Summary | ZeroBOX

random.exe

SystemBC RedlineStealer Gen1 RedLine stealer Generic Malware Malicious Library Downloader Antivirus Malicious Packer .NET framework(MSIL) UPX Escalate priviledges ScreenShot Steal credential Create Service DGA PWS Http API Socket
Category Machine Started Completed
FILE s1_win7_x6401 July 28, 2024, 10:38 a.m. July 28, 2024, 10:42 a.m.
Size 1.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8c0430ee2841a6554d709869a81a375b
SHA256 1498a70a6f12ced4f590dda71ac978898dbe18955fc745c964f3e9379dd291da
CRC32 4005E7B6
ssdeep 49152:cpjkmmm/9iVwteCqO+fyphnWpoG9Z8PdmLy:crmy9iVBiXwKG9Zsd
Yara
  • PE_Header_Zero - PE File Signature
  • themida_packer - themida packer
  • IsPE32 - (no description)

IP Address Status Action
103.28.36.182 Active Moloch
164.124.101.2 Active Moloch
185.215.113.16 Active Moloch
185.215.113.67 Active Moloch
185.215.113.9 Active Moloch
58.65.168.132 Active Moloch
45.33.6.223 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.16:80 -> 192.168.56.101:49164 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49164 2014819 ET INFO Packed Executable Download Misc activity
TCP 185.215.113.16:80 -> 192.168.56.101:49164 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49164 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49164 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 103.28.36.182:443 -> 192.168.56.101:49216 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49179 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49185 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49215 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49211 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 103.28.36.182:443 -> 192.168.56.101:49212 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49214 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2022491 ET HUNTING Download Request Containing Suspicious Filename - Crypted A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 103.28.36.182:443 -> 192.168.56.101:49189 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49210 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.67:40960 -> 192.168.56.101:49220 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2046045 ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) A Network Trojan was detected
TCP 185.215.113.67:40960 -> 192.168.56.101:49220 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 185.215.113.67:40960 -> 192.168.56.101:49220 2046056 ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 185.215.113.9:9137 -> 192.168.56.101:49283 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2046045 ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) A Network Trojan was detected
TCP 185.215.113.9:9137 -> 192.168.56.101:49283 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response A Network Trojan was detected
TCP 192.168.56.101:49284 -> 58.65.168.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49285 -> 58.65.168.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 185.215.113.9:9137 -> 192.168.56.101:49283 2046056 ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49293 -> 58.65.168.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49295 -> 58.65.168.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 58.65.168.132:443 -> 192.168.56.101:49297 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49283 -> 185.215.113.9:9137 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49302 -> 58.65.168.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 58.65.168.132:443 -> 192.168.56.101:49303 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 58.65.168.132:443 -> 192.168.56.101:49286 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49301 -> 58.65.168.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 185.215.113.16:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49220 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b258
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b258
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b918
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045b918
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0045bad8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0052b238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0052b238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0052b0f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b258
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b258
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b918
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083b918
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0083bad8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00907978
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00907978
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00907ff8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
file C:\Program Files\Mozilla Firefox\firefox.exe
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section \x00
section .idata
section
section efnzbsnu
section dfucfsbq
section .taggant
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: random+0x3090b9
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 3182777
exception.address: 0xf490b9
registers.esp: 2292856
registers.edi: 0
registers.eax: 1
registers.ebp: 2292872
registers.edx: 17686528
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 c2 5f 9d 7f 7b 50 b8 91 4a 7c 43 e9 00 00
exception.symbol: random+0x6d977
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 448887
exception.address: 0xcad977
registers.esp: 2292820
registers.edi: 1968898280
registers.eax: 30600
registers.ebp: 4003311636
registers.edx: 13290883
registers.ebx: 1725195017
registers.esi: 3
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb bb 46 b3 ff 4e f7 db 81 e3 5b 7f ff 77 e9 cd
exception.symbol: random+0x6d090
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 446608
exception.address: 0xcad090
registers.esp: 2292824
registers.edi: 1968898280
registers.eax: 30600
registers.ebp: 4003311636
registers.edx: 13294071
registers.ebx: 242921
registers.esi: 0
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 c7 0d 06 b5 1f 03 3c 24 e9 cb fd ff ff c1
exception.symbol: random+0x6e816
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 452630
exception.address: 0xcae816
registers.esp: 2292820
registers.edi: 13295432
registers.eax: 28880
registers.ebp: 4003311636
registers.edx: 1435545697
registers.ebx: 539488664
registers.esi: 0
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 9b ff ff ff 8b 14 24 81 c4 04 00 00 00
exception.symbol: random+0x6e512
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 451858
exception.address: 0xcae512
registers.esp: 2292824
registers.edi: 13324312
registers.eax: 28880
registers.ebp: 4003311636
registers.edx: 1435545697
registers.ebx: 539488664
registers.esi: 0
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 81 ec 04 00 00 00 89 24 24 81 04 24 04 00
exception.symbol: random+0x6e89b
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 452763
exception.address: 0xcae89b
registers.esp: 2292824
registers.edi: 13298684
registers.eax: 0
registers.ebp: 4003311636
registers.edx: 1435545697
registers.ebx: 1259
registers.esi: 0
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 e9 59 00 00 00 89 eb 5d e9 fa f8 ff ff 8b
exception.symbol: random+0x1eaa1a
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2009626
exception.address: 0xe2aa1a
registers.esp: 2292824
registers.edi: 4294942504
registers.eax: 13101392
registers.ebp: 4003311636
registers.edx: 425984
registers.ebx: 425984
registers.esi: 14879786
registers.ecx: 1740832768
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 e9 b0 00 00 00 31 d3 5a 31 df 8b 1c 24 81
exception.symbol: random+0x1efa16
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2030102
