Summary | ZeroBOX

herso.exe

RedLine stealer Gen1 Amadey EnigmaProtector Generic Malware Malicious Library Admin Tool (Sysinternals etc ...) Antivirus UPX Malicious Packer Code injection Anti_VM AntiDebug OS Processor Check PE32 PE File AntiVM DLL
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 6, 2024, 9:17 a.m. Aug. 6, 2024, 9:40 a.m.
Size 1.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 54dda3a0f0895906ba57a691a4655415
SHA256 872ea10c56fbd7eed22a86a03387e45213bf90e7e85df771b0a747075a4fa004
CRC32 E33B1C81
ssdeep 24576:j7I25TWJuUpiD3iaFXJubX9iOQkZ1+G0n/v92SJojo1aS/pxPZxSN11INelXUt14:YyTvubXkO8G0ndD/nZ4WAlEtKgSLCrI
Yara
  • PE_Header_Zero - PE File Signature
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)

IP Address Status Action
164.124.101.2 Active Moloch
185.215.113.16 Active Moloch
185.215.113.19 Active Moloch
185.215.113.24 Active Moloch
34.49.45.138 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.19:80 -> 192.168.56.103:49164 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 185.215.113.16:80 -> 192.168.56.103:49165 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.103:49165 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.103:49165 2014819 ET INFO Packed Executable Download Misc activity
TCP 185.215.113.16:80 -> 192.168.56.103:49165 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.103:49165 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.103:49165 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.103:49168 2014819 ET INFO Packed Executable Download Misc activity
TCP 185.215.113.16:80 -> 192.168.56.103:49168 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.103:49168 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.103:49168 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49167 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49167 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 185.215.113.24:80 -> 192.168.56.103:49175 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.103:49175 -> 185.215.113.24:80 2044243 ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 185.215.113.24:80 2044244 ET MALWARE Win32/Stealc Requesting browsers Config from C2 Malware Command and Control Activity Detected
TCP 185.215.113.24:80 -> 192.168.56.103:49175 2051828 ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 185.215.113.24:80 2044246 ET MALWARE Win32/Stealc Requesting plugins Config from C2 Malware Command and Control Activity Detected
TCP 185.215.113.24:80 -> 192.168.56.103:49175 2051831 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 185.215.113.24:80 2044248 ET MALWARE Win32/Stealc Submitting System Information to C2 Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 185.215.113.24:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49175 -> 185.215.113.24:80 2044301 ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 185.215.113.24:80 -> 192.168.56.103:49175 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.24:80 -> 192.168.56.103:49175 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2044303 ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 185.215.113.24:80 -> 192.168.56.103:49178 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.24:80 -> 192.168.56.103:49178 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2044302 ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49198 -> 34.49.45.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49197 -> 34.49.45.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49201 -> 34.49.45.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49203 -> 34.49.45.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 185.215.113.24:80 -> 192.168.56.103:49178 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2044305 ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2044306 ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.24:80 2044307 ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity A suspicious filename was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
file C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l2-1-0.dll
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
registry HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section \x00
section .idata
section
section empipoju
section ojixoypn
section .taggant
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: herso+0x30e0b9
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 3203257
exception.address: 0x12fe0b9
registers.esp: 4193044
registers.edi: 0
registers.eax: 1
registers.ebp: 4193060
registers.edx: 21594112
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 31 f6 ff 34 3e ff 34 24 ff 34 24 e9 24 01 00
