Summary | ZeroBOX

sand.exe

RedLine stealer Gen1 RedlineStealer Amadey EnigmaProtector Generic Malware .NET framework(MSIL) Malicious Library Admin Tool (Sysinternals etc ...) UPX Malicious Packer Anti_VM ftp PE64 PE File OS Processor Check PE32 ZIP Format .NET EXE DLL
Category Machine Started Completed
FILE s1_win7_x6401 July 31, 2024, 7:25 a.m. July 31, 2024, 7:30 a.m.
Size 1.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 037f916ac94fcc198a7253a0daf62777
SHA256 f0167568d478299cd5d6b6336d6b6f27123154776c5b89edc6faa3dfa0efb81a
CRC32 0A8BBE93
ssdeep 24576:XY/JCuINmBP3ZomWFOPtl26WbqRC+fxxTVfoOrx4MSqmzjCPsvjNt/Qfqr0S+iC6:6FftlTw+JJNoZXCkvjb/Wqr0qOa6k
Yara
  • PE_Header_Zero - PE File Signature
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
coe.com.vn 103.28.36.182
IP Address Status Action
185.215.113.16 Active Moloch
103.28.36.182 Active Moloch
164.124.101.2 Active Moloch
185.215.113.19 Active Moloch
185.215.113.67 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.19:80 -> 192.168.56.101:49164 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49167 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49165 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49167 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 185.215.113.19:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49167 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49167 2014819 ET INFO Packed Executable Download Misc activity
TCP 185.215.113.16:80 -> 192.168.56.101:49167 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49167 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49167 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 103.28.36.182:443 -> 192.168.56.101:49187 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 103.28.36.182:443 -> 192.168.56.101:49178 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49182 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49177 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 185.215.113.67:40960 -> 192.168.56.101:49191 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49181 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 103.28.36.182:443 -> 192.168.56.101:49183 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 185.215.113.16:80 -> 192.168.56.101:49167 2014819 ET INFO Packed Executable Download Misc activity
TCP 192.168.56.101:49167 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49172 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49168 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49167 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49172 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49172 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49176 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49185 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49186 -> 103.28.36.182:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49172 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b1d8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b258
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b258
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b158
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b918
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075b918
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0075bad8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section \x00
section .idata
section
section upgbvxgh
section iqndoduh
section .taggant
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: sand+0x31f0b9
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 3272889
exception.address: 0x4ef0b9
registers.esp: 9436744
registers.edi: 0
registers.eax: 1
registers.ebp: 9436760
registers.edx: 6901760
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 c7 04 24 4e e7 92 6e 89 04 24 b8 00 29 fb
exception.symbol: sand+0x6cdb6
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 445878
exception.address: 0x23cdb6
registers.esp: 9436708
registers.edi: 1968898280
registers.eax: 28758
registers.ebp: 3992367124
registers.edx: 1900544
registers.ebx: 902556667
registers.esi: 2346378
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 31 c0 e9 cc f8 ff ff 05 b6 34 be 78 e9 30 00
exception.symbol: sand+0x6d7b0
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 448432
exception.address: 0x23d7b0
registers.esp: 9436712
registers.edi: 1968898280
registers.eax: 28758
registers.ebp: 3992367124
registers.edx: 1900544
registers.ebx: 902556667
registers.esi: 2375136
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 e9 2d f9 ff ff 5a e9 e5 f8 ff ff b8 3c af
exception.symbol: sand+0x6d818
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 448536
exception.address: 0x23d818
registers.esp: 9436712
registers.edi: 1968898280
registers.eax: 4294941264
registers.ebp: 3992367124
registers.edx: 233705
registers.ebx: 902556667
registers.esi: 2375136
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 04 24 e9 5b 02 00 00 ff 34 24 58 81 c4
exception.symbol: sand+0x6dede
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 450270
exception.address: 0x23dede
registers.esp: 9436712
registers.edi: 2379921
registers.eax: 29521
registers.ebp: 3992367124
registers.edx: 2145175296
registers.ebx: 758756352
registers.esi: 1259
registers.ecx: 4294940772
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 b3 f7 ff ff 54 5e e9 06 fe ff ff 29 c1
exception.symbol: sand+0x1f14f9
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2036985
exception.address: 0x3c14f9
registers.esp: 9436708
registers.edi: 2385543
registers.eax: 30582
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 45023919
registers.esi: 3918959
registers.ecx: 3935202
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 50 b8 e0 5a a9 04 89 44 24 04 8b 04 24 83
exception.symbol: sand+0x1f0c55
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2034773
exception.address: 0x3c0c55
registers.esp: 9436712
registers.edi: 2385543
registers.eax: 30582
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 45023919
registers.esi: 3918959
registers.ecx: 3965784
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 d7 c2 47 5b 89 1c 24 bb 7f 5c f7 7f e9 0b
exception.symbol: sand+0x1f108b
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2035851
exception.address: 0x3c108b
registers.esp: 9436712
registers.edi: 512233
registers.eax: 30582
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 3918959
registers.ecx: 3938016
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 7b 7c 46 72 89 34 24 e9 70 fa ff ff be cb
exception.symbol: sand+0x1f3819
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2045977
exception.address: 0x3c3819
registers.esp: 9436712
registers.edi: 3942499
registers.eax: 32501
registers.ebp: 3992367124
registers.edx: 9041
registers.ebx: 3975964
registers.esi: 9041
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 00 38 6a 59 89 04 24 89 e0 51 e9 7f 08 00
exception.symbol: sand+0x1f2efb
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2043643
exception.address: 0x3c2efb
registers.esp: 9436712
registers.edi: 3942499
registers.eax: 32501
registers.ebp: 3992367124
registers.edx: 4294938080
registers.ebx: 3975964
registers.esi: 50665
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 c9 e9 3a 00 00 00 68 aa e4 5d 7c 58 09 c1
exception.symbol: sand+0x1f5280
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2052736
exception.address: 0x3c5280
registers.esp: 9436712
registers.edi: 13250062
registers.eax: 27966
registers.ebp: 3992367124
registers.edx: 1994497242
registers.ebx: 132969275
registers.esi: 3979242
registers.ecx: 1969148396
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 04 24 55 e9 99 fe ff ff
exception.symbol: sand+0x1f54de
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2053342
exception.address: 0x3c54de
registers.esp: 9436712
registers.edi: 13250062
registers.eax: 27966
registers.ebp: 3992367124
registers.edx: 1994497242
registers.ebx: 1259
registers.esi: 3979242
registers.ecx: 4294941952
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 e9 bf 18 00 00 42 81 ea
exception.symbol: sand+0x1fe4d4
exception.instruction: in eax, dx
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2090196
exception.address: 0x3ce4d4
registers.esp: 9436704
registers.edi: 13250062
registers.eax: 1447909480
registers.ebp: 3992367124
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 3981226
