Summary | ZeroBOX

vbc.exe

AgentTesla Generic Malware info stealer browser Chrome Downloader Antivirus Google User Data ScreenShot Create Service KeyLogger Internet API Socket Escalate priviledges DNS Code injection Sniff Audio AntiDebug .NET EXE PE File AntiVM PE32
Category Machine Started Completed
FILE s1_win7_x6403_us June 28, 2022, 9:18 a.m. June 28, 2022, 9:41 a.m.
Size 789.5KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 d39d493b27584c9c4dc9e0d3f03d0a0a
SHA256 44218ac9cedc1b94a4f7ca1483be08ee58ccfe2f380aeef668e1ba887bd2520b
CRC32 FE36C08F
ssdeep 12288:05PBgXmof7B+fpR0IWxC3LUAcNTIg1sCpuTw3BlgkDhkaWfOzWoxKnr5byks6u8:0hSWaS3Wm/cNsKvgkrDhkDOzWLU6u8
Yara
  • IsPE32 - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature

IP Address Status Action
164.124.101.2 Active Moloch
178.237.33.50 Active Moloch
179.43.154.168 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:60117 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 179.43.154.168:8903 2036594 ET JA3 Hash - Remcos 3.x TLS Connection Malware Command and Control Activity Detected
TCP 192.168.56.103:49166 -> 179.43.154.168:8903 2036594 ET JA3 Hash - Remcos 3.x TLS Connection Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.103:49167
179.43.154.168:8903
None None None
TLS 1.3
192.168.56.103:49166
179.43.154.168:8903
None None None

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005f9cb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005f9d38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005f9d38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005f9d38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005f9d38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005f9eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005f9eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618a68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618fe8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618fe8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618fe8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618fe8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618fe8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618fe8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b28
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618ee8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618768
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006193e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006193e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
K32EnumProcessModules+0x18 RegisterApplicationRestart-0x1be kernel32+0x3b37e @ 0x7689b37e
0x4c6522d
0x49b2512
0x21543a0
0x2154124
0x2157b78
0x2151e63
0x2151dda
0x2151c67
0x229e97d
0x2296034
0x2295fc3
0x2295f4c
0x2295f02
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x73972652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7398264f
LogHelp_TerminateOnAssert+0x12cf8 GetPrivateContextsPerfCounters-0x674a clr+0x81838 @ 0x739f1838
LogHelp_TerminateOnAssert+0x12bf7 GetPrivateContextsPerfCounters-0x684b clr+0x81737 @ 0x739f1737
mscorlib+0x2d36ad @ 0x722a36ad
mscorlib+0x308f2d @ 0x722d8f2d
0x2154d13
0x2154c2e
0x2154124
0x2157b78
0x2151e63
0x2151dda
0x2151c67
0x229e97d
0x2296034
0x2295fc3
0x2295f4c
0x2295f02
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x73972652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7398264f
LogHelp_TerminateOnAssert+0x12cf8 GetPrivateContextsPerfCounters-0x674a clr+0x81838 @ 0x739f1838
LogHelp_TerminateOnAssert+0x12bf7 GetPrivateContextsPerfCounters-0x684b clr+0x81737 @ 0x739f1737
mscorlib+0x2d36ad @ 0x722a36ad
mscorlib+0x308f2d @ 0x722d8f2d
0x2154d13
0x2154c2e
0x2154124
0x2157b78
0x2151e63
0x2151dda
0x2151c67
0x229e97d
0x2296034
0x2295fc3
0x2295f4c
0x2295f02
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x73972652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7398264f
LogHelp_TerminateOnAssert+0x12cf8 GetPrivateContextsPerfCounters-0x674a clr+0x81838 @ 0x739f1838
LogHelp_TerminateOnAssert+0x12bf7 GetPrivateContextsPerfCounters-0x684b clr+0x81737 @ 0x739f1737
mscorlib+0x2d3711 @ 0x722a3711
mscorlib+0x308f2d @ 0x722d8f2d
0x2154d13
0x2154c2e
0x2154124
0x2157b78
0x2151e63
0x2151dda
0x2151c67
0x229e97d

exception.instruction_r: 89 04 91 c7 45 fc fe ff ff ff ff 45 10 81 7d 10
exception.symbol: K32EnumProcessModules+0x113 RegisterApplicationRestart-0xc3 kernel32+0x3b479
exception.instruction: mov dword ptr [ecx + edx*4], eax
exception.module: KERNEL32.dll
exception.exception_code: 0xc0000005
exception.offset: 242809
exception.address: 0x7689b479
registers.esp: 3397152
registers.edi: 1987043272
registers.eax: 8585216
registers.ebp: 3397356
registers.edx: 0
registers.ebx: 0
registers.esi: 1
registers.ecx: 0
1 0 0
suspicious_features GET method with no useragent header suspicious_request GET http://geoplugin.net/json.gp
domain imranmhemoodcheema.ddns.net
request GET http://geoplugin.net/json.gp
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 1966080
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00900000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00aa0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73971000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73972000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 1310720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02070000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02170000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003f2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00425000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0042b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00427000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00416000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0041a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00417000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00790000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00791000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00792000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00793000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00794000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00795000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00796000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00797000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00798000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003fa000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0041b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0081f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00810000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006b1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006b2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00799000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0079a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 40960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006b5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006bf000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02290000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02291000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02292000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02293000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00811000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02294000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02295000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02296000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00812000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02297000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2352
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02298000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description InstallUtil.exe tried to sleep 288 seconds, actually delayed analysis time by 288 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceW

number_of_free_clusters: 8362495
sectors_per_cluster: 8362495
bytes_per_sector: 512
root_path: C:
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 8362495
sectors_per_cluster: 8362495
bytes_per_sector: 512
root_path: C:
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 2498841
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\GrShaderCache\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-wal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Floc\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Floc\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data-wal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\GrShaderCache\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Login Data
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
cmdline Powershell -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: Powershell
parameters: -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
filepath: Powershell
1 1 0
section {u'size_of_data': u'0x000af800', u'virtual_address': u'0x00002000', u'entropy': 7.998440767877275, u'name': u'.text', u'virtual_size': u'0x000af7c4'} entropy 7.99844076788 description A section with a high entropy has been found
section {u'size_of_data': u'0x00015a00', u'virtual_address': u'0x000b2000', u'entropy': 7.383967251071401, u'name': u'.rsrc', u'virtual_size': u'0x00015a00'} entropy 7.38396725107 description A section with a high entropy has been found
entropy 0.999366286439 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communications use DNS rule Network_DNS
description Match Windows Inet API call rule Str_Win32_Internet_API
description Win.Trojan.agentTesla rule Win_Trojan_agentTesla_Zero
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Run a KeyLogger rule KeyLogger
description Google Chrome User Data Check rule Chrome_User_Data_Check_Zero
description browser info stealer rule infoStealer_browser_Zero
description File Downloader rule Network_Downloader
description Escalate priviledges rule Escalate_priviledges
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Trillian
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Trillian
2 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2676
region_size: 503808
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000380
1 0 0

NtAllocateVirtualMemory

process_identifier: 2884
region_size: 491520
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000002c8
1 0 0

NtAllocateVirtualMemory

process_identifier: 2944
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000002c8
1 0 0