exception.symbol: herso+0x6d6d5
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 448213
exception.address: 0x105d6d5
registers.esp: 4193012
registers.edi: 17186793
registers.eax: 29101
registers.ebp: 4007178260
registers.edx: 16711680
registers.ebx: 129
registers.esi: 3
registers.ecx: 1971388416
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 35 07 00 00 5d 55 89 e5 81 c5 04 00 00 00
exception.symbol: herso+0x6ce61
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 446049
exception.address: 0x105ce61
registers.esp: 4193012
registers.edi: 17186793
registers.eax: 29101
registers.ebp: 4007178260
registers.edx: 16711680
registers.ebx: 80171347
registers.esi: 4294941284
registers.ecx: 1971388416
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 ba cb 0c ed 4f 50 68 f5 49 c9 22 89 1c 24
exception.symbol: herso+0x6e3a0
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 451488
exception.address: 0x105e3a0
registers.esp: 4193008
registers.edi: 17186793
registers.eax: 32220
registers.ebp: 4007178260
registers.edx: 293041014
registers.ebx: 17161278
registers.esi: 4294941284
registers.ecx: 2060724334
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 89 e7 81 c7 04 00 00 00 e9 87 02 00 00 01
exception.symbol: herso+0x6e2ee
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 451310
exception.address: 0x105e2ee
registers.esp: 4193012
registers.edi: 0
registers.eax: 32220
registers.ebp: 4007178260
registers.edx: 293041014
registers.ebx: 17164438
registers.esi: 235753
registers.ecx: 2060724334
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 89 3c 24 89 e7 e9 b2 03 00 00 58 55 bd ae
exception.symbol: herso+0x1e652d
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 1991981
exception.address: 0x11d652d
registers.esp: 4193012
registers.edi: 17197679
registers.eax: 18729726
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 62456761
registers.esi: 18686230
registers.ecx: 953
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 d0 ae 93 4f 89 14 24 c7 04 24 7d 29 ff 22
exception.symbol: herso+0x1e66f5
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 1992437
exception.address: 0x11d66f5
registers.esp: 4193012
registers.edi: 17197679
registers.eax: 18729726
registers.ebp: 4007178260
registers.edx: 623849
registers.ebx: 4294943584
registers.esi: 18686230
registers.ecx: 953
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 89 04 24 68 21 a3 31 75 89 0c 24 e9 70 fa
exception.symbol: herso+0x1e84aa
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2000042
exception.address: 0x11d84aa
registers.esp: 4193012
registers.edi: 17197679
registers.eax: 18741723
registers.ebp: 4007178260
registers.edx: 623849
registers.ebx: 1709887346
registers.esi: 18686230
registers.ecx: 1084890819
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 c7 04 24 64 f5 ef 7f 81 ec 04 00 00 00 89
exception.symbol: herso+0x1e7bae
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 1997742
exception.address: 0x11d7bae
registers.esp: 4193012
registers.edi: 4294937888
registers.eax: 18741723
registers.ebp: 4007178260
registers.edx: 623849
registers.ebx: 50665
registers.esi: 18686230
registers.ecx: 1084890819
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 c7 04 24 f7 ef 3e 70 89 3c 24 89 14 24 89
exception.symbol: herso+0x1ea2c4
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2007748
exception.address: 0x11da2c4
registers.esp: 4193012
registers.edi: 8662759
registers.eax: 1259
registers.ebp: 4007178260
registers.edx: 0
registers.ebx: 0
registers.esi: 205839809
registers.ecx: 18721439
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 ec 04 89 1c 24 e9 e9
exception.symbol: herso+0x1f69b7
exception.instruction: in eax, dx
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2058679
exception.address: 0x11e69b7
registers.esp: 4193004
registers.edi: 8662759
registers.eax: 1447909480
registers.ebp: 4007178260
registers.edx: 22104
registers.ebx: 1971327157
registers.esi: 18748226
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: herso+0x1f6fc2
exception.address: 0x11e6fc2
exception.module: herso.exe
exception.exception_code: 0xc000001d
exception.offset: 2060226
registers.esp: 4193004
registers.edi: 8662759
registers.eax: 1
registers.ebp: 4007178260
registers.edx: 22104
registers.ebx: 0
registers.esi: 18748226
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 df 3a 2d 12 01
exception.symbol: herso+0x1f29f0
exception.instruction: in eax, dx
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2042352
exception.address: 0x11e29f0
registers.esp: 4193004
registers.edi: 8662759
registers.eax: 1447909480
registers.ebp: 4007178260