exception.address: 0xe2fa16
registers.esp: 2292820
registers.edi: 4294942504
registers.eax: 27755
registers.ebp: 4003311636
registers.edx: 14873716
registers.ebx: 40960625
registers.esi: 14879786
registers.ecx: 625
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 14 24 e9 97 00 00 00 83 ea 01 83 ec 04
exception.symbol: random+0x1ef512
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2028818
exception.address: 0xe2f512
registers.esp: 2292824
registers.edi: 4294942504
registers.eax: 27755
registers.ebp: 4003311636
registers.edx: 14901471
registers.ebx: 40960625
registers.esi: 14879786
registers.ecx: 625
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 c7 04 24 e2 3a 83 43 e9 b9 06 00 00 8b 14
exception.symbol: random+0x1ef68e
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2029198
exception.address: 0xe2f68e
registers.esp: 2292824
registers.edi: 0
registers.eax: 27755
registers.ebp: 4003311636
registers.edx: 14876603
registers.ebx: 40960625
registers.esi: 14879786
registers.ecx: 1549541099
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 50 57 bf b6 f3 ee 35 81 f7 77 d6 7e 6b 81
exception.symbol: random+0x1f6f7d
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2060157
exception.address: 0xe36f7d
registers.esp: 2292824
registers.edi: 14933480
registers.eax: 30308
registers.ebp: 4003311636
registers.edx: 95
registers.ebx: 14876629
registers.esi: 4294940384
registers.ecx: 202985
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 e9 f8 c6 ff ff 87 3c 24
exception.symbol: random+0x1fe7a2
exception.instruction: in eax, dx
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2090914
exception.address: 0xe3e7a2
registers.esp: 2292816
registers.edi: 5844504
registers.eax: 1447909480
registers.ebp: 4003311636
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 14912929
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: random+0x1fe1bb
exception.address: 0xe3e1bb
exception.module: random.exe
exception.exception_code: 0xc000001d
exception.offset: 2089403
registers.esp: 2292816
registers.edi: 5844504
registers.eax: 1
registers.ebp: 4003311636
registers.edx: 22104
registers.ebx: 0
registers.esi: 14912929
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 6c 2b 2d 12 01
exception.symbol: random+0x1fc04a
exception.instruction: in eax, dx
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2080842
exception.address: 0xe3c04a
registers.esp: 2292816
registers.edi: 5844504
registers.eax: 1447909480
registers.ebp: 4003311636
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 14912929
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 be 4f 54 b0 28 64 8f 05 00 00 00 00
exception.symbol: random+0x20186e
exception.instruction: int 1
exception.module: random.exe
exception.exception_code: 0xc0000005
exception.offset: 2103406
exception.address: 0xe4186e
registers.esp: 2292784
registers.edi: 0
registers.eax: 2292784
registers.ebp: 4003311636
registers.edx: 2130566135
registers.ebx: 14948650
registers.esi: 14948437
registers.ecx: 2130527123
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ea 59 ae df 40 56 e9 fc 01 00 00 50 b8 59
exception.symbol: random+0x2022f9
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2106105
exception.address: 0xe422f9
registers.esp: 2292820
registers.edi: 5844504
registers.eax: 25659
registers.ebp: 4003311636
registers.edx: 14949469
registers.ebx: 33663499
registers.esi: 14948890
registers.ecx: 852948189
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 a5 6b 95 4b 89 1c 24 68 51 5b 5f 13 89 24
exception.symbol: random+0x202671
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2106993
exception.address: 0xe42671
registers.esp: 2292824
registers.edi: 5844504
registers.eax: 25659
registers.ebp: 4003311636
registers.edx: 14975128
registers.ebx: 33663499
registers.esi: 2283
registers.ecx: 4294944776
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 52 53 50 b8 48 80 97 7f 35 48 4c e8 41 89
exception.symbol: random+0x20fe82
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2162306
exception.address: 0xe4fe82
registers.esp: 2292820
registers.edi: 13287510
registers.eax: 30390
registers.ebp: 4003311636
registers.edx: 6
registers.ebx: 15006941
registers.esi: 1968968720
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 c8 00 00 00 5e 01 df 5b 83 c7 04 51 e9 68
exception.symbol: random+0x21052c
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2164012
exception.address: 0xe5052c
registers.esp: 2292824
registers.edi: 4294939340
registers.eax: 30390
registers.ebp: 4003311636
registers.edx: 6
registers.ebx: 15037331
registers.esi: 1968968720
registers.ecx: 322689
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 3c 24 e9 0c f8 ff ff c1 e2 06 e9
exception.symbol: random+0x2112d9
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2167513
exception.address: 0xe512d9
registers.esp: 2292824
registers.edi: 4105686376
registers.eax: 28913
registers.ebp: 4003311636
registers.edx: 4294941312
registers.ebx: 1163956138
registers.esi: 1968968720
registers.ecx: 15038733
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 3c 24 51 68 a4 7a 1d 6e 8b 0c 24 83 c4
exception.symbol: random+0x21672b
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2189099
exception.address: 0xe5672b
registers.esp: 2292816
registers.edi: 0
registers.eax: 26010
registers.ebp: 4003311636
registers.edx: 1179202795
registers.ebx: 15036582
registers.esi: 1779687800
registers.ecx: 14995985
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 ba 00 00 00 35 3f 07 f9 0b 01 c1 8b 04 24
exception.symbol: random+0x21c268
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2212456
exception.address: 0xe5c268
registers.esp: 2292816
registers.edi: 0
registers.eax: 84201
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 1348702769
registers.esi: 15059591
registers.ecx: 1740832768
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 43 4a 03 43 89 04 24 53 89 14 24 ba b5 08
exception.symbol: random+0x238e65
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2330213
exception.address: 0xe78e65
registers.esp: 2292780
registers.edi: 15173367
registers.eax: 31191
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 13284399
registers.esi: 15169261
registers.ecx: 1740832768
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 52 e9 b9 fd ff ff 8b 24 24 e9 91 04 00 00
exception.symbol: random+0x2389c4
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2329028
exception.address: 0xe789c4
registers.esp: 2292784
registers.edi: 15204558
registers.eax: 31191
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 13284399
registers.esi: 15169261
registers.ecx: 1740832768
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 c7 04 24 12 1b 03 79 ff 04 24 50 b8 ff ff
exception.symbol: random+0x239243
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2331203
exception.address: 0xe79243
registers.esp: 2292784
registers.edi: 15176342
registers.eax: 0
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 116969
registers.esi: 15169261
registers.ecx: 1740832768
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 39 ff ff ff 41 81 f1 f1 32 0a 93 01 c8
exception.symbol: random+0x239e63
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2334307
exception.address: 0xe79e63
registers.esp: 2292784
registers.edi: 15180603
registers.eax: 26107
registers.ebp: 4003311636
registers.edx: 20470580
registers.ebx: 0
registers.esi: 2646566496
registers.ecx: 1740832768
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 44 88 72 19 89 1c 24 e9 07 00 00 00 01 fa
exception.symbol: random+0x23b321
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2339617
exception.address: 0xe7b321
registers.esp: 2292784
registers.edi: 0
registers.eax: 30898
registers.ebp: 4003311636
registers.edx: 3514849120
registers.ebx: 1620185825
registers.esi: 15185408