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: sand+0x1fd38a
exception.address: 0x3cd38a
exception.module: sand.exe
exception.exception_code: 0xc000001d
exception.offset: 2085770
registers.esp: 9436704
registers.edi: 13250062
registers.eax: 1
registers.ebp: 3992367124
registers.edx: 22104
registers.ebx: 0
registers.esi: 3981226
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 a5 28 2d 12 01
exception.symbol: sand+0x1fdcde
exception.instruction: in eax, dx
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2088158
exception.address: 0x3cdcde
registers.esp: 9436704
registers.edi: 13250062
registers.eax: 1447909480
registers.ebp: 3992367124
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 3981226
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 6a 00 51 e8 03 00 00 00 20 59 c3 59
exception.symbol: sand+0x204593
exception.instruction: int 1
exception.module: sand.exe
exception.exception_code: 0xc0000005
exception.offset: 2114963
exception.address: 0x3d4593
registers.esp: 9436672
registers.edi: 0
registers.eax: 9436672
registers.ebp: 3992367124
registers.edx: 17596
registers.ebx: 4015913
registers.esi: 18217
registers.ecx: 4015292
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 34 69 99 1b 89 04 24 89 e0 e9 5d 00 00 00
exception.symbol: sand+0x204e5a
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2117210
exception.address: 0x3d4e5a
registers.esp: 9436712
registers.edi: 13250062
registers.eax: 4048174
registers.ebp: 3992367124
registers.edx: 6379
registers.ebx: 4294938796
registers.esi: 2721715807
registers.ecx: 2088501248
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 df 06 00 00 54 59 81 c1 04 00 00 00 81
exception.symbol: sand+0x213a53
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2177619
exception.address: 0x3e3a53
registers.esp: 9436712
registers.edi: 2339390
registers.eax: 30553
registers.ebp: 3992367124
registers.edx: 6
registers.ebx: 19261346
registers.esi: 4108303
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 c7 04 24 16 8f de 5e 89 34 24 68 1a 30 3d
exception.symbol: sand+0x213af3
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2177779
exception.address: 0x3e3af3
registers.esp: 9436712
registers.edi: 3923872081
registers.eax: 0
registers.ebp: 3992367124
registers.edx: 6
registers.ebx: 19261346
registers.esi: 4080943
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 89 1c 24 89 14 24 e9 81 fe ff ff 5c 53 50
exception.symbol: sand+0x219ec6
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2203334
exception.address: 0x3e9ec6
registers.esp: 9436700
registers.edi: 3923872081
registers.eax: 29815
registers.ebp: 3992367124
registers.edx: 1043012196
registers.ebx: 527383049
registers.esi: 4080943
registers.ecx: 4102103
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 df 05 00 00 87 2c 24 5c 52 e9 b0 03 00 00
exception.symbol: sand+0x219969
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2201961
exception.address: 0x3e9969
registers.esp: 9436704
registers.edi: 3923872081
registers.eax: 29815
registers.ebp: 3992367124
registers.edx: 1043012196
registers.ebx: 527383049
registers.esi: 4080943
registers.ecx: 4131918
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 89 14 24 e9 9b 03 00 00 89 fe 5f 83 c6 ff
exception.symbol: sand+0x219c4a
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2202698
exception.address: 0x3e9c4a
registers.esp: 9436704
registers.edi: 3923872081
registers.eax: 4294940104
registers.ebp: 3992367124
registers.edx: 1043012196
registers.ebx: 322689
registers.esi: 4080943
registers.ecx: 4131918
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 e9 ec 01 00 00 ff 0c 24 87 3c 24 f7 d7 87
exception.symbol: sand+0x21a5fa
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2205178
exception.address: 0x3ea5fa
registers.esp: 9436700
registers.edi: 3923872081
registers.eax: 4105149
registers.ebp: 3992367124
registers.edx: 1043012196
registers.ebx: 964290386
registers.esi: 4080943
registers.ecx: 1456481679
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 54 5b 56 be c0 5d f9 3e e9 47 f4 ff ff 89
exception.symbol: sand+0x21b0be
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2207934
exception.address: 0x3eb0be
registers.esp: 9436704
registers.edi: 3923872081
registers.eax: 4133707
registers.ebp: 3992367124
registers.edx: 1043012196
registers.ebx: 964290386
registers.esi: 4080943
registers.ecx: 1456481679
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 68 f7 e1 cc 57 89 14 24 81 ec 04 00 00 00
exception.symbol: sand+0x21ab15
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2206485
exception.address: 0x3eab15
registers.esp: 9436704
registers.edi: 3923872081
registers.eax: 4108539
registers.ebp: 3992367124
registers.edx: 1043012196
registers.ebx: 0
registers.esi: 4080943
registers.ecx: 84201
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 34 24 be 83 88 3f 2b 81 ee b3 41 9f 3b
exception.symbol: sand+0x21f6c7
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2225863
exception.address: 0x3ef6c7
registers.esp: 9436700
registers.edi: 3923872081
registers.eax: 4124993
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 289296042
registers.esi: 4080943
registers.ecx: 2088501248
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb ba 4c 9b 9d 6f 83 ea 01 52 f7 14 24 5a 83 ea
exception.symbol: sand+0x21f5c1
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2225601
exception.address: 0x3ef5c1
registers.esp: 9436704
registers.edi: 0
registers.eax: 4127852
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 1783979243
registers.esi: 4080943
registers.ecx: 2088501248
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 ba 5c db df 6b 29 d0 5a 03 04 24 52 ba 1b
exception.symbol: sand+0x22bc6e
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2276462
exception.address: 0x3fbc6e
registers.esp: 9436700
registers.edi: 2147344213
registers.eax: 4176839
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 2147483645
registers.esi: 4286854489
registers.ecx: 2134741213
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 34 24 89 3c 24 e9 1a 00
exception.symbol: sand+0x22c4fc
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2278652
exception.address: 0x3fc4fc
registers.esp: 9436704
registers.edi: 2147344213
registers.eax: 4206169
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 2147483645
registers.esi: 4286854489
registers.ecx: 2134741213
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 60 f3 ca 1d 89 04 24 83 ec 04 89 04 24 e9
exception.symbol: sand+0x22bf2c
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2277164
exception.address: 0x3fbf2c
registers.esp: 9436704
registers.edi: 2147344213
registers.eax: 4180085
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 4286854489
registers.ecx: 1358981728
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 ba ff ff ff c7 04 24 30 b5 c7 78 89 04 24
exception.symbol: sand+0x242342
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2368322
exception.address: 0x412342
registers.esp: 9436672
registers.edi: 4269709
registers.eax: 29942
registers.ebp: 3992367124
registers.edx: 0
registers.ebx: 4261495
registers.esi: 1459645024
registers.ecx: 2088501248
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 14 34 2f 2b e9 7d ff ff ff be e1 73 69 4f
exception.symbol: sand+0x2433d1
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2372561
exception.address: 0x4133d1
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 26518
registers.ebp: 3992367124
registers.edx: 62948
registers.ebx: 1911637819
registers.esi: 4269740
registers.ecx: 4297245
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 04 24 89 1c 24 50 51 e9 8f fe ff
exception.symbol: sand+0x242c17
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2370583
exception.address: 0x412c17
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 26518
registers.ebp: 3992367124
registers.edx: 62948
registers.ebx: 0
registers.esi: 15526224
registers.ecx: 4273613
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 b9 5b d6 c5 79 51 b9 f7 3a 7f 50 81 e9 7f
exception.symbol: sand+0x2454ba
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2380986
exception.address: 0x4154ba
registers.esp: 9436668
registers.edi: 232903481
registers.eax: 29054
registers.ebp: 3992367124
registers.edx: 62948
registers.ebx: 4279722
registers.esi: 244154116
registers.ecx: 4340849