NtAllocateVirtualMemory

process_identifier: 3008
region_size: 356352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000002c8
1 0 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Fhzjx reg_value "C:\Users\test22\AppData\Roaming\Wcmxjutqc\Fhzjx.exe"
file C:\Users\test22\AppData\Roaming\Digsby\digsby.dat
file C:\Users\test22\AppData\Roaming\MySpace\IM\users.txt
registry HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords
registry HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
registry HKEY_CURRENT_USER\Software\Paltalk
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $Ýð2w™‘\$™‘\$™‘\$- ­$Š‘\$- ¯$?‘\$- ®$‡‘\$éØ$˜‘\$1›$›‘\$¢Ï_%ƒ‘\$¢ÏY%£‘\$¢ÏX%»‘\$éÏ$Ž‘\$™‘]$µ\$ÏU%Ƒ\$ Ï£$˜‘\$Ï^%˜‘\$Rich™‘\$PEL+¼‡bà 0 =@@°€8—ð TKp˜8ð{8„|(|@@°.text½.0 `.rdata†p@r4@@.data¼?À¦@À.tls ´@À.gfids0¶@@.rsrcTK Lº@@.reloc˜8p:@B
base_address: 0x00400000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: €ÿÿÿÿ±¿DNæ@»ÿÿÿÿ Copyright (c) by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.ÿÿÿÿ “    l…EpˆEj…E..pÁFLÖFLÖFLÖFLÖFLÖFLÖFLÖFLÖFLÖFtÁFPÖFPÖFPÖFPÖFPÖFPÖFPÖFxÁFÿÿÿÿpˆE˜ÂF˜ÂF˜ÂF˜ÂF˜ÂFxÁFðŠEpŒE¸šEØÁFpÇFCPSTPDT ÂFàÂFÿÿÿÿÿÿÿÿÿÿÿÿ€ ¤`‚y‚!¦ß¡¥Ÿàü@~€ü¨Á£Ú£ þ@þµÁ£Ú£ þAþ¶Ï¢ä¢å¢è¢[þ@~¡þQQÚ^Ú _ÚjÚ2ÓØÞàù1~þ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZpÇFþÿÿÿþÿÿÿu˜0Ï!­tåša¾Œe¸‘¢z»Œ^ž âȨ3œðqFãAüqF‰!ArF¨AtFE.?AVtype_info@@tFE.?AVbad_alloc@std@@tFE.?AVbad_array_new_length@std@@tFE.?AVlogic_error@std@@tFE.?AVlength_error@std@@tFE.?AVout_of_range@std@@tFE.?AV_Facet_base@std@@tFE.?AV_Locimp@locale@std@@tFE.?AVfacet@locale@std@@tFE.?AU_Crt_new_delete@std@@tFE.?AVcodecvt_base@std@@tFE.?AUctype_base@std@@tFE.?AV?$ctype@D@std@@tFE.?AV?$codecvt@DDU_Mbstatet@@@std@@tFE.?AVbad_exception@std@@tFE.HtFE.?AVfailure@ios_base@std@@tFE.?AVruntime_error@std@@tFE.?AVsystem_error@std@@tFE.?AVbad_cast@std@@tFE.?AV_System_error@std@@tFE.?AVexception@std@@
base_address: 0x0046c000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: €
base_address: 0x00470000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: eüJüg>¿Ùg>'g>I­g>{° a·`ŠC^Cϸ¾¸_g>g>MãLá­OÍ–ÇqÃ{ß{ß@AþC¦”~•Á£ýÔç×4Þ„àÜÆM)Ž” ƒ% b Er4NPNWN]TUZ[ äøää äö_^îØØäüûüû í9<8;ú` Ÿž†…¢†…§µ¶³´±²¯°†…¸ Ÿ†… Y
base_address: 0x00471000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL´Ë^à Ðètbà@€!f `tpð`X.MPRESS1Pöàà.MPRESS2Þ `øàà.rsrcp@Àv2.19
base_address: 0x00400000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: ð`|að`ü`‰aü`ašaa a§a aaÄaaaäaa$a÷a$a,a b,a4a&b4a<aAb<aDa[bDaXaka”a€³aÐaïabb3bMbebGetModuleHandleAGetProcAddressKERNEL32.DLLmsvcrt.dllabsCOMCTL32.dllVERSION.dllVerQueryValueWWININET.dllFindCloseUrlCacheUSER32.dllGetDCGDI32.dllSetBkModecomdlg32.dllFindTextWADVAPI32.dllRegCloseKeySHELL32.dllSHGetMallocole32.dllCoInitialize`èXZ ‹0ð+À‹þf­Áà ‹ÈP­+Èñ‹ÈWQIŠD9ˆ1uö+À¬‹È€áð$Áá Šè¬ ÈQͽýÿÿÓåYX‹Ü¤lñÿÿQ+ÉQQ‹ÌQf‹Áâ RWƒÁQPƒÁVQè^‹ã^Z+À‰2´+Ð+É;Ês&‹Ù¬A$þ<èuòCƒÁ­ Àx;ÂsåëÃxßÂ+ÉFüëÖè_ÇMÿÿÿ°éª¸V «èX˜ éˆ UWVSƒì|‹”$ÇD$tÆD$s‹¬$œB‰D$x¸¶J‹ØÓã‹ËI‰L$l¶JÓàH‰D$h‹„$¨¶2ÇEÇD$`Ǹ‰t$dÇD$\ÇD$XÇD$TÇD$P¶JÎÓàˆ69L$ts‹D$xfǃÀâö‹œ$”3ÿÇD$Hÿÿÿÿ‹Ó”$˜‰T$L3Ò;\$L„} ¶ÁçBC øƒú~狌$¤9L$tƒe ‹t$t#t$l‹D$`‹T$xÁà‰t$DƁ|$Hÿÿÿ,Bw;\$L„- Ád$H¶ÁçC ø‹D$Hf‹UÁè ·Ê¯Á;øƒÝ‰D$H¸+ÁŠL$dÁø¾¶T$sf‰E‹D$t#D$h‹l$xÓà¹+L$dÓúÂiÀƒ|$`„(l‰D$ŽÊ‹D$t+D$\‹”$ ¶‰D$@Ñd$@‹L$@6‹l$á|$HÿÿÿDM‰L$<,w;\$L„aÁd$H¶ÁçC ø‹D$Hf‹Áè ·ñ¯Æ;øs#‰D$H¸+ƋòÁøƒ|$<f‰…t"ë.)D$H+ø‹ÁrfÁèf+ȃ|$<f‰tþÿŽWÿÿÿëyþÿq6‹l$ê|$Hÿÿÿw;\$L„ÅÁd$H¶ÁçC ø‹D$Hf‹MÁè ·ñ¯Æ;øs‰D$H¸+ƋòÁøf‰EëŸ)D$H+ø‹ÁrfÁèf+Èf‰M뇋T$t‹Æ‹Œ$ ˆD$sˆBƒ|$`‰T$t ÇD$`éƒ|$`  ƒl$`é ƒl$`é‹L$H+ø‹t$`+ȋÂfÁèf+Ёùÿÿÿf‰U‹l$xtu‰t$8w;\$L„ò¶ÁçÁáC ø‹l$8‹ÁÁè f‹•€·ê¯Å;øsR‹ð¸+ŋl$XÁø‹L$T‹T$8‰L$P‹L$xf‰‚€‹D$\‰l$T‰D$X3Àƒ|$`ŸÀÁd@‰D$`ét‹ñ+ø+ð‹ÂfÁè‹L$8f+Ёþÿÿÿf‰‘€w;\$L„N¶ÁçÁæC ø‹l$8‹ÖÁê f‹˜·Á¯Ð;úƒã½‹ò+èÇD$4‹ÅÁø‹L$8f‰˜‹D$`‹L$DÁàD$xúÿÿÿ,Hw;\$L„ܶÁçÁæC øf‹•à‹ÆÁè ·Ê¯Á;øs`)L$4Á|$4‹t$4‰D$Hƒ|$tf‰…à„”3Àƒ|$`‹¬$ ‹T$tŸÀD ‰D$`‹D$t+D$\Š(ˆD$sˆDB‰T$té2+ð+ø‹ÂfÁèf+Ðf‰•àé‹Á+òfÁè‹l$8f+È+úþÿÿÿf‰˜w;\$L„¶ÁçÁæC ø‹L$8‹ÆÁè f‹‘°·Ê¯Á;øs#‹ð¸+Á‹l$8Áøf‰…°‹D$X頋Î+ø+ȋÂfÁèf+ЋD$8ùÿÿÿf‰°w;\$L„¢¶ÁçÁáC ø‹t$8‹ÁÁè f‹–È·ê¯Å;øs ‹ð¸+ŋl$8Áøf‰…È‹D$Të&‹ñ+ø+ð‹ÂfÁèf+ЋD$8f‰È‹T$T‹D$P‰T$P‹L$X‰L$T‹l$\‰D$\‰l$X3Àƒ|$`‹L$xŸÀÁh D@‰D$`þÿÿÿw;\$L„ô¶ÁçÁæC øf‹‹ÆÁè ·ê¯Å;øs/‰D$H¸+ÅÁd$DÁøÇD$,f‰‹D$DL‰L$ër+ð+ø‹ÂfÁèf+Ёþÿÿÿf‰w;\$L„…¶ÁçÁæC øf‹Q‹ÆÁè ·ê¯Å;øs;‰D$H¸+ÅÁd$DÁøÇD$,‹T$Df‰AŒ ‰L$ÇD$0ë/+ð+ø‹Â‰t$HfÁèÇD$,f+ÐÇD$0f‰QÁ‰L$‹L$0º‰L$(,‹t$õ|$Hÿÿÿw;\$L„ÒÁd$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁø‹Õf‰ë)D$H+ø‹ÂfÁèf+Ðf‰U‹t$(N‰t$(u‰ŠL$0¸Óà+ÐT$,ƒ|$`‰T$ çƒD$`ƒú‹Â~¸‹t$xÁàÇD$$„0`‰D$¸,‹t$õ|$Hÿÿÿw;\$L„ Ád$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁøf‰‹Åë)D$H+ø‹ÂfÁèf+ЍEf‰‹l$$M‰l$$u‰PÀƒú‰$Ž'‹Â‹òÑøƒæHÿƒÎƒú ‰L$ ‹l$xÓæ҉4$Du+Â^‰D$ëVPû|$Hÿÿÿw;\$L„WÁd$H¶ÁçC øÑl$Hö;|$Hr+|$HƒÎJuȋD$xÁæ‰4$DÇD$ ‰D$ÇD$¸‹l$À‰D$è|$Hÿÿÿw;\$L„ëÁd$H¶ÁçC ø‹D$Hf‹UÁè ·ò¯Æ;øs‰D$H¸+ÆÁøf‰E‹D$ë)D$H+ø‹ÂfÁèf+ЋD$f‰U‹T$@ $‹L$ Ñd$I‰L$ …pÿÿÿ‹4$F‰t$\tZ‹L$ ‹l$tƒÁ9l$\w`‹„$ ‹Õ+D$\”$ tŠFˆD$sˆBÿD$tIt‹¬$¤9l$trâë‹„$¤9D$t‚ºöÿÿ|$Hÿÿÿw;\$L¸t)ë¸ë C+œ$”3À‹”$œ‹L$t‰‹œ$¨‰ ƒÄ|[^_]Ãéä þÿ,¢øÿMs