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 5a 02 00 00 89 04 24 e9 27 03 00 00 58
exception.symbol: random+0x23c369
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2343785
exception.address: 0xe7c369
registers.esp: 2292784
registers.edi: 322689
registers.eax: 0
registers.ebp: 4003311636
registers.edx: 3514849120
registers.ebx: 1553619598
registers.esi: 15185408
registers.ecx: 15190726
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 89 14 24 c7 04 24 77 bf d7 77 e9 21 00 00
exception.symbol: random+0x23d575
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2348405
exception.address: 0xe7d575
registers.esp: 2292784
registers.edi: 4294939668
registers.eax: 30690
registers.ebp: 4003311636
registers.edx: 1317623943
registers.ebx: 15221828
registers.esi: 29616464
registers.ecx: 210789999
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 b8 01 00 00 31 f5 5e f7 d5 e9 9a 00 00 00
exception.symbol: random+0x241935
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2365749
exception.address: 0xe81935
registers.esp: 2292784
registers.edi: 15235189
registers.eax: 26457
registers.ebp: 4003311636
registers.edx: 4294943668
registers.ebx: 24811
registers.esi: 29616464
registers.ecx: 1971716238
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 34 24 55 51 68 28 a5 e5 73 8b 0c 24 81
exception.symbol: random+0x243f31
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2375473
exception.address: 0xe83f31
registers.esp: 2292784
registers.edi: 616256338
registers.eax: 30955
registers.ebp: 4003311636
registers.edx: 4294943668
registers.ebx: 15248974
registers.esi: 29616464
registers.ecx: 4294939400
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 ec ba 79 20 89 14 24 68 fc 4e 7a 2f 5a e9
exception.symbol: random+0x2449da
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2378202
exception.address: 0xe849da
registers.esp: 2292780
registers.edi: 616256338
registers.eax: 15221484
registers.ebp: 4003311636
registers.edx: 4990640
registers.ebx: 1681337667
registers.esi: 29616464
registers.ecx: 4294939400
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb bb a3 b5 fd 5f e9 84 fd ff ff 83 ee 04 33 34
exception.symbol: random+0x244580
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2377088
exception.address: 0xe84580
registers.esp: 2292784
registers.edi: 616256338
registers.eax: 15251524
registers.ebp: 4003311636
registers.edx: 4990640
registers.ebx: 1681337667
registers.esi: 29616464
registers.ecx: 4294939400
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 c7 04 24 f5 34 07 75 c1 24 24 04 c1 2c 24
exception.symbol: random+0x2444cb
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2376907
exception.address: 0xe844cb
registers.esp: 2292784
registers.edi: 616256338
registers.eax: 15224500
registers.ebp: 4003311636
registers.edx: 157417
registers.ebx: 0
registers.esi: 29616464
registers.ecx: 4294939400
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 c7 04 24 97 d3 5c 64 89 1c 24 bb 27 29 f7
exception.symbol: random+0x24d8c9
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2414793
exception.address: 0xe8d8c9
registers.esp: 2292784
registers.edi: 2298801283
registers.eax: 31506
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 2147483650
registers.esi: 0
registers.ecx: 15261660
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 c1 00 00 00 81 f1 70 e0 79 30 01 c8 e9 2e
exception.symbol: random+0x25ab11
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2468625
exception.address: 0xe9ab11
registers.esp: 2292784
registers.edi: 15295071
registers.eax: 32541
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 15346214
registers.esi: 15273194
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 60 e8 9d 07 89 3c 24 c7 04 24 93 62 f3 71
exception.symbol: random+0x25ac28
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2468904
exception.address: 0xe9ac28
registers.esp: 2292784
registers.edi: 15295071
registers.eax: 32541
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 15346214
registers.esi: 4294938120
registers.ecx: 604292947
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 1d 00 00 00 83 c2 04 87
exception.symbol: random+0x2651b9
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2511289
exception.address: 0xea51b9
registers.esp: 2292784
registers.edi: 4294937976
registers.eax: 15385943
registers.ebp: 4003311636
registers.edx: 2130566132
registers.ebx: 15318461
registers.esi: 4374792
registers.ecx: 1894739
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 52 e9 ab 0a 00 00 01 d7 5a e9 3b 01 00 00
exception.symbol: random+0x270ad7
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2558679
exception.address: 0xeb0ad7
registers.esp: 2292780
registers.edi: 15383829
registers.eax: 29855
registers.ebp: 4003311636
registers.edx: 15383829
registers.ebx: 15383829
registers.esi: 4374792
registers.ecx: 15403623
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 c5 fd ff ff 55 89 0c 24 e9 b7 04 00 00 87
exception.symbol: random+0x270f89
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2559881
exception.address: 0xeb0f89
registers.esp: 2292784
registers.edi: 15383829
registers.eax: 29855
registers.ebp: 4003311636
registers.edx: 15383829
registers.ebx: 15383829
registers.esi: 4374792
registers.ecx: 15433478
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb bb 1a c0 c7 79 52 e9 ca 02 00 00 57 bf bb 03
exception.symbol: random+0x270b76
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2558838
exception.address: 0xeb0b76
registers.esp: 2292784
registers.edi: 15383829
registers.eax: 2304201554
registers.ebp: 4003311636
registers.edx: 15383829
registers.ebx: 15383829
registers.esi: 0
registers.ecx: 15406578
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 3e 3e 7b 65 8b 1c 24 57 54 5f 81 c7 04 00
exception.symbol: random+0x271934
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2562356
exception.address: 0xeb1934
registers.esp: 2292784
registers.edi: 604292945
registers.eax: 26342
registers.ebp: 4003311636
registers.edx: 15433295
registers.ebx: 4294944140
registers.esi: 0
registers.ecx: 15406578
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 78 01 00 00 5a 83 c4 04 59 c1 ea 06 e9 2e
exception.symbol: random+0x289fe3
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2662371
exception.address: 0xec9fe3
registers.esp: 2292780
registers.edi: 15207767
registers.eax: 31055
registers.ebp: 4003311636
registers.edx: 15507165
registers.ebx: 16910336
registers.esi: 15207764
registers.ecx: 3738837507
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 51 e9 9f fa ff ff b9 02 7c df 7d 01 cf e9
exception.symbol: random+0x28a76a
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2664298
exception.address: 0xeca76a
registers.esp: 2292784
registers.edi: 15207767
registers.eax: 31055
registers.ebp: 4003311636
registers.edx: 15509856
registers.ebx: 16910336
registers.esi: 0
registers.ecx: 2298801283
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 bf 02 00 00 87 3c 24 e9 00 01 00 00 5d 81
exception.symbol: random+0x28aed8
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2666200
exception.address: 0xecaed8
registers.esp: 2292780
registers.edi: 15510232
registers.eax: 26722
registers.ebp: 4003311636
registers.edx: 15509856
registers.ebx: 24786977
registers.esi: 0
registers.ecx: 2298801283
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 e5 51 89 04 24 50 c7 04 24 04 00 00 00
exception.symbol: random+0x28b2f2
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2667250
exception.address: 0xecb2f2
registers.esp: 2292784
registers.edi: 15536954
registers.eax: 26722
registers.ebp: 4003311636
registers.edx: 15509856
registers.ebx: 24786977
registers.esi: 0
registers.ecx: 2298801283
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 3c 24 68 cf 15 7b 5f e9 92 00 00
exception.symbol: random+0x28b39a
