âEEôPè_¡‹å]ÃU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüƒÀP‹MƒÁQèI›ƒÄ‹UüÇ@BE‹EüǼBE‹Eü‹å]ÂÌÌU‹ìQ‰Mü‹EüÇ4BE3ɋUüƒÂ‰ ‰J‹EüƒÀP‹MƒÁQèùšƒÄ‹UüÇ@BE‹Eü‹å]ÂÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì‹E ‹ƒÁ#‹U ‰ ‹E‹‰MôºkÂÿ‹Mô‹‰UøÇEð‹E‹+Mø‰Müƒ}ürƒ}ü#wë è‘Å3Òu÷3Àuå‹M‹Uø‰‹å]ÃÌÌÌÌÌÌÌÌÌÌÌU‹ìjÿhxEd¡Pƒìx¡ðE3ʼnEðPEôd£ÇEœMØè)ÇEüÇEÐÇE̋E‰E˜‹Mƒé‰Mƒ}˜„`‹U ŠˆENjM
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ua÷“™À™À™À~v2À?™À~vÀ3™À~v3À•™Àx À™À˜À™À~v6À™À~vÀ™À~vÀ™ÀRich™ÀPELå[©_à  ¶HKð€Ð@PQX€Œ¹PPˆÑàP0¨t@à.textµ¶ `.data°Jк@À.pakalåðOÒ@À.rsrcˆÑPÒÖ@@.reloceàPf¨@B¼»Ü»ø»¼¼"¼:¼X¼p¼~¼˜¼¬¼¼¼ؼè¼ö¼½½.½D½`½x½ˆ½œ½®½¾½Ú½ð½¾ ¾<¾P¾`¾t¾„¾–¾¸¾оæ¾ö¾¿(¿>¿X¿n¿z¿’¿ª¿¼¿Ê¿ê¿þ¿À*À:ÀPÀ^ÀìÄÜÄÔÀàÀòÀÁ$Á<ÁTÁdÁxÁŒÁ¨ÁÆÁÚÁêÁÂÂ"ÂJÂXÂpŠš°ÂÆÂàÂøÂà Ã:ÃFÃPÃ^ÃjÀÐæöÃÂÃØÃâÃôÃÄÄ.Ä>ÄPÄ\ÄjÄvĎĚĮÄÀÄÐÄúÄ–À†À²À€„CpC€ DðuDà±D@âCГD žEÀŽC?€a:uivscanff:\dd\vctools\crt_bld\self_x86\crt\src\scanf.c(format != NULL)fmodzC¶ŠCOŠC¶ŠCŠC¶ŠCOŠC¶ŠCMŠCMŠCwŠCMŠC¶ŠC¶ŠCOŠC¶ŠCð?ð?33ð¿0C€€ÿ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream),
request_handle: 0x00cc0120
1 1 0