base_address: 0x00476000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: (€0€p€`€BIN2H€ ` 2@ä Ѐ ø€# €&H€'p€/˜€0À€?è€@€R8€ èàH4ä KVä 8lLXä `ÄLöä ˆ¼MÚä °˜NDä ØÜN ä üOºä (¸Pbä PQhäx€  r|ä|4VS_VERSION_INFO½ïþ?ÚStringFileInfo¶040904b00CompanyNameNirSoft`FileDescriptionWeb Browser Password Viewer*FileVersion2.06LInternalNameWeb Browser Pass Viewh"LegalCopyrightCopyright © 2011 - 2020 Nir Sofer.ProductVersion2.06DVarFileInfo$Translation °
base_address: 0x00477000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL»üiTà 2¶"P@@÷  0È H.MPRESS1Öàà.MPRESS2p Øàà.rsrc0æ@Àv2.19
base_address: 0x00400000
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: È D!È Ô Q!Ô Ü b!Ü ä o!ä ì ‚!ì ô ˜!ô ü ¸!ü !Ó!! !í! ! !3!\!€z!Œ!¥!Å!ß!÷!GetModuleHandleAGetProcAddressKERNEL32.DLLmsvcrt.dllabsCOMCTL32.dllUSER32.dllGetDCGDI32.dllSetBkModecomdlg32.dllGetSaveFileNameAADVAPI32.dllRegEnumKeyASHELL32.dllSHGetMallocole32.dllCoInitialize`èXZ ‹0ð+À‹þf­Áà ‹ÈP­+Èñ‹ÈWQIŠD9ˆ1uö+À¬‹È€áð$Áá Šè¬ ÈQͽýÿÿÓåYX‹Ü¤lñÿÿQ+ÉQQ‹ÌQf‹Áâ RWƒÁQPƒÁVQè^‹ã^Z+À‰2´+Ð+É;Ês&‹Ù¬A$þ<èuòCƒÁ­ Àx;ÂsåëÃxßÂ+ÉFüëÖè_ÇMÿÿÿ°éª¸V «èX˜ éˆ UWVSƒì|‹”$ÇD$tÆD$s‹¬$œB‰D$x¸¶J‹ØÓã‹ËI‰L$l¶JÓàH‰D$h‹„$¨¶2ÇEÇD$`Ǹ‰t$dÇD$\ÇD$XÇD$TÇD$P¶JÎÓàˆ69L$ts‹D$xfǃÀâö‹œ$”3ÿÇD$Hÿÿÿÿ‹Ó”$˜‰T$L3Ò;\$L„} ¶ÁçBC øƒú~狌$¤9L$tƒe ‹t$t#t$l‹D$`‹T$xÁà‰t$DƁ|$Hÿÿÿ,Bw;\$L„- Ád$H¶ÁçC ø‹D$Hf‹UÁè ·Ê¯Á;øƒÝ‰D$H¸+ÁŠL$dÁø¾¶T$sf‰E‹D$t#D$h‹l$xÓà¹+L$dÓúÂiÀƒ|$`„(l‰D$ŽÊ‹D$t+D$\‹”$ ¶‰D$@Ñd$@‹L$@6‹l$á|$HÿÿÿDM‰L$<,w;\$L„aÁd$H¶ÁçC ø‹D$Hf‹Áè ·ñ¯Æ;øs#‰D$H¸+ƋòÁøƒ|$<f‰…t"ë.)D$H+ø‹ÁrfÁèf+ȃ|$<f‰tþÿŽWÿÿÿëyþÿq6‹l$ê|$Hÿÿÿw;\$L„ÅÁd$H¶ÁçC ø‹D$Hf‹MÁè ·ñ¯Æ;øs‰D$H¸+ƋòÁøf‰EëŸ)D$H+ø‹ÁrfÁèf+Èf‰M뇋T$t‹Æ‹Œ$ ˆD$sˆBƒ|$`‰T$t ÇD$`éƒ|$`  ƒl$`é ƒl$`é‹L$H+ø‹t$`+ȋÂfÁèf+Ёùÿÿÿf‰U‹l$xtu‰t$8w;\$L„ò¶ÁçÁáC ø‹l$8‹ÁÁè f‹•€·ê¯Å;øsR‹ð¸+ŋl$XÁø‹L$T‹T$8‰L$P‹L$xf‰‚€‹D$\‰l$T‰D$X3Àƒ|$`ŸÀÁd@‰D$`ét‹ñ+ø+ð‹ÂfÁè‹L$8f+Ёþÿÿÿf‰‘€w;\$L„N¶ÁçÁæC ø‹l$8‹ÖÁê f‹˜·Á¯Ð;úƒã½‹ò+èÇD$4‹ÅÁø‹L$8f‰˜‹D$`‹L$DÁàD$xúÿÿÿ,Hw;\$L„ܶÁçÁæC øf‹•à‹ÆÁè ·Ê¯Á;øs`)L$4Á|$4‹t$4‰D$Hƒ|$tf‰…à„”3Àƒ|$`‹¬$ ‹T$tŸÀD ‰D$`‹D$t+D$\Š(ˆD$sˆDB‰T$té2+ð+ø‹ÂfÁèf+Ðf‰•àé‹Á+òfÁè‹l$8f+È+úþÿÿÿf‰˜w;\$L„¶ÁçÁæC ø‹L$8‹ÆÁè f‹‘°·Ê¯Á;øs#‹ð¸+Á‹l$8Áøf‰…°‹D$X頋Î+ø+ȋÂfÁèf+ЋD$8ùÿÿÿf‰°w;\$L„¢¶ÁçÁáC ø‹t$8‹ÁÁè f‹–È·ê¯Å;øs ‹ð¸+ŋl$8Áøf‰…È‹D$Të&‹ñ+ø+ð‹ÂfÁèf+ЋD$8f‰È‹T$T‹D$P‰T$P‹L$X‰L$T‹l$\‰D$\‰l$X3Àƒ|$`‹L$xŸÀÁh D@‰D$`þÿÿÿw;\$L„ô¶ÁçÁæC øf‹‹ÆÁè ·ê¯Å;øs/‰D$H¸+ÅÁd$DÁøÇD$,f‰‹D$DL‰L$ër+ð+ø‹ÂfÁèf+Ёþÿÿÿf‰w;\$L„…¶ÁçÁæC øf‹Q‹ÆÁè ·ê¯Å;øs;‰D$H¸+ÅÁd$DÁøÇD$,‹T$Df‰AŒ ‰L$ÇD$0ë/+ð+ø‹Â‰t$HfÁèÇD$,f+ÐÇD$0f‰QÁ‰L$‹L$0º‰L$(,‹t$õ|$Hÿÿÿw;\$L„ÒÁd$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁø‹Õf‰ë)D$H+ø‹ÂfÁèf+Ðf‰U‹t$(N‰t$(u‰ŠL$0¸Óà+ÐT$,ƒ|$`‰T$ çƒD$`ƒú‹Â~¸‹t$xÁàÇD$$„0`‰D$¸,‹t$õ|$Hÿÿÿw;\$L„ Ád$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁøf‰‹Åë)D$H+ø‹ÂfÁèf+ЍEf‰‹l$$M‰l$$u‰PÀƒú‰$Ž'‹Â‹òÑøƒæHÿƒÎƒú ‰L$ ‹l$xÓæ҉4$Du+Â^‰D$ëVPû|$Hÿÿÿw;\$L„WÁd$H¶ÁçC øÑl$Hö;|$Hr+|$HƒÎJuȋD$xÁæ‰4$DÇD$ ‰D$ÇD$¸‹l$À‰D$è|$Hÿÿÿw;\$L„ëÁd$H¶ÁçC ø‹D$Hf‹UÁè ·ò¯Æ;øs‰D$H¸+ÆÁøf‰E‹D$ë)D$H+ø‹ÂfÁèf+ЋD$f‰U‹T$@ $‹L$ Ñd$I‰L$ …pÿÿÿ‹4$F‰t$\tZ‹L$ ‹l$tƒÁ9l$\w`‹„$ ‹Õ+D$\”$ tŠFˆD$sˆBÿD$tIt‹¬$¤9l$trâë‹„$¤9D$t‚ºöÿÿ|$Hÿÿÿw;\$L¸t)ë¸ë C+œ$”3À‹”$œ‹L$t‰‹œ$¨‰ ƒÄ|[^_]Ãé ÿÿšâýÿMs
base_address: 0x00422000
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL›;à]à :â8RP@p#ù P8`ÜPP.MPRESS1@´àà.MPRESS2¢ P¶àà.rsrc`Ä@Àv2.19
base_address: 0x00400000
process_identifier: 3008