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2667418
exception.address: 0xecb39a
registers.esp: 2292784
registers.edi: 15512958
registers.eax: 26722
registers.ebp: 4003311636
registers.edx: 15509856
registers.ebx: 24786977
registers.esi: 1964140625
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 04 24 89 3c 24 51 b9 93 33 3f 6a
exception.symbol: random+0x28b958
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2668888
exception.address: 0xecb958
registers.esp: 2292784
registers.edi: 15512958
registers.eax: 0
registers.ebp: 4003311636
registers.edx: 15509856
registers.ebx: 15516346
registers.esi: 1964140625
registers.ecx: 13166929
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb b9 03 2b c7 5f 53 89 04 24 b8 00 a9 bf 6b 2d
exception.symbol: random+0x28cb8b
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2673547
exception.address: 0xeccb8b
registers.esp: 2292784
registers.edi: 15519612
registers.eax: 2736067432
registers.ebp: 4003311636
registers.edx: 0
registers.ebx: 1009009095
registers.esi: 1964140625
registers.ecx: 13166929
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 1d 08 00 00 ff 74 24 04 8b 2c 24 57 51 e9
exception.symbol: random+0x290218
exception.instruction: sti
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2687512
exception.address: 0xed0218
registers.esp: 2292784
registers.edi: 15519612
registers.eax: 15564562
registers.ebp: 4003311636
registers.edx: 0
registers.ebx: 1009009095
registers.esi: 1964140625
registers.ecx: 1663438630
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.16/Jo89Ku7d/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/build.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/crypted.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/5447jsX.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/crypteda.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/25072023.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/pered.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/2020.exe
request POST http://185.215.113.16/Jo89Ku7d/index.php
request GET http://185.215.113.16/inc/build.exe
request GET http://185.215.113.16/inc/crypted.exe
request GET http://185.215.113.16/inc/5447jsX.exe
request GET http://185.215.113.16/inc/crypteda.exe
request GET http://185.215.113.16/inc/25072023.exe
request GET http://185.215.113.16/inc/pered.exe
request GET http://185.215.113.16/inc/2020.exe
request POST http://185.215.113.16/Jo89Ku7d/index.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2660
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2660
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2660
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c41000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ae0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00af0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00bb0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00bc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02500000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02550000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02560000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02570000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02680000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02690000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ae0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ae0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ae0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ae0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ae0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2660
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73402000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2660
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02fb0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000046f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2940
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2940
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2940
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00361000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02490000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02500000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02610000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02620000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02630000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02830000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02840000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02950000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2940
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description axplong.exe tried to sleep 1169 seconds, actually delayed analysis time by 1169 seconds
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\lockfile
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-errorhandling-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-sysinfo-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX1\lofsawd.exe
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-handle-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-file-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-conio-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-memory-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133666212567898750\libssl-1_1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-heap-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-utility-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\1000002001\crypted.exe
file C:\Users\test22\AppData\Local\Temp\1000003001\5447jsX.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\build.exe
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-processthreads-l1-1-1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI21442\python3.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\libcrypto-1_1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-file-l1-2-0.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\1.bat
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-debug-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-locale-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\python310.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133666212567898750\python3.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-synch-l1-2-0.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\clamer.exe
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133666212567898750\libffi-7.dll
file C:\Users\test22\AppData\Local\Temp\1000027001\buildred.exe
file C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
file C:\Users\test22\AppData\Local\Temp\_MEI21442\VCRUNTIME140.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-profile-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133666212567898750\stub.exe
file C:\Users\test22\AppData\Local\Temp\1000014001\gawdth.exe
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-rtlsupport-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\libffi-7.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-console-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\ucrtbase.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-environment-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-convert-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-file-l2-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-namedpipe-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI21442\python311.dll
file C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-processenvironment-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133666212567898750\vcruntime140.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-time-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-heap-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\VCRUNTIME140.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-math-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI21442\libcrypto-3.dll