InternetReadFile

buffer: MZPÿÿ¸@º´ Í!¸LÍ!This program must be run under Win32 $7PEL^B*àŽ F|hT`@0w³@°˜Üð„àCODEÌDF `DATA”(`*J@ÀBSSõtÀ.idata˜°t@À.tlsÐŒÀ.rdataàŒ@P.reloc„ðŽ@P.rsrcܨ@P ²@P@Byteÿ@ Stringl@l@8.@D.@H.@L.@@.@-@8-@t-@TObjectÿ% ²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%²B‹Àÿ% ²B‹Àÿ%,²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%²B‹Àÿ%ü±B‹Àÿ%ø±B‹Àÿ%<²B‹Àÿ%8²B‹Àÿ%4²B‹Àÿ%ô±B‹Àÿ%H²B‹Àÿ%D²B‹Àÿ%ð±B‹Àÿ%ì±B‹ÀSƒÄ¼» Tè¡ÿÿÿöD$,t·\$0‹ÃƒÄD[ËÀÿ%è±B‹Àÿ%ä±B‹Àÿ%à±B‹Àÿ%ܱB‹Àÿ%رB‹Àÿ%Ô±B‹Àÿ%бB‹Àÿ%̱B‹ÀSƒÄô»Ð•Bƒ;uYhDjè¦ÿÿÿ‰D$ƒ|$u3À‰$ëP‹D$‹̕B‰‹D$£Ì•B3À‹ÐҋL$TщT$‹T$‹ ‰ ‹T$‰@ƒødu܋‰D$‹D$‹‰‹D$‰$‹$ƒÄ [ɉ@ËÀSVƒÄø‹ò‹Øèfÿÿÿ‰D$ƒ|$u3Àë:‹‹T$‰B‹F‹T$‰B ‹‰$‹D$‹$‰‹D$‰X‹$‹T$‰P‹D$‰°YZ^[ÃÄø‹P‰$‹‰T$‹$‹L$‰ ‹T$‹ $‰J‹ЕB‰£Ð•BYZËÀSVWUƒÄø‹Ù‹ð‹ü‹‰‹‰‹B‰C‹‹‰D$‹‹R‹Ê‹/M ‹;Èu‹èÿÿÿ‹‹@‰‹‹@ CëC;Ðu‹èqÿÿÿ‹‹@ C‹D$‰;7u®‹Ó‹Æèúþÿÿ„Àu3À‰YZ]_^[Í@SVWUƒÄð‰$‹ô‹‰D$ ‹ ‹‹@;È‚†‹Ø‹>_ ‹ùz;ßrv;Èu!‹B‹A‹B‹)B ‹ƒx uV‹èðþÿÿëM‹Ø‹>_ ‹ùz;ßu ‹B‹)B ë3‹Z‰\$‹>‹‹.} +û‰|$+ȋ‰H T$‹èMþÿÿ„Àu3Àë°ë‹‹‰‹;D$ …Yÿÿÿ3ÀƒÄ]_^[ÐSVW‹Ú‹ðþ}¾ë Æÿÿæ
request_handle: 0x00cc0078
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $Š½@ÊÎÜ.™ÎÜ.™ÎÜ.™Ú·-˜ÞÜ.™Ú·+˜wÜ.™¢¨+˜ŸÜ.™¢¨*˜ÜÜ.™¢¨-˜ÔÜ.™¨&˜ÏÜ.™Ú·*˜ÖÜ.™Ú·(˜ÏÜ.™Ú·/˜ÙÜ.™ÎÜ/™7Ü.™¨*˜ÉÜ.™¨+˜ßÜ.™¨Ñ™ÏÜ.™Îܹ™ÏÜ.™¨,˜ÏÜ.™RichÎÜ.™PELóyƒaà „î³^à@@œ‰ 0(5p¬€P8€ˆ@à .text¡"$ `.gdhjkgaš@* `.gdhjkgadP, `.gdhjkgaÊ`< `.gdhjkgap@ `.gdhjkga]V `.gdhjkga” Z `.gdhjkga© °` `.gdhjkgaÅ À n `.gdhjkgaˆÐz `.rdataZ»à¼Š@@.data¤w .F@À.gdhjkgaP t@À.rsrc(506v@@.reloc¬€p‚¬@BU‹ìj¹(ÌTèaP ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìj¹,ÌTèAP ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìj¹4ñTè!P ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìèˆÇ £ñT]ÃÌU‹ìèxÇ £ñT]ÃÌU‹ìj¹óTèáO ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìh,fR¹ðòTè®E h@/QèŸEƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìhfR¹òTè~E hP/QèoEƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìh$fR¹ØòTèNE h`/Qè?EƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìhfR¹¨òTèE hp/QèEƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìh fR¹ÀòTèîD h€/QèßDƒÄ]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìjÿh¢Qd¡PƒìD¡D©T3ÅPEôd£ÇóT@Æ óTh€eRhôeREìPè÷ ƒÄ PM°èËÕ ÇEüMàQU°RMäèäL ‹HQ
request_handle: 0x00cc0098
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ua÷“™À™À™À~v2À?™À~vÀ3™À~v3À•™Àx À™À˜À™À~v6À™À~vÀ™À~vÀ™ÀRich™ÀPELo`à  FKÎ @ OSÜ€¬PPNˆÑ0O0ÐÁ@à.text( `.data°J @À.vomå@N @À.rsrcˆÑPNÒ$@@.relocöc0Odö@BÜü & 2 B Z x  ž ¸ Ì Ü ø   ( 6 N d € ˜ ¨ ¼ Î Þ ú  " @ \ p € ” ¤ ¶ Ø ð   2 H ^ x Ž š ² Ê Ü ê   2 J Z p ~  üô (D\t„˜¬Èæú  2BjxªºÐæ&@Zfp~Š °ÆÖâø&8N^p|Š–®ºÎà𶠦 Ò  ÑAÚA mBÃBÿB`/BðàB@ëCàÛA |haC0Â0¶vscanff:\dd\vctools\crt_bld\self_x86\crt\src\scanf.c(format != NULL)fmod4ÇAÖ×Ao×AÖ×A4×AÖ×Ao×AÖ×Am×Am×A—×Am×AÖ×AÖ×Ao×AÖ×Að?ð?33ð¿0C€€ÿ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream),
request_handle: 0x00cc00e4
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ua÷“™À™À™À~v2À?™À~vÀ3™À~v3À•™Àx À™À˜À™À~v6À™À~vÀ™À~vÀ™ÀRich™ÀPEL§–`à  FK0Ð @ O2äÌPPNˆÑ0O 0èÃ@à.textH `.data°J  @À.nefaå@N"@À.rsrcˆÑPNÒ&@@.relocöc0Odø@Bü  8 F R b z ˜ ° ¾ Ø ì ü  ( 6 H V n „   ¸ È Ü î þ  0 B ` |    ´ Ä Ö ø &6Rh~˜®ºÒêü *>Rjzž, 2Hd|”¤¸Ìè*@RbŠ˜°ÊÚð 8F`z†žªÀÐæö"4FXn~œª¶ÎÚî:ÖÆòÀÓA°ÜAÀoB0ÅB C€1BãB`íCÞA'ga.HÄH¸vscanff:\dd\vctools\crt_bld\self_x86\crt\src\scanf.c(format != NULL)fmodTÉAöÙAÙAöÙATÙAöÙAÙAöÙAÙAÙA·ÙAÙAöÙAöÙAÙAöÙAð?ð?33ð¿0C€€ÿ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream),