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 42 05 00 00 31 14 24 33 14 24 8b 24 24 e9
exception.symbol: sand+0x244dca
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2379210
exception.address: 0x414dca
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 29054
registers.ebp: 3992367124
registers.edx: 62948
registers.ebx: 4308776
registers.esi: 244154116
registers.ecx: 4340849
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 68 02 00 00 31 d1 5a 81 f1 cd 66 c5 e8 89
exception.symbol: sand+0x244e9e
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2379422
exception.address: 0x414e9e
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 1342204512
registers.ebp: 3992367124
registers.edx: 62948
registers.ebx: 4282616
registers.esi: 244154116
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 85 01 00 00 31 c6 58 53 89 e3 68 88 5a 32
exception.symbol: sand+0x246238
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2384440
exception.address: 0x416238
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 31639
registers.ebp: 3992367124
registers.edx: 4316364
registers.ebx: 4282616
registers.esi: 244154116
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 c6 01 00 00 50 b8 04 00 00 00 01 c2 e9 78
exception.symbol: sand+0x2462e3
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2384611
exception.address: 0x4162e3
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 31639
registers.ebp: 3992367124
registers.edx: 4316364
registers.ebx: 4294938644
registers.esi: 44777
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 bf fe 7c fe 3f e9 c6 01 00 00 53 e9 00 00
exception.symbol: sand+0x24ab05
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2403077
exception.address: 0x41ab05
registers.esp: 9436668
registers.edi: 232903481
registers.eax: 32248
registers.ebp: 3992367124
registers.edx: 4302557
registers.ebx: 2349377
registers.esi: 44777
registers.ecx: 1971716238
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb b8 f0 b8 ea 0d 56 be 0a 2c f7 59 81 f6 77 e3
exception.symbol: sand+0x24af5b
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2404187
exception.address: 0x41af5b
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 32248
registers.ebp: 3992367124
registers.edx: 4334805
registers.ebx: 2349377
registers.esi: 44777
registers.ecx: 1971716238
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 c7 04 24 e1 7d d9 65 58 40 e9 55 02 00 00
exception.symbol: sand+0x24aa0d
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2402829
exception.address: 0x41aa0d
registers.esp: 9436672
registers.edi: 232903481
registers.eax: 4294937624
registers.ebp: 3992367124
registers.edx: 4334805
registers.ebx: 2349377
registers.esi: 101353
registers.ecx: 1971716238
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 c6 3f dd 7b 6f 81 ee 66 84 3f 76 e9 9d fa
exception.symbol: sand+0x24db43
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2415427
exception.address: 0x41db43
registers.esp: 9436668
registers.edi: 4313292
registers.eax: 29135
registers.ebp: 3992367124
registers.edx: 2349378
registers.ebx: 2349378
registers.esi: 4313943
registers.ecx: 1732638305
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 bd c4 8a d6 08 55 55 bd 58 48 db 78 29 6c
exception.symbol: sand+0x24d5d1
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2414033
exception.address: 0x41d5d1
registers.esp: 9436672
registers.edi: 4313292
registers.eax: 29135
registers.ebp: 3992367124
registers.edx: 2349378
registers.ebx: 2349378
registers.esi: 4343078
registers.ecx: 1732638305
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 25 fc ff ff 68 ca 55 89 10 89 04 24 e9
exception.symbol: sand+0x24d7a1
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2414497
exception.address: 0x41d7a1
registers.esp: 9436672
registers.edi: 0
registers.eax: 29135
registers.ebp: 3992367124
registers.edx: 2349378
registers.ebx: 2349378
registers.esi: 4316810
registers.ecx: 21883218
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 e9 3c 00 00 00 ff 34 24 ff 34 24 5d 83 c4
exception.symbol: sand+0x24e2fe
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2417406
exception.address: 0x41e2fe
registers.esp: 9436672
registers.edi: 0
registers.eax: 27653
registers.ebp: 3992367124
registers.edx: 4344905
registers.ebx: 1600371775
registers.esi: 4316810
registers.ecx: 2104113000
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 1d f9 ff ff 4d 81 e5 69 3d d3 7f c1 e5 02
exception.symbol: sand+0x24ea04
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2419204
exception.address: 0x41ea04
registers.esp: 9436672
registers.edi: 0
registers.eax: 27653
registers.ebp: 3992367124
registers.edx: 4320457
registers.ebx: 157417
registers.esi: 4316810
registers.ecx: 2104113000
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 60 7a 0c 18 89 04 24 89 14 24 89 3c 24 68
exception.symbol: sand+0x26c99e
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2541982
exception.address: 0x43c99e
registers.esp: 9436672
registers.edi: 0
registers.eax: 32126
registers.ebp: 3992367124
registers.edx: 4444713
registers.ebx: 1971716070
registers.esi: 3135853651
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 1a 99 c9 16 89 1c 24 50 b8 0d 1e 7f 7f 89
exception.symbol: sand+0x26dbb4
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2546612
exception.address: 0x43dbb4
registers.esp: 9436672
registers.edi: 4475010
registers.eax: 29864
registers.ebp: 3992367124
registers.edx: 28467384
registers.ebx: 1588778816
registers.esi: 3135853651
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 ff fb ff ff 05 42 d1 27 1f e9 1c 02 00 00
exception.symbol: sand+0x26dab3
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2546355
exception.address: 0x43dab3
registers.esp: 9436672
registers.edi: 4475010
registers.eax: 29864
registers.ebp: 3992367124
registers.edx: 28467384
registers.ebx: 4294940420
registers.esi: 3135853651
registers.ecx: 82608470
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 71 cd c1 27 89 2c 24 54 5d e9 59 01 00 00
exception.symbol: sand+0x2735f6
exception.instruction: sti
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2569718
exception.address: 0x4435f6
registers.esp: 9436672
registers.edi: 4472812
registers.eax: 0
registers.ebp: 3992367124
registers.edx: 2130566132
registers.ebx: 392254056
registers.esi: 3135853651
registers.ecx: 2088501248
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.19/Vi9leo/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/cost/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/steam/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/soka/random.exe
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.16/Jo89Ku7d/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/GOLD.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/4434.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/crypteda.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/25072023.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/pered.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/inc/2020.exe
request POST http://185.215.113.19/Vi9leo/index.php
request GET http://185.215.113.16/cost/random.exe
request GET http://185.215.113.16/steam/random.exe
request GET http://185.215.113.16/soka/random.exe
request POST http://185.215.113.16/Jo89Ku7d/index.php
request GET http://185.215.113.16/inc/GOLD.exe
request GET http://185.215.113.16/inc/4434.exe
request GET http://185.215.113.16/inc/crypteda.exe
request GET http://185.215.113.16/inc/25072023.exe
request GET http://185.215.113.16/inc/pered.exe
request GET http://185.215.113.16/inc/2020.exe
request POST http://185.215.113.19/Vi9leo/index.php
request POST http://185.215.113.16/Jo89Ku7d/index.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x001d1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02540000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02550000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02560000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02670000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02760000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02770000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02780000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02890000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02c10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02da0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02df0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02f00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02f10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73402000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x032b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000046c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2816