file C:\Users\test22\AppData\Local\Temp\_MEI21442\Blsvr.exe
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3832866432-4053218753-3017428901-1001
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3832866432-4053218753-3017428901-1001
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3832866432-4053218753-3017428901-1001
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3832866432-4053218753-3017428901-1001
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Command Prompt.lnk
file C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\build.exe
file C:\Users\test22\AppData\Local\Temp\1000002001\crypted.exe
file C:\Users\test22\AppData\Local\Temp\1000003001\5447jsX.exe
file C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
file C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
file C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
file C:\Users\test22\AppData\Local\Temp\1000012001\2020.exe
file C:\Users\test22\AppData\Local\Temp\1000014001\gawdth.exe
file C:\Users\test22\AppData\Local\Temp\1000027001\buildred.exe
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133666212567898750\stub.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\1.bat
file C:\Users\test22\AppData\Local\Temp\RarSFX0\clamer.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX1\lofsawd.exe
file C:\Users\test22\AppData\Local\Temp\1000027001\buildred.exe
file C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX1\lofsawd.exe
file C:\Users\test22\AppData\Local\Temp\1000002001\crypted.exe
file C:\Users\test22\AppData\Local\Temp\1000003001\5447jsX.exe
file C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
file C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
wmi SELECT * FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000001001\build.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000001001\build.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000002001\crypted.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000002001\crypted.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000003001\5447jsX.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000003001\5447jsX.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000012001\2020.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000012001\2020.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000014001\gawdth.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000014001\gawdth.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000027001\buildred.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000027001\buildred.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd† *¨œfð. )®ê«ö@€­ ` P€@à©(p­”@ã(hS.text¸¬®``.dataÀ²@À.rdataP+Ð,´@@.eh_framà@À.pdata( â@@.xdataø  ì@@.bss0€À.idataPö@À.CRT``@À.tlsp@À.rsrc@ੀâ© @@.reloc”p­ì«@BUH‰åH‰MH‰UL‰E D‰M(]ÃUH‰åHƒì èT‰öH‹Ú‹…Àt ¹èO©ë ¹èC©èÞ H‹7Û‹‰èÞ H‹Û‹‰è¾2H‹gÙ‹ƒøuH‹)ÛH‰ÁèË;¸HƒÄ ]ÃUH‰åHƒì0H‹Û‹‰wH‹ÈÚ‹HgH‰D$ A‰ÑL@H1H‰ÂH#H‰Áè·¨‰)HƒÄ0]ÃUH‰åHƒì0ÇEüÿH‹¤ÙÇè=‰Eü‹EüHƒÄ0]ÃUH‰åHƒì0ÇEüÿH‹uÙÇè‰Eü‹EüHƒÄ0]ÃUH‰åHƒìpHÇEðÇEä0‹EäeH‹H‰EØH‹EØH‹@H‰EèÇEüë!H‹EðH;Eèu ÇEüëE¹èH‹CÿÐH‹MÙH‰EÐH‹EèH‰EÈHÇEÀH‹MÈH‹EÀH‹UÐðH± H‰EðHƒ}ðu¨H‹&Ù‹ƒøu ¹è­§ë?H‹ Ù‹…Àu(H‹ÿØÇH‹BÙH‰ÂH‹(ÙH‰Á萧ë ÇèH‹ÍØ‹ƒøu&H‹ïØH‰ÂH‹ÕØH‰Áè]§H‹¦Øǃ}üuH‹ƒØH‰E¸HÇE°H‹U°H‹E¸H‡H‹•×H‹H…ÀtH‹†×H‹A¸º¹ÿÐè„8H‹ÕØH‰ÁH‹ËAÿÐH‹ØH‰HýÿÿH‰Á耟èK0‹ H‰Áèsè©,H‹[×H‹H‹ñH‰H‹ çH‹Ø‹ÎI‰È‰Áè ,‰Ö‹Ô…Àu ‹Æ‰Á諦‹Á…ÀuèD¦‹ªHƒÄp]ÃUH‰åHƒì H‹9×ÇH‹<×ÇH‹?×ÇH‹¢ÖH‰EøH‹Eø·f=MZt ¸é­H‹Eø‹@<HcÐH‹EøHÐH‰EðH‹Eð‹=PEt ¸éH‹EðHƒÀH‰EèH‹Eè··À= t = t)ëVH‹Eè‹@\ƒøw¸ëHH‹E苀ЅÀ•À¶Àë4H‹EèH‰EàH‹Eà‹@lƒøw¸ëH‹Eà‹€à…À•À¶Àë¸HƒÄ ]ÃUSHƒìHHl$@‰M H‰U(‹E ƒÀH˜HÁàH‰Á薥H‰EðH‹E(H‹H‰EèÇEü鏋EüH˜HÅH‹EèHÐH‹H‰Á謥HƒÀHÀH‰Eà‹EüH˜HÅH‹EðHH‹EàH‰Áè0¥H‰‹EüH˜HÅH‹EèHÐH‹‹EüH˜H ÅH‹EðHÈH‹H‹MàI‰ÈH‰Á襃Eü‹Eü;E Œeÿÿÿ‹EüH˜HÅH‹EðHÐHÇH‹E(H‹UðH‰HƒÄH[]ÃUH‰åHƒì H‰MH‹EH‰Áè2¤H…Àt¸ë¸ÿÿÿÿHƒÄ ]АÃff.„@1ÀÃff.„fUWVSHƒì(Hl$ H5 ºH‰ñÿ>H‰ÃH…ÀtkH‰ñÿR>H‹=>H÷¹H‰ÙH‰ÿ×Hú¹H‰ÙH‰Æÿ×H‰©H…ötHH ¯éÿÖH 6HƒÄ([^_]éÿÿÿf„HYÿÿÿH5BÿÿÿH‰{©ë¼f„UH‰åHƒì H‹a©H…Àt H UéÿÐH‹ ŒH…ÉtHƒÄ ]Hÿ%û<HƒÄ ]Аf.„fDUWVSHºÅgV/ëÔ'I‰ÊHI(E‹JHM‹BM‹IÉLÂIƒû†­I‹ZI‹RH¿OëÔ'=®²ÂI‹B H‰ÞH¯ßH‰ÕHÑÂHÁÆH¯ïHòL‰ÆHÁÆ L¯ÇHòH‰ÆHÁÅHÁÆH¯ÇHòIÁÀH¾‡Ê녱y7žH¯îL¯ÆH1êH‰ÝH»c®²ÂwÊë…H¯ÖHÁÅH¯îHÚH1êH¯ÖHÚI1ÐH‰ÂL¯ÆHÁÂH¯ÖIH1ÂH¯ÖHÚIr0LÚI9ñr`H»OëÔ'=®²ÂH‰ñI¸‡Ê녱y7žI»c®²ÂwÊë…fDH‹AøHƒÁH¯ÃHÁÀI¯ÀH1ÐHÁÀI¯ÀJI9ÉsØL‰ÈL)ÐHHÐHƒáøHñLAM9Ár5‹H¹‡Ê녱y7žH¯ÁL‰ÁH1ÐHºOëÔ'=®²ÂHÁÀH¯ÂHºùy7ž±gVHÂL9És2IºÅgV/ëÔ'I¸‡Ê녱y7ž¶HƒÁI¯ÂH1ÐHÁÀ I¯ÀH‰ÂI9ÉuâH‰ÐHÁè!H1ÐHºOëÔ'=®²ÂH¯ÂH‰ÂHÁêH1ÐHºùy7ž±gVH¯ÂH‰ÂHÁê H1Ð[^_]ÃHƒì8L‰D$PLD$PL‰L$XL‰D$(è³=HƒÄ8Ãff.„Hƒì8L‰L$XLL$XL‰L$(èø=HƒÄ8ÃAWAVAUATUWVSL‹\$hA‹;I‰ÊI‰ÔM…É„=C¶DÿIƒùv1HÇÂÿÿÿÿ„À„â½Ð¸)ÐIƒùˆ‡%KtøH‹ë@HɶA¶Jc ‹HÙÿá@A¶HHÁá0HÊA¶HHÁá(HÊA¶HHÁá HÊA¶HHÁáHÊA¶HHÁáHÊA¶HHÁáHʄÀ„Q½È¸ L‰ÆD)ÈÁà)ÈÁïK,"MK@¶ÿMhLuý‰û÷ۃã?éÁfI9ð„?‰ÂH‰ñÁêA‰ÓL)ÙL9Á‚ÁâH‰Î)ÐH‹M9òƒ¬‰ÁI‰ÓIƒÂIÓã‰ÙIÓëK YD¶YD¶9AÃH‰ÐEˆzüD‰ÙHÓà‰ÙHÓèIA¶¶@DØAˆJýI‰Ó‰ÁIÓã‰ÙIÓëK YD¶YD¶9AÃH‰ÐEˆzþD‰ÙHÓà‰ÙHÓèIA¶¶@DØAˆJÿƒø@w!L9î‚8ÿÿÿ‰ÂƒàÁêH)ÖH‹M9ò‚UÿÿÿI9ês/÷߃ç?‰ÁI‰ÓIƒÂIÓã‰ùIÓëOYA¶ E¶[AˆJÿDØL9ÕuÖI9ðt4HÇÂìÿÿÿH‰Ð[^_]A\A]A^A_ÃH‰òL)‰ÑÁâH)Î)ÐH‹ë›I9êr˜L‰âƒø@uÄëÉf„HǸÿÿÿH‰Ð[^_]A\A]A^A_ÃL‰Êë¤@AVAUATUWVSL‹\$`A‹3H‰ÕM…É„BC¶DÿIƒùv6HÇÂÿÿÿÿ„À„ä½Ð¸)ÐIƒùˆ‡(K\
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $Àýxl„œ?„œ?„œ?Wî>ˆœ?Wî>.œ?Wî>‘œ?F>–œ?Wî>œ?„œ?œ?F>؜?F>œœ?w>…œ?wé?…œ?w>…œ?Rich„œ?PEL“³žfà 'rdºá@ @ª <°àÀÜP°1 TÀ2 ð0 @.textöpr `.rdatal'(v@@.dataøçÀ О @À.rsrcà°n@@.relocÜPÀRp@Bj¸ELHèêѸÄÀIÇEðhÀI‰EìƒeüÇÄÀI “HÇEüh”lIPhtÀIèn|ƒMüÿhV€Hè}΃ÄènÑÃj¸„LHè“Ѹ\ÀIÇEðÀI‰EìƒeüÇ\ÀIð’HÇEüh\lIPh ÀIè|ƒMüÿhY€Hè&΃ÄèÑÃhPŽNè „Ç$\€HèÎYÃj¹ŽNè`hh€HèïÍYùLŽNèö„h~€HèÙÍYÃht€HèÍÍYùNèԄhˆ€Hè·ÍYÃjjh8‘N¹èNèðh’€Hè˜ÍYÃVWjèѳY¿8‘N‹ð‹Ïè4jV‹ÏÇ8‘ND›Hèۖhœ€Hè`ÍY_^ùáNéû¹àNè[„h¦€Hè>ÍYÃhº€Hè2ÍYÃh°€Hè&ÍYÃjjhà‘N¹8’N让hĀHèÍYÃVWjè@³Y¿à‘N‹ð‹Ï裏jV‹ÏÇà‘ND›HèJ–h΀HèÏÌY_^á8’NÇؒN8’N‹H¡Ü’N‰t’NùؑN趃h؀Hè™ÌYùø’N蠃hì€HèƒÌYÃhâ€HèwÌYÃÌÌÌÌÌÌÌÌÌ̋D$øاNÃÿt$jRQèíÿÿÿÿpÿ0èiPƒÄÍD$Pjè}²‹T$ ‹ÈèÎÿÿÿYYÃU‹ìQQ‹EV‹ñ‰EøEøÆEüVÇä’Hƒ"ƒbRPèðÞYY‹Æ^É‹D$Çä’Hƒaƒa‰A‹ÁÂV‹ñFÇä’Hƒ ƒ`P‹D$ ƒÀPè¬ÞYY‹Æ^AÇä’HPèøÞYÃy¸Ä,IEAÃV‹ñFÇä’HPèÖÞöD$ Yt j Vè‡ËYY‹Æ^ƒaƒa‹D$‰A‹ÁÇ “HÂV‹ñFÇä’HPè’ÞöD$ Yt j VèCËYY‹Æ^AÇä’HPèkÞYÃa‹ÁƒaÇAØ,IÇD”HÃV‹ñFÇä’HPè?ÞöD$ Yt j VèðÊYY‹Æ^AÇä’HPèÞYÃV‹ñVƒ&ƒfèpyY‹Æ^ÃQèPzYÃVÿt$‹ñVƒ&ƒfèyYY‹Æ^ÂVÿt$‹ñVèÛxYY‹Æ^ÂQè{YÃV‹ñVƒ&ƒfèyVè#yYY‹Æ^ÍD$Pèþy̸ÿÿÿÃU‹ìƒì MôèÿÿÿhªIEôPèœëÌVÿt$‹ñè:þÿÿÇD”H‹Æ^ÂVÿt$‹ñè"þÿÿÇ “H‹Æ^ÂéIÆ‹D$‹L$ƒ#‹‹Pü+ƒÀüƒøw‰Ãéxp‹ÁÂÂhð,IèI‰ÌVÿt$‹ñèxýÿÿÇ°”H‹Æ^ÂV‹ñFÇä’HPèÙÜöD$ Yt j VèŠÉYY‹Æ^AÇä’HPè²ÜYËD$V‹ñƒxv‹PèýÿÿÇP”H‹Æ^ÂVÿt$‹ñèýÿÿÇP”H‹Æ^ÂV‹ñFÇä’HPèeÜöD$ Yt j VèÉYY‹Æ^AÇä’HPè>ÜYÃVÿt$‹ñèýÿÿÇP”H‹Æ^Âjÿqÿ1ÿTH…À„£¦Ã‹D$‹I;H”À‹D$‰‹D$‰A‹Á‹ËAËAÿ1‹Èÿt$‹ÿR‹D$‹D$‰‹D$‰A‹Á‹ËAËT$V‹t$ ‹B‹N‹@;Au ‹;u°^Ã2À^ËD$‹T$‰‰HÂU‹ìQQÿu ‹UøÿuRÿP Pè±ÿÿÿYYÉ‹AV‹t$‹V;Bu ‹;D$ u°ë2À^‰‹ÁÇA°ËIËD$‹L$‰Ç@¨tNÃU‹ìƒì$¡ÁI3ʼnEøƒ}$V‹uWt¿-IWè…RYPWMèÁ5‹MUàÿu R‹ÿPƒ}ôEàÿuðGEàMPè›5Màè 5E‹ÎPèg/Mèö4‹Mø‹Æ_3Í^è‹ÂÉÃU‹ìƒì¡ÁI3ʼnEüVÿu‹ñUä‹M R‹ÿPƒ}øEä‹ÎGEäPèäúÿÿMäÇP”Hè£4‹M‹Æ‹U ‰N ‹MüÇ\”H3͉V^è'ÂÉÂU‹ìƒì ¡ÁI3ʼnEø‹EVƒì‹ñ‹ÌPèE/ÿu EàÿuPèèþÿÿƒÄ$‹ÎPèGýÿÿMàè=4‹M‹Æ‹U ‰N ‹MøÇ\”H3͉V^èÁÁÉ V‹ñFÇä’HPèºÙöD$ Yt jVèkÆYY‹Æ^AÇä’HPè“ÙYÃVÿt$ ‹ñÿt$ èéþÿÿÇh”H‹Æ^ÂU‹ìƒäøƒì¡ÁI3ĉD$‹EV‹ñL$Pè,.D$‹ÎPÿu ÿuè ÿÿÿL$è„3‹L$‹ÆÇh”H^3ÌèÁ‹å] V‹ñFÇä’HPè ÙöD$ Yt jVè»ÅYY‹Æ^AÇä’HPèãØYÃU‹ìƒì ‹ÑMøè™ýÿÿMäÿpÿ0è3ÿÿÿh|¨IEäPèÛæÌVÿt$‹ñè Çh”H‹Æ^ÂV‹t$WV‹ùè_ùÿÿÇ\”H‹F ‹V‰G ‹Ç‰W_^¸-IÃÿt$è£Y‹L$Pè7-‹D$ÂöD$V‹ñt jVèÅYY‹Æ^¸ -IÃU‹ìƒ} u‹Mjh|/Iè&-ëÿu è©¢Y‹MPèá,‹E]ÂöD$V‹ñt jVè®ÄYY‹Æ^¸°ËIø¨tNÃa‹ÁƒaÇA-IÇPšHÃV‹ñFÇä’HPè¬×öD$ Yt j Vè]ÄYY‹Æ^AÇä’HPè…×YÃU‹ìƒì MôèŸÿÿÿh`©IEôPèŒåÌVÿt$‹ñè*øÿÿÇPšH‹Æ^ÂÂVq‹…ÒtJ‹Âð±;Ât ‹Ð…Àuí2À^ð^ÃðÿAÃðÿAÃVWƒÏÿ‹ñ‹ÇðÁFu‹ÿðÁ~Ou ‹‹Î_^ÿ`_^ÃÈÿðÁAu‹ÿ`Ã3ÀÂ3À@‰A‰A‹ÁÃÇ\šHÃöD$V‹ñÇ\šHt jVèuÃYY‹Æ^ÂSV3ۋñSèŒz3À‰^ˆ^‰^ ˆ^‰^f‰F‰^f‰F ‰^$ˆ^(‰^,ˆ^09D$ tÿt$ Vè2žYY‹Æ^[Âh$-IèƒÌV‹ñWVè_žƒ~,Yt ÿv,èWNY3ÿ‰~,9~$t ÿv$èDNY‰~$9~t