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: ÜP`QÜPèPmQèPðP~QðPøP‹QøPQ¨QQQ»QQQÑQQQêQQ QR Q(QR(Q<QOQxQ€–Q³QÅQÞQ÷QR)RGetModuleHandleAGetProcAddressKERNEL32.DLLmsvcrt.dlllogCOMCTL32.dllRPCRT4.dllUuidFromStringAUSER32.dllGetDCGDI32.dllSetBkModecomdlg32.dllFindTextAADVAPI32.dllRegEnumKeyASHELL32.dllSHGetMallocole32.dllCoInitialize`èXZ ‹0ð+À‹þf­Áà ‹ÈP­+Èñ‹ÈWQIŠD9ˆ1uö+À¬‹È€áð$Áá Šè¬ ÈQͽýÿÿÓåYX‹Ü¤lñÿÿQ+ÉQQ‹ÌQf‹Áâ RWƒÁQPƒÁVQè^‹ã^Z+À‰2´+Ð+É;Ês&‹Ù¬A$þ<èuòCƒÁ­ Àx;ÂsåëÃxßÂ+ÉFüëÖè_ÇMÿÿÿ°éª¸V «èX˜ éˆ UWVSƒì|‹”$ÇD$tÆD$s‹¬$œB‰D$x¸¶J‹ØÓã‹ËI‰L$l¶JÓàH‰D$h‹„$¨¶2ÇEÇD$`Ǹ‰t$dÇD$\ÇD$XÇD$TÇD$P¶JÎÓàˆ69L$ts‹D$xfǃÀâö‹œ$”3ÿÇD$Hÿÿÿÿ‹Ó”$˜‰T$L3Ò;\$L„} ¶ÁçBC øƒú~狌$¤9L$tƒe ‹t$t#t$l‹D$`‹T$xÁà‰t$DƁ|$Hÿÿÿ,Bw;\$L„- Ád$H¶ÁçC ø‹D$Hf‹UÁè ·Ê¯Á;øƒÝ‰D$H¸+ÁŠL$dÁø¾¶T$sf‰E‹D$t#D$h‹l$xÓà¹+L$dÓúÂiÀƒ|$`„(l‰D$ŽÊ‹D$t+D$\‹”$ ¶‰D$@Ñd$@‹L$@6‹l$á|$HÿÿÿDM‰L$<,w;\$L„aÁd$H¶ÁçC ø‹D$Hf‹Áè ·ñ¯Æ;øs#‰D$H¸+ƋòÁøƒ|$<f‰…t"ë.)D$H+ø‹ÁrfÁèf+ȃ|$<f‰tþÿŽWÿÿÿëyþÿq6‹l$ê|$Hÿÿÿw;\$L„ÅÁd$H¶ÁçC ø‹D$Hf‹MÁè ·ñ¯Æ;øs‰D$H¸+ƋòÁøf‰EëŸ)D$H+ø‹ÁrfÁèf+Èf‰M뇋T$t‹Æ‹Œ$ ˆD$sˆBƒ|$`‰T$t ÇD$`éƒ|$`  ƒl$`é ƒl$`é‹L$H+ø‹t$`+ȋÂfÁèf+Ёùÿÿÿf‰U‹l$xtu‰t$8w;\$L„ò¶ÁçÁáC ø‹l$8‹ÁÁè f‹•€·ê¯Å;øsR‹ð¸+ŋl$XÁø‹L$T‹T$8‰L$P‹L$xf‰‚€‹D$\‰l$T‰D$X3Àƒ|$`ŸÀÁd@‰D$`ét‹ñ+ø+ð‹ÂfÁè‹L$8f+Ёþÿÿÿf‰‘€w;\$L„N¶ÁçÁæC ø‹l$8‹ÖÁê f‹˜·Á¯Ð;úƒã½‹ò+èÇD$4‹ÅÁø‹L$8f‰˜‹D$`‹L$DÁàD$xúÿÿÿ,Hw;\$L„ܶÁçÁæC øf‹•à‹ÆÁè ·Ê¯Á;øs`)L$4Á|$4‹t$4‰D$Hƒ|$tf‰…à„”3Àƒ|$`‹¬$ ‹T$tŸÀD ‰D$`‹D$t+D$\Š(ˆD$sˆDB‰T$té2+ð+ø‹ÂfÁèf+Ðf‰•àé‹Á+òfÁè‹l$8f+È+úþÿÿÿf‰˜w;\$L„¶ÁçÁæC ø‹L$8‹ÆÁè f‹‘°·Ê¯Á;øs#‹ð¸+Á‹l$8Áøf‰…°‹D$X頋Î+ø+ȋÂfÁèf+ЋD$8ùÿÿÿf‰°w;\$L„¢¶ÁçÁáC ø‹t$8‹ÁÁè f‹–È·ê¯Å;øs ‹ð¸+ŋl$8Áøf‰…È‹D$Të&‹ñ+ø+ð‹ÂfÁèf+ЋD$8f‰È‹T$T‹D$P‰T$P‹L$X‰L$T‹l$\‰D$\‰l$X3Àƒ|$`‹L$xŸÀÁh D@‰D$`þÿÿÿw;\$L„ô¶ÁçÁæC øf‹‹ÆÁè ·ê¯Å;øs/‰D$H¸+ÅÁd$DÁøÇD$,f‰‹D$DL‰L$ër+ð+ø‹ÂfÁèf+Ёþÿÿÿf‰w;\$L„…¶ÁçÁæC øf‹Q‹ÆÁè ·ê¯Å;øs;‰D$H¸+ÅÁd$DÁøÇD$,‹T$Df‰AŒ ‰L$ÇD$0ë/+ð+ø‹Â‰t$HfÁèÇD$,f+ÐÇD$0f‰QÁ‰L$‹L$0º‰L$(,‹t$õ|$Hÿÿÿw;\$L„ÒÁd$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁø‹Õf‰ë)D$H+ø‹ÂfÁèf+Ðf‰U‹t$(N‰t$(u‰ŠL$0¸Óà+ÐT$,ƒ|$`‰T$ çƒD$`ƒú‹Â~¸‹t$xÁàÇD$$„0`‰D$¸,‹t$õ|$Hÿÿÿw;\$L„ Ád$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁøf‰‹Åë)D$H+ø‹ÂfÁèf+ЍEf‰‹l$$M‰l$$u‰PÀƒú‰$Ž'‹Â‹òÑøƒæHÿƒÎƒú ‰L$ ‹l$xÓæ҉4$Du+Â^‰D$ëVPû|$Hÿÿÿw;\$L„WÁd$H¶ÁçC øÑl$Hö;|$Hr+|$HƒÎJuȋD$xÁæ‰4$DÇD$ ‰D$ÇD$¸‹l$À‰D$è|$Hÿÿÿw;\$L„ëÁd$H¶ÁçC ø‹D$Hf‹UÁè ·ò¯Æ;øs‰D$H¸+ÆÁøf‰E‹D$ë)D$H+ø‹ÂfÁèf+ЋD$f‰U‹T$@ $‹L$ Ñd$I‰L$ …pÿÿÿ‹4$F‰t$\tZ‹L$ ‹l$tƒÁ9l$\w`‹„$ ‹Õ+D$\”$ tŠFˆD$sˆBÿD$tIt‹¬$¤9l$trâë‹„$¤9D$t‚ºöÿÿ|$Hÿÿÿw;\$L¸t)ë¸ë C+œ$”3À‹”$œ‹L$t‰‹œ$¨‰ ƒÄ|[^_]Ãé5ìþÿh²úÿMs
base_address: 0x00455000
process_identifier: 3008
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 3008
process_handle: 0x000002c8
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $Ýð2w™‘\$™‘\$™‘\$- ­$Š‘\$- ¯$?‘\$- ®$‡‘\$éØ$˜‘\$1›$›‘\$¢Ï_%ƒ‘\$¢ÏY%£‘\$¢ÏX%»‘\$éÏ$Ž‘\$™‘]$µ\$ÏU%Ƒ\$ Ï£$˜‘\$Ï^%˜‘\$Rich™‘\$PEL+¼‡bà 0 =@@°€8—ð TKp˜8ð{8„|(|@@°.text½.0 `.rdata†p@r4@@.data¼?À¦@À.tls ´@À.gfids0¶@@.rsrcTK Lº@@.reloc˜8p:@B
base_address: 0x00400000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL´Ë^à Ðètbà@€!f `tpð`X.MPRESS1Pöàà.MPRESS2Þ `øàà.rsrcp@Àv2.19
base_address: 0x00400000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL»üiTà 2¶"P@@÷  0È H.MPRESS1Öàà.MPRESS2p Øàà.rsrc0æ@Àv2.19
base_address: 0x00400000
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL›;à]à :â8RP@p#ù P8`ÜPP.MPRESS1@´àà.MPRESS2¢ P¶àà.rsrc`Ä@Àv2.19
base_address: 0x00400000
process_identifier: 3008
process_handle: 0x000002c8
1 1 0
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x00408a5e
hook_identifier: 13 (WH_KEYBOARD_LL)
module_address: 0x00400000
1 393701 0
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
registry HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
registry HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
registry HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
registry HKEY_LOCAL_MACHINE\Software\Mozilla\Mozilla Thunderbird
registry HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\{D9734F19-8CFB-411D-BC59-833E334FCB5E}\Calendar Summary\POP3 User
registry HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
Process injection Process 2352 called NtSetContextThread to modify thread in remote process 2676
Process injection Process 2676 called NtSetContextThread to modify thread in remote process 2884
Process injection Process 2676 called NtSetContextThread to modify thread in remote process 2944
Process injection Process 2676 called NtSetContextThread to modify thread in remote process 3008
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4395837
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000390
process_identifier: 2676
1 0 0