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2816
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2816
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00321000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02230000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02240000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02250000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02310000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02330000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x023c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02650000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02660000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2816
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02670000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description axplong.exe tried to sleep 817 seconds, actually delayed analysis time by 817 seconds
description explorti.exe tried to sleep 1149 seconds, actually delayed analysis time by 1149 seconds
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-memory-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-string-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-interlocked-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-debug-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\_pytransform.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-handle-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-datetime-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-processenvironment-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\1000012001\2020.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-console-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-processthreads-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-localization-l1-2-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-file-l2-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-profile-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-file-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-file-l1-2-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\libffi-7.dll
file C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-filesystem-l1-1-0.dll
file C:\Users\test22\1000029002\ab417aa83e.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-synch-l1-2-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-runtime-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-environment-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\python310.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-heap-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-util-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\VCRUNTIME140.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-sysinfo-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-rtlsupport-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-time-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-math-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-string-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-process-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-errorhandling-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\libcrypto-1_1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-synch-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\libssl-1_1.dll
file C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\ucrtbase.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-locale-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-heap-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-utility-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-processthreads-l1-1-1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-crt-stdio-l1-1-0.dll
file C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\python3.dll
file C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe
file C:\Users\test22\AppData\Local\Temp\_MEI13042\api-ms-win-core-libraryloader-l1-1-0.dll
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000000
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3832866432-4053218753-3017428901-1001
desired_access: 0x00100001 (FILE_READ_DATA|FILE_LIST_DIRECTORY|SYNCHRONIZE)
file_attributes: 4 (FILE_ATTRIBUTE_SYSTEM)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3832866432-4053218753-3017428901-1001
create_options: 16417 (FILE_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_OPEN_FOR_BACKUP_INTENT)
status_info: 4294967295 ()
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
3221225525 0
file C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
file C:\Users\test22\1000029002\ab417aa83e.exe
file C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe
file C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe
file C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe
file C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
file C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
file C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
file C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe
file C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
file C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe
file C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe
file C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
file C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\1000029002\ab417aa83e.exe
parameters:
filepath: C:\Users\test22\1000029002\ab417aa83e.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELb@]à 2 V0@ |qȐœpt,.codeð78 `.textÂÒPÔ< `.rdata304@@.data,pD@À.rsrcœV@@h¬hh€Aè\@ƒÄ hèU@£€AhhhèB@£€Aè¼?¸ˆpA£4€AèÝÍèIËèCšèǒèZèÔŠèø…èx}è@Cèöèk¡º.pA €AèÓ?hõÿÿÿèã?£<€A¸P¸€AP1ÀPhhèÿ5 €Aè “hhxpA €APhè_’ÿ5¨€Aèæ’hhppA¨€APhè9’h˜€Ah€pAhh¡†h èÊº:pA l€Aè+?ÿ5°€A蒒hhppA°€APhè呍;@PèÁ‡Rè ÍZPèÅhH€Aè:Íè ‹X€AƒûuèfèS,hèè±Ìÿ5€AèÎ>èÏ>èµA臇èç”轘èìÀèS‰ÃUSWºƒìÇ$Juó‹T$X $èa>ÿ4$èùD‰D$ÿt$èL‰‰D$T$ Rhhhhè”ɍT$RhhhhèvÉÇD$ÇD$ ÇD$$ÇD$(ÇD$,ÇD$0ÇD$ ÇD$ ÿt$ X‰D$4ÿt$X‰D$8ÇD$ë¸ÿ;D$|Tÿt$‹l$8X‰E‹\$4ƒÃ‰\$4‹l$8¾]!Ûu ÿt$X‰D$8‹l$8¾EP‹\$ ‹l$ÁãX‰D‹\$8C‰\$8ÿD$q¡ÇD$ ÇD$ë¸ÿ;D$|m‹\$ ‹|$‹l$ Áç\=‹|$‹l$Áç\=ãÿ‰\$ ‹\$‹l$ ÁãÿtX‰D$,‹\$ Áãÿt‹\$ ÁãX‰Dÿt$,‹\$$ÁãX‰DÿD$qˆÇD$ÇD$ ÿt$PX‰D$<ÇD$(ë‹\$TK;\$(ŒÃ‹\$Cãÿ‰\$‹\$ ‹|$‹l$ Áç\=ãÿ‰\$ ‹\$ÁãÿtX‰D$,‹\$ Áãÿt‹\$ ÁãX‰Dÿt$,‹\$$ÁãX‰D‹\$Áã‹\‹|$ Áç‹|=çÿûãÿ‰\$$‹\$$ÁãÿtX‰D$0‹l$<¾]3\$0S‹l$@XˆE‹\$<C‰\$<ÿD$(.ÿÿÿT$ RhhhhèǍT$RhhhhèÇÿt$譆‹D$Pë1Àÿ4$èmÊPÿt$è0Èÿt$è'ÈXƒÄ@_[] USº ƒìÇ$Juóè§Ê‹”€Aƒû…2‹|€Aƒûu‹h€Aƒût¸ë1À!À„¸&pAPÿ5€AèB‰$ÇD$ë‹$;D$Œ’RèÉZPRèøÈZP¸fpAPÿt$ÿ5€AèQBD$ PèÉÿt$èé!ÀtLRèÄÈZPÿt$ è3D$PèïȋT$Rè¥ÈZPRè=ʋT$Rè3ʺfpARè(ʍD$Pè¾ÈÿD$aÿÿÿÿt$èë@‰D$hD$Pÿt$è4…Pÿt$ ÿ5<€AèX:ÿt$è;…º$pA €Aè:éÎÇ”€AÇD$RèÈZPRèÈZP¸.pAPÿt$(ÿ5$€Aè_AD$Pè%ȸ2pAPÿt$èC‰D$ ƒ|$ t\RèÅÇZPRè½ÇZP¸2pAPhÿt$ èAD$(PèÝÇRè—ÇZPRèÇZP¸2pAPhÿt$ èé@D$Pè¯Ç‹T$1Éè:…î‹\$‰Ø¹™÷ù‰Ó!Ûu+ÿt$è¡BP‹\$‹-˜€AkÛ ÝX‰E‹\$C‰\$é­RèÇZPRèÇZPhÿt$è¡CèüȺ6pAYQèÐ9‰Áè‰9„´‹P€ARèׯZPRèoȋl€ARècÈRè½ÆZPRèµÆZP¸6pAPÿt$ èÄEXD$,PèÙÆÿt$(èՎ‹„€Aƒûuÿt$$èÜAPÿt$,è7ÿt$(è'$‹€ARè]ÆZPRèõNjT$,RèëǺfpARèàǍ€APètÆé½Rè)ÆZPRè!ÆZP¸6pAPÿt$è0ED$PèFƋT$RèüÅZPRè”Ç‹\$‹-˜€AkÛ ݍEPèÆÿt$$è3AP‹\$‹-˜€AkÛ ÝX‰E‹€ARè³ÅZPRèKNjP€ARè?Njl€ARè3NjT$Rè)ǺfpARèǍ€APè²Åëë‹\$C‰\$éLýÿÿ‹D$ë1Àÿt$èÆÿt$(èÆÿt$è Æÿt$$èÆÿt$ èûŃÄ,[]ÃS1ÀPPPPPPèWƸ qA£4€AÇ$ë¸;$|d¡4€A¾‰D$ÿ4€ARèâÄZPRèÚÄZP‹\$ kÛÿSè DD$ PèŋT$ Rè·ÄZPRèOƋT$ RèEƍD$PèÛÄÿ$q’h謁‰D$Rè‚ÄZPRèzÄZPèID$Pè©Äÿt$h¸$pAPÿt$ èk6RèKÄZPRèCÄZPÿt$èxx€APèlÄÿ5x€A舍ÿ5x€Aè[Œÿt$h¸$pAPÿ5x€Aè6RèöÃZPRèîÃZPÿt$è#,€APèÄÿ5,€Aè3ÿ5,€AèŒÿt$h¸$pAPÿ5,€AèÁ5ÿ5,€Aèw8Rè–ÃZPRèŽÃZPÿt$èÀ@€APè·Ãÿ5@€Aèӌÿt$ ÿ5@€Aè>8ÿt$h¸$pAPÿ5,€Aè]5Rè=ÃZPRè5ÃZPÿt$èj€p€APè^Ãÿt$è€ë1Àÿt$èØÃÿt$èÏÃÿt$ èÆÃƒÄ[ÃUS1ÀPPPPPPè"ÄRèÜÂZPhhRèÊÂZPRèÂÂZPèÓzè¸5$èÎ4èÉ5‰$h !@Pÿt$è·4ÿ4$èµ4ÿ5°€AèAˆ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELb@]à 2 V0@ |qȐœpt,.codeð78 `.textÂÒPÔ< `.rdata304@@.data,pD@À.rsrcœV@@h¬hh€Aè\@ƒÄ hèU@£€AhhhèB@£€Aè¼?¸ˆpA£4€AèÝÍèIËèCšèǒèZèÔŠèø…èx}è@Cèöèk¡º.pA €AèÓ?hõÿÿÿèã?£<€A¸P¸€AP1ÀPhhèÿ5 €Aè “hhxpA €APhè_’ÿ5¨€Aèæ’hhppA¨€APhè9’h˜€Ah€pAhh¡†h èÊº:pA l€Aè+?ÿ5°€A蒒hhppA°€APhè呍;@PèÁ‡Rè ÍZPèÅhH€Aè:Íè ‹X€AƒûuèfèS,hèè±Ìÿ5€AèÎ>èÏ>èµA臇èç”轘èìÀèS‰ÃUSWºƒìÇ$Juó‹T$X $èa>ÿ4$èùD‰D$ÿt$èL‰‰D$T$ Rhhhhè”ɍT$RhhhhèvÉÇD$ÇD$ ÇD$$ÇD$(ÇD$,ÇD$0ÇD$ ÇD$ ÿt$ X‰D$4ÿt$X‰D$8ÇD$ë¸ÿ;D$|Tÿt$‹l$8X‰E‹\$4ƒÃ‰\$4‹l$8¾]!