request_handle: 0x00cc00fc
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ua÷“™À™À™À~v2À?™À~vÀ3™À~v3À•™Àx À™À˜À™À~v6À™À~vÀ™À~vÀ™ÀRich™ÀPELèì2_à  úCnKÅAD@°[mF,þCP@ŽˆÑxE( 0H¹A@à.text¨ùCúC `.data°JDþC@À.nayenizå0ŽD@À.rsrcˆÑ@ŽÒD@@.relocì‹ ŒìD@B\D|D˜D¦D²DÂDÚDøDDD8DLD\DxDˆD–D¨D¶DÎDäDDD(D<DND^DzDD¢DÀDÜDðDDD$D6DXDpD†D–D²DÈDÞDøDDD2DJD\DjDŠDžD²DÊDÚDðDþDŒ D| DtD€D’D¨DÄDÜDôDDD,DHDfDzDŠD D²DÂDêDøDD*D:DPDfD€D˜D¦DÀDÚDæDðDþD D D0DFDVDbDxD‚D”D¦D¸DÎDÞDðDüD D D. D: DN D` Dp Dš D6D&DRD Ɂҁ e‚º‚€ö‚à&‚p؂Àâƒ`Ӂ”Öza1¨¹A¨­Avscanff:\dd\vctools\crt_bld\self_x86\crt\src\scanf.c(format != NULL)fmod´¾Vρï΁Vρ´ÎVρï΁Vρí΁í΁ρí΁VρVρï΁Vρð?ð?33ð¿0C€€ÿ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream),
request_handle: 0x00cc00b0
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeCreateTokenPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeAssignPrimaryTokenPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeMachineAccountPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeTcbPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeTakeOwnershipPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeLoadDriverPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeBackupPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRemoteShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeEnableDelegationPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeManageVolumePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeCreateGlobalPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeTrustedCredManAccessPrivilege
1 1 0
process hyvacaerufe.exe
process cmd.exe
process system
process yy1upurwshhgaxyvfo1fsejc.exe
process ww15_testll_0310_single.exe
process bumperww.exe
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: Yy吐眞
process_identifier: 3568
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: Yy吐眞
process_identifier: 3568
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: Yy吐眞
process_identifier: 3568
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: Yy吐眞
process_identifier: 3568
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: Yy吐眞
process_identifier: 3568
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: Yy吐眞
process_identifier: 3568
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: Yy吐眞
process_identifier: 3568
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3684
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3684
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: customer51.exe
process_identifier: 3712
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3824
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3824
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: gcleaner.exe
process_identifier: 3848
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3944
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3944
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3944
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3944
0 0