NtSetContextThread

registers.eip: 1999372740
registers.esp: 3734876
registers.edi: 0
registers.eax: 4678260
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000019c
process_identifier: 2884
1 0 0

NtSetContextThread

registers.eip: 1999372740
registers.esp: 1571928
registers.edi: 0
registers.eax: 4334086
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000019c
process_identifier: 2944
1 0 0

NtSetContextThread

registers.eip: 1999372740
registers.esp: 3735108
registers.edi: 0
registers.eax: 4543032
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000019c
process_identifier: 3008
1 0 0
Process injection Process 2352 resumed a thread in remote process 2676
Process injection Process 2676 resumed a thread in remote process 2884
Process injection Process 2676 resumed a thread in remote process 2944
Process injection Process 2676 resumed a thread in remote process 3008
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000390
suspend_count: 1
process_identifier: 2676
1 0 0

NtResumeThread

thread_handle: 0x0000019c
suspend_count: 1
process_identifier: 2884
1 0 0

NtResumeThread

thread_handle: 0x0000019c
suspend_count: 1
process_identifier: 2944
1 0 0

NtResumeThread

thread_handle: 0x0000019c
suspend_count: 1
process_identifier: 3008
1 0 0
Bkav W32.AIDetectNet.01
MicroWorld-eScan Gen:Variant.Strictor.6291
FireEye Generic.mg.d39d493b27584c9c
ALYac Gen:Variant.Strictor.6291
Cylance Unsafe
Sangfor Suspicious.Win32.Save.a
Cybereason malicious.b27584
Arcabit Trojan.Strictor.D1893
Elastic malicious (high confidence)
APEX Malicious
BitDefender Gen:Variant.Strictor.6291
Ad-Aware Gen:Variant.Strictor.6291
Emsisoft Gen:Variant.Strictor.6291 (B)
McAfee-GW-Edition BehavesLike.Win32.Generic.bc
Trapmine malicious.moderate.ml.score
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
Avira TR/Dropper.MSIL.Gen
Microsoft Trojan:Win32/Wacatac.B!ml
GData Gen:Variant.Strictor.6291
Cynet Malicious (score: 100)
Acronis suspicious
MAX malware (ai score=88)
Malwarebytes Malware.AI.70571527
Rising Trojan.FakeFolder/ICON!1.6ABA (CLASSIC)
Ikarus Trojan.MSIL.Injector
MaxSecure Trojan.Malware.300983.susgen
BitDefenderTheta Gen:NN.ZemsilF.34742.Xm0@aS8uDEf
CrowdStrike win/malicious_confidence_100% (D)
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000dc
suspend_count: 1
process_identifier: 2352
1 0 0

NtResumeThread

thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2352
1 0 0

NtResumeThread

thread_handle: 0x0000018c
suspend_count: 1
process_identifier: 2352
1 0 0

CreateProcessInternalW

thread_identifier: 2468
thread_handle: 0x0000038c
process_identifier: 2464
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
track: 1
command_line: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
filepath_r: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000394
1 1 0

CreateProcessInternalW

thread_identifier: 2680
thread_handle: 0x00000390
process_identifier: 2676
current_directory:
filepath:
track: 1
command_line: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
filepath_r:
stack_pivoted: 0
creation_flags: 134217732 (CREATE_NO_WINDOW|CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000380
1 1 0

NtGetContextThread

thread_handle: 0x00000390
1 0 0

NtAllocateVirtualMemory

process_identifier: 2676
region_size: 503808
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000380
1 0 0

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $Ýð2w™‘\$™‘\$™‘\$- ­$Š‘\$- ¯$?‘\$- ®$‡‘\$éØ$˜‘\$1›$›‘\$¢Ï_%ƒ‘\$¢ÏY%£‘\$¢ÏX%»‘\$éÏ$Ž‘\$™‘]$µ\$ÏU%Ƒ\$ Ï£$˜‘\$Ï^%˜‘\$Rich™‘\$PEL+¼‡bà 0 =@@°€8—ð TKp˜8ð{8„|(|@@°.text½.0 `.rdata†p@r4@@.data¼?À¦@À.tls ´@À.gfids0¶@@.rsrcTK Lº@@.reloc˜8p:@B
base_address: 0x00400000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00454000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: €ÿÿÿÿ±¿DNæ@»ÿÿÿÿ Copyright (c) by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.ÿÿÿÿ “    l…EpˆEj…E..pÁFLÖFLÖFLÖFLÖFLÖFLÖFLÖFLÖFLÖFtÁFPÖFPÖFPÖFPÖFPÖFPÖFPÖFxÁFÿÿÿÿpˆE˜ÂF˜ÂF˜ÂF˜ÂF˜ÂFxÁFðŠEpŒE¸šEØÁFpÇFCPSTPDT ÂFàÂFÿÿÿÿÿÿÿÿÿÿÿÿ€ ¤`‚y‚!¦ß¡¥Ÿàü@~€ü¨Á£Ú£ þ@þµÁ£Ú£ þAþ¶Ï¢ä¢å¢è¢[þ@~¡þQQÚ^Ú _ÚjÚ2ÓØÞàù1~þ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZpÇFþÿÿÿþÿÿÿu˜0Ï!­tåša¾Œe¸‘¢z»Œ^ž âȨ3œðqFãAüqF‰!ArF¨AtFE.?AVtype_info@@tFE.?AVbad_alloc@std@@tFE.?AVbad_array_new_length@std@@tFE.?AVlogic_error@std@@tFE.?AVlength_error@std@@tFE.?AVout_of_range@std@@tFE.?AV_Facet_base@std@@tFE.?AV_Locimp@locale@std@@tFE.?AVfacet@locale@std@@tFE.?AU_Crt_new_delete@std@@tFE.?AVcodecvt_base@std@@tFE.?AUctype_base@std@@tFE.?AV?$ctype@D@std@@tFE.?AV?$codecvt@DDU_Mbstatet@@@std@@tFE.?AVbad_exception@std@@tFE.HtFE.?AVfailure@ios_base@std@@tFE.?AVruntime_error@std@@tFE.?AVsystem_error@std@@tFE.?AVbad_cast@std@@tFE.?AV_System_error@std@@tFE.?AVexception@std@@
base_address: 0x0046c000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: €
base_address: 0x00470000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: eüJüg>¿Ùg>'g>I­g>{° a·`ŠC^Cϸ¾¸_g>g>MãLá­OÍ–ÇqÃ{ß{ß@AþC¦”~•Á£ýÔç×4Þ„àÜÆM)Ž” ƒ% b Er4NPNWN]TUZ[ äøää äö_^îØØäüûüû í9<8;ú` Ÿž†…¢†…§µ¶³´±²¯°†…¸ Ÿ†… Y
base_address: 0x00471000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00472000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00477000
process_identifier: 2676
process_handle: 0x00000380
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2676
process_handle: 0x00000380
1 1 0

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4395837
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000390
process_identifier: 2676
1 0 0