Ûu ÿt$X‰D$8‹l$8¾EP‹\$ ‹l$ÁãX‰D‹\$8C‰\$8ÿD$q¡ÇD$ ÇD$ë¸ÿ;D$|m‹\$ ‹|$‹l$ Áç\=‹|$‹l$Áç\=ãÿ‰\$ ‹\$‹l$ ÁãÿtX‰D$,‹\$ Áãÿt‹\$ ÁãX‰Dÿt$,‹\$$ÁãX‰DÿD$qˆÇD$ÇD$ ÿt$PX‰D$<ÇD$(ë‹\$TK;\$(ŒÃ‹\$Cãÿ‰\$‹\$ ‹|$‹l$ Áç\=ãÿ‰\$ ‹\$ÁãÿtX‰D$,‹\$ Áãÿt‹\$ ÁãX‰Dÿt$,‹\$$ÁãX‰D‹\$Áã‹\‹|$ Áç‹|=çÿûãÿ‰\$$‹\$$ÁãÿtX‰D$0‹l$<¾]3\$0S‹l$@XˆE‹\$<C‰\$<ÿD$(.ÿÿÿT$ RhhhhèǍT$RhhhhèÇÿt$譆‹D$Pë1Àÿ4$èmÊPÿt$è0Èÿt$è'ÈXƒÄ@_[] USº ƒìÇ$Juóè§Ê‹”€Aƒû…2‹|€Aƒûu‹h€Aƒût¸ë1À!À„¸&pAPÿ5€AèB‰$ÇD$ë‹$;D$Œ’RèÉZPRèøÈZP¸fpAPÿt$ÿ5€AèQBD$ PèÉÿt$èé!ÀtLRèÄÈZPÿt$ è3D$PèïȋT$Rè¥ÈZPRè=ʋT$Rè3ʺfpARè(ʍD$Pè¾ÈÿD$aÿÿÿÿt$èë@‰D$hD$Pÿt$è4…Pÿt$ ÿ5<€AèX:ÿt$è;…º$pA €Aè:éÎÇ”€AÇD$RèÈZPRèÈZP¸.pAPÿt$(ÿ5$€Aè_AD$Pè%ȸ2pAPÿt$èC‰D$ ƒ|$ t\RèÅÇZPRè½ÇZP¸2pAPhÿt$ èAD$(PèÝÇRè—ÇZPRèÇZP¸2pAPhÿt$ èé@D$Pè¯Ç‹T$1Éè:…î‹\$‰Ø¹™÷ù‰Ó!Ûu+ÿt$è¡BP‹\$‹-˜€AkÛ ÝX‰E‹\$C‰\$é­RèÇZPRèÇZPhÿt$è¡CèüȺ6pAYQèÐ9‰Áè‰9„´‹P€ARèׯZPRèoȋl€ARècÈRè½ÆZPRèµÆZP¸6pAPÿt$ èÄEXD$,PèÙÆÿt$(èՎ‹„€Aƒûuÿt$$èÜAPÿt$,è7ÿt$(è'$‹€ARè]ÆZPRèõNjT$,RèëǺfpARèàǍ€APètÆé½Rè)ÆZPRè!ÆZP¸6pAPÿt$è0ED$PèFƋT$RèüÅZPRè”Ç‹\$‹-˜€AkÛ ݍEPèÆÿt$$è3AP‹\$‹-˜€AkÛ ÝX‰E‹€ARè³ÅZPRèKNjP€ARè?Njl€ARè3NjT$Rè)ǺfpARèǍ€APè²Åëë‹\$C‰\$éLýÿÿ‹D$ë1Àÿt$èÆÿt$(èÆÿt$è Æÿt$$èÆÿt$ èûŃÄ,[]ÃS1ÀPPPPPPèWƸ qA£4€AÇ$ë¸;$|d¡4€A¾‰D$ÿ4€ARèâÄZPRèÚÄZP‹\$ kÛÿSè DD$ PèŋT$ Rè·ÄZPRèOƋT$ RèEƍD$PèÛÄÿ$q’h謁‰D$Rè‚ÄZPRèzÄZPèID$Pè©Äÿt$h¸$pAPÿt$ èk6RèKÄZPRèCÄZPÿt$èxx€APèlÄÿ5x€A舍ÿ5x€Aè[Œÿt$h¸$pAPÿ5x€Aè6RèöÃZPRèîÃZPÿt$è#,€APèÄÿ5,€Aè3ÿ5,€AèŒÿt$h¸$pAPÿ5,€AèÁ5ÿ5,€Aèw8Rè–ÃZPRèŽÃZPÿt$èÀ@€APè·Ãÿ5@€Aèӌÿt$ ÿ5@€Aè>8ÿt$h¸$pAPÿ5,€Aè]5Rè=ÃZPRè5ÃZPÿt$èj€p€APè^Ãÿt$è€ë1Àÿt$èØÃÿt$èÏÃÿt$ èÆÃƒÄ[ÃUS1ÀPPPPPPè"ÄRèÜÂZPhhRèÊÂZPRèÂÂZPèÓzè¸5$èÎ4èÉ5‰$h !@Pÿt$è·4ÿ4$èµ4ÿ5°€AèAˆ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELb@]à 2 V0@ |qȐœpt,.codeð78 `.textÂÒPÔ< `.rdata304@@.data,pD@À.rsrcœV@@h¬hh€Aè\@ƒÄ hèU@£€AhhhèB@£€Aè¼?¸ˆpA£4€AèÝÍèIËèCšèǒèZèÔŠèø…èx}è@Cèöèk¡º.pA €AèÓ?hõÿÿÿèã?£<€A¸P¸€AP1ÀPhhèÿ5 €Aè “hhxpA €APhè_’ÿ5¨€Aèæ’hhppA¨€APhè9’h˜€Ah€pAhh¡†h èÊº:pA l€Aè+?ÿ5°€A蒒hhppA°€APhè呍;@PèÁ‡Rè ÍZPèÅhH€Aè:Íè ‹X€AƒûuèfèS,hèè±Ìÿ5€AèÎ>èÏ>èµA臇èç”轘èìÀèS‰ÃUSWºƒìÇ$Juó‹T$X $èa>ÿ4$èùD‰D$ÿt$èL‰‰D$T$ Rhhhhè”ɍT$RhhhhèvÉÇD$ÇD$ ÇD$$ÇD$(ÇD$,ÇD$0ÇD$ ÇD$ ÿt$ X‰D$4ÿt$X‰D$8ÇD$ë¸ÿ;D$|Tÿt$‹l$8X‰E‹\$4ƒÃ‰\$4‹l$8¾]!Ûu ÿt$X‰D$8‹l$8¾EP‹\$ ‹l$ÁãX‰D‹\$8C‰\$8ÿD$q¡ÇD$ ÇD$ë¸ÿ;D$|m‹\$ ‹|$‹l$ Áç\=‹|$‹l$Áç\=ãÿ‰\$ ‹\$‹l$ ÁãÿtX‰D$,‹\$ Áãÿt‹\$ ÁãX‰Dÿt$,‹\$$ÁãX‰DÿD$qˆÇD$ÇD$ ÿt$PX‰D$<ÇD$(ë‹\$TK;\$(ŒÃ‹\$Cãÿ‰\$‹\$ ‹|$‹l$ Áç\=ãÿ‰\$ ‹\$ÁãÿtX‰D$,‹\$ Áãÿt‹\$ ÁãX‰Dÿt$,‹\$$ÁãX‰D‹\$Áã‹\‹|$ Áç‹|=çÿûãÿ‰\$$‹\$$ÁãÿtX‰D$0‹l$<¾]3\$0S‹l$@XˆE‹\$<C‰\$<ÿD$(.ÿÿÿT$ RhhhhèǍT$RhhhhèÇÿt$譆‹D$Pë1Àÿ4$èmÊPÿt$è0Èÿt$è'ÈXƒÄ@_[] USº ƒìÇ$Juóè§Ê‹”€Aƒû…2‹|€Aƒûu‹h€Aƒût¸ë1À!À„¸&pAPÿ5€AèB‰$ÇD$ë‹$;D$Œ’RèÉZPRèøÈZP¸fpAPÿt$ÿ5€AèQBD$ PèÉÿt$èé!ÀtLRèÄÈZPÿt$ è3D$PèïȋT$Rè¥ÈZPRè=ʋT$Rè3ʺfpARè(ʍD$Pè¾ÈÿD$aÿÿÿÿt$èë@‰D$hD$Pÿt$è4…Pÿt$ ÿ5<€AèX:ÿt$è;…º$pA €Aè:éÎÇ”€AÇD$RèÈZPRèÈZP¸.pAPÿt$(ÿ5$€Aè_AD$Pè%ȸ2pAPÿt$èC‰D$ ƒ|$ t\RèÅÇZPRè½ÇZP¸2pAPhÿt$ èAD$(PèÝÇRè—ÇZPRèÇZP¸2pAPhÿt$ èé@D$Pè¯Ç‹T$1Éè:…î‹\$‰Ø¹™÷ù‰Ó!Ûu+ÿt$è¡BP‹\$‹-˜€AkÛ ÝX‰E‹\$C‰\$é­RèÇZPRèÇZPhÿt$è¡CèüȺ6pAYQèÐ9‰Áè‰9„´‹P€ARèׯZPRèoȋl€ARècÈRè½ÆZPRèµÆZP¸6pAPÿt$ èÄEXD$,PèÙÆÿt$(èՎ‹„€Aƒûuÿt$$èÜAPÿt$,è7ÿt$(è'$‹€ARè]ÆZPRèõNjT$,RèëǺfpARèàǍ€APètÆé½Rè)ÆZPRè!ÆZP¸6pAPÿt$è0ED$PèFƋT$RèüÅZPRè”Ç‹\$‹-˜€AkÛ ݍEPèÆÿt$$è3AP‹\$‹-˜€AkÛ ÝX‰E‹€ARè³ÅZPRèKNjP€ARè?Njl€ARè3NjT$Rè)ǺfpARèǍ€APè²Åëë‹\$C‰\$éLýÿÿ‹D$ë1Àÿt$èÆÿt$(èÆÿt$è Æÿt$$èÆÿt$ èûŃÄ,[]ÃS1ÀPPPPPPèWƸ qA£4€AÇ$ë¸;$|d¡4€A¾‰D$ÿ4€ARèâÄZPRèÚÄZP‹\$ kÛÿSè DD$ PèŋT$ Rè·ÄZPRèOƋT$ RèEƍD$PèÛÄÿ$q’h謁‰D$Rè‚ÄZPRèzÄZPèID$Pè©Äÿt$h¸$pAPÿt$ èk6RèKÄZPRèCÄZPÿt$èxx€APèlÄÿ5x€A舍ÿ5x€Aè[Œÿt$h¸$pAPÿ5x€Aè6RèöÃZPRèîÃZPÿt$è#,€APèÄÿ5,€Aè3ÿ5,€AèŒÿt$h¸$pAPÿ5,€AèÁ5ÿ5,€Aèw8Rè–ÃZPRèŽÃZPÿt$èÀ@€APè·Ãÿ5@€Aèӌÿt$ ÿ5@€Aè>8ÿt$h¸$pAPÿ5,€Aè]5Rè=ÃZPRè5ÃZPÿt$èj€p€APè^Ãÿt$è€ë1Àÿt$èØÃÿt$èÏÃÿt$ èÆÃƒÄ[ÃUS1ÀPPPPPPè"ÄRèÜÂZPhhRèÊÂZPRèÂÂZPèÓzè¸5$èÎ4èÉ5‰$h !@Pÿt$è·4ÿ4$èµ4ÿ5°€AèAˆ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $„_´Vå1çVå1çVå1ç9“šçOå1ç9“¯çwå1ç9“›ç+å1ç_¢ç]å1çVå0ç*å1ç9“žçWå1ç9“«çWå1ç9“¬çWå1çRichVå1çPEL·×jeà  ¤^@, ÞÀ@0Þ‹€  ¼.0/¼àBÔ|°B@à@?ÀF@àBN@àBN@àÀ B N@à.rsrc€àB~X@@x`C(Ö@à.data@"ð»2"þ@àW¦<Iië ß4=@Ú{Óy*÷F~}¦´09;v BÙe‚ö§É~±­Ó3–‹Eì}¡~ù¾ÞŒ,yÌÙÖM A)ƒå@;“¦ŠµÓoüÙ!³–3¥³ K`žÜ26È Ò× ½AŒÀ$țå½j¹f§%ÓÈ~Ž.šL3ë9›_°B`pú'i)d¥s㌅¥“ލWÝgŽówº'%!uE޹ɠ_ªiŠ»KÿS•7úÆË0ë9ÏX}œnü£à!¨ÎÖe‰w@@‘¨UAaÓ£ë úº³òN…È\s@sÜ.ö(Å_›TQ̇¾|Qº«µ}ÞͼT0Iu…·Ïþôgú´‹¦lˆ•Á’—ýޜ³³X>ÑÄm††X­1×ð71­ B§Á·Å®ÂrŽÍÔ¢¶„~ ŠÍÝ6­ÞïÚC—\x ø€¨"ërº³(Ԁp¤@ۊ‘!¦×%B¶ëÌÒÚy Œ`pOW‘?|Êá}è6¾0·‘~@óŸî¾˜SýI½'œ»/Ó¡Ù0gšÌG«dô¹ß#¾†×¹‰>!öwéÌb‹UÛ¨ew¶(vᕬ;Zä¯CCBø Èàn›cû‘ËJœNSšª|ƒâábUFĉsQv¦¡fy9  ƒÝ:üs‡í éçx,妭^½  Å¥ŒâåPP,Ø  Ç6hg–Ýü÷®KE ÙJgñO+ì¦.yޱDÔ_ØÀY „Ô¤'ÕtŠ3¬Axf£>ÎÉìäŒP{²¹œÔÅ[Z'DuÃÿÇ€f¾×7©Çq:1¤à‘¿O(Æ×?”*&AÓТðõNߙఠÊ.¥û½<©2{«ý¯÷¢/~íÞV™ìƒ¸¶²ð—C§(Uõ)o±jTÅxÒí#LçôG`óm–_ú´ç¹#àš¸’·ñ……€ ”™mO‡&Ÿ\€VÙ7ë0<ª±²cŒ“-eE9´ÂšËY; ÓÄ ÅºD×_ëØqÔ0;`Eµ1ÒóhќO ŒØéðÄ8nA0F$9C’ÇûðþÛȲR„Y»+Š÷àÉ^ û¾uØúÓPŠ}í¹ãöÊ]ŸE“¤gU=}ú¬ÌØu"üd—ùÄV8aCŒÀ6_¤†Oîþz¥šs¹hjT=1±òä¾ýGe{_¨,£–›1ûïMG“·î”ï1¶RSÒ»n;ôÂ=ÊjXVÄÁn·¨~מ$ÎO¯å_G†ýR\ì; Ýü%)Õu8Rc×ML¦­_£·é라Mûƨì¿}­:ÇÐyŠ3‰o´­‘»{û¸|höç[õÖÆ*Zq[ºl9́ëjt}ëO°W[Ïç\ó‹:a«©vçç¼q H²¬4úóà¿ä¶Í´¯¡™ ª¿ µ ‘µp5Š”;=`jSh])¸ôe*ðʧqXW–m@¨ЏÆŠz<¿Ð.c'Žq_þºfñ(Ò2k÷‰hWäÞcÛÞ¡ö˜c¶½û?öö^¸o9 ÄpÝ »·UŸJ“ƒHo™hÌ(l})¹]éú»dÇÐyG‰V9Ï÷;·›wª\ë땋û+uFSÓG¨^V#…ÂNèÇ8ð!4>Œ°eËút&l['ñZž ãÀ'ÍyzL£Ä'lL»Mv²Hñìf#æÁJì㠺ҘZú¹Õöˆñ¸wñé0EW\+.üL–)öÁeËØvœV¥uö׿i¼<¾3êWÈ{Å_z2Ç Ç²v—âO¢ãþ¿ç€ÊÅW' ÉÿļÖQÝ'¿7‘‹õ³æ: ¡ò¡}µ-"–9À`á¹SjS‚vâjçÎ $Z8\_½“Ï%¶:A—ˆdQj&ŽÖjý «©Üz﹩ºC»ÃgÚ"!DUª‘·4²í_ö6ì&èúM©l˗ƒQ4 3˜ ¦Zlš#‡o͏*»“®9ÆqgÔÓ}@VÖ!†æßí&Ãêäÿ‡ÏÜÍ Ə¶D$tÀ3ÖÁl¹“¹õÌã€Öõ9'œl+ÙÔl=¸aR£[+ÈÃé:5^®Š ·´ÝBK|±”µ*tp/[0«T»à|ξWÔ·+–öôÃá։ÈvñEm9oÙgÿ-ÏX V›0ె+®„”Š_‚"}*Œø'IäĪæƒÞ<?6Úwñ’TNz­ƒ5­(µõÅÑ. |Ӈ2R:ë¡Î¯ Ê¸N%Ý»®4í”ö€×Ðýôú×úø_1wê8WtÅ 村:fãxw‘¼“oY5–î‚í€{µ ³’ö•K|Ñ)s¶¯Iöðdx?=‰Ÿ".Mï')a€É¾GçØÑ4° §þ×wÛ¾ÒøþJ®PE䦛jgErÌÄþíR(¹Ti@$ï”hÿ¼Q=ÉLƒž¸ôI£±…Øîj, ?m|ðôºÎ4|EÏÏTôÕ2¸oþˍb:±1W`?×푛99^¥¬õK½Y_©ÇÃÙä,8?lgÕ^–.j­ëpXêFo°ÈHKôý€PRùï2ð=X¾ÔUäDBÌ)´ö%M`À<=´ÛÃÌÑdSوÄýn©éÃ„Ò m[¸ÍfÚAÅ­!­äoGeÎÁOó™3$®­”X wÖÓ\5]Ou$7u `›ë;ƒ,tÞñ§ÌÕE;£ (fžxöÚ[d€”¾âùÔ~eWd ª-’/½>:-‰^Už–íÊ&ìå ËG¾ø=òzž>ÃH  y}<RE:e×ò±)Jÿ:÷Ѽ™C㸏jpÌ× ry ¯š@šNZKÞ°žUÀJ˰•_;N Vª}†{s¿%4Ž¡ÍøàóR¯ÜD2fÀœUH«ÎÔöëŒÍR»‘ú<¼íekÓn;ÉЧ”¥Të˜Çßx5JOIWˆ!ÐÕúM<3ªfÌ JÞî+OƒÌhkð½¤VÎäªúbèGßŸš tæc=²ÐÈÝù˜½IƒÅÇ!Ԛ ›°äš»úú«ô•yfX7—näg»KÈu{zLƈr™y°!Ã}>Nø‚s£-žÌý¯%°. ç"Z¢HÚåë¿$µÜyîï¾Ó>!¯Ü_–êïÅÈlvâ²Ö}ËóH®ã¸¬¿e“k‡óêÞ/ªzF‰=ÖcƒÖՀz@‚”¡ZöS«2o‹ÅÔ£·ùS¸®\¤üÆ » ×Ҋ°h+W,nÒÁèpLىÈòϝ•§Ã(×î{>á¯a YºªGøƒù2xíߛ6)Mðgq];ϱªn¾Ñ¨¥qAŸÉ@P 1iؙÿ·ꚼ&[üùLQɘÙüú&@tTÄ(=> ˆÚÉ.˜èèK¤ËƒžÔVO~ Bþ–b?(Ée=Øñ2X§û‚-ƒ| 9ücÁ÷->±|ÏN-±èÿJõÍ! ƒÃõ¾o0´¶=™:gù{í.w­L’&øêB‡Ã$§èûsºc¹öZÿ=¹p%itÿ°õ?¹}f#ÿgúiì 5ä¢üçpâÛpE˜^^'àw¦î­à!¼`kqÿ2ØÕ!èðOùS—½G~²>Ãò:ˆ ` ¹S ÐÞé¹VB´ˆ-ÖxÙYS =·Ôä± t“Þ8¼ƒZ@¬á6J}©Î¸xð½ƒpTîWÙ*Alï“#åßÃõ—÷¸RÃ_JµŒˆ(ÜÔ¢«·1À£þMOV¸¤½<Q«ú|Y5‰µ9PG8àT9Æ;g›JV¶›Ñ8TfõwÞï]šmӄ¥Æ´c?Vœ¬8»ýbRª^¢I*¸¼EhbÐ+µâ¬ã|f`¹-ʓ·?²Ûý›±“r`L^¿wI/å§òJÓ®ŒƒÅà€ï‚Œd[¶?®ÿ&5«FÁ<¦ÖÝÏe ` Tú’€x¯pÏÂÿºl$¨SmJ«ìˆè|SÒ‚K 8n¿KËİj®¹l'Ö ü .¼¥®¿|†'˜4;ß,ðŸÚìÐK²|—_Œpq
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $„_´Vå1çVå1çVå1ç9“šçOå1ç9“¯çwå1ç9“›ç+å1ç_¢ç]å1çVå0ç*å1ç9“žçWå1ç9“«çWå1ç9“¬çWå1çRichVå1çPEL·×jeà  ¤^@, ÞÀ@0Þ‹€  ¼.0/¼àBÔ|°B@à@?ÀF@àBN@àBN@àÀ B N@à.rsrc€àB~X@@x`C(Ö@à.data@"ð»2"þ@àW¦<Iië ß4=@Ú{Óy*÷F~}¦´09;v BÙe‚ö§É~±­Ó3–‹Eì}¡~ù¾ÞŒ,yÌÙÖM A)ƒå@;“¦ŠµÓoüÙ!³–3¥³ K`žÜ26È Ò× ½AŒÀ$țå½j¹f§%ÓÈ~Ž.šL3ë9›_°B`pú'i)d¥s㌅¥“ލWÝgŽówº'%!uE޹ɠ_ªiŠ»KÿS•7úÆË0ë9ÏX}œnü£à!¨ÎÖe‰w@@‘¨UAaÓ£ë úº³òN…È\s@sÜ.ö(Å_›TQ̇¾|Qº«µ}ÞͼT0Iu…·Ïþôgú´‹¦lˆ•Á’—ýޜ³³X>ÑÄm††X­1×ð71­ B§Á·Å®ÂrŽÍÔ¢¶„~ ŠÍÝ6­ÞïÚC—\x ø€¨"ërº³(Ԁp¤@ۊ‘!¦×%B¶ëÌÒÚy Œ`pOW‘?|Êá}è6¾0·‘~@óŸî¾˜SýI½'œ»/Ó¡Ù0gšÌG«dô¹ß#¾†×¹‰>!öwéÌb‹UÛ¨ew¶(vᕬ;Zä¯CCBø Èàn›cû‘ËJœNSšª|ƒâábUFĉsQv¦¡fy9  ƒÝ:üs‡í éçx,妭^½  Å¥ŒâåPP,Ø  Ç6hg–Ýü÷®KE ÙJgñO+ì¦.yޱDÔ_ØÀY „Ô¤'ÕtŠ3¬Axf£>ÎÉìäŒP{²¹œÔÅ[Z'DuÃÿÇ€f¾×7©Çq:1¤à‘¿O(Æ×?”*&AÓТðõNߙఠÊ.¥û½<©2{«ý¯÷¢/~íÞV™ìƒ¸¶²ð—C§(Uõ)o±jTÅxÒí#LçôG`óm–_ú´ç¹#àš¸’·ñ……€ ”™mO‡&Ÿ\€VÙ7ë0<ª±²cŒ“-eE9´ÂšËY; ÓÄ ÅºD×_ëØqÔ0;`Eµ1ÒóhќO ŒØéðÄ8nA0F$9C’ÇûðþÛȲR„Y»+Š÷àÉ^ û¾uØúÓPŠ}í¹ãöÊ]ŸE“¤gU=}ú¬ÌØu"üd—ùÄV8aCŒÀ6_¤†Oîþz¥šs¹hjT=1±òä¾ýGe{_¨,£–›1ûïMG“·î”ï1¶RSÒ»n;ôÂ=ÊjXVÄÁn·¨~מ$ÎO¯å_G†ýR\ì; Ýü%)Õu8Rc×ML¦­_£·é라Mûƨì¿}­:ÇÐyŠ3‰o´­‘»{û¸|höç[õÖÆ*Zq[ºl9́ëjt}ëO°W[Ïç\ó‹:a«©vçç¼q H²¬4úóà¿ä¶Í´¯¡™ ª¿ µ ‘µp5Š”;=`jSh])¸ôe*ðʧqXW–m@¨ЏÆŠz<¿Ð.c'Žq_þºfñ(Ò2k÷‰hWäÞcÛÞ¡ö˜c¶½û?öö^¸o9 ÄpÝ »·UŸJ“ƒHo™hÌ(l})¹]éú»dÇÐyG‰V9Ï÷;·›wª\ë땋û+uFSÓG¨^V#…ÂNèÇ8ð!4>Œ°eËút&l['ñZž ãÀ'ÍyzL£Ä'lL»Mv²Hñìf#æÁJì㠺ҘZú¹Õöˆñ¸wñé0EW\+.üL–)öÁeËØvœV¥uö׿i¼<¾3êWÈ{Å_z2Ç Ç²v—âO¢ãþ¿ç€ÊÅW' ÉÿļÖQÝ'¿7‘‹õ³æ: ¡ò¡}µ-"–9À`á¹SjS‚vâjçÎ $Z8\_½“Ï%¶:A—ˆdQj&ŽÖjý «©Üz﹩ºC»ÃgÚ"!DUª‘·4²í_ö6ì&èúM©l˗ƒQ4 3˜ ¦Zlš#‡o͏*»“®9ÆqgÔÓ}@VÖ!†æßí&Ãêäÿ‡ÏÜÍ Ə¶D$tÀ3ÖÁl¹“¹õÌã€Öõ9'œl+ÙÔl=¸aR£[+ÈÃé:5^®Š ·´ÝBK|±”µ*tp/[0«T»à|ξWÔ·+–öôÃá։ÈvñEm9oÙgÿ-ÏX V›0ె+®„”Š_‚"}*Œø'IäĪæƒÞ<?6Úwñ’TNz­ƒ5­(µõÅÑ. |Ӈ2R:ë¡Î¯ Ê¸N%Ý»®4í”ö€×Ðýôú×úø_1wê8WtÅ 村:fãxw‘¼“oY5–î‚í€{µ ³’ö•K|Ñ)s¶¯Iöðdx?=‰Ÿ".Mï')a€É¾GçØÑ4° §þ×wÛ¾ÒøþJ®PE䦛jgErÌÄþíR(¹Ti@$ï”hÿ¼Q=ÉLƒž¸ôI£±…Øîj, ?m|ðôºÎ4|EÏÏTôÕ2¸oþˍb:±1W`?×푛99^¥¬õK½Y_©ÇÃÙä,8?lgÕ^–.j­ëpXêFo°ÈHKôý€PRùï2ð=X¾ÔUäDBÌ)´ö%M`À<=´ÛÃÌÑdSوÄýn©éÃ„Ò m[¸ÍfÚAÅ­!­äoGeÎÁOó™3$®­”X wÖÓ\5]Ou$7u `›ë;ƒ,tÞñ§ÌÕE;£ (fžxöÚ[d€”¾âùÔ~eWd ª-’/½>:-‰^Už–íÊ&ìå ËG¾ø=òzž>ÃH  y}<RE:e×ò±)Jÿ:÷Ѽ™C㸏jpÌ× ry ¯š@šNZKÞ°žUÀJ˰•_;N Vª}†{s¿%4Ž¡ÍøàóR¯ÜD2fÀœUH«ÎÔöëŒÍR»‘ú<¼íekÓn;ÉЧ”¥Të˜Çßx5JOIWˆ!ÐÕúM<3ªfÌ JÞî+OƒÌhkð½¤VÎäªúbèGßŸš tæc=²ÐÈÝù˜½IƒÅÇ!Ԛ ›°äš»úú«ô•yfX7—näg»KÈu{zLƈr™y°!Ã}>Nø‚s£-žÌý¯%°. ç"Z¢HÚåë¿$µÜyîï¾Ó>!¯Ü_–êïÅÈlvâ²Ö}ËóH®ã¸¬¿e“k‡óêÞ/ªzF‰=ÖcƒÖՀz@‚”¡ZöS«2o‹ÅÔ£·ùS¸®\¤üÆ » ×Ҋ°h+W,nÒÁèpLىÈòϝ•§Ã(×î{>á¯a YºªGøƒù2xíߛ6)Mðgq];ϱªn¾Ñ¨¥qAŸÉ@P 1iؙÿ·ꚼ&[üùLQɘÙüú&@tTÄ(=> ˆÚÉ.˜èèK¤ËƒžÔVO~ Bþ–b?(Ée=Øñ2X§û‚-ƒ| 9ücÁ÷->±|ÏN-±èÿJõÍ! ƒÃõ¾o0´¶=™:gù{í.w­L’&øêB‡Ã$§èûsºc¹öZÿ=¹p%itÿ°õ?¹}f#ÿgúiì 5ä¢üçpâÛpE˜^^'àw¦î­à!¼`kqÿ2ØÕ!èðOùS—½G~²>Ãò:ˆ ` ¹S ÐÞé¹VB´ˆ-ÖxÙYS =·Ôä± t“Þ8¼ƒZ@¬á6J}©Î¸xð½ƒpTîWÙ*Alï“#åßÃõ—÷¸RÃ_JµŒˆ(ÜÔ¢«·1À£þMOV¸¤½<Q«ú|Y5‰µ9PG8àT9Æ;g›JV¶›Ñ8TfõwÞï]šmӄ¥Æ´c?Vœ¬8»ýbRª^¢I*¸¼EhbÐ+µâ¬ã|f`¹-ʓ·?²Ûý›±“r`L^¿wI/å§òJÓ®ŒƒÅà€ï‚Œd[¶?®ÿ&5«FÁ<¦ÖÝÏe ` Tú’€x¯pÏÂÿºl$¨SmJ«ìˆè|SÒ‚K 8n¿KËİj®¹l'Ö ü .¼¥®¿|†'˜4;ß,ðŸÚìÐK²|—_Œpq