Process32NextW

snapshot_handle: 0x0000000000000028
process_name: conhost.exe
process_identifier: 3944
0 0
url http://firstfloorsoftware.com/ModernUI
url http://schemas.openxmlformats.org/markup-compatibility/2006
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000001
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_CURRENT_USER\software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000002
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000000
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_CLASSES_ROOT\software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000005
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_CURRENT_CONFIG\software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000003
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_USERS\software\wow6432node\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000001
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000002
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000000
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000005
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_CURRENT_CONFIG\software\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: software\microsoft\windows\currentversion\uninstall\nmx 1.00
base_handle: 0xffffffff80000003
key_handle: 0x0000000000000000
options: 0
access: 0x00020019
regkey: HKEY_USERS\software\microsoft\windows\currentversion\uninstall\nmx 1.00
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\adblocker
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\adblocker
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
base_handle: 0x80000002
key_handle: 0x000004b4
options: 0
access: 0x00000001
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
base_handle: 0x80000002
key_handle: 0x000004b4
options: 0
access: 0x00000001
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0
cmdline "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2548 CREDAT:145409
cmdline cmd.exe /c taskkill /f /im chrome.exe
cmdline C:\Program Files (x86)\Internet Explorer\iexplore.exe https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
cmdline "C:\Program Files (x86)\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
host 186.2.171.3
host 193.56.146.36
host 2.56.59.42
host 212.192.241.15
host 212.193.30.113
host 45.133.1.107
host 45.133.1.182
host 45.9.20.156
host 94.26.249.132
host 95.217.123.66
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 4452
region_size: 131072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000020c
1 0 0
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 8 (SystemProcessorPerformanceInformation)
1 0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover reg_value "C:\Program Files (x86)\Microsoft Analysis Services\Xibijozhana.exe"
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELÂb'âà 0ˆ* À@ jè@…،OÀÀ˜ðà ¼Œ  H.text … ˆ `.rsrcÀÀŒ@@.reloc à@B
base_address: 0x00400000
process_identifier: 4452
process_handle: 0x0000020c
1 1 0

WriteProcessMemory

buffer: €0€ HXÀhäh4VS_VERSION_INFO½ïþ?ÈStringFileInfo¤040904b1, CommentsBapS Ulix(CompanyNameHmE8FileDescriptionJNe WNP0FileVersion4.2.5.2: InternalNameBkQI Cec.exez+LegalCopyrightCopyright 2020 © Ozs. All rights reserved.2LegalTrademarksDLfPB OriginalFilenameBkQI Cec.exe2 ProductNameBkQI Cec4ProductVersion4.2.8.28Assembly Version4.2.8.2DVarFileInfo$Translation PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
base_address: 0x0041c000
process_identifier: 4452
process_handle: 0x0000020c
1 1 0

WriteProcessMemory

buffer: € ,=
base_address: 0x0041e000
process_identifier: 4452
process_handle: 0x0000020c
1 1 0

WriteProcessMemory

buffer: @
base_address: 0xfffde008
process_identifier: 4452
process_handle: 0x0000020c
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELÂb'âà 0ˆ* À@ jè@…،OÀÀ˜ðà ¼Œ  H.text … ˆ `.rsrcÀÀŒ@@.reloc à@B
base_address: 0x00400000
process_identifier: 4452
process_handle: 0x0000020c
1 1 0
process kak.tmp useragent InnoDownloadPlugin/1.5
process iexplore.exe useragent Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
process BumperWW.exe useragent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
process BumperWW.exe useragent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
process vFZoCgl35XxVzh8qqcJB1_ox.exe useragent Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36
Process injection Process 3800 called NtSetContextThread to modify thread in remote process 4452
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4295978
registers.ebp: 0
registers.edx: 0
registers.ebx: -139264
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000358
process_identifier: 4452
1 0 0
Process injection Process 2548 resumed a thread in remote process 2672
Process injection Process 3800 resumed a thread in remote process 4452
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000360
suspend_count: 1
process_identifier: 2672
1 0 0