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ègšX¬ô ¬ô ¬ô t÷  ô tñ ô tð ¹ô tõ ¯ô ¬õ .ô n‡ð ¾ô n‡ñ ÷ô n‡÷ ´ô _„ñ ­ô _„ô ­ô _„ö ­ô Rich¬ô PELk\¢fà ':ôA„`@p@À ¸x (@\ H߀߈Þ@`l.textG12 `.zzZ P6 `.rdataò²`´>@@.data| ò@À.reloc\ @"@B¹ ,Fè'=hÅ@Bè)pYÃj¸ü<Bèq¸¤FÇEðHF‰EìƒeüǤFHbBÇEühŒýBPhTFèPGƒMüÿhÏ@BèÙoƒÄè©pÃj¸;=Bè¿p¸<FÇEðàF‰EìƒeüÇ<FgBÇEühøCPhìFèùFƒMüÿhÒ@Bè‚oƒÄèRpÃhß@BèooYÃhÕ@BècoYÃhh/Fè?GÇ$é@BèKoYÃj¹4/Fè hõ@Bè3oYùd/Fè<h ABèoYÃhABèoYÃjjhð/F¹ /FèÖUhABèònYÃVWjèÿÃY¿ð/F‹ð‹ÏèVjV‹ÏÇð/FxsBèÀZhABèºnY_^ù™/Fé_V¹˜/Fè–;h)ABè˜nYù„0Fè€;h=ABè‚nYÃh3ABèvnYÃÌÌÌÌÌÌÌVÿt$ ‹ñ3Àÿt$ @‰F‰FFPÇ eBèfƒÄ ‹Æ^ÂVÿt$‹ñLjfBèÒ YPNèa^Vÿt$ ‹ñ3Àÿt$ @N ‰F‰FÇŒeBèW‹Æ^ÂVÿt$‹ñƒf$NÇÄeBè¦=‰v$‹Æ^ƒì$SU‹l$43ÀVW‹ñ‰D$ƒì ‹Ì‰U‰FèÖ‹} j[…ÿtðÿG‹Çë‹ÃP‹Îèw"…ÿt‹Ïè+€}t‹EL$(‰D$$E Pèc3ۍD$$Cë3À‰D$‰D$‰D$ ‹D$4‰D$D$‹Pèó-öÃt‹L$ƒãý…Ét‹D$ +ÁƒàüPQèîYYöÃt L$(è0D$8‹ÎPè´ _‹Æ^][ƒÄ$ÂVj‹ñè¹ ‹D$–€Ç4fBƒb$LjfB‹‰B‹Æ‰R$^ÂU‹ìQQVWÿu‹ñè½ÿÿÿƒì0ÇlfB¾¨‹Ìƒ'ƒg词EøVPè¼ ƒÄ8;øtP‹Ïè·‹Mü…Étèê!_ÆFv‹Æ^ÉÂj ¸":BèÊm‹]3ÿ‹Ç‰Eèÿu èwÝY‹È‰Mä‹‹@‹t ‹D$;Ç|;÷v;Ç| ;ñv+ñÇëWÀfE܋Eà‹u܉EìSMÔèN€}Øu j^‹Öé‰}ü‹ ‹A‹D%Àƒø@t<‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8èª7ƒøÿtsƒÆÿ‰u܋EìƒÐÿ‰Eì‰Eàëɋ ‹A‹L8‹Wÿuäÿu ÿP$;EäuE;×uA‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8èR7ƒøÿtƒÆÿ‰u܋EìƒÐÿ‰Eì‰EàëÉj^‹×ëj^‹Ö‰Uè‹‹@‰| ‰|$ƒMüÿë;‹M‹‹PыB j^ Æj3É9J8Eñ ðV‹Êè•0¸6@ÃMüÿ3ÿj^‹]‹Uè‹‹HËW3À9y8Eð q òVèe0MÔ貋Ãè¦kÃÌÌÌÌ̋ËD$=rPèYÅÀtPè)hYÃ3ÀËD$H#;Ȇ,QèhY‹È…Ét A#ƒàà‰HüÃéʳS‹ÙVW‹|$‹C‹3+ÆÁø;øvWèa‹3VWÿt$è÷ƒÄ ë<U‹k+îÁýV;ýv ‹t$UVèٍ®+ý‹sVWPèɃÄë Wÿt$èºƒÄ ]¾_^‰C[Âj,è{gY‰‰@‰@fÇ@ ÃS‹\$ U‹é¹ÿÿÿ;ÙwZjX;ØwSÿt$‰]U‰Eèè/ƒÄ Æ+ë4VWQPS軋ðNQèÞþÿÿSÿt$(‹ø‰]W‰}‰uè´/ƒÄÆ_^][ÂèZ.ÌS‹Ù¹ÿÿÿW‹|$;ùwQjX;øwjÿt$‰{S‰CèrvƒÄ ë.VQPWèN‹ðNQèqþÿÿO‰Qÿt$$‰{P‰sèG/ƒÄ^_[Âèò-ÌV‹t$W‹ù‹N…ÉtèA#„Àt‹‰‹F‰G°ë2À_^Âƒì ‹Ìÿt$èõ‹D$‹L$ÿ0èa Ã|$V‹ñt#ÿt$è|‹D$Vÿ6ÿ0‹D$ÿ0范ĉF^ ‹T$‹B…Àtðÿ@‹‰‹B‰AÂV‹t$W‹|$+|$ Wÿt$VèƒuƒÄ 7_^ËL$‹D$ÿt$ PQèÈÿÿÿƒÄ ÃU‹ì‹E =rE PEP訋E YYPÿuèÆeYY]ËыJ;Jt‹D$‹‰‹BH‰Jë ÿt$Q‹ÊèËÂj¸?:Bè=i‹ñ‰uà‹]‹Ã+‰E‹F+=ÿÿÿ„’@‰EèPèî‰EìPèâüÿÿY‹ø‰}äƒeü‹EljE‹M Š ˆ‹N‹;Ùu‹Ç‹]ëVWSR臃ċӋN‹]CVPQRèpƒÄƒMüÿÿuìÿuèW‹Îèä‹ÃèhÂÿuìÿuä‹Màè-jjèMzè,ÌÌÌÌÌÌj¸\:Bèuh‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèPèL‰EìP‹Îèí+‹Ø‰]äƒeü<»‹M ‹ ‰‹F‹9Eu‹ÓëVSÿuQ蝃ċM‹FWVRPQ舃ăMüÿÿuìÿuèS‹ÎèT‹ÇèWgÂÿuìÿuä‹MàèÞ,jjèŠyèK+ÌÌÌÌÌÌj¸y:Bè²g‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèP艉EìP‹Îè*+‹Ø‰]äƒeü<»‹E ‹‰‹V‹9Uu‹ÃëVSÿuQèڃċM‹VGVPRQèŃăMüÿÿuìÿuèS‹Îè‘‹Çè”fÂÿuìÿuä‹Màè,jjèÇxèˆ*ÌÌÌÌÌÌV‹ñ‹ÿpÿt$ èj,ÿ6è.cYY^ÂV‹t$ W‹ùëÿv‹Ïÿt$èèÿÿÿVÿt$‹6è YY€~ tÞ_^ÂV‹t$ Nèƒ(j,VèâbYY^ËD$ƒèt0ƒèu+Vh¨è•b‹ðY…ötÿt$ ‹Îèÿ÷ÿÿÇPfBë3ö‹Æ^Ãh°èkbY…Àt ÿt$‹Èè øÿÿÃ3ÀÃVj0èOb‹ðYÿt$NÇüeB膋Æ^ÃV‹qŽÈèk:‹L$,…Ét#‹SÿPŽÈŠØèP:L$ è'ŠÃ[^Â(èÑ2ÌQS‹Ùºÿÿÿ‹L$ ‹ÂU‹k+Å;Árl‹CVWR<)‰D$PWèU‹ðNQèxùÿÿ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ègšX¬ô ¬ô ¬ô t÷  ô tñ ô tð ¹ô tõ ¯ô ¬õ .ô n‡ð ¾ô n‡ñ ÷ô n‡÷ ´ô _„ñ ­ô _„ô ­ô _„ö ­ô Rich¬ô PELº]¢fà ':,A„`@°@À ¸x (€d H߀߈Þ@`l.textG12 `.zzZ P6 `.rdataò²`´>@@.data¼T Fò@À.relocd €"8@B¹àdVè'=hÅ@Bè)pYÃj¸ü<Bèq¸ÄKVÇEðhKV‰EìƒeüÇÄKVHbBÇEühŒýBPhtKVèPGƒMüÿhÏ@BèÙoƒÄè©pÃj¸;=Bè¿p¸\KVÇEðKV‰EìƒeüÇ\KVgBÇEühøCPh KVèùFƒMüÿhÒ@Bè‚oƒÄèRpÃhß@BèooYÃhÕ@BècoYÃh¨gVè?GÇ$é@BèKoYÃj¹tgVè hõ@Bè3oYù¤gVè<h ABèoYÃhABèoYÃjjh0hV¹àgVèÖUhABèònYÃVWjèÿÃY¿0hV‹ð‹ÏèVjV‹ÏÇ0hVxsBèÀZhABèºnY_^ùÙgVé_V¹ØgVè–;h)ABè˜nYùÄhVè€;h=ABè‚nYÃh3ABèvnYÃÌÌÌÌÌÌÌVÿt$ ‹ñ3Àÿt$ @‰F‰FFPÇ eBèfƒÄ ‹Æ^ÂVÿt$‹ñLjfBèÒ YPNèa^Vÿt$ ‹ñ3Àÿt$ @N ‰F‰FÇŒeBèW‹Æ^ÂVÿt$‹ñƒf$NÇÄeBè¦=‰v$‹Æ^ƒì$SU‹l$43ÀVW‹ñ‰D$ƒì ‹Ì‰U‰FèÖ‹} j[…ÿtðÿG‹Çë‹ÃP‹Îèw"…ÿt‹Ïè+€}t‹EL$(‰D$$E Pèc3ۍD$$Cë3À‰D$‰D$‰D$ ‹D$4‰D$D$‹Pèó-öÃt‹L$ƒãý…Ét‹D$ +ÁƒàüPQèîYYöÃt L$(è0D$8‹ÎPè´ _‹Æ^][ƒÄ$ÂVj‹ñè¹ ‹D$–€Ç4fBƒb$LjfB‹‰B‹Æ‰R$^ÂU‹ìQQVWÿu‹ñè½ÿÿÿƒì0ÇlfB¾¨‹Ìƒ'ƒg词EøVPè¼ ƒÄ8;øtP‹Ïè·‹Mü…Étèê!_ÆFv‹Æ^ÉÂj ¸":BèÊm‹]3ÿ‹Ç‰Eèÿu èwÝY‹È‰Mä‹‹@‹t ‹D$;Ç|;÷v;Ç| ;ñv+ñÇëWÀfE܋Eà‹u܉EìSMÔèN€}Øu j^‹Öé‰}ü‹ ‹A‹D%Àƒø@t<‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8èª7ƒøÿtsƒÆÿ‰u܋EìƒÐÿ‰Eì‰Eàëɋ ‹A‹L8‹Wÿuäÿu ÿP$;EäuE;×uA‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8èR7ƒøÿtƒÆÿ‰u܋EìƒÐÿ‰Eì‰EàëÉj^‹×ëj^‹Ö‰Uè‹‹@‰| ‰|$ƒMüÿë;‹M‹‹PыB j^ Æj3É9J8Eñ ðV‹Êè•0¸6@ÃMüÿ3ÿj^‹]‹Uè‹‹HËW3À9y8Eð q òVèe0MÔ貋Ãè¦kÃÌÌÌÌ̋ËD$=rPèYÅÀtPè)hYÃ3ÀËD$H#;Ȇ,QèhY‹È…Ét A#ƒàà‰HüÃéʳS‹ÙVW‹|$‹C‹3+ÆÁø;øvWèa‹3VWÿt$è÷ƒÄ ë<U‹k+îÁýV;ýv ‹t$UVèٍ®+ý‹sVWPèɃÄë Wÿt$èºƒÄ ]¾_^‰C[Âj,è{gY‰‰@‰@fÇ@ ÃS‹\$ U‹é¹ÿÿÿ;ÙwZjX;ØwSÿt$‰]U‰Eèè/ƒÄ Æ+ë4VWQPS軋ðNQèÞþÿÿSÿt$(‹ø‰]W‰}‰uè´/ƒÄÆ_^][ÂèZ.ÌS‹Ù¹ÿÿÿW‹|$;ùwQjX;øwjÿt$‰{S‰CèrvƒÄ ë.VQPWèN‹ðNQèqþÿÿO‰Qÿt$$‰{P‰sèG/ƒÄ^_[Âèò-ÌV‹t$W‹ù‹N…ÉtèA#„Àt‹‰‹F‰G°ë2À_^Âƒì ‹Ìÿt$èõ‹D$‹L$ÿ0èa Ã|$V‹ñt#ÿt$è|‹D$Vÿ6ÿ0‹D$ÿ0范ĉF^ ‹T$‹B…Àtðÿ@‹‰‹B‰AÂV‹t$W‹|$+|$ Wÿt$VèƒuƒÄ 7_^ËL$‹D$ÿt$ PQèÈÿÿÿƒÄ ÃU‹ì‹E =rE PEP訋E YYPÿuèÆeYY]ËыJ;Jt‹D$‹‰‹BH‰Jë ÿt$Q‹ÊèËÂj¸?:Bè=i‹ñ‰uà‹]‹Ã+‰E‹F+=ÿÿÿ„’@‰EèPèî‰EìPèâüÿÿY‹ø‰}äƒeü‹EljE‹M Š ˆ‹N‹;Ùu‹Ç‹]ëVWSR臃ċӋN‹]CVPQRèpƒÄƒMüÿÿuìÿuèW‹Îèä‹ÃèhÂÿuìÿuä‹Màè-jjèMzè,ÌÌÌÌÌÌj¸\:Bèuh‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèPèL‰EìP‹Îèí+‹Ø‰]äƒeü<»‹M ‹ ‰‹F‹9Eu‹ÓëVSÿuQ蝃ċM‹FWVRPQ舃ăMüÿÿuìÿuèS‹ÎèT‹ÇèWgÂÿuìÿuä‹MàèÞ,jjèŠyèK+ÌÌÌÌÌÌj¸y:Bè²g‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèP艉EìP‹Îè*+‹Ø‰]äƒeü<»‹E ‹‰‹V‹9Uu‹ÃëVSÿuQèڃċM‹VGVPRQèŃăMüÿÿuìÿuèS‹Îè‘‹Çè”fÂÿuìÿuä‹Màè,jjèÇxèˆ*ÌÌÌÌÌÌV‹ñ‹ÿpÿt$ èj,ÿ6è.cYY^ÂV‹t$ W‹ùëÿv‹Ïÿt$èèÿÿÿVÿt$‹6è YY€~ tÞ_^ÂV‹t$ Nèƒ(j,VèâbYY^ËD$ƒèt0ƒèu+Vh¨è•b‹ðY…ötÿt$ ‹Îèÿ÷ÿÿÇPfBë3ö‹Æ^Ãh°èkbY…Àt ÿt$‹Èè øÿÿÃ3ÀÃVj0èOb‹ðYÿt$NÇüeB膋Æ^ÃV‹qŽÈèk:‹L$,…Ét#‹SÿPŽÈŠØèP:L$ è'ŠÃ[^Â(èÑ2ÌQS‹Ùºÿÿÿ‹L$ ‹ÂU‹k+Å;Árl‹CVWR<)‰D$PWèU‹ðNQèxùÿÿ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELB½à 0ìÐƹ @  @…t¹O ÄÉ X¹  H.text¬é ì `.rsrcÄÉ Ìð@@.reloc ¼@B¨¹HT- €M`­ø 0 1s, ~Ï%-&~Îþls- %€Ï(+o/ 8Ðo0 ±%rprYp~1 (2 ¢%rqpr¯p~1 (2 ¢%rÇprp~1 (2 ¢%r!prap~1 (2 ¢(˜ o3 81(4 s_sm~1 }Í~1 s5 (6 o7 }Í{ÍrqprÑp~1 (2 o8   ,rãprp~1 (2 +;rprap~1 (2 o8 -{Í(›+ {Í(š(9 þ  9:o:   (; o< o= (> {Í(™  (9 þ  9ñs? s? s? þ`s@ ~Ð%-&~ÎþmsA %€Ð(+þas@ ~Ñ%-&~ÎþnsA %€Ñ(+þbs@ ~Ò%-&~ÎþosA %€Ò(+oB þ9E{͍±%rip¢oC šr}p(> (C(+oE sF (N(+oToG #>@(H (I ioJ &ÞÞ(K þ9œþcs@ ~Ó%-&~ÎþpsA %€Ó(+þds@ ~Ô%-&~ÎþqsA %€Ô(+þes@ ~Õ%-&~ÎþrsA %€Õ(+ÞÞo_ oaþfsL ~Ö%-&~ÎþssM %€Ö(+ocoiþgsN ~×%-&~ÎþtsO %€×(+oeþhsP ~Ø%-&~ÎþusQ %€Ø(+ogþisR ~Ù%-&~ÎþvsS %€Ù(+ok( +,dsm%o_% r£p(> oa%sU oc%oi%ok%sV oe%sW ogoX ( +,dsm%o_% rµp(> oa%sU oc%oi%ok%sV oe%sW ogoX ÞÞolþ, oX (Y :ÃúÿÿÞþoZ Üo[ :%úÿÿÞ ,oZ ÜÞ&Þ + *A”ñ,›:ÕåäɵDù4â $0sr rËp(\ (] þ , Ýî( srÝpo&8žoo^ oo^ (rùpo8   ,4sr  ³%-o_ šoo oq +sr%oo%oq Þ ÞXoþ  :NÿÿÿÞ ÞÞÞ+*ALPà1Ó 0’sU  ³%а(` sa (\ (] þ , ÝS( s³%Ð|(` sa o&8òs’oo^ ooo^ oo(o‘ÞÞÞooŒ(K - oŒ+rýpooŽ(K - oŽ+rýpoo(K - o+rýpo‘Üorýp(b   , oc Xoþ  :úþÿÿÞ ÞÞ Þ+*AdzJÄzRÌoC8{}„0Ìs? (\ (] þ , Ý£( s³%О(` sa o&8Css%oo^ ov%oo^ o: .þox%oo^ oz%oo: 1þo|%oo^ (d @Bj[!‘¶Yo~%oo^ o€%r po(o‚o}jþ,-(e    (f   (g
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $¨:ìf}iìf}iìf}i§~hëf}i§xhSf}i§yhæf}iŒ€ièf}iŒxhÄf}iŒyhýf}iŒ~håf}i§|hçf}iìf|igf}iˆyhøf}iˆhíf}iRichìf}iPEd†pZ¢fð"  ˆ\°¯@0pÊ®`Á€„”¼x  ôàÄ X ”à’@ .text ‡ˆ `.rdataž* ,Œ@@.dataèи@À.pdataÄ à"Æ@@_RDATA\è@@.rsrc ô öê@@.relocX à@B@SHƒì è¥ßH‹è•ßH‹Ó‹èSeH‹ØèƒßH‹Ó‹HƒÄ [éÜ%ÌÌÌÌÌÌÌÌÌÌÌÌHÃÃÌÌÌÌÌÌÌÌH‰T$H‰L$SUVWAVAWHìˆ3ÀM‹ðH‹ÚH‰D$PH‹ùH‰D$XH¿•H‰D$`D@X‰D$(HL$ H‰D$ I‹ñ‹èè ˆD‹ø…Àt&HSD‹ÀH ••è°EÿHÄˆA_A^_^][ù L‰¬$€èû.L‹èH…ÀuLCH¨•H å•èÌéc¹ èÍ.H‹èH…ÀuLCHʕH ·•èžé5L‰¤$ÐD‹c@f„L‹¸ L;àI‹ÜºI‹ÍHGØL‹ÃèºãH;Ã…ãH‹èá…À…ÓL+ã‰\$(L‰l$ f„» H‰l$03҉\$8HL$ èfk‹øA¿ÿÿÿÿHƒùvwƒøtm‹L$8H+ÙM…öt(M‹ÎAWL‹ÃH‹ÍèêH;Ãu I‹Îè¦à…ÀtA‹ÿë>H…ötL‹ÃH‹ÕH‹Î芨Hóƒ|$8t€ƒÿtM…ätH‹¼$ÀéÿÿÿE3ÿë(¿ýÿÿÿH‹”$ÈH ð”HƒÂD‹ÇèëA¿ÿÿÿÿL‹¤$ÐHL$ è*ƒI‹ÍèN-H‹ÍèF-L‹¬$€A‹ÇHÄˆA_A^_^][ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌ@VAVHƒì(H‹H‹òL‹ñH…Àu2HƒÁxHo“èº)I‰H…ÀuHVH _•è‚3ÀHƒÄ(A^^ËVE3ÀIVH‹ÈèZå…Ày!LFHg•H œ•è«3ÀHƒÄ(A^^ËN L‰|$ è¤,L‹øH…Àu D‹N LFH}•H Š“èq鰀~H‰\$@H‰l$HH‰|$PL‰d$XuM‹ÏE3ÀH‹ÖI‹ÎèÁüÿÿ…Àtmë`‹^ I‹ïH…Ût`A¼ ff„M‹I;ÜH‹ûA¸IGüH‹ÍH‹×è^áHƒør HïH+ßuÔë"LFHߓH ”èÛI‹ÏèÏ+E3ÿH‹|$PH‹l$HH‹\$@L‹d$XI‹H…Ét è»ÝIÇI‹ÇL‹|$ HƒÄ(A^^ÃÌÌÌÌÌÌÌÌ@SWAVHƒì0H‹úL‹ñè¬Rƒøÿu HƒÄ0A^_[ÃH‰l$PIŽx0HoL‰d$`H‹Õè¡UL‹àH…Àu L‹ÅH‡”H ´”è3AD$ÿéŽI‹H…Àu1INxH†‘èÑ'I‰H…ÀuH‹ÕH w“èš»ÿÿÿÿé7‹WE3ÀIVH‹Èèrã…Ày L‹ÅH€“H µ“èÄ»ÿÿÿÿé€uE3ÉM‹ÄH‹×I‹Îè#ûÿÿ‹ØéãL‰l$(3ÛA½ L‰|$ A‹Íè’*L‹øH…ÀuL‹ÅH(’H }‘èdA_ÿ阋 H…ÿ„„H‰t$Xff„M‹I;ýH‹÷A¸IGõI‹ÏH‹Öè~ßHƒør1M‹ÌA¸H‹ÖI‹Ïè¤æHƒørH+þu½ë+H,’H Y’ëHܑH ’L‹ÅèÕ»ÿÿÿÿH‹t$XI‹Ïè¿)L‹l$(L‹|$ I‹H…Ét è¸ÛIÇI‹Ìè©Û‹ÃH‹l$PL‹d$`HƒÄ0A^_[ÃÌÌÌÌÌÌÌÌ@SHƒì L‹IH‹ÚL‹YM;ËsDM‹Ñ€IAL‹ÃL+ÀfD¶B¶ +ÑuHÿÀ…Éuí…Òt/IcIÁL‹ÈI;Âr I;ÃrÆ3ÀHƒÄ [ÃH gè²3ÀHƒÄ [ÃI‹ÁHƒÄ [ÃÌH‰\$H‰l$H‰t$WHƒì H‹YH‹êH‹ñHÇÇÿÿÿÿHÿǀ<u÷H‹IH;ÙsT€{ouHKL‹ÇH‹Õèä(…ÀtH‹NHcHÃH‹ØH;FrH;ÁrÏë!HCHǀ8tHCHÇëH ʎè3ÀH‹\$0H‹l$8H‹t$@HƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌ@SHƒì HcH‹ÙHÂH;AsH „ŽèÏH‹CHƒÄ [ÃÌÌÌÌÌH‰\$WHƒì0H‹?¸H3ÄH‰D$(H‹ÙH‹ H…ÉuHKxHaŽè¬$H‰H‹ÈH…ÀtSH‹’³HT$ H‰D$ A¸HÁè ˆD$#è[YH‹øH…Àt%H‹ E3ÀH‹Ðè9à…ÀyH"‘H èŽ ¸ÿÿÿÿégL‹ HK ºXDB©èËÜHƒøsH‘H ‡èV ¸ÿÿÿÿé/‹K(E3À‹C,ȉC,‹C0ȉC0‹C4ɋÉH+ù‰K(ÈHƒÇX‰C4H‰{3ÿ‰»|P‰²Ã‹S,HSH‹ è“ßHcK0è'H‰CH…ÀuH®H óèÚ GÿéµHcS0A¸L‹ H‹ÈèÜHƒøs H éIÿÿÿHcC0HCH‹ H‰CègمÀtH œè'¸ÿÿÿÿëcH‹CH;CsGfD‹H‹ɉH‹HɉH‹H ɉH ʉHcÊHÈH‹ÁH;KrH;KrÍë H „ŒèÏ H‹ H…Étè.ØH‰;3ÀH‹L$(H3Ìè“H‹\$HHƒÄ0_ÃÌÌÌÌÌH‰\$H‰t$WHƒì I‹ØH‹òH‹ùLL‹ÊHƒÁxºè0=}vHxL‹ËL؏ºè=}THŸx H‹ÖH‹ËèÅ 3ö‰·xP@f„¶ˆƒ H[„ÀuïH‹ÏèGýÿÿ…Àt"H‹H…Étèb×H‰73ÀH‹\$0H‹t$8HƒÄ _ÃH‹\$0¸H‹t$8HƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌH…Ét7SHƒì H‹ÙH‹IH…Étè%H‹ H…Ét è×HÇH‹Ëèå$HƒÄ [ÃÌÌÌ@SHƒì ºP¹è¿$H‹ØH…ÀuHäŽH è° H‹ÃHƒÄ [ÃÌÌÌÌÌÌÌL‰D$L‰L$ SUVWHƒì8I‹ðHl$xH‹ÚH‹ùèëôÿÿH‰l$(L‹ÎL‹ÃHÇD$ H‹×H‹HƒÉ蜅À¹ÿÿÿÿHÁHƒÄ8_^][ÃÌÌÌÌÌH‰\$H‰l$H‰t$ WHì€H‹R´H3ÄH‰„$pH‹ALlŽL‹IH‹ùHƒÁ(H‰D$ ºè’ÿˆº2·È‹ØDBÒÿ¨„f‰‡Z ‹