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ÌPJˆr>ˆr>ˆr>Ó=†r>Ó;(r>]:šr>]=žr>];ýr>Ó:œr>Ó?›r>ˆr?^r>7‰r>Á‰r><‰r>Richˆr>PEL¾@¢fà æÊ`J@J“@€W kàPMJMJ €Þ@à.rsrcàî@À.idata  ð@À *°ò@àiicmdrrk€Ð0€ô@àaehhwvonPJt@à.taggant0`J"x@à
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $J^òŽ?œÝ?œÝ?œÝÝMŸÜ?œÝÝM™Ü£?œÝÝM˜Ü?œÝÝMÜ ?œÝ?Ý‹?œÝ̾˜Ü?œÝ̾™ÜS?œÝ̾ŸÜ?œÝý½™Ü?œÝý½žÜ?œÝRich?œÝPEL±§fà '‚Ð~¼ @@ÌO(`@#ø @!8 @ t.textŸvx `.Bqqå | `.rdatar¸ º†@@.datatñ`â@@À.reloc@#`$"@B¹Ø@Hè;^hÿ…B蚦YÃj¸©B臧¸¬%HÇEðP%H‰EìƒeüǬ%HH¢BÇEühœBCPh\%HèÛhƒMüÿh †BèJ¦ƒÄè§Ãj¸èBè0§¸D%HÇEðè$H‰EìƒeüÇD%Hô§BÇEühDFCPhô$Hè„hƒMüÿh †Bèó¥ƒÄèæÃh†Bèà¥YÃh†BèÔ¥YÃh¨CHèÊhÇ$#†Bè¼¥YÃj¹tCHè|h/†B褥Yù¤CHè/]hE†B莥YÃh;†B肥YÃjjh0DH¹àCHè{{hO†Bèc¥YÃVWjèãY¿0DH‹ð‹Ïè¿{jV‹ÏÇ0DHP´Bèf€hY†Bè+¥Y_^ùÙCHé|¹ØCHèª\hc†Bè ¥Yù™DHé͎¹˜DHèŠ\hm†Bèé¤YÃjjhðDH¹ DH蔍hw†BèʤYÃVWjèJY¿ðDH‹ð‹ÏèØ‹ÏÇðDH(µBÆ8EHÆ.EHè?€¡HEH‹ LEHƒ%(EHh†B‰5<EH£0EH‰ 4EHèd¤Y_^ùŒEHèí[h•†BèL¤YÃh‹†Bè@¤YÃVÿt$ ‹ñ3Àÿt$ @‰F‰FFPÇd¦Bè ƒÄ ‹Æ^ÂVÿt$‹ñÇL§Bè!YPNèÄ^Vÿt$ ‹ñ3Àÿt$ @N ‰F‰FÇH¦Bè‹Æ^ÂVÿt$‹ñƒf$NLj¦Bè}‰v$‹Æ^ƒì$SU‹l$43ÀVW‹ñ‰D$ƒì ‹Ì‰U‰F誋} j[…ÿtðÿG‹Çë‹ÃP‹Îè²/…ÿt‹Ïè{?€}t‹EL$(‰D$$E Pè3ۍD$$Cë3À‰D$‰D$‰D$ ‹D$4‰D$D$‹PèƒBöÃt‹L$ƒãý…Ét‹D$ +ÁƒàüPQè‘YYöÃt L$(èîDD$8‹ÎPè._‹Æ^][ƒÄ$ÂVj‹ñè‹D$–€Çø¦Bƒb$ÇL§B‹‰B‹Æ‰R$^ÂU‹ìQQVWÿu‹ñè½ÿÿÿƒì0Ç0§B¾¨‹Ìƒ'ƒg胍EøVPè ƒÄ8;øtP‹ÏèÚ"‹Mü…Étè=/_ÆFv‹Æ^ÉÂj ¸²~B蛣‹]3ÿ‹Ç‰Eèÿu è7Y‹È‰Mä‹‹@‹t ‹D$;Ç|;÷v;Ç| ;ñv+ñÇëWÀfE܋Eà‹u܉EìSMÔè"€}Øu j^‹Öé‰}ü‹ ‹A‹D%Àƒø@t<‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8è¶WƒøÿtsƒÆÿ‰u܋EìƒÐÿ‰Eì‰Eàëɋ ‹A‹L8‹Wÿuäÿu ÿP$;EäuE;×uA‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8è^WƒøÿtƒÆÿ‰u܋EìƒÐÿ‰Eì‰EàëÉj^‹×ëj^‹Ö‰Uè‹‹@‰| ‰|$ƒMüÿë;‹M‹‹PыB j^ Æj3É9J8Eñ ðV‹ÊèF¸Ö@ÃMüÿ3ÿj^‹]‹Uè‹‹HËW3À9y8Eð q òVèæEMÔè¯ ‹Ãèw¡ÃÌÌÌÌ̋ÃU‹ìƒì‹E ‹‹@‰Eü‹E‰Mø‹‹@‰EôEøPEð‰MðPèYYÉËL$‹T$‹A;B |‹;s°Ã2ÀËD$S3ÛSh@Bÿpÿ0è`£‹È‹D$9P|9s³ŠÃ[ËD$S3ÛSh@Bÿpÿ0è2£‹È‹D$ ;P|;s³ŠÃ[ËD$=rPèYÅÀtPèMYÃ3ÀËD$H#;Ȇ¥@Qè3Y‹È…Ét A#ƒàà‰HüÃéMêS‹ÙVW‹|$‹C‹3+ÆÁø;øvWèï*‹3VWÿt$èíƒÄ ë<U‹k+îÁýV;ýv ‹t$UVèύ®+ý‹sVWP迃Äë Wÿt$è°ƒÄ ]¾_^‰C[Âj,蟜Y‰‰@‰@fÇ@ ÃS‹\$ U‹é¹ÿÿÿ;ÙwZjX;ØwSÿt$‰]U‰Eè¼DƒÄ Æ+ë4VWQPSè'‹ðNQèÞþÿÿSÿt$(‹ø‰]W‰}‰uèˆDƒÄÆ_^][Âè«BÌS‹\$ U‹é¹þÿÿ;ÙwdjX;ØwSÿt$‰]U‰EèdDƒÄ 3Àf‰D]ë;VWQPSèÕ&‹ðƒÄ NQ‹ÍèµBSÿt$‹ø‰]W‰}‰uè(DƒÄ 3Àf‰__^][Âè0BÌS‹Ù¹ÿÿÿW‹|$;ùwQjX;øwjÿt$‰{S‰C芬ƒÄ ë.VQPWè0&‹ðNQèöýÿÿO‰Qÿt$$‰{P‰sè CƒÄ^_[ÂèÈAÌS‹\$ U‹é¹þÿÿ;ÙwdjX;ØwSÿt$‰]U‰EèþTƒÄ 3Àf‰D]ë;VWQPSèò%‹ðƒÄ NQ‹ÍèÒASÿt$‹ø‰]W‰}‰uèÂTƒÄ 3Àf‰__^][ÂèMAÌV‹t$W‹ù‹N…Étè«1„Àt‹‰‹F‰G°ë2À_^Âƒì ‹Ìÿt$è&‹D$‹L$ÿ0è!Ã|$V‹ñt#ÿt$èã$‹D$Vÿ6ÿ0‹D$ÿ0èï ƒÄ‰F^ ‹T$‹B…Àtðÿ@‹‰‹B‰AÂV‹t$W‹|$+|$ Wÿt$Vè «ƒÄ 7_^ËL$‹D$ÿt$ PQèÈÿÿÿƒÄ ÃU‹ì‹E =rE PEPè$‹E YYPÿuèô™YY]ËыJ;Jt‹D$‹‰‹BH‰Jë ÿt$Q‹ÊèËÂj¸Ï~Bèk‹ñ‰uà‹]‹Ã+‰E‹F+=ÿÿÿ„’@‰EèPè†$‰EìPèìûÿÿY‹ø‰}äƒeü‹EljE‹M Š ˆ‹N‹;Ùu‹Ç‹]ëVWSRèê ƒÄ‹Ó‹N‹]CVPQRèÓ ƒÄƒMüÿÿuìÿuèW‹Îè|&‹ÃèHœÂÿuìÿuä‹Màè‰AjjèD±èi?ÌÌÌÌÌÌj¸ì~B補‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèPèä#‰EìP‹ÎèS?‹Ø‰]äƒeü<»‹M ‹ ‰‹F‹9Eu‹ÓëVSÿuQè ƒÄ‹M‹FWVRPQèë ƒÄƒMüÿÿuìÿuèS‹Îèì%‹Ç腛
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $J^òŽ?œÝ?œÝ?œÝÝMŸÜ?œÝÝM™Ü£?œÝÝM˜Ü?œÝÝMÜ ?œÝ?Ý‹?œÝ̾˜Ü?œÝ̾™ÜS?œÝ̾ŸÜ?œÝý½™Ü?œÝý½žÜ?œÝRich?œÝPELzý¨fà '‚þ~¼ @°@ÌO(€4#ø @!8 @ t.textŸvx `.Bqqå | `.rdatar¸ º†@@.datat`@@À.reloc4#€$P@B¹ØnFè;^hÿ…B蚦YÃj¸©B臧¸ÌSFÇEðpSF‰EìƒeüÇÌSFH¢BÇEühœBCPh|SFèÛhƒMüÿh †BèJ¦ƒÄè§Ãj¸èBè0§¸dSFÇEðSF‰EìƒeüÇdSFô§BÇEühDFCPhSFè„hƒMüÿh †Bèó¥ƒÄèæÃh†Bèà¥YÃh†BèÔ¥YÃh¨qFèÊhÇ$#†Bè¼¥YÃj¹tqFè|h/†B褥Yù¤qFè/]hE†B莥YÃh;†B肥YÃjjh0rF¹àqFè{{hO†Bèc¥YÃVWjèãY¿0rF‹ð‹Ïè¿{jV‹ÏÇ0rFP´Bèf€hY†Bè+¥Y_^ùÙqFé|¹ØqFèª\hc†Bè ¥Yù™rFé͎¹˜rFèŠ\hm†Bèé¤YÃjjhðrF¹ rF蔍hw†BèʤYÃVWjèJY¿ðrF‹ð‹ÏèØ‹ÏÇðrF(µBÆ8sFÆ.sFè?€¡HsF‹ LsFƒ%(sFh†B‰5<sF£0sF‰ 4sFèd¤Y_^ùŒsFèí[h•†BèL¤YÃh‹†Bè@¤YÃVÿt$ ‹ñ3Àÿt$ @‰F‰FFPÇd¦Bè ƒÄ ‹Æ^ÂVÿt$‹ñÇL§Bè!YPNèÄ^Vÿt$ ‹ñ3Àÿt$ @N ‰F‰FÇH¦Bè‹Æ^ÂVÿt$‹ñƒf$NLj¦Bè}‰v$‹Æ^ƒì$SU‹l$43ÀVW‹ñ‰D$ƒì ‹Ì‰U‰F誋} j[…ÿtðÿG‹Çë‹ÃP‹Îè²/…ÿt‹Ïè{?€}t‹EL$(‰D$$E Pè3ۍD$$Cë3À‰D$‰D$‰D$ ‹D$4‰D$D$‹PèƒBöÃt‹L$ƒãý…Ét‹D$ +ÁƒàüPQè‘YYöÃt L$(èîDD$8‹ÎPè._‹Æ^][ƒÄ$ÂVj‹ñè‹D$–€Çø¦Bƒb$ÇL§B‹‰B‹Æ‰R$^ÂU‹ìQQVWÿu‹ñè½ÿÿÿƒì0Ç0§B¾¨‹Ìƒ'ƒg胍EøVPè ƒÄ8;øtP‹ÏèÚ"‹Mü…Étè=/_ÆFv‹Æ^ÉÂj ¸²~B蛣‹]3ÿ‹Ç‰Eèÿu è7Y‹È‰Mä‹‹@‹t ‹D$;Ç|;÷v;Ç| ;ñv+ñÇëWÀfE܋Eà‹u܉EìSMÔè"€}Øu j^‹Öé‰}ü‹ ‹A‹D%Àƒø@t<‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8è¶WƒøÿtsƒÆÿ‰u܋EìƒÐÿ‰Eì‰Eàëɋ ‹A‹L8‹Wÿuäÿu ÿP$;EäuE;×uA‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8è^WƒøÿtƒÆÿ‰u܋EìƒÐÿ‰Eì‰EàëÉj^‹×ëj^‹Ö‰Uè‹‹@‰| ‰|$ƒMüÿë;‹M‹‹PыB j^ Æj3É9J8Eñ ðV‹ÊèF¸Ö@ÃMüÿ3ÿj^‹]‹Uè‹‹HËW3À9y8Eð q òVèæEMÔè¯ ‹Ãèw¡ÃÌÌÌÌ̋ÃU‹ìƒì‹E ‹‹@‰Eü‹E‰Mø‹‹@‰EôEøPEð‰MðPèYYÉËL$‹T$‹A;B |‹;s°Ã2ÀËD$S3ÛSh@Bÿpÿ0è`£‹È‹D$9P|9s³ŠÃ[ËD$S3ÛSh@Bÿpÿ0è2£‹È‹D$ ;P|;s³ŠÃ[ËD$=rPèYÅÀtPèMYÃ3ÀËD$H#;Ȇ¥@Qè3Y‹È…Ét A#ƒàà‰HüÃéMêS‹ÙVW‹|$‹C‹3+ÆÁø;øvWèï*‹3VWÿt$èíƒÄ ë<U‹k+îÁýV;ýv ‹t$UVèύ®+ý‹sVWP迃Äë Wÿt$è°ƒÄ ]¾_^‰C[Âj,蟜Y‰‰@‰@fÇ@ ÃS‹\$ U‹é¹ÿÿÿ;ÙwZjX;ØwSÿt$‰]U‰Eè¼DƒÄ Æ+ë4VWQPSè'‹ðNQèÞþÿÿSÿt$(‹ø‰]W‰}‰uèˆDƒÄÆ_^][Âè«BÌS‹\$ U‹é¹þÿÿ;ÙwdjX;ØwSÿt$‰]U‰EèdDƒÄ 3Àf‰D]ë;VWQPSèÕ&‹ðƒÄ NQ‹ÍèµBSÿt$‹ø‰]W‰}‰uè(DƒÄ 3Àf‰__^][Âè0BÌS‹Ù¹ÿÿÿW‹|$;ùwQjX;øwjÿt$‰{S‰C芬ƒÄ ë.VQPWè0&‹ðNQèöýÿÿO‰Qÿt$$‰{P‰sè CƒÄ^_[ÂèÈAÌS‹\$ U‹é¹þÿÿ;ÙwdjX;ØwSÿt$‰]U‰EèþTƒÄ 3Àf‰D]ë;VWQPSèò%‹ðƒÄ NQ‹ÍèÒASÿt$‹ø‰]W‰}‰uèÂTƒÄ 3Àf‰__^][ÂèMAÌV‹t$W‹ù‹N…Étè«1„Àt‹‰‹F‰G°ë2À_^Âƒì ‹Ìÿt$è&‹D$‹L$ÿ0è!Ã|$V‹ñt#ÿt$èã$‹D$Vÿ6ÿ0‹D$ÿ0èï ƒÄ‰F^ ‹T$‹B…Àtðÿ@‹‰‹B‰AÂV‹t$W‹|$+|$ Wÿt$Vè «ƒÄ 7_^ËL$‹D$ÿt$ PQèÈÿÿÿƒÄ ÃU‹ì‹E =rE PEPè$‹E YYPÿuèô™YY]ËыJ;Jt‹D$‹‰‹BH‰Jë ÿt$Q‹ÊèËÂj¸Ï~Bèk‹ñ‰uà‹]‹Ã+‰E‹F+=ÿÿÿ„’@‰EèPè†$‰EìPèìûÿÿY‹ø‰}äƒeü‹EljE‹M Š ˆ‹N‹;Ùu‹Ç‹]ëVWSRèê ƒÄ‹Ó‹N‹]CVPQRèÓ ƒÄƒMüÿÿuìÿuèW‹Îè|&‹ÃèHœÂÿuìÿuä‹Màè‰AjjèD±èi?ÌÌÌÌÌÌj¸ì~B補‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèPèä#‰EìP‹ÎèS?‹Ø‰]äƒeü<»‹M ‹ ‰‹F‹9Eu‹ÓëVSÿuQè ƒÄ‹M‹FWVRPQèë ƒÄƒMüÿÿuìÿuèS‹Îèì%‹Ç腛
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ègšX¬ô ¬ô ¬ô t÷  ô tñ ô tð ¹ô tõ ¯ô ¬õ .ô n‡ð ¾ô n‡ñ ÷ô n‡÷ ´ô _„ñ ­ô _„ô ­ô _„ö ­ô Rich¬ô PELº]¢fà ':,A„`@°@À ¸x (€d H߀߈Þ@`l.textG12 `.zzZ P6 `.rdataò²`´>@@.data¼T Fò@À.relocd €"8@B¹àdVè'=hÅ@Bè)pYÃj¸ü<Bèq¸ÄKVÇEðhKV‰EìƒeüÇÄKVHbBÇEühŒýBPhtKVèPGƒMüÿhÏ@BèÙoƒÄè©pÃj¸;=Bè¿p¸\KVÇEðKV‰EìƒeüÇ\KVgBÇEühøCPh KVèùFƒMüÿhÒ@Bè‚oƒÄèRpÃhß@BèooYÃhÕ@BècoYÃh¨gVè?GÇ$é@BèKoYÃj¹tgVè hõ@Bè3oYù¤gVè<h ABèoYÃhABèoYÃjjh0hV¹àgVèÖUhABèònYÃVWjèÿÃY¿0hV‹ð‹ÏèVjV‹ÏÇ0hVxsBèÀZhABèºnY_^ùÙgVé_V¹ØgVè–;h)ABè˜nYùÄhVè€;h=ABè‚nYÃh3ABèvnYÃÌÌÌÌÌÌÌVÿt$ ‹ñ3Àÿt$ @‰F‰FFPÇ eBèfƒÄ ‹Æ^ÂVÿt$‹ñLjfBèÒ YPNèa^Vÿt$ ‹ñ3Àÿt$ @N ‰F‰FÇŒeBèW‹Æ^ÂVÿt$‹ñƒf$NÇÄeBè¦=‰v$‹Æ^ƒì$SU‹l$43ÀVW‹ñ‰D$ƒì ‹Ì‰U‰FèÖ‹} j[…ÿtðÿG‹Çë‹ÃP‹Îèw"…ÿt‹Ïè+€}t‹EL$(‰D$$E Pèc3ۍD$$Cë3À‰D$‰D$‰D$ ‹D$4‰D$D$‹Pèó-öÃt‹L$ƒãý…Ét‹D$ +ÁƒàüPQèîYYöÃt L$(è0D$8‹ÎPè´ _‹Æ^][ƒÄ$ÂVj‹ñè¹ ‹D$–€Ç4fBƒb$LjfB‹‰B‹Æ‰R$^ÂU‹ìQQVWÿu‹ñè½ÿÿÿƒì0ÇlfB¾¨‹Ìƒ'ƒg词EøVPè¼ ƒÄ8;øtP‹Ïè·‹Mü…Étèê!_ÆFv‹Æ^ÉÂj ¸":BèÊm‹]3ÿ‹Ç‰Eèÿu èwÝY‹È‰Mä‹‹@‹t ‹D$;Ç|;÷v;Ç| ;ñv+ñÇëWÀfE܋Eà‹u܉EìSMÔèN€}Øu j^‹Öé‰}ü‹ ‹A‹D%Àƒø@t<‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8èª7ƒøÿtsƒÆÿ‰u܋EìƒÐÿ‰Eì‰Eàëɋ ‹A‹L8‹Wÿuäÿu ÿP$;EäuE;×uA‹Eì;Ç|3;÷v-‹‹H¶D@P‹L8èR7ƒøÿtƒÆÿ‰u܋EìƒÐÿ‰Eì‰EàëÉj^‹×ëj^‹Ö‰Uè‹‹@‰| ‰|$ƒMüÿë;‹M‹‹PыB j^ Æj3É9J8Eñ ðV‹Êè•0¸6@ÃMüÿ3ÿj^‹]‹Uè‹‹HËW3À9y8Eð q òVèe0MÔ貋Ãè¦kÃÌÌÌÌ̋ËD$=rPèYÅÀtPè)hYÃ3ÀËD$H#;Ȇ,QèhY‹È…Ét A#ƒàà‰HüÃéʳS‹ÙVW‹|$‹C‹3+ÆÁø;øvWèa‹3VWÿt$è÷ƒÄ ë<U‹k+îÁýV;ýv ‹t$UVèٍ®+ý‹sVWPèɃÄë Wÿt$èºƒÄ ]¾_^‰C[Âj,è{gY‰‰@‰@fÇ@ ÃS‹\$ U‹é¹ÿÿÿ;ÙwZjX;ØwSÿt$‰]U‰Eèè/ƒÄ Æ+ë4VWQPS軋ðNQèÞþÿÿSÿt$(‹ø‰]W‰}‰uè´/ƒÄÆ_^][ÂèZ.ÌS‹Ù¹ÿÿÿW‹|$;ùwQjX;øwjÿt$‰{S‰CèrvƒÄ ë.VQPWèN‹ðNQèqþÿÿO‰Qÿt$$‰{P‰sèG/ƒÄ^_[Âèò-ÌV‹t$W‹ù‹N…ÉtèA#„Àt‹‰‹F‰G°ë2À_^Âƒì ‹Ìÿt$èõ‹D$‹L$ÿ0èa Ã|$V‹ñt#ÿt$è|‹D$Vÿ6ÿ0‹D$ÿ0范ĉF^ ‹T$‹B…Àtðÿ@‹‰‹B‰AÂV‹t$W‹|$+|$ Wÿt$VèƒuƒÄ 7_^ËL$‹D$ÿt$ PQèÈÿÿÿƒÄ ÃU‹ì‹E =rE PEP訋E YYPÿuèÆeYY]ËыJ;Jt‹D$‹‰‹BH‰Jë ÿt$Q‹ÊèËÂj¸?:Bè=i‹ñ‰uà‹]‹Ã+‰E‹F+=ÿÿÿ„’@‰EèPèî‰EìPèâüÿÿY‹ø‰}äƒeü‹EljE‹M Š ˆ‹N‹;Ùu‹Ç‹]ëVWSR臃ċӋN‹]CVPQRèpƒÄƒMüÿÿuìÿuèW‹Îèä‹ÃèhÂÿuìÿuä‹Màè-jjèMzè,ÌÌÌÌÌÌj¸\:Bèuh‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèPèL‰EìP‹Îèí+‹Ø‰]äƒeü<»‹M ‹ ‰‹F‹9Eu‹ÓëVSÿuQ蝃ċM‹FWVRPQ舃ăMüÿÿuìÿuèS‹ÎèT‹ÇèWgÂÿuìÿuä‹MàèÞ,jjèŠyèK+ÌÌÌÌÌÌj¸y:Bè²g‹ñ‰uà‹}+>Áÿ‹F+Áø=ÿÿÿ?