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 18748226
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 92 fa ff ff ff 34 24 58 83 c4 04 50 89 e0
exception.symbol: herso+0x1fa0f0
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2072816
exception.address: 0x11ea0f0
registers.esp: 4193008
registers.edi: 8662759
registers.eax: 29224
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 40914187
registers.esi: 10
registers.ecx: 18782895
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 a7 00 00 00 89 f0 52 68 00 00 00 00 5a 55
exception.symbol: herso+0x1f9f79
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2072441
exception.address: 0x11e9f79
registers.esp: 4193012
registers.edi: 8662759
registers.eax: 29224
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 40914187
registers.esi: 10
registers.ecx: 18812119
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 9b 6d 78 1b 89 04 24 68 0e 8d 7f 67 ff 34
exception.symbol: herso+0x1fa39c
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2073500
exception.address: 0x11ea39c
registers.esp: 4193012
registers.edi: 8662759
registers.eax: 29224
registers.ebp: 4007178260
registers.edx: 6379
registers.ebx: 40914187
registers.esi: 4294941264
registers.ecx: 18812119
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 e8 14 00 00 00 36 f4 2f 20 da fa 3e
exception.symbol: herso+0x1facba
exception.instruction: int 1
exception.module: herso.exe
exception.exception_code: 0xc0000005
exception.offset: 2075834
exception.address: 0x11eacba
registers.esp: 4192972
registers.edi: 0
registers.eax: 4192972
registers.ebp: 4007178260
registers.edx: 44501
registers.ebx: 18787797
registers.esi: 18787381
registers.ecx: 504897376
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 89 e3 50 b8 25 35 e9 56 35 21 35 e9 56 01
exception.symbol: herso+0x209530
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2135344
exception.address: 0x11f9530
registers.esp: 4193012
registers.edi: 17150914
registers.eax: 32504
registers.ebp: 4007178260
registers.edx: 6
registers.ebx: 18878707
registers.esi: 1971262480
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 5c 00 00 00 56 ff 74 24 04 5e e9 d4 fc ff
exception.symbol: herso+0x209d19
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2137369
exception.address: 0x11f9d19
registers.esp: 4193012
registers.edi: 17150914
registers.eax: 32504
registers.ebp: 4007178260
registers.edx: 4294938144
registers.ebx: 18878707
registers.esi: 1971262480
registers.ecx: 98601296
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 c7 04 24 ea bf 76 63 e9 87 03 00 00 81 c7
exception.symbol: herso+0x20f146
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2158918
exception.address: 0x11ff146
registers.esp: 4193000
registers.edi: 18870020
registers.eax: 29282
registers.ebp: 4007178260
registers.edx: 774241995
registers.ebx: 167815814
registers.esi: 1988413394
registers.ecx: 774241995
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 3c 24 bf 8b 1e ee 5f 47 50 56 e9 06 ff
exception.symbol: herso+0x20f2f2
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2159346
exception.address: 0x11ff2f2
registers.esp: 4193004
registers.edi: 18873014
registers.eax: 604277078
registers.ebp: 4007178260
registers.edx: 774241995
registers.ebx: 167815814
registers.esi: 0
registers.ecx: 774241995
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 ad 01 00 00 81 f5 9b 38 4a 5a 31 e8 5d 05
exception.symbol: herso+0x21164a
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2168394
exception.address: 0x120164a
registers.esp: 4193000
registers.edi: 4022815394
registers.eax: 29576
registers.ebp: 4007178260
registers.edx: 2142270149
registers.ebx: 18879041
registers.esi: 18873014
registers.ecx: 2161147548
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 e9 74 f8 ff ff ff 34 1a ff 34 24 e9 63 00
exception.symbol: herso+0x211b7c
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2169724
exception.address: 0x1201b7c
registers.esp: 4193004
registers.edi: 4022815394
registers.eax: 29576
registers.ebp: 4007178260
registers.edx: 2142270149
registers.ebx: 18908617
registers.esi: 18873014
registers.ecx: 2161147548
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 3c 24 c7 04 24 87 83 f2
exception.symbol: herso+0x211daa
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2170282
exception.address: 0x1201daa
registers.esp: 4193004
registers.edi: 322689
registers.eax: 29576
registers.ebp: 4007178260
registers.edx: 4294940800
registers.ebx: 18908617
registers.esi: 18873014
registers.ecx: 2161147548
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 00 00 00 00 89 04 24 e9