NtResumeThread

thread_handle: 0x00000390
suspend_count: 1
process_identifier: 2676
1 0 0

NtResumeThread

thread_handle: 0x00000298
suspend_count: 1
process_identifier: 2464
1 0 0

NtResumeThread

thread_handle: 0x000002ec
suspend_count: 1
process_identifier: 2464
1 0 0

NtResumeThread

thread_handle: 0x00000438
suspend_count: 1
process_identifier: 2464
1 0 0

NtResumeThread

thread_handle: 0x00000484
suspend_count: 1
process_identifier: 2464
1 0 0

CreateProcessInternalW

thread_identifier: 2888
thread_handle: 0x0000019c
process_identifier: 2884
current_directory:
filepath:
track: 1
command_line: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\test22\AppData\Local\Temp\eeghiqcgh"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x000002c8
1 1 0

NtGetContextThread

thread_handle: 0x0000019c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2884
region_size: 491520
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000002c8
1 0 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL´Ë^à Ðètbà@€!f `tpð`X.MPRESS1Pöàà.MPRESS2Þ `øàà.rsrcp@Àv2.19
base_address: 0x00400000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: ð`|að`ü`‰aü`ašaa a§a aaÄaaaäaa$a÷a$a,a b,a4a&b4a<aAb<aDa[bDaXaka”a€³aÐaïabb3bMbebGetModuleHandleAGetProcAddressKERNEL32.DLLmsvcrt.dllabsCOMCTL32.dllVERSION.dllVerQueryValueWWININET.dllFindCloseUrlCacheUSER32.dllGetDCGDI32.dllSetBkModecomdlg32.dllFindTextWADVAPI32.dllRegCloseKeySHELL32.dllSHGetMallocole32.dllCoInitialize`èXZ ‹0ð+À‹þf­Áà ‹ÈP­+Èñ‹ÈWQIŠD9ˆ1uö+À¬‹È€áð$Áá Šè¬ ÈQͽýÿÿÓåYX‹Ü¤lñÿÿQ+ÉQQ‹ÌQf‹Áâ RWƒÁQPƒÁVQè^‹ã^Z+À‰2´+Ð+É;Ês&‹Ù¬A$þ<èuòCƒÁ­ Àx;ÂsåëÃxßÂ+ÉFüëÖè_ÇMÿÿÿ°éª¸V «èX˜ éˆ UWVSƒì|‹”$ÇD$tÆD$s‹¬$œB‰D$x¸¶J‹ØÓã‹ËI‰L$l¶JÓàH‰D$h‹„$¨¶2ÇEÇD$`Ǹ‰t$dÇD$\ÇD$XÇD$TÇD$P¶JÎÓàˆ69L$ts‹D$xfǃÀâö‹œ$”3ÿÇD$Hÿÿÿÿ‹Ó”$˜‰T$L3Ò;\$L„} ¶ÁçBC øƒú~狌$¤9L$tƒe ‹t$t#t$l‹D$`‹T$xÁà‰t$DƁ|$Hÿÿÿ,Bw;\$L„- Ád$H¶ÁçC ø‹D$Hf‹UÁè ·Ê¯Á;øƒÝ‰D$H¸+ÁŠL$dÁø¾¶T$sf‰E‹D$t#D$h‹l$xÓà¹+L$dÓúÂiÀƒ|$`„(l‰D$ŽÊ‹D$t+D$\‹”$ ¶‰D$@Ñd$@‹L$@6‹l$á|$HÿÿÿDM‰L$<,w;\$L„aÁd$H¶ÁçC ø‹D$Hf‹Áè ·ñ¯Æ;øs#‰D$H¸+ƋòÁøƒ|$<f‰…t"ë.)D$H+ø‹ÁrfÁèf+ȃ|$<f‰tþÿŽWÿÿÿëyþÿq6‹l$ê|$Hÿÿÿw;\$L„ÅÁd$H¶ÁçC ø‹D$Hf‹MÁè ·ñ¯Æ;øs‰D$H¸+ƋòÁøf‰EëŸ)D$H+ø‹ÁrfÁèf+Èf‰M뇋T$t‹Æ‹Œ$ ˆD$sˆBƒ|$`‰T$t ÇD$`éƒ|$`  ƒl$`é ƒl$`é‹L$H+ø‹t$`+ȋÂfÁèf+Ёùÿÿÿf‰U‹l$xtu‰t$8w;\$L„ò¶ÁçÁáC ø‹l$8‹ÁÁè f‹•€·ê¯Å;øsR‹ð¸+ŋl$XÁø‹L$T‹T$8‰L$P‹L$xf‰‚€‹D$\‰l$T‰D$X3Àƒ|$`ŸÀÁd@‰D$`ét‹ñ+ø+ð‹ÂfÁè‹L$8f+Ёþÿÿÿf‰‘€w;\$L„N¶ÁçÁæC ø‹l$8‹ÖÁê f‹˜·Á¯Ð;úƒã½‹ò+èÇD$4‹ÅÁø‹L$8f‰˜‹D$`‹L$DÁàD$xúÿÿÿ,Hw;\$L„ܶÁçÁæC øf‹•à‹ÆÁè ·Ê¯Á;øs`)L$4Á|$4‹t$4‰D$Hƒ|$tf‰…à„”3Àƒ|$`‹¬$ ‹T$tŸÀD ‰D$`‹D$t+D$\Š(ˆD$sˆDB‰T$té2+ð+ø‹ÂfÁèf+Ðf‰•àé‹Á+òfÁè‹l$8f+È+úþÿÿÿf‰˜w;\$L„¶ÁçÁæC ø‹L$8‹ÆÁè f‹‘°·Ê¯Á;øs#‹ð¸+Á‹l$8Áøf‰…°‹D$X頋Î+ø+ȋÂfÁèf+ЋD$8ùÿÿÿf‰°w;\$L„¢¶ÁçÁáC ø‹t$8‹ÁÁè f‹–È·ê¯Å;øs ‹ð¸+ŋl$8Áøf‰…È‹D$Të&‹ñ+ø+ð‹ÂfÁèf+ЋD$8f‰È‹T$T‹D$P‰T$P‹L$X‰L$T‹l$\‰D$\‰l$X3Àƒ|$`‹L$xŸÀÁh D@‰D$`þÿÿÿw;\$L„ô¶ÁçÁæC øf‹‹ÆÁè ·ê¯Å;øs/‰D$H¸+ÅÁd$DÁøÇD$,f‰‹D$DL‰L$ër+ð+ø‹ÂfÁèf+Ёþÿÿÿf‰w;\$L„…¶ÁçÁæC øf‹Q‹ÆÁè ·ê¯Å;øs;‰D$H¸+ÅÁd$DÁøÇD$,‹T$Df‰AŒ ‰L$ÇD$0ë/+ð+ø‹Â‰t$HfÁèÇD$,f+ÐÇD$0f‰QÁ‰L$‹L$0º‰L$(,‹t$õ|$Hÿÿÿw;\$L„ÒÁd$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁø‹Õf‰ë)D$H+ø‹ÂfÁèf+Ðf‰U‹t$(N‰t$(u‰ŠL$0¸Óà+ÐT$,ƒ|$`‰T$ çƒD$`ƒú‹Â~¸‹t$xÁàÇD$$„0`‰D$¸,‹t$õ|$Hÿÿÿw;\$L„ Ád$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁøf‰‹Åë)D$H+ø‹ÂfÁèf+ЍEf‰‹l$$M‰l$$u‰PÀƒú‰$Ž'‹Â‹òÑøƒæHÿƒÎƒú ‰L$ ‹l$xÓæ҉4$Du+Â^‰D$ëVPû|$Hÿÿÿw;\$L„WÁd$H¶ÁçC øÑl$Hö;|$Hr+|$HƒÎJuȋD$xÁæ‰4$DÇD$ ‰D$ÇD$¸‹l$À‰D$è|$Hÿÿÿw;\$L„ëÁd$H¶ÁçC ø‹D$Hf‹UÁè ·ò¯Æ;øs‰D$H¸+ÆÁøf‰E‹D$ë)D$H+ø‹ÂfÁèf+ЋD$f‰U‹T$@ $‹L$ Ñd$I‰L$ …pÿÿÿ‹4$F‰t$\tZ‹L$ ‹l$tƒÁ9l$\w`‹„$ ‹Õ+D$\”$ tŠFˆD$sˆBÿD$tIt‹¬$¤9l$trâë‹„$¤9D$t‚ºöÿÿ|$Hÿÿÿw;\$L¸t)ë¸ë C+œ$”3À‹”$œ‹L$t‰‹œ$¨‰ ƒÄ|[^_]Ãéä þÿ,¢øÿMs
base_address: 0x00476000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: (€0€p€`€BIN2H€ ` 2@ä Ѐ ø€# €&H€'p€/˜€0À€?è€@€R8€ èàH4ä KVä 8lLXä `ÄLöä ˆ¼MÚä °˜NDä ØÜN ä üOºä (¸Pbä PQhäx€  r|ä|4VS_VERSION_INFO½ïþ?ÚStringFileInfo¶040904b00CompanyNameNirSoft`FileDescriptionWeb Browser Password Viewer*FileVersion2.06LInternalNameWeb Browser Pass Viewh"LegalCopyrightCopyright © 2011 - 2020 Nir Sofer.ProductVersion2.06DVarFileInfo$Translation °
base_address: 0x00477000
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2884
process_handle: 0x000002c8
1 1 0