„Œ@‰EèP艉EìP‹Îè*+‹Ø‰]äƒeü<»‹E ‹‰‹V‹9Uu‹ÃëVSÿuQèڃċM‹VGVPRQèŃăMüÿÿuìÿuèS‹Îè‘‹Çè”fÂÿuìÿuä‹Màè,jjèÇxèˆ*ÌÌÌÌÌÌV‹ñ‹ÿpÿt$ èj,ÿ6è.cYY^ÂV‹t$ W‹ùëÿv‹Ïÿt$èèÿÿÿVÿt$‹6è YY€~ tÞ_^ÂV‹t$ Nèƒ(j,VèâbYY^ËD$ƒèt0ƒèu+Vh¨è•b‹ðY…ötÿt$ ‹Îèÿ÷ÿÿÇPfBë3ö‹Æ^Ãh°èkbY…Àt ÿt$‹Èè øÿÿÃ3ÀÃVj0èOb‹ðYÿt$NÇüeB膋Æ^ÃV‹qŽÈèk:‹L$,…Ét#‹SÿPŽÈŠØèP:L$ è'ŠÃ[^Â(èÑ2ÌQS‹Ùºÿÿÿ‹L$ ‹ÂU‹k+Å;Árl‹CVWR<)‰D$PWèU‹ðNQèxùÿÿ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELB½à 0ìÐƹ @  @…t¹O ÄÉ X¹  H.text¬é ì `.rsrcÄÉ Ìð@@.reloc ¼@B¨¹HT- €M`­ø 0 1s, ~Ï%-&~Îþls- %€Ï(+o/ 8Ðo0 ±%rprYp~1 (2 ¢%rqpr¯p~1 (2 ¢%rÇprp~1 (2 ¢%r!prap~1 (2 ¢(˜ o3 81(4 s_sm~1 }Í~1 s5 (6 o7 }Í{ÍrqprÑp~1 (2 o8   ,rãprp~1 (2 +;rprap~1 (2 o8 -{Í(›+ {Í(š(9 þ  9:o:   (; o< o= (> {Í(™  (9 þ  9ñs? s? s? þ`s@ ~Ð%-&~ÎþmsA %€Ð(+þas@ ~Ñ%-&~ÎþnsA %€Ñ(+þbs@ ~Ò%-&~ÎþosA %€Ò(+oB þ9E{͍±%rip¢oC šr}p(> (C(+oE sF (N(+oToG #>@(H (I ioJ &ÞÞ(K þ9œþcs@ ~Ó%-&~ÎþpsA %€Ó(+þds@ ~Ô%-&~ÎþqsA %€Ô(+þes@ ~Õ%-&~ÎþrsA %€Õ(+ÞÞo_ oaþfsL ~Ö%-&~ÎþssM %€Ö(+ocoiþgsN ~×%-&~ÎþtsO %€×(+oeþhsP ~Ø%-&~ÎþusQ %€Ø(+ogþisR ~Ù%-&~ÎþvsS %€Ù(+ok( +,dsm%o_% r£p(> oa%sU oc%oi%ok%sV oe%sW ogoX ( +,dsm%o_% rµp(> oa%sU oc%oi%ok%sV oe%sW ogoX ÞÞolþ, oX (Y :ÃúÿÿÞþoZ Üo[ :%úÿÿÞ ,oZ ÜÞ&Þ + *A”ñ,›:ÕåäɵDù4â $0sr rËp(\ (] þ , Ýî( srÝpo&8žoo^ oo^ (rùpo8   ,4sr  ³%-o_ šoo oq +sr%oo%oq Þ ÞXoþ  :NÿÿÿÞ ÞÞÞ+*ALPà1Ó 0’sU  ³%а(` sa (\ (] þ , ÝS( s³%Ð|(` sa o&8òs’oo^ ooo^ oo(o‘ÞÞÞooŒ(K - oŒ+rýpooŽ(K - oŽ+rýpoo(K - o+rýpo‘Üorýp(b   , oc Xoþ  :úþÿÿÞ ÞÞ Þ+*AdzJÄzRÌoC8{}„0Ìs? (\ (] þ , Ý£( s³%О(` sa o&8Css%oo^ ov%oo^ o: .þox%oo^ oz%oo: 1þo|%oo^ (d @Bj[!‘¶Yo~%oo^ o€%r po(o‚o}jþ,-(e    (f   (g
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $¨:ìf}iìf}iìf}i§~hëf}i§xhSf}i§yhæf}iŒ€ièf}iŒxhÄf}iŒyhýf}iŒ~håf}i§|hçf}iìf|igf}iˆyhøf}iˆhíf}iRichìf}iPEd†pZ¢fð"  ˆ\°¯@0pÊ®`Á€„”¼x  ôàÄ X ”à’@ .text ‡ˆ `.rdataž* ,Œ@@.dataèи@À.pdataÄ à"Æ@@_RDATA\è@@.rsrc ô öê@@.relocX à@B@SHƒì è¥ßH‹è•ßH‹Ó‹èSeH‹ØèƒßH‹Ó‹HƒÄ [éÜ%ÌÌÌÌÌÌÌÌÌÌÌÌHÃÃÌÌÌÌÌÌÌÌH‰T$H‰L$SUVWAVAWHìˆ3ÀM‹ðH‹ÚH‰D$PH‹ùH‰D$XH¿•H‰D$`D@X‰D$(HL$ H‰D$ I‹ñ‹èè ˆD‹ø…Àt&HSD‹ÀH ••谍EÿHÄˆA_A^_^][ù L‰¬$€èû.L‹èH…ÀuLCH¨•H å•èÌéc¹ èÍ.H‹èH…ÀuLCHʕH ·•èžé5L‰¤$ÐD‹c@f„L‹¸ L;àI‹ÜºI‹ÍHGØL‹ÃèºãH;Ã…ãH‹èá…À…ÓL+ã‰\$(L‰l$ f„» H‰l$03҉\$8HL$ èfk‹øA¿ÿÿÿÿHƒùvwƒøtm‹L$8H+ÙM…öt(M‹ÎAWL‹ÃH‹ÍèêH;Ãu I‹Îè¦à…ÀtA‹ÿë>H…ötL‹ÃH‹ÕH‹Î芨Hóƒ|$8t€ƒÿtM…ätH‹¼$ÀéÿÿÿE3ÿë(¿ýÿÿÿH‹”$ÈH ð”HƒÂD‹ÇèëA¿ÿÿÿÿL‹¤$ÐHL$ è*ƒI‹ÍèN-H‹ÍèF-L‹¬$€A‹ÇHÄˆA_A^_^][ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌ@VAVHƒì(H‹H‹òL‹ñH…Àu2HƒÁxHo“èº)I‰H…ÀuHVH _•è‚3ÀHƒÄ(A^^ËVE3ÀIVH‹ÈèZå…Ày!LFHg•H œ•è«3ÀHƒÄ(A^^ËN L‰|$ è¤,L‹øH…Àu D‹N LFH}•H Š“èq鰀~H‰\$@H‰l$HH‰|$PL‰d$XuM‹ÏE3ÀH‹ÖI‹ÎèÁüÿÿ…Àtmë`‹^ I‹ïH…Ût`A¼ ff„M‹I;ÜH‹ûA¸IGüH‹ÍH‹×è^áHƒør HïH+ßuÔë"LFHߓH ”èÛI‹ÏèÏ+E3ÿH‹|$PH‹l$HH‹\$@L‹d$XI‹H…Ét è»ÝIÇI‹ÇL‹|$ HƒÄ(A^^ÃÌÌÌÌÌÌÌÌ@SWAVHƒì0H‹úL‹ñè¬Rƒøÿu HƒÄ0A^_[ÃH‰l$PIŽx0HoL‰d$`H‹Õè¡UL‹àH…Àu L‹ÅH‡”H ´”è3AD$ÿéŽI‹H…Àu1INxH†‘èÑ'I‰H…ÀuH‹ÕH w“èš»ÿÿÿÿé7‹WE3ÀIVH‹Èèrã…Ày L‹ÅH€“H µ“èÄ»ÿÿÿÿé€uE3ÉM‹ÄH‹×I‹Îè#ûÿÿ‹ØéãL‰l$(3ÛA½ L‰|$ A‹Íè’*L‹øH…ÀuL‹ÅH(’H }‘èdA_ÿ阋 H…ÿ„„H‰t$Xff„M‹I;ýH‹÷A¸IGõI‹ÏH‹Öè~ßHƒør1M‹ÌA¸H‹ÖI‹Ïè¤æHƒørH+þu½ë+H,’H Y’ëHܑH ’L‹ÅèÕ»ÿÿÿÿH‹t$XI‹Ïè¿)L‹l$(L‹|$ I‹H…Ét è¸ÛIÇI‹Ìè©Û‹ÃH‹l$PL‹d$`HƒÄ0A^_[ÃÌÌÌÌÌÌÌÌ@SHƒì L‹IH‹ÚL‹YM;ËsDM‹Ñ€IAL‹ÃL+ÀfD¶B¶ +ÑuHÿÀ…Éuí…Òt/IcIÁL‹ÈI;Âr I;ÃrÆ3ÀHƒÄ [ÃH gè²3ÀHƒÄ [ÃI‹ÁHƒÄ [ÃÌH‰\$H‰l$H‰t$WHƒì H‹YH‹êH‹ñHÇÇÿÿÿÿHÿǀ<u÷H‹IH;ÙsT€{ouHKL‹ÇH‹Õèä(…ÀtH‹NHcHÃH‹ØH;FrH;ÁrÏë!HCHǀ8tHCHÇëH ʎè3ÀH‹\$0H‹l$8H‹t$@HƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌ@SHƒì HcH‹ÙHÂH;AsH „ŽèÏH‹CHƒÄ [ÃÌÌÌÌÌH‰\$WHƒì0H‹?¸H3ÄH‰D$(H‹ÙH‹ H…ÉuHKxHaŽè¬$H‰H‹ÈH…ÀtSH‹’³HT$ H‰D$ A¸HÁè ˆD$#è[YH‹øH…Àt%H‹ E3ÀH‹Ðè9à…ÀyH"‘H èŽ ¸ÿÿÿÿégL‹ HK ºXDB©èËÜHƒøsH‘H ‡èV ¸ÿÿÿÿé/‹K(E3À‹C,ȉC,‹C0ȉC0‹C4ɋÉH+ù‰K(ÈHƒÇX‰C4H‰{3ÿ‰»|P‰²Ã‹S,HSH‹ è“ßHcK0è'H‰CH…ÀuH®H óèÚ GÿéµHcS0A¸L‹ H‹ÈèÜHƒøs H éIÿÿÿHcC0HCH‹ H‰CègمÀtH œè'¸ÿÿÿÿëcH‹CH;CsGfD‹H‹ɉH‹HɉH‹H ɉH ʉHcÊHÈH‹ÁH;KrH;KrÍë H „ŒèÏ H‹ H…Étè.ØH‰;3ÀH‹L$(H3Ìè“H‹\$HHƒÄ0_ÃÌÌÌÌÌH‰\$H‰t$WHƒì I‹ØH‹òH‹ùLL‹ÊHƒÁxºè0=}vHxL‹ËL؏ºè=}THŸx H‹ÖH‹ËèÅ 3ö‰·xP@f„¶ˆƒ H[„ÀuïH‹ÏèGýÿÿ…Àt"H‹H…Étèb×H‰73ÀH‹\$0H‹t$8HƒÄ _ÃH‹\$0¸H‹t$8HƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌH…Ét7SHƒì H‹ÙH‹IH…Étè%H‹ H…Ét è×HÇH‹Ëèå$HƒÄ [ÃÌÌÌ@SHƒì ºP¹è¿$H‹ØH…ÀuHäŽH è° H‹ÃHƒÄ [ÃÌÌÌÌÌÌÌL‰D$L‰L$ SUVWHƒì8I‹ðHl$xH‹ÚH‹ùèëôÿÿH‰l$(L‹ÎL‹ÃHÇD$ H‹×H‹HƒÉ蜅À¹ÿÿÿÿHÁHƒÄ8_^][ÃÌÌÌÌÌH‰\$H‰l$H‰t$ WHì€H‹R´H3ÄH‰„$pH‹ALlŽL‹IH‹ùHƒÁ(H‰D$ ºè’ÿˆº2·È‹ØDBÒÿ¨„f‰‡Z ‹
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $ £XhcðXhcðXhcð`ñ_hcðfñìhcðgñRhcð›ëžð[hcð›ë`ñQhcð›ëgñIhcð›ëfñphcðbñShcðXhbðÉhcðKìgñAhcðKìañYhcðRichXhcðPEd†‹j¢fð" (”ŽÐÀ@Ð ŽÅ`Á€„lÇx´+`"ÀhÀ€œ@°P.text’” `.rdataB&°(˜@@.dataØsàÀ@À.pdata"`$Î@@.rsrc´+,ò@@.relochÀ@BHƒì(è/á‹H‹îωè'áH‹H‹ÝÏH‰HH‹ ÒÏHƒÄ(é¹$ÌÌÌÌÌÌÌÌÌHqCÃÌÌÌÌÌÌÌÌH‰\$H‰l$ L‰D$VWATAUAWHƒì H‹ò3íHý§D‹ýI‹øH‹ÙA½ÿÿÿÿèå.L‹àH…ÀuHVH Ú§èMé‹VE3ÀH“I‹Ìè7é…ÀyLFHä§H ¨èˆ鯋N è‹0L‹øH…Àu D‹N LFH¨H ¦èXé€~uM‹ÏE3ÀH‹ÖI‹ÌèÌëW‹^ L‰t$PM‹÷H…Ût;¸ DH;ØH‹ûM‹ÌA¸HGøI‹ÎH‹×è^åHƒørhL÷¸ H+ßuϋÅH‹|$`L‹t$P…Àt I‹ÏèÓ/L‹ýI‹ÌèØáI‹ïM…ÿtH‹×I‹Ïèù.D‹èH‹Íèª/H‹\$XA‹ÅH‹l$hHƒÄ A_A]A\_^ÃLFH!¦H N¦è}A‹Åë‹ÌÌÌÌÌÌÌÌH‰T$H‰L$SUVWAVAWHìˆ3ÀM‹ðH‹ÚH‰D$PH‹ùH‰D$XA¸XH‰D$`H@¤‰D$(HL$ H‰D$ ‹èI‹ñèXžD‹ø…Àt(HSD‹ÀH #¤èޏÿÿÿÿHÄˆA_A^_^][ù L‰¬$€èç.L‹èH…ÀuLCH4¤H q¤è¸é\¹ è¹.H‹èH…ÀuLCHV¤H C¤èŠé.L‰¤$ÐA¿ÿÿÿÿD‹c¸ I‹ÜL;àL‹ÏºI‹ÍHGØL‹ÃèªãH;Ã…æH‹Ïè á…À…ÖL+ã‰\$(L‰l$ f„» H‰l$03҉\$8HL$ 膁‹øA¿ÿÿÿÿHƒùv|ƒøtr‹L$8H+ÙM…öt)M‹ÎL‹ÃºH‹ÍènêH;Ãu I‹Îè•à…ÀtA‹ÿëBH…ötL‹ÃH‹ÕH‹Îè‰}Hóƒ|$8„{ÿÿÿƒÿtM…ätH‹¼$ÀéÿÿÿE3ÿë ¿ýÿÿÿH‹”$ÈH {£HƒÂD‹ÇèïL‹¤$ÐHL$ èm™I‹ÍèA-H‹Íè9-L‹¬$€A‹ÇHÄˆA_A^_^][ÃÌÌH‰\$ VAVAWHƒì H‹òH‹ÙH¤E3öè +L‹øH…Àu!HVH ¤èu3ÀH‹\$XHƒÄ A_A^^ËVE3ÀH“I‹ÏèSå…ÀyLFH¤H 5¤è¤黋N è§,L‹ðH…Àu D‹N LFH ¤H -¢èt鋀~uM‹ÎE3ÀH‹ÖI‹Ïèèüÿÿëc‹^ H‰l$@I‹îH‰|$HL‰d$PH…Ût8A¼ fDI;ÜH‹ûM‹ÏA¸IGüH‹ÍH‹×ènáHƒørBHïH+ßuÔ3ÀH‹|$HH‹l$@L‹d$P…Àt I‹Îèã+E3öI‹ÏèèÝH‹\$XI‹ÆHƒÄ A_A^^ÃLFHW¢H „¢è³¸ÿÿÿÿëªÌÌÌÌÌÌÌÌÌÌÌÌ@SWHƒì8€znH‹úH‹Ùu$èxúÿÿ‹Ø…ÀyHWH _£è‹ÃHƒÄ8_[ÃHn£L‰d$`I‹Èèe)L‹àH…Àu(LGHR£H £è6L‹d$`¸ÿÿÿÿHƒÄ8_[ÃH2¢L‰|$ H‹Ëè!)L‹øH…ÀuHWH ¢è‰»ÿÿÿÿéT‹WE3ÀH“I‹Ïènã…Ày!LGH¢H P¢è¿»ÿÿÿÿé€uE3ÉM‹ÄH‹×I‹Ïè.ûÿÿ‹ØéôL‰l$03ÛA½ L‰t$(A‹Íè*L‹ðH…Àu!LGH H  è^»ÿÿÿÿé§H‰t$X‹w H…ö„‰H‰l$P@ff„I;õH‹îM‹ÏA¸IGíI‹ÎH‹ÕènßHƒør1M‹ÌA¸H‹ÕI‹Îè”æHƒørH+õu½ë,H¼ H é ëHl H ™ LGèÄ»ÿÿÿÿH‹l$PI‹Îè®)H‹t$XL‹l$0L‹t$(I‹Ïè§ÛI‹ÌèŸÛL‹|$ ‹ÃL‹d$`HƒÄ8_[ÃH‰\$H‰t$WHƒì H‹™H‹òH‹ùH;™spfff„D¶CA@¦¨÷t:A€ødt4A€ønt.A€øxt(HCL‹ÆL+À€¶B¶ +ÑuHÿÀ…Éuí…ÒëHKH‹Öèí)…Àt ‹HØH;Ÿr›3ÀH‹\$0H‹t$8HƒÄ _ÃH‹t$8H‹ÃH‹\$0HƒÄ _ÃÌÌÌÌÌÌ@SHƒì H‹HÇH…ÛtH‹‹è›(H‹ËHƒÄ [éŽ(HƒÄ [ÃÌÌÌÌÌÌÌÌÌÌÌ̋HÂÃÌÌÌÌÌÌÌÌÌÌH‰\$H‰l$ WHìH‹7ÇH3ÄH‰„$ˆHYŸH‹é3ÛèK&H‹øH…À„H‹ ºH”$€H‰„$€A¸HÁèH‹Ï H‰´$¨ˆ„$ƒè5]H‹ðH…À„7E3ÀH‹ÐH‹Ïèoà…ÀyH  H UŸèÄ é L‹ÏHL$ ºXA¸èÝHƒøsH H _žèŽ é׺`¹èn'H‹ØH…ÀuHûŸH ( è_ é¨L‹ÍL ºH‹ËèÓ‹D$(H‹ ȉD$(LL$8‹D$,LîŸȉD$,º@‹D$0ȉD$0‹D$4ȉD$4‰ƒèˆ‹D$(E3ÀH+ðH‹ÏHFXH‰ƒ‹T$,HÐèhߋL$0èÛ&H‰ƒH…ÀuHˆŸH eœè¬ éõ‹T$0L‹ÏA¸H‹ÈèîÛHƒøsH}ŸH Jèy é‹D$0H‹ÏHƒH‰ƒè*مÀtH gŸèÚ é“H‹“H;“ƒD‹âÄfo RŸf3ÀAƒø|óof8Áóëf„‹ ‚ɉ ‚HÿÀHƒø|ï¶JA¦¨÷t€ùdt€ùnt €ùxt2Àë° ƒ•Àˆƒ‹HÐH;“r’H‹Ïè¶×H‹´$¨H‹ÃH‹Œ$ˆH3Ì蟜Lœ$I‹[ I‹k(I‹ã_ÃÌÌÌÌÌÌÌÌÌÌL‰D$L‰L$ SUVWHƒ
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x0002dc00', u'virtual_address': u'0x00001000', u'entropy': 7.979258429305275, u'name': u' \\x00 ', u'virtual_size': u'0x00068000'} entropy 7.97925842931 description A section with a high entropy has been found
section {u'size_of_data': u'0x001a4400', u'virtual_address': u'0x0031f000', u'entropy': 7.95364661792593, u'name': u'upgbvxgh', u'virtual_size': u'0x001a5000'} entropy 7.95364661793 description A section with a high entropy has been found
entropy 0.994133333333 description Overall entropy of this PE file is high
process system
host 185.215.113.16
host 185.215.113.19
host 185.215.113.67
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1964
region_size: 48115712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000388
3221225496 0
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\ab417aa83e.exe reg_value C:\Users\test22\1000029002\ab417aa83e.exe
file C:\Windows\Tasks\explorti.job
file C:\Windows\Tasks\axplong.job
Process injection Process 2816 manipulating memory of non-child process 1964
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1964
region_size: 48115712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000388
3221225496 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 e9 bf 18 00 00 42 81 ea
exception.symbol: sand+0x1fe4d4
exception.instruction: in eax, dx
exception.module: sand.exe
exception.exception_code: 0xc0000096
exception.offset: 2090196
exception.address: 0x3ce4d4
registers.esp: 9436704
registers.edi: 13250062
registers.eax: 1447909480
registers.ebp: 3992367124
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 3981226
registers.ecx: 20
1 0 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000001e8
suspend_count: 1
process_identifier: 2556
1 0 0