exception.symbol: herso+0x214523
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2180387
exception.address: 0x1204523
registers.esp: 4193000
registers.edi: 322689
registers.eax: 26784
registers.ebp: 4007178260
registers.edx: 4294940800
registers.ebx: 1128402562
registers.esi: 18873014
registers.ecx: 18889908
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 50 68 88 1d 6f 7f 58 2d 41 e0 b7 07 e9 03
exception.symbol: herso+0x213d1e
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2178334
exception.address: 0x1203d1e
registers.esp: 4193004
registers.edi: 4294943372
registers.eax: 84201
registers.ebp: 4007178260
registers.edx: 4294940800
registers.ebx: 1128402562
registers.esi: 18873014
registers.ecx: 18916692
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 2e 0f c3 7b e9 02 05 00 00 58 81 c5 a4 9f
exception.symbol: herso+0x225881
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2250881
exception.address: 0x1215881
registers.esp: 4193004
registers.edi: 3278334944
registers.eax: 18992767
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 3278339044
registers.esi: 4294939748
registers.ecx: 116969
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 d4 f9 ff ff 87 2c 24 5c 89 14 24 89 e2 55
exception.symbol: herso+0x23c304
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2343684
exception.address: 0x122c304
registers.esp: 4192972
registers.edi: 19081385
registers.eax: 28667
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 2147485317
registers.esi: 2313063264
registers.ecx: 4294941396
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 1c 24 83 ec 04 89 0c 24
exception.symbol: herso+0x23ceb9
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2346681
exception.address: 0x122ceb9
registers.esp: 4192972
registers.edi: 4294939004
registers.eax: 30950
registers.ebp: 4007178260
registers.edx: 1325214180
registers.ebx: 772068874
registers.esi: 19089113
registers.ecx: 604801362
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 ba 04 69 f6 3d 55 bd 12 f7 cf 3e e9 eb 02
exception.symbol: herso+0x23dbe8
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2350056
exception.address: 0x122dbe8
registers.esp: 4192968
registers.edi: 4294939004
registers.eax: 29272
registers.ebp: 4007178260
registers.edx: 1975250091
registers.ebx: 772068874
registers.esi: 19061041
registers.ecx: 604801362
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 2c 24 e9 b8 fc ff ff 89
exception.symbol: herso+0x23dd36
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2350390
exception.address: 0x122dd36
registers.esp: 4192972
registers.edi: 4294939004
registers.eax: 4294940540
registers.ebp: 4007178260
registers.edx: 1002937741
registers.ebx: 772068874
registers.esi: 19090313
registers.ecx: 604801362
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 0c 24 89 04 24 89 e0 e9 b9 0b 00 00 89
exception.symbol: herso+0x241ee4
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2367204
exception.address: 0x1231ee4
registers.esp: 4192972
registers.edi: 4294939004
registers.eax: 27123
registers.ebp: 4007178260
registers.edx: 0
registers.ebx: 65804
registers.esi: 19105926
registers.ecx: 1969225870
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 1e 05 00 00 83 c7 04 87 3c 24 5c
exception.symbol: herso+0x242194
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2367892
exception.address: 0x1232194
registers.esp: 4192972
registers.edi: 4294939004
registers.eax: 322689
registers.ebp: 4007178260
registers.edx: 4294943784
registers.ebx: 65804
registers.esi: 19105926
registers.ecx: 1969225870
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 c6 34 8b 5f 7f 03 34 24 52 68 da 03 a5 6a
exception.symbol: herso+0x244477
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2376823
exception.address: 0x1234477
registers.esp: 4192968
registers.edi: 287777128
registers.eax: 29776
registers.ebp: 4007178260
registers.edx: 871407392
registers.ebx: 287784299
registers.esi: 19088068
registers.ecx: 890493803
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 c7 04 24 ac 8a 6d 12 89 04 24 c7 04 24 e6
exception.symbol: herso+0x244769
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2377577
exception.address: 0x1234769
registers.esp: 4192972
registers.edi: 287777128
registers.eax: 24811
registers.ebp: 4007178260
registers.edx: 871407392
registers.ebx: 0
registers.esi: 19091036
registers.ecx: 890493803
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 34 24 89 e6 e9 d5 01 00 00 54 8b
exception.symbol: herso+0x24799c
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2390428
exception.address: 0x123799c
registers.esp: 4192968
registers.edi: 19100995