NtSetContextThread

registers.eip: 1999372740
registers.esp: 3734876
registers.edi: 0
registers.eax: 4678260
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000019c
process_identifier: 2884
1 0 0

NtResumeThread

thread_handle: 0x0000019c
suspend_count: 1
process_identifier: 2884
1 0 0

CreateProcessInternalW

thread_identifier: 2948
thread_handle: 0x0000019c
process_identifier: 2944
current_directory:
filepath:
track: 1
command_line: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\test22\AppData\Local\Temp\pyuriinavenvg"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x000002c8
1 1 0

NtGetContextThread

thread_handle: 0x0000019c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2944
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000002c8
1 0 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL»üiTà 2¶"P@@÷  0È H.MPRESS1Öàà.MPRESS2p Øàà.rsrc0æ@Àv2.19
base_address: 0x00400000
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: È D!È Ô Q!Ô Ü b!Ü ä o!ä ì ‚!ì ô ˜!ô ü ¸!ü !Ó!! !í! ! !3!\!€z!Œ!¥!Å!ß!÷!GetModuleHandleAGetProcAddressKERNEL32.DLLmsvcrt.dllabsCOMCTL32.dllUSER32.dllGetDCGDI32.dllSetBkModecomdlg32.dllGetSaveFileNameAADVAPI32.dllRegEnumKeyASHELL32.dllSHGetMallocole32.dllCoInitialize`èXZ ‹0ð+À‹þf­Áà ‹ÈP­+Èñ‹ÈWQIŠD9ˆ1uö+À¬‹È€áð$Áá Šè¬ ÈQͽýÿÿÓåYX‹Ü¤lñÿÿQ+ÉQQ‹ÌQf‹Áâ RWƒÁQPƒÁVQè^‹ã^Z+À‰2´+Ð+É;Ês&‹Ù¬A$þ<èuòCƒÁ­ Àx;ÂsåëÃxßÂ+ÉFüëÖè_ÇMÿÿÿ°éª¸V «èX˜ éˆ UWVSƒì|‹”$ÇD$tÆD$s‹¬$œB‰D$x¸¶J‹ØÓã‹ËI‰L$l¶JÓàH‰D$h‹„$¨¶2ÇEÇD$`Ǹ‰t$dÇD$\ÇD$XÇD$TÇD$P¶JÎÓàˆ69L$ts‹D$xfǃÀâö‹œ$”3ÿÇD$Hÿÿÿÿ‹Ó”$˜‰T$L3Ò;\$L„} ¶ÁçBC øƒú~狌$¤9L$tƒe ‹t$t#t$l‹D$`‹T$xÁà‰t$DƁ|$Hÿÿÿ,Bw;\$L„- Ád$H¶ÁçC ø‹D$Hf‹UÁè ·Ê¯Á;øƒÝ‰D$H¸+ÁŠL$dÁø¾¶T$sf‰E‹D$t#D$h‹l$xÓà¹+L$dÓúÂiÀƒ|$`„(l‰D$ŽÊ‹D$t+D$\‹”$ ¶‰D$@Ñd$@‹L$@6‹l$á|$HÿÿÿDM‰L$<,w;\$L„aÁd$H¶ÁçC ø‹D$Hf‹Áè ·ñ¯Æ;øs#‰D$H¸+ƋòÁøƒ|$<f‰…t"ë.)D$H+ø‹ÁrfÁèf+ȃ|$<f‰tþÿŽWÿÿÿëyþÿq6‹l$ê|$Hÿÿÿw;\$L„ÅÁd$H¶ÁçC ø‹D$Hf‹MÁè ·ñ¯Æ;øs‰D$H¸+ƋòÁøf‰EëŸ)D$H+ø‹ÁrfÁèf+Èf‰M뇋T$t‹Æ‹Œ$ ˆD$sˆBƒ|$`‰T$t ÇD$`éƒ|$`  ƒl$`é ƒl$`é‹L$H+ø‹t$`+ȋÂfÁèf+Ёùÿÿÿf‰U‹l$xtu‰t$8w;\$L„ò¶ÁçÁáC ø‹l$8‹ÁÁè f‹•€·ê¯Å;øsR‹ð¸+ŋl$XÁø‹L$T‹T$8‰L$P‹L$xf‰‚€‹D$\‰l$T‰D$X3Àƒ|$`ŸÀÁd@‰D$`ét‹ñ+ø+ð‹ÂfÁè‹L$8f+Ёþÿÿÿf‰‘€w;\$L„N¶ÁçÁæC ø‹l$8‹ÖÁê f‹˜·Á¯Ð;úƒã½‹ò+èÇD$4‹ÅÁø‹L$8f‰˜‹D$`‹L$DÁàD$xúÿÿÿ,Hw;\$L„ܶÁçÁæC øf‹•à‹ÆÁè ·Ê¯Á;øs`)L$4Á|$4‹t$4‰D$Hƒ|$tf‰…à„”3Àƒ|$`‹¬$ ‹T$tŸÀD ‰D$`‹D$t+D$\Š(ˆD$sˆDB‰T$té2+ð+ø‹ÂfÁèf+Ðf‰•àé‹Á+òfÁè‹l$8f+È+úþÿÿÿf‰˜w;\$L„¶ÁçÁæC ø‹L$8‹ÆÁè f‹‘°·Ê¯Á;øs#‹ð¸+Á‹l$8Áøf‰…°‹D$X頋Î+ø+ȋÂfÁèf+ЋD$8ùÿÿÿf‰°w;\$L„¢¶ÁçÁáC ø‹t$8‹ÁÁè f‹–È·ê¯Å;øs ‹ð¸+ŋl$8Áøf‰…È‹D$Të&‹ñ+ø+ð‹ÂfÁèf+ЋD$8f‰È‹T$T‹D$P‰T$P‹L$X‰L$T‹l$\‰D$\‰l$X3Àƒ|$`‹L$xŸÀÁh D@‰D$`þÿÿÿw;\$L„ô¶ÁçÁæC øf‹‹ÆÁè ·ê¯Å;øs/‰D$H¸+ÅÁd$DÁøÇD$,f‰‹D$DL‰L$ër+ð+ø‹ÂfÁèf+Ёþÿÿÿf‰w;\$L„…¶ÁçÁæC øf‹Q‹ÆÁè ·ê¯Å;øs;‰D$H¸+ÅÁd$DÁøÇD$,‹T$Df‰AŒ ‰L$ÇD$0ë/+ð+ø‹Â‰t$HfÁèÇD$,f+ÐÇD$0f‰QÁ‰L$‹L$0º‰L$(,‹t$õ|$Hÿÿÿw;\$L„ÒÁd$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁø‹Õf‰ë)D$H+ø‹ÂfÁèf+Ðf‰U‹t$(N‰t$(u‰ŠL$0¸Óà+ÐT$,ƒ|$`‰T$ çƒD$`ƒú‹Â~¸‹t$xÁàÇD$$„0`‰D$¸,‹t$õ|$Hÿÿÿw;\$L„ Ád$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁøf‰‹Åë)D$H+ø‹ÂfÁèf+ЍEf‰‹l$$M‰l$$u‰PÀƒú‰$Ž'‹Â‹òÑøƒæHÿƒÎƒú ‰L$ ‹l$xÓæ҉4$Du+Â^‰D$ëVPû|$Hÿÿÿw;\$L„WÁd$H¶ÁçC øÑl$Hö;|$Hr+|$HƒÎJuȋD$xÁæ‰4$DÇD$ ‰D$ÇD$¸‹l$À‰D$è|$Hÿÿÿw;\$L„ëÁd$H¶ÁçC ø‹D$Hf‹UÁè ·ò¯Æ;øs‰D$H¸+ÆÁøf‰E‹D$ë)D$H+ø‹ÂfÁèf+ЋD$f‰U‹T$@ $‹L$ Ñd$I‰L$ …pÿÿÿ‹4$F‰t$\tZ‹L$ ‹l$tƒÁ9l$\w`‹„$ ‹Õ+D$\”$ tŠFˆD$sˆBÿD$tIt‹¬$¤9l$trâë‹„$¤9D$t‚ºöÿÿ|$Hÿÿÿw;\$L¸t)ë¸ë C+œ$”3À‹”$œ‹L$t‰‹œ$¨‰ ƒÄ|[^_]Ãé ÿÿšâýÿMs
base_address: 0x00422000
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00423000
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2944
process_handle: 0x000002c8
1 1 0