CreateProcessInternalW

thread_identifier: 2820
thread_handle: 0x000003d8
process_identifier: 2816
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000003e0
1 1 0

NtResumeThread

thread_handle: 0x000001a4
suspend_count: 1
process_identifier: 2816
1 0 0

CreateProcessInternalW

thread_identifier: 908
thread_handle: 0x00000370
process_identifier: 1964
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
track: 1
command_line:
filepath_r: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000388
1 1 0

NtGetContextThread

thread_handle: 0x00000370
1 0 0

NtAllocateVirtualMemory

process_identifier: 1964
region_size: 48115712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000388
3221225496 0

CreateProcessInternalW

thread_identifier: 1356
thread_handle: 0x00000480
process_identifier: 1264
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\1000029002\ab417aa83e.exe
track: 1
command_line: "C:\Users\test22\1000029002\ab417aa83e.exe"
filepath_r: C:\Users\test22\1000029002\ab417aa83e.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000484
1 1 0

CreateProcessInternalW

thread_identifier: 2192
thread_handle: 0x0000046c
process_identifier: 2188
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000030001\22fc86ad3a.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x0000047c
1 1 0

NtResumeThread

thread_handle: 0x00000114
suspend_count: 1
process_identifier: 1264
1 0 0

NtResumeThread

thread_handle: 0x000001e8
suspend_count: 1
process_identifier: 2188
1 0 0

CreateProcessInternalW

thread_identifier: 2536
thread_handle: 0x000003cc
process_identifier: 2540
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\44111dbc49\axplong.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000003d0
1 1 0

NtResumeThread

thread_handle: 0x000001a0
suspend_count: 1
process_identifier: 2540
1 0 0

CreateProcessInternalW

thread_identifier: 2720
thread_handle: 0x00000460
process_identifier: 2716
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000002001\GOLD.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000464
1 1 0

CreateProcessInternalW

thread_identifier: 3036
thread_handle: 0x00000444
process_identifier: 3020
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000003001\4434.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000470
1 1 0

CreateProcessInternalW

thread_identifier: 1864
thread_handle: 0x00000370
process_identifier: 1780
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000004001\crypteda.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x0000046c
1 1 0

CreateProcessInternalW

thread_identifier: 2468
thread_handle: 0x000004dc
process_identifier: 2452
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000009001\25072023.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000004fc
1 1 0

CreateProcessInternalW

thread_identifier: 416
thread_handle: 0x000004d4
process_identifier: 1304
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000500
1 1 0

NtResumeThread

thread_handle: 0x000000dc
suspend_count: 1
process_identifier: 2452
1 0 0

NtResumeThread

thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2452
1 0 0

NtResumeThread

thread_handle: 0x0000018c
suspend_count: 1
process_identifier: 2452
1 0 0

NtResumeThread

thread_handle: 0x0000000000000090
suspend_count: 1
process_identifier: 1304
1 0 0

CreateProcessInternalW

thread_identifier: 672
thread_handle: 0x000000000000009c
process_identifier: 920
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000010001\pered.exe
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x00000000000000a0
1 1 0
dead_host 192.168.56.101:49194
dead_host 192.168.56.101:49191
dead_host 192.168.56.101:49193
dead_host 185.215.113.67:40960
dead_host 192.168.56.101:49192
dead_host 192.168.56.101:49197
dead_host 192.168.56.101:49196
dead_host 192.168.56.101:49200