NtResumeThread

thread_handle: 0x00000358
suspend_count: 1
process_identifier: 4452
1 0 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
3221225507 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 34 1e 00 00 c3 e9 91 d9 fc ff a0 c4 99 0e
exception.symbol: z7cnf_kncwqg5qs37fhaootp+0x44b8b5
exception.instruction: in eax, dx
exception.module: Z7cnF_KncwQG5qs37FHAoOtp.exe
exception.exception_code: 0xc0000096
exception.offset: 4503733
exception.address: 0x175b8b5
registers.esp: 2948408
registers.edi: 22569755
registers.eax: 1447909480
registers.ebp: 20299776
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
1 0 0
dead_host 2.56.59.42:80
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableRoutinelyTakingAction
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2420
thread_handle: 0x000000d0
process_identifier: 2416
current_directory:
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\is-0EQ3T.tmp\kak.tmp" /SL5="$3002C,506127,422400,C:\Users\test22\AppData\Local\Temp\kak.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x000000d4
1 1 0

NtResumeThread

thread_handle: 0x00000164
suspend_count: 1
process_identifier: 2416
1 0 0

CreateProcessInternalW

thread_identifier: 2564
thread_handle: 0x00000360
process_identifier: 2560
current_directory: C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp\DYbALA.exe" /S /UID=2709
filepath_r:
stack_pivoted: 0
creation_flags: 67108864 (CREATE_DEFAULT_ERROR_MODE)
inherit_handles: 0
process_handle: 0x00000364
1 1 0

NtResumeThread

thread_handle: 0x00000000000000b4
suspend_count: 1
process_identifier: 2560
1 0 0

NtResumeThread

thread_handle: 0x000000000000013c
suspend_count: 1
process_identifier: 2560
1 0 0

NtResumeThread

thread_handle: 0x0000000000000188
suspend_count: 1
process_identifier: 2560
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ac
suspend_count: 1
process_identifier: 2560
1 0 0

NtResumeThread

thread_handle: 0x0000000000000268
suspend_count: 1
process_identifier: 2560
1 0 0

NtResumeThread

thread_handle: 0x0000000000000378
suspend_count: 1
process_identifier: 2560
1 0 0

CreateProcessInternalW

thread_identifier: 2728
thread_handle: 0x0000000000000708
process_identifier: 2724
current_directory: C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp
filepath: C:\Users\test22\AppData\Local\Temp\ab-479ac-814-bb8a8-11130f0847f23\Lixygaevymi.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\ab-479ac-814-bb8a8-11130f0847f23\Lixygaevymi.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\ab-479ac-814-bb8a8-11130f0847f23\Lixygaevymi.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x0000000000000700
1 1 0

CreateProcessInternalW

thread_identifier: 2836
thread_handle: 0x0000000000000710
process_identifier: 2832
current_directory: C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp
filepath: C:\Users\test22\AppData\Local\Temp\4a-841a7-6ec-3f1a8-c322fd916228f\Hyvacaerufe.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\4a-841a7-6ec-3f1a8-c322fd916228f\Hyvacaerufe.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\4a-841a7-6ec-3f1a8-c322fd916228f\Hyvacaerufe.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x0000000000000700
1 1 0

CreateProcessInternalW

thread_identifier: 2920
thread_handle: 0x0000000000000718
process_identifier: 2916
current_directory: C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp
filepath: C:\Program Files\Windows Defender\EOUZNQTEXE\foldershare.exe
track: 1
command_line: "C:\Program Files\Windows Defender\EOUZNQTEXE\foldershare.exe" /VERYSILENT
filepath_r: C:\Program Files\Windows Defender\EOUZNQTEXE\foldershare.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x0000000000000710
1 1 0

NtResumeThread

thread_handle: 0x00000000000000b4
suspend_count: 1
process_identifier: 2724
1 0 0

NtResumeThread

thread_handle: 0x0000000000000144
suspend_count: 1
process_identifier: 2724
1 0 0

NtGetContextThread

thread_handle: 0x0000000000000144
1 0 0

NtGetContextThread

thread_handle: 0x0000000000000144
1 0 0

NtResumeThread

thread_handle: 0x0000000000000144
suspend_count: 1
process_identifier: 2724
1 0 0

NtResumeThread

thread_handle: 0x000000000000018c
suspend_count: 1
process_identifier: 2724
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ac
suspend_count: 1
process_identifier: 2724
1 0 0