NtSetContextThread

registers.eip: 1999372740
registers.esp: 1571928
registers.edi: 0
registers.eax: 4334086
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000019c
process_identifier: 2944
1 0 0

NtResumeThread

thread_handle: 0x0000019c
suspend_count: 1
process_identifier: 2944
1 0 0

CreateProcessInternalW

thread_identifier: 3012
thread_handle: 0x0000019c
process_identifier: 3008
current_directory:
filepath:
track: 1
command_line: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\test22\AppData\Local\Temp\zazkjbgbjmfzqsno"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x000002c8
1 1 0

NtGetContextThread

thread_handle: 0x0000019c
1 0 0

NtAllocateVirtualMemory

process_identifier: 3008
region_size: 356352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000002c8
1 0 0

WriteProcessMemory

buffer: MZ@ÿÿ¸ º´ Í!¸LÍ!Win32 .EXE. $@PEL›;à]à :â8RP@p#ù P8`ÜPP.MPRESS1@´àà.MPRESS2¢ P¶àà.rsrc`Ä@Àv2.19
base_address: 0x00400000
process_identifier: 3008
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 3008
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: ÜP`QÜPèPmQèPðP~QðPøP‹QøPQ¨QQQ»QQQÑQQQêQQ QR Q(QR(Q<QOQxQ€–Q³QÅQÞQ÷QR)RGetModuleHandleAGetProcAddressKERNEL32.DLLmsvcrt.dlllogCOMCTL32.dllRPCRT4.dllUuidFromStringAUSER32.dllGetDCGDI32.dllSetBkModecomdlg32.dllFindTextAADVAPI32.dllRegEnumKeyASHELL32.dllSHGetMallocole32.dllCoInitialize`èXZ ‹0ð+À‹þf­Áà ‹ÈP­+Èñ‹ÈWQIŠD9ˆ1uö+À¬‹È€áð$Áá Šè¬ ÈQͽýÿÿÓåYX‹Ü¤lñÿÿQ+ÉQQ‹ÌQf‹Áâ RWƒÁQPƒÁVQè^‹ã^Z+À‰2´+Ð+É;Ês&‹Ù¬A$þ<èuòCƒÁ­ Àx;ÂsåëÃxßÂ+ÉFüëÖè_ÇMÿÿÿ°éª¸V «èX˜ éˆ UWVSƒì|‹”$ÇD$tÆD$s‹¬$œB‰D$x¸¶J‹ØÓã‹ËI‰L$l¶JÓàH‰D$h‹„$¨¶2ÇEÇD$`Ǹ‰t$dÇD$\ÇD$XÇD$TÇD$P¶JÎÓàˆ69L$ts‹D$xfǃÀâö‹œ$”3ÿÇD$Hÿÿÿÿ‹Ó”$˜‰T$L3Ò;\$L„} ¶ÁçBC øƒú~狌$¤9L$tƒe ‹t$t#t$l‹D$`‹T$xÁà‰t$DƁ|$Hÿÿÿ,Bw;\$L„- Ád$H¶ÁçC ø‹D$Hf‹UÁè ·Ê¯Á;øƒÝ‰D$H¸+ÁŠL$dÁø¾¶T$sf‰E‹D$t#D$h‹l$xÓà¹+L$dÓúÂiÀƒ|$`„(l‰D$ŽÊ‹D$t+D$\‹”$ ¶‰D$@Ñd$@‹L$@6‹l$á|$HÿÿÿDM‰L$<,w;\$L„aÁd$H¶ÁçC ø‹D$Hf‹Áè ·ñ¯Æ;øs#‰D$H¸+ƋòÁøƒ|$<f‰…t"ë.)D$H+ø‹ÁrfÁèf+ȃ|$<f‰tþÿŽWÿÿÿëyþÿq6‹l$ê|$Hÿÿÿw;\$L„ÅÁd$H¶ÁçC ø‹D$Hf‹MÁè ·ñ¯Æ;øs‰D$H¸+ƋòÁøf‰EëŸ)D$H+ø‹ÁrfÁèf+Èf‰M뇋T$t‹Æ‹Œ$ ˆD$sˆBƒ|$`‰T$t ÇD$`éƒ|$`  ƒl$`é ƒl$`é‹L$H+ø‹t$`+ȋÂfÁèf+Ёùÿÿÿf‰U‹l$xtu‰t$8w;\$L„ò¶ÁçÁáC ø‹l$8‹ÁÁè f‹•€·ê¯Å;øsR‹ð¸+ŋl$XÁø‹L$T‹T$8‰L$P‹L$xf‰‚€‹D$\‰l$T‰D$X3Àƒ|$`ŸÀÁd@‰D$`ét‹ñ+ø+ð‹ÂfÁè‹L$8f+Ёþÿÿÿf‰‘€w;\$L„N¶ÁçÁæC ø‹l$8‹ÖÁê f‹˜·Á¯Ð;úƒã½‹ò+èÇD$4‹ÅÁø‹L$8f‰˜‹D$`‹L$DÁàD$xúÿÿÿ,Hw;\$L„ܶÁçÁæC øf‹•à‹ÆÁè ·Ê¯Á;øs`)L$4Á|$4‹t$4‰D$Hƒ|$tf‰…à„”3Àƒ|$`‹¬$ ‹T$tŸÀD ‰D$`‹D$t+D$\Š(ˆD$sˆDB‰T$té2+ð+ø‹ÂfÁèf+Ðf‰•àé‹Á+òfÁè‹l$8f+È+úþÿÿÿf‰˜w;\$L„¶ÁçÁæC ø‹L$8‹ÆÁè f‹‘°·Ê¯Á;øs#‹ð¸+Á‹l$8Áøf‰…°‹D$X頋Î+ø+ȋÂfÁèf+ЋD$8ùÿÿÿf‰°w;\$L„¢¶ÁçÁáC ø‹t$8‹ÁÁè f‹–È·ê¯Å;øs ‹ð¸+ŋl$8Áøf‰…È‹D$Të&‹ñ+ø+ð‹ÂfÁèf+ЋD$8f‰È‹T$T‹D$P‰T$P‹L$X‰L$T‹l$\‰D$\‰l$X3Àƒ|$`‹L$xŸÀÁh D@‰D$`þÿÿÿw;\$L„ô¶ÁçÁæC øf‹‹ÆÁè ·ê¯Å;øs/‰D$H¸+ÅÁd$DÁøÇD$,f‰‹D$DL‰L$ër+ð+ø‹ÂfÁèf+Ёþÿÿÿf‰w;\$L„…¶ÁçÁæC øf‹Q‹ÆÁè ·ê¯Å;øs;‰D$H¸+ÅÁd$DÁøÇD$,‹T$Df‰AŒ ‰L$ÇD$0ë/+ð+ø‹Â‰t$HfÁèÇD$,f+ÐÇD$0f‰QÁ‰L$‹L$0º‰L$(,‹t$õ|$Hÿÿÿw;\$L„ÒÁd$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁø‹Õf‰ë)D$H+ø‹ÂfÁèf+Ðf‰U‹t$(N‰t$(u‰ŠL$0¸Óà+ÐT$,ƒ|$`‰T$ çƒD$`ƒú‹Â~¸‹t$xÁàÇD$$„0`‰D$¸,‹t$õ|$Hÿÿÿw;\$L„ Ád$H¶ÁçC ø‹D$Hf‹Áè ·Ê¯Á;øs‰D$H¸+ÁÁøf‰‹Åë)D$H+ø‹ÂfÁèf+ЍEf‰‹l$$M‰l$$u‰PÀƒú‰$Ž'‹Â‹òÑøƒæHÿƒÎƒú ‰L$ ‹l$xÓæ҉4$Du+Â^‰D$ëVPû|$Hÿÿÿw;\$L„WÁd$H¶ÁçC øÑl$Hö;|$Hr+|$HƒÎJuȋD$xÁæ‰4$DÇD$ ‰D$ÇD$¸‹l$À‰D$è|$Hÿÿÿw;\$L„ëÁd$H¶ÁçC ø‹D$Hf‹UÁè ·ò¯Æ;øs‰D$H¸+ÆÁøf‰E‹D$ë)D$H+ø‹ÂfÁèf+ЋD$f‰U‹T$@ $‹L$ Ñd$I‰L$ …pÿÿÿ‹4$F‰t$\tZ‹L$ ‹l$tƒÁ9l$\w`‹„$ ‹Õ+D$\”$ tŠFˆD$sˆBÿD$tIt‹¬$¤9l$trâë‹„$¤9D$t‚ºöÿÿ|$Hÿÿÿw;\$L¸t)ë¸ë C+œ$”3À‹”$œ‹L$t‰‹œ$¨‰ ƒÄ|[^_]Ãé5ìþÿh²úÿMs
base_address: 0x00455000
process_identifier: 3008
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00456000
process_identifier: 3008
process_handle: 0x000002c8
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 3008
process_handle: 0x000002c8
1 1 0