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $ £XhcðXhcðXhcð`ñ_hcðfñìhcðgñRhcð›ëžð[hcð›ë`ñQhcð›ëgñIhcð›ëfñphcðbñShcðXhbðÉhcðKìgñAhcðKìañYhcðRichXhcðPEd†‹j¢fð" (”ŽÐÀ@Ð ŽÅ`Á€„lÇx´+`"ÀhÀ€œ@°P.text’” `.rdataB&°(˜@@.dataØsàÀ@À.pdata"`$Î@@.rsrc´+,ò@@.relochÀ@BHƒì(è/á‹H‹îωè'áH‹H‹ÝÏH‰HH‹ ÒÏHƒÄ(é¹$ÌÌÌÌÌÌÌÌÌHqCÃÌÌÌÌÌÌÌÌH‰\$H‰l$ L‰D$VWATAUAWHƒì H‹ò3íHý§D‹ýI‹øH‹ÙA½ÿÿÿÿèå.L‹àH…ÀuHVH Ú§èMé‹VE3ÀH“I‹Ìè7é…ÀyLFHä§H ¨èˆ鯋N è‹0L‹øH…Àu D‹N LFH¨H ¦èXé€~uM‹ÏE3ÀH‹ÖI‹ÌèÌëW‹^ L‰t$PM‹÷H…Ût;¸ DH;ØH‹ûM‹ÌA¸HGøI‹ÎH‹×è^åHƒørhL÷¸ H+ßuϋÅH‹|$`L‹t$P…Àt I‹ÏèÓ/L‹ýI‹ÌèØáI‹ïM…ÿtH‹×I‹Ïèù.D‹èH‹Íèª/H‹\$XA‹ÅH‹l$hHƒÄ A_A]A\_^ÃLFH!¦H N¦è}A‹Åë‹ÌÌÌÌÌÌÌÌH‰T$H‰L$SUVWAVAWHìˆ3ÀM‹ðH‹ÚH‰D$PH‹ùH‰D$XA¸XH‰D$`H@¤‰D$(HL$ H‰D$ ‹èI‹ñèXžD‹ø…Àt(HSD‹ÀH #¤èŽ¸ÿÿÿÿHÄˆA_A^_^][ù L‰¬$€èç.L‹èH…ÀuLCH4¤H q¤è¸é\¹ è¹.H‹èH…ÀuLCHV¤H C¤èŠé.L‰¤$ÐA¿ÿÿÿÿD‹c¸ I‹ÜL;àL‹ÏºI‹ÍHGØL‹ÃèªãH;Ã…æH‹Ïè á…À…ÖL+ã‰\$(L‰l$ f„» H‰l$03҉\$8HL$ 膁‹øA¿ÿÿÿÿHƒùv|ƒøtr‹L$8H+ÙM…öt)M‹ÎL‹ÃºH‹ÍènêH;Ãu I‹Îè•à…ÀtA‹ÿëBH…ötL‹ÃH‹ÕH‹Îè‰}Hóƒ|$8„{ÿÿÿƒÿtM…ätH‹¼$ÀéÿÿÿE3ÿë ¿ýÿÿÿH‹”$ÈH {£HƒÂD‹ÇèïL‹¤$ÐHL$ èm™I‹ÍèA-H‹Íè9-L‹¬$€A‹ÇHÄˆA_A^_^][ÃÌÌH‰\$ VAVAWHƒì H‹òH‹ÙH¤E3öè +L‹øH…Àu!HVH ¤èu3ÀH‹\$XHƒÄ A_A^^ËVE3ÀH“I‹ÏèSå…ÀyLFH¤H 5¤è¤黋N è§,L‹ðH…Àu D‹N LFH ¤H -¢èt鋀~uM‹ÎE3ÀH‹ÖI‹Ïèèüÿÿëc‹^ H‰l$@I‹îH‰|$HL‰d$PH…Ût8A¼ fDI;ÜH‹ûM‹ÏA¸IGüH‹ÍH‹×ènáHƒørBHïH+ßuÔ3ÀH‹|$HH‹l$@L‹d$P…Àt I‹Îèã+E3öI‹ÏèèÝH‹\$XI‹ÆHƒÄ A_A^^ÃLFHW¢H „¢è³¸ÿÿÿÿëªÌÌÌÌÌÌÌÌÌÌÌÌ@SWHƒì8€znH‹úH‹Ùu$èxúÿÿ‹Ø…ÀyHWH _£è‹ÃHƒÄ8_[ÃHn£L‰d$`I‹Èèe)L‹àH…Àu(LGHR£H £è6L‹d$`¸ÿÿÿÿHƒÄ8_[ÃH2¢L‰|$ H‹Ëè!)L‹øH…ÀuHWH ¢è‰»ÿÿÿÿéT‹WE3ÀH“I‹Ïènã…Ày!LGH¢H P¢è¿»ÿÿÿÿé€uE3ÉM‹ÄH‹×I‹Ïè.ûÿÿ‹ØéôL‰l$03ÛA½ L‰t$(A‹Íè*L‹ðH…Àu!LGH H  è^»ÿÿÿÿé§H‰t$X‹w H…ö„‰H‰l$P@ff„I;õH‹îM‹ÏA¸IGíI‹ÎH‹ÕènßHƒør1M‹ÌA¸H‹ÕI‹Îè”æHƒørH+õu½ë,H¼ H é ëHl H ™ LGèÄ»ÿÿÿÿH‹l$PI‹Îè®)H‹t$XL‹l$0L‹t$(I‹Ïè§ÛI‹ÌèŸÛL‹|$ ‹ÃL‹d$`HƒÄ8_[ÃH‰\$H‰t$WHƒì H‹™H‹òH‹ùH;™spfff„D¶CA@¦¨÷t:A€ødt4A€ønt.A€øxt(HCL‹ÆL+À€¶B¶ +ÑuHÿÀ…Éuí…ÒëHKH‹Öèí)…Àt ‹HØH;Ÿr›3ÀH‹\$0H‹t$8HƒÄ _ÃH‹t$8H‹ÃH‹\$0HƒÄ _ÃÌÌÌÌÌÌ@SHƒì H‹HÇH…ÛtH‹‹è›(H‹ËHƒÄ [éŽ(HƒÄ [ÃÌÌÌÌÌÌÌÌÌÌÌ̋HÂÃÌÌÌÌÌÌÌÌÌÌH‰\$H‰l$ WHìH‹7ÇH3ÄH‰„$ˆHYŸH‹é3ÛèK&H‹øH…À„H‹ ºH”$€H‰„$€A¸HÁèH‹Ï H‰´$¨ˆ„$ƒè5]H‹ðH…À„7E3ÀH‹ÐH‹Ïèoà…ÀyH  H UŸèÄ é L‹ÏHL$ ºXA¸èÝHƒøsH H _žèŽ é׺`¹èn'H‹ØH…ÀuHûŸH ( è_ é¨L‹ÍL ºH‹ËèÓ‹D$(H‹ ȉD$(LL$8‹D$,LîŸȉD$,º@‹D$0ȉD$0‹D$4ȉD$4‰ƒèˆ‹D$(E3ÀH+ðH‹ÏHFXH‰ƒ‹T$,HÐèhߋL$0èÛ&H‰ƒH…ÀuHˆŸH eœè¬ éõ‹T$0L‹ÏA¸H‹ÈèîÛHƒøsH}ŸH Jèy é‹D$0H‹ÏHƒH‰ƒè*مÀtH gŸèÚ é“H‹“H;“ƒD‹âÄfo RŸf3ÀAƒø|óof8Áóëf„‹ ‚ɉ ‚HÿÀHƒø|ï¶JA¦¨÷t€ùdt€ùnt €ùxt2Àë° ƒ•Àˆƒ‹HÐH;“r’H‹Ïè¶×H‹´$¨H‹ÃH‹Œ$ˆH3Ì蟜Lœ$I‹[ I‹k(I‹ã_ÃÌÌÌÌÌÌÌÌÌÌL‰D$L‰L$ SUVWHƒ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $$„2â`å\±`å\±`å\±Ôy­±hå\±Ôy¯±ëå\±Ôy®±må\±àž¡±bå\±àžX°rå\±àž_°jå\±àžY°Yå\±iß±iå\±iÛ±bå\±iÏ±gå\±`å]±Cä\±îžY°Rå\±îž\°aå\±îž£±aå\±îž^°aå\±Rich`å\±PEd†#—@fð" !h†à.@`Á —4ԗP|ÿ l0p À6T€7(ð³@€¼ˆ .textngh `.rdataÄ(€*l@@.data\ç°–@À.pdatal0 2°@@.didat`àâ@À_RDATA\ðæ@@.rsrc|ÿè@@.relocp  è@BH 9¹éŽÌÌÌÌH Éù鸤ÌÌÌÌHƒì(H 5ùèdH ÉeHƒÄ(é¸H Éeé¬ÌÌÌÌHƒì(è̉ájHƒÄ(ÃÌÌÌÌÌÌÌÌÌÌÌÌH éjé”ûÌÌÌÌH ÙeélÌÌÌÌH Ùeé\ÌÌÌÌHƒì(H ­lèئH ÉeHƒÄ(é8H Éeé,ÌÌÌÌH ÉeéÌÌÌÌH Éeé ÌÌÌÌHƒì(H ¥kèTˆH éeHƒÄ(éèH )féÜÌÌÌÌHƒì(H Ål蘀H fHƒÄ(é¸H fé¬ÌÌÌÌH‰\$H‰l$H‰t$WHƒì0H‹ñI‹ØI‹ÈH‹ú3íèhL‹ÀH‹ÓH‹Ïè¯DE H‰.H‹ÐH‰nH‹ÎH‰nH‹Øèž$H‰kH‹ÆH‹t$Pf‰+H‹l$HHÇCH‹\$@HƒÄ0_ÃÌÌÌH‰\$H‰t$WHƒì0H‹ù3öH‹JH‹ÚH;Js!HƒzHAH‰BH‹ÂrH‹fD‰Hf‰tHëE·ÈºDŠÆH‹Ëè"A¸ H‰7H‹ÓH‰wH‹ÏH‰wè$H‰sH‹Çf‰3H‹t$HHÇCH‹\$@HƒÄ0_ÃHƒì(HA'H;Áv'H‹Èè[H‹ÈH…ÀtHƒÀ'HƒààH‰HøHƒÄ(ÃèqfÌèç ÌÌÌH‰\$H‰l$H‰t$WAVAWHƒì I¾þÿÿÿÿÿÿI‹ØL‹úH‹ùM;ƇÌHÇAHƒûsH‰YHÛL‹ÃèS#3öf‰4;é…H‹Ã3öHƒÈI;ÆvH¸ÿÿÿÿÿÿÿH ë.¹ L‹ðH;ÁH¸ÿÿÿÿÿÿÿLBñINH;Èw^HÉHùr èÿÿÿH‹èëH…ÉtèxëïH‹îH‰_I‹×HÛH‰/L‹ÃL‰wH‹ÍèÇ"f‰4+H‹\$@H‹l$HH‹t$PHƒÄ A_A^_Ãèå Ìèc ÌÌÌH…Ò„H‰\$H‰t$WHƒì H¸ÿÿÿÿÿÿÿH‹ñH;ÐwoHHûr H‹Ëè}þÿÿH‹øëH…Ût H‹ËèÛ ëì3ÿH‰>H;H‰~L‹Ã3ÒH‰FH‹ÏèÛ(Hƒd$0H;HL$0H‰FèOH‹\$8H‹t$@HƒÄ _ÃèÖ ÌÌH‰\$WHƒì H‹ÚI‹øH+ÙH‹ÑL‹ÃH‹ÏèÛ!H;H‹\$0HƒÄ _ÃH‹ÄH‰XH‰hH‰pH‰x ATAVAWHƒì H»þÿÿÿÿÿÿM‹ùL‹òH‹ùH;Ó‡H‹iHƒÊE3äH;ÓwH‹ÍH‹ÃHÑéH+ÁH;èvH¸ÿÿÿÿÿÿÿH ë1H)H‹ÚH;ÐHBØH¸ÿÿÿÿÿÿÿHKH;ȇ HÉHùr èLýÿÿH‹ðëH…Étè­ ëïI‹ôH‰_I‹×K6L‰wL‹ÃH‹Îèþ fD‰$3Hƒýr1H‹HmHúrL‹AøHƒÂ'I+ÈHAøHƒøw3I‹ÈèŽ H‰7H‹ÇH‹\$@H‹l$HH‹t$PH‹|$XHƒÄ A_A^A\ÃèØ ÌèVcÌèP ÌÌÌÌH‰\$H‰l$H‰t$WATAUAVAWHƒì L‹qH»þÿÿÿÿÿÿH‹ÃM‹éI+ÆH‹ñH;‚@H‹iM<I‹×E3ÀHƒÊH;ÓwH‹ÍH‹ÃHÑéH+ÁH;èvH¸ÿÿÿÿÿÿÿH ë1H)H‹ÚH;ÐHBØH¸ÿÿÿÿÿÿÿHKH;ȇéHÉHùr èûûÿÿH‹øëH…Étè\ ëïI‹øH‹D$pO6LðL‰~H‰^M$8H‹ÏL<HƒýrSH‹H‹Óè—M‹ÇI‹ÕI‹Ìè‰3ÀHmfB‰wHúrH‹KøHƒÂ'H+ÙHCøHƒøwMH‹ÙH‹Ëè ëH‹ÖèGM‹ÇI‹ÕI‹Ìè93ÀfB‰wH‰>H‹ÆH‹\$PH‹l$XH‹t$`HƒÄ A_A^A]A\_ÃèÎaÌèÈÌè>ÌÌH‰\$H‰l$H‰t$WATAUAVAWHƒì L‹qH¿þÿÿÿÿÿÿH‹ÇE·ùI+ÆH‹ñH;‚H‹iM$I‹ÔE3íHƒÊH;×wH‹ÍH‹ÇHÑéH+ÁH;èvH¸ÿÿÿÿÿÿÿH ë1H)H‹úH;ÐHBøH¸ÿÿÿÿÿÿÿHOH;ȇÇHÉHùr ènúÿÿH‹ØëH…ÉtèÏ ëïI‹ÝMöL‰fH‰~M‹ÆH‹ËHƒýrIH‹>H‹×èHmfE‰<fE‰lHúrH‹OøHƒÂ'H+ùHGøHƒøwCH‹ùH‹Ïè¨ ëH‹ÖèÒfE‰<fE‰lH‰H‹ÆH‹\$PH‹l$XH‹t$`HƒÄ A_A^A]A\_Ãèc`Ìè]ÌèÓÌÌÌ@SHƒì H‹ÙH‹ÂH ŗWÀH‰ HSHHèsHÀ—H‰H‹ÃHƒÄ [Ã@SHƒì H‹ÙH‹ÂH ‰—WÀH‰ HSHHè7HœH‰H‹ÃHƒÄ [ÃHƒaHLpH‰AHù›H‰H‹ÁÃÌÌ@SHƒì H‹ÙH‹ÂH -—WÀH‰ HSHHèÛH‹ÃHƒÄ [ÃÌÌ@SHƒì H‹H…ÛtIH‹ H…ÉtAH‹SH+ÑHÑúHÒHúrL‹AøHƒÂ'I+ÈHAøHƒøwI‹ÈèGHƒ#HƒcHƒcHƒÄ [Ãè&_ÌÌé»ÌÌÌ@SHƒì H‹ÙH‹ H…ÉtAH‹SH+ÑHÑúHÒHúrL‹AøHƒÂ'I+ÈHAøHƒøwI‹ÈèàHƒ#HƒcHƒcHƒÄ [Ãè¿^ÌÌÌH9–H‰HƒÁéÌÌÌÌÌH‰\$WHƒì H–H‹ùH‰‹ÚHƒÁèZöÃt ºH‹ÏèxH‹\$0H‹ÇHƒÄ _ÃÌÌ@USVWAUAVAWH¬$PÿÿÿHì°H‹³£H3ÄH‰… I‹ÙI‹ðL‹úL‹ñE3íL‰mfoÖnóEfD‰m¿M…É„ÊL‰màWÀóEðH‹Ëèf^L‹ÀH‹ÓHMàèw÷ÿÿE3ÀHUàHM`è–öÿÿL‹ÃH‹ÐHM@è öÿÿE3ÀH‹ÐHM èvöÿÿH‹ÐHƒxrH‹L‹@HMèÐHM è%HM@èHM`èH‹UøHƒúr2HUH‹MàH‹ÁH;×rHƒÂ'H‹IøH+ÁHƒÀøHƒø‡èè@¹£è H‹ØL‰màWÀóEðH‹Èè]L‹ÀH‹ÓHMàè öÿÿE3À
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELG¢ôà 0ìТ¹ @  @…P¹O ÄÉ 4¹  H.textˆé ì `.rsrcÄÉ Ìð@@.reloc ¼@B„¹HT-èM<­ø 0 1s, ~Ï%-&~Îþls- %€Ï(+o/ 8Ðo0 ±%rprYp~1 (2 ¢%rqpr¯p~1 (2 ¢%rÇprp~1 (2 ¢%r!prap~1 (2 ¢(˜ o3 81(4 s_sm~1 }Í~1 s5 (6 o7 }Í{ÍrqprÑp~1 (2 o8   ,rãprp~1 (2 +;rprap~1 (2 o8 -{Í(›+ {Í(š(9 þ  9:o:   (; o< o= (> {Í(™  (9 þ  9ñs? s? s? þ`s@ ~Ð%-&~ÎþmsA %€Ð(+þas@ ~Ñ%-&~ÎþnsA %€Ñ(+þbs@ ~Ò%-&~ÎþosA %€Ò(+oB þ9E{͍±%rip¢oC šr}p(> (C(+oE sF (N(+oToG #>@(H (I ioJ &ÞÞ(K þ9œþcs@ ~Ó%-&~ÎþpsA %€Ó(+þds@ ~Ô%-&~ÎþqsA %€Ô(+þes@ ~Õ%-&~ÎþrsA %€Õ(+ÞÞo_ oaþfsL ~Ö%-&~ÎþssM %€Ö(+ocoiþgsN ~×%-&~ÎþtsO %€×(+oeþhsP ~Ø%-&~ÎþusQ %€Ø(+ogþisR ~Ù%-&~ÎþvsS %€Ù(+ok( +,dsm%o_% r£p(> oa%sU oc%oi%ok%sV oe%sW ogoX ( +,dsm%o_% rµp(> oa%sU oc%oi%ok%sV oe%sW ogoX ÞÞolþ, oX (Y :ÃúÿÿÞþoZ Üo[ :%úÿÿÞ ,oZ ÜÞ&Þ + *A”ñ,›:ÕåäɵDù4â $0sr rËp(\ (] þ , Ýî( srÝpo&8žoo^ oo^ (rùpo8   ,4sr  ³%-o_ šoo oq +sr%oo%oq Þ ÞXoþ  :NÿÿÿÞ ÞÞÞ+*ALPà1Ó 0’sU  ³%а(` sa (\ (] þ , ÝS( s³%Ð|(` sa o&8òs’oo^ ooo^ oo(o‘ÞÞÞooŒ(K - oŒ+rýpooŽ(K - oŽ+rýpoo(K - o+rýpo‘Üorýp(b   , oc Xoþ  :úþÿÿÞ ÞÞ Þ+*AdzJÄzRÌoC8{}„0Ìs? (\ (] þ , Ý£( s³%О(` sa o&8Css%oo^ ov%oo^ o: .þox%oo^ oz%oo: 1þo|%oo^ (d @Bj[!‘¶Yo~%oo^ o€%r po(o‚o}jþ,-(e    (f   (g
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x0002de00', u'virtual_address': u'0x00001000', u'entropy': 7.984723801335668, u'name': u' \\x00 ', u'virtual_size': u'0x00068000'} entropy 7.98472380134 description A section with a high entropy has been found
section {u'size_of_data': u'0x00193600', u'virtual_address': u'0x00309000', u'entropy': 7.952774004070317, u'name': u'efnzbsnu', u'virtual_size': u'0x00194000'} entropy 7.95277400407 description A section with a high entropy has been found
entropy 0.993915929204 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
process system
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Install itself for autorun at Windows startup rule Persistence
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x00000594
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExW

regkey_r: AddressBook
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
1 0 0

RegOpenKeyExW

regkey_r: Connection Manager
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
1 0 0

RegOpenKeyExW

regkey_r: DirectDrawEx
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
1 0 0

RegOpenKeyExW

regkey_r: EditPlus
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
1 0 0

RegOpenKeyExW

regkey_r: ENTERPRISE
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE
1 0 0

RegOpenKeyExW

regkey_r: Fontcore
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
1 0 0

RegOpenKeyExW

regkey_r: Google Chrome
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExW

regkey_r: Haansoft HWord 80 Korean
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
1 0 0

RegOpenKeyExW

regkey_r: IE40
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40
1 0 0

RegOpenKeyExW

regkey_r: IE4Data
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
1 0 0

RegOpenKeyExW

regkey_r: IE5BAKEX
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
1 0 0

RegOpenKeyExW

regkey_r: IEData
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData
1 0 0

RegOpenKeyExW

regkey_r: MobileOptionPack
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
1 0 0

RegOpenKeyExW

regkey_r: SchedulingAgent
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
1 0 0

RegOpenKeyExW

regkey_r: WIC
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC
1 0 0

RegOpenKeyExW

regkey_r: {01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
1 0 0

RegOpenKeyExW

regkey_r: {1D91F7DA-F517-4727-9E62-B7EA978BE980}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}
1 0 0

RegOpenKeyExW

regkey_r: {60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0015-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0016-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0018-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0019-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001A-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001B-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001F-0409-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-001F-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0028-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-002C-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0030-0000-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0044-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-006E-0409-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-006E-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-00A1-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-00BA-0409-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {90120000-0114-0412-0000-0000000FF1CE}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExW

regkey_r: {939659F3-71D2-461F-B24D-91D05A4389B4}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}
1 0 0

RegOpenKeyExW

regkey_r: {9B84A461-3B4C-40E2-B44F-CE22E215EE40}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}
1 0 0

RegOpenKeyExW

regkey_r: {d992c12e-cab2-426f-bde3-fb8c53950b0d}
base_handle: 0x00000594
key_handle: 0x00000598
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}
1 0 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x00000444
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExW

regkey_r: AddressBook
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
1 0 0

RegOpenKeyExW

regkey_r: Connection Manager
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
1 0 0

RegOpenKeyExW

regkey_r: DirectDrawEx
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
1 0 0

RegOpenKeyExW

regkey_r: EditPlus
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
1 0 0

RegOpenKeyExW

regkey_r: ENTERPRISE
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE
1 0 0

RegOpenKeyExW

regkey_r: Fontcore
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
1 0 0

RegOpenKeyExW

regkey_r: Google Chrome
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExW

regkey_r: Haansoft HWord 80 Korean
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
1 0 0

RegOpenKeyExW

regkey_r: IE40
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40
1 0 0

RegOpenKeyExW

regkey_r: IE4Data
base_handle: 0x00000444
key_handle: 0x00000440
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
1 0 0
host 185.215.113.16
host 185.215.113.67
host 185.215.113.9
host 45.33.6.223
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
file C:\Windows\Tasks\axplong.job
file C:\Windows\Tasks\Test Task17.job
file C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml
file C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml
Time & API Arguments Status Return Repeated

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Access MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Excel MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office PowerPoint MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Publisher MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Outlook MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Word MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office IME (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office InfoPath MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OneNote MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove Setup Metadata MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 ActiveX
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 NPAPI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000598
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24215
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 한컴오피스 한글 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Access MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Excel MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office PowerPoint MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Publisher MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Outlook MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Word MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office IME (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office InfoPath MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OneNote MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExW

key_handle: 0x00000440
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob
file C:\Users\test22\AppData\Local\Temp\RarSFX0\clamer.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_16952343
file C:\Users\test22\AppData\Local\Temp\RarSFX0\1.bat
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-errorhandling-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-sysinfo-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-handle-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-file-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-conio-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-memory-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-heap-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-utility-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_decimal.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-processthreads-l1-1-1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-file-l1-2-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\libcrypto-1_1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_ctypes.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_queue.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_cffi_backend.cp310-win_amd64.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-debug-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-locale-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\cryptography-42.0.8.dist-info\INSTALLER
file C:\Users\test22\AppData\Local\Temp\_MEI24522\unicodedata.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-time-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-synch-l1-2-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\cryptography-42.0.8.dist-info\top_level.txt
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_lzma.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\certifi\cacert.pem
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-profile-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\base_library.zip
file C:\Users\test22\AppData\Local\Temp\_MEI24522\cryptography-42.0.8.dist-info\WHEEL
file C:\Users\test22\AppData\Local\Temp\_MEI24522\cryptography-42.0.8.dist-info\REQUESTED
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-timezone-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-convert-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-file-l2-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-namedpipe-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_pytransform.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\cryptography-42.0.8.dist-info\LICENSE.APACHE
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-processenvironment-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\libffi-7.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_brotli.cp310-win_amd64.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-console-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-heap-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\VCRUNTIME140.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\cryptography-42.0.8.dist-info\RECORD
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-crt-environment-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\certifi\py.typed
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-string-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-datetime-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI24522\_bz2.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI24522\api-ms-win-core-interlocked-l1-1-0.dll
Process injection Process 2372 resumed a thread in remote process 1964
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 1964
1 0 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 e9 f8 c6 ff ff 87 3c 24
exception.symbol: random+0x1fe7a2
exception.instruction: in eax, dx
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 2090914
exception.address: 0xe3e7a2
registers.esp: 2292816
registers.edi: 5844504
registers.eax: 1447909480
registers.ebp: 4003311636
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 14912929
registers.ecx: 20
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
Skyhigh BehavesLike.Win32.Generic.tc
ALYac Gen:Variant.Kryptik.260
Cylance Unsafe
VIPRE Gen:Variant.Kryptik.260
Sangfor Trojan.Win32.Kryptik.Vl55
BitDefender Gen:Variant.Kryptik.260
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Packed.Themida.HZB
APEX Malicious
McAfee Artemis!8C0430EE2841
Avast Win32:TrojanX-gen [Trj]
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Packed:Win32/Themida.1e4423b8
MicroWorld-eScan Gen:Variant.Kryptik.260
Emsisoft Gen:Variant.Kryptik.260 (B)
F-Secure Trojan.TR/Crypt.TPM.Gen
TrendMicro Trojan.Win32.PRIVATELOADER.YXEG1Z
McAfeeD Real Protect-LS!8C0430EE2841
Trapmine malicious.high.ml.score
FireEye Generic.mg.8c0430ee2841a655
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
Google Detected
Avira TR/Crypt.TPM.Gen
MAX malware (ai score=86)
Kingsoft Win32.HeurC.KVMH008.a
Gridinsoft Trojan.Win32.Amadey.tr
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Gen:Variant.Kryptik.260
Varist W32/Agent.JDU.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.R645974
BitDefenderTheta Gen:NN.ZexaF.36810.XDWaa81ut1oi
DeepInstinct MALICIOUS
Malwarebytes Malware.Heuristic.2025
Zoner Probably Heur.ExeHeaderL
TrendMicro-HouseCall Trojan.Win32.PRIVATELOADER.YXEG1Z
Tencent Win32.Trojan.Generic.Kjgl
Fortinet W32/PossibleThreat
AVG Win32:TrojanX-gen [Trj]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_100% (W)