NtResumeThread

thread_handle: 0x0000000000000260
suspend_count: 1
process_identifier: 2724
1 0 0

NtResumeThread

thread_handle: 0x0000000000000370
suspend_count: 1
process_identifier: 2724
1 0 0

NtResumeThread

thread_handle: 0x000000000000059c
suspend_count: 1
process_identifier: 2724
1 0 0

CreateProcessInternalW

thread_identifier: 2544
thread_handle: 0x0000000000000678
process_identifier: 2548
current_directory: C:\Users\test22\AppData\Local\Temp\is-BI6MO.tmp
filepath: C:\Program Files (x86)\Internet Explorer\iexplore.exe
track: 1
command_line: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
filepath_r: C:\Program Files (x86)\Internet Explorer\iexplore.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x0000000000000670
1 1 0

NtResumeThread

thread_handle: 0x00000000000000b4
suspend_count: 1
process_identifier: 2832
1 0 0

NtResumeThread

thread_handle: 0x000000000000013c
suspend_count: 1
process_identifier: 2832
1 0 0

NtResumeThread

thread_handle: 0x0000000000000184
suspend_count: 1
process_identifier: 2832
1 0 0

NtResumeThread

thread_handle: 0x000000000000019c
suspend_count: 1
process_identifier: 2832
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ec
suspend_count: 1
process_identifier: 2832
1 0 0

NtResumeThread

thread_handle: 0x0000000000000288
suspend_count: 1
process_identifier: 2832
1 0 0

NtResumeThread

thread_handle: 0x00000000000002e0
suspend_count: 1
process_identifier: 2832
1 0 0

NtResumeThread

thread_handle: 0x000000000000043c
suspend_count: 1
process_identifier: 2832
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ec
suspend_count: 1
process_identifier: 2832
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ec
suspend_count: 1
process_identifier: 2832
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ec
suspend_count: 1
process_identifier: 2832
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ec
suspend_count: 1
process_identifier: 2832
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ec
suspend_count: 1
process_identifier: 2832
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0

NtResumeThread

thread_handle: 0x00000000000001ec
suspend_count: 1
process_identifier: 2832
1 0 0

NtGetContextThread

thread_handle: 0x00000000000001ec
1 0 0
Lionic Trojan.Win32.Chebka.a!c
Elastic malicious (high confidence)
MicroWorld-eScan Application.DealAlpha.1.Gen
FireEye Application.DealAlpha.1.Gen
ALYac Application.DealAlpha.1.Gen
Cylance Unsafe
Sangfor Trojan.Win32.Chebka.gen
K7AntiVirus Trojan ( 0056e5201 )
Alibaba TrojanDownloader:Win32/Chebka.495e5564
K7GW Trojan ( 0056e5201 )
Cybereason malicious.7c77da
Symantec PUA.InstallCore
ESET-NOD32 multiple detections
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan-Downloader.Win32.Chebka.gen
BitDefender Application.DealAlpha.1.Gen
Avast FileRepMalware
Tencent Win32.Trojan-downloader.Chebka.Ljub
Sophos Generic PUA KN (PUA)
DrWeb Trojan.Siggen15.33937
VIPRE Trojan.Win32.Generic!BT
TrendMicro TrojanSpy.Win32.TRICKBOT.YXBKDZ
McAfee-GW-Edition BehavesLike.Win32.AdwareFileTour.bm
Emsisoft Application.DealAlpha.1.Gen (B)
SentinelOne Static AI - Suspicious PE
Jiangmin TrojanDownloader.Generic.bkpy
Webroot W32.Malware.Gen
Avira HEUR/AGEN.1142105
MAX malware (ai score=87)
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Trojan:Script/Phonzy.B!ml
Gridinsoft Trojan.Win32.Downloader.vb
Arcabit Application.DealAlpha.1.Gen
ZoneAlarm HEUR:Trojan-Downloader.Win32.Chebka.gen
GData Application.DealAlpha.1.Gen
AhnLab-V3 Malware/Win.Generic.R446742
McAfee RDN/Generic Downloader.x
VBA32 TrojanDownloader.Chebka
Malwarebytes Adware.Csdimonetize
Ikarus Trojan-Downloader.Win32.Agent
Fortinet Riskware/multiple_detections
AVG FileRepMalware
Panda Trj/CI.A
MaxSecure Trojan.Malware.300983.susgen