registers.eax: 19101693
registers.ebp: 4007178260
registers.edx: 836032545
registers.ebx: 1
registers.esi: 1
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 c7 04 24 2d fc 21 5d 89 2c 24 57 c7 04 24
exception.symbol: herso+0x248239
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2392633
exception.address: 0x1238239
registers.esp: 4192972
registers.edi: 19100995
registers.eax: 19104482
registers.ebp: 4007178260
registers.edx: 157417
registers.ebx: 1
registers.esi: 1
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 e9 37 00 00 00 59 81 f7 5e 36 bf 7e 81 c7
exception.symbol: herso+0x248ac3
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2394819
exception.address: 0x1238ac3
registers.esp: 4192968
registers.edi: 19100995
registers.eax: 19105587
registers.ebp: 4007178260
registers.edx: 157417
registers.ebx: 1219189504
registers.esi: 1
registers.ecx: 1337876430
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 e9 c4 02 00 00 68 6d ea f6 00 e9 83 03 00
exception.symbol: herso+0x248d86
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2395526
exception.address: 0x1238d86
registers.esp: 4192972
registers.edi: 2173331560
registers.eax: 19108589
registers.ebp: 4007178260
registers.edx: 157417
registers.ebx: 1219189504
registers.esi: 0
registers.ecx: 1337876430
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 c7 04 24 41 9a 9d 52 ff 34 24 ff 34 24 5a
exception.symbol: herso+0x25bb9c
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2472860
exception.address: 0x124bb9c
registers.esp: 4192972
registers.edi: 2298801283
registers.eax: 25849
registers.ebp: 4007178260
registers.edx: 18914776
registers.ebx: 19210308
registers.esi: 5881836
registers.ecx: 4294944304
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 c8 63 de 4b e9 be 05 00 00 55 bd a4 f8 02
exception.symbol: herso+0x264e5b
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2510427
exception.address: 0x1254e5b
registers.esp: 4192972
registers.edi: 19188756
registers.eax: 30052
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 19251340
registers.esi: 5881836
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 c7 04 24 52 ef 71 25 89 3c 24 89 04 24 89
exception.symbol: herso+0x264cfd
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2510077
exception.address: 0x1254cfd
registers.esp: 4192972
registers.edi: 0
registers.eax: 30052
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 19224168
registers.esi: 9451
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 eb 01 00 00 81 cf 25 7d cd 0f f7
exception.symbol: herso+0x26c299
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2540185
exception.address: 0x125c299
registers.esp: 4192972
registers.edi: 19240230
registers.eax: 29073
registers.ebp: 4007178260
registers.edx: 0
registers.ebx: 25356626
registers.esi: 19254036
registers.ecx: 765722624
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 0c 24 e9 29 04 00 00 31 fe 31 f7
exception.symbol: herso+0x26fd61
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2555233
exception.address: 0x125fd61
registers.esp: 4192972
registers.edi: 19240230
registers.eax: 30986
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 19297373
registers.esi: 19254036
registers.ecx: 765722624
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 70 00 00 00 ff 74 24 04 8b 04 24 83 c4 04
exception.symbol: herso+0x2700db
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2556123
exception.address: 0x12600db
registers.esp: 4192972
registers.edi: 19240230
registers.eax: 3923872081
registers.ebp: 4007178260
registers.edx: 0
registers.ebx: 19269589
registers.esi: 19254036
registers.ecx: 765722624
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ef e8 03 0d 7a 55 bd 5c f5 d3 1b e9 94 06
exception.symbol: herso+0x281b54
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2628436
exception.address: 0x1271b54
registers.esp: 4192968
registers.edi: 19338971
registers.eax: 31195
registers.ebp: 4007178260
registers.edx: 11
registers.ebx: 19310155
registers.esi: 5881836
registers.ecx: 12
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 89 34 24 c7 04 24 8b 7f b5 0b 81 2c 24 51
exception.symbol: herso+0x2822bc
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2630332
exception.address: 0x12722bc
registers.esp: 4192972
registers.edi: 19370166
registers.eax: 31195
registers.ebp: 4007178260
registers.edx: 11
registers.ebx: 19310155
registers.esi: 5881836
registers.ecx: 12
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 63 02 00 00 52 53 81 ec 04 00 00 00 e9 f3
exception.symbol: herso+0x281ef6
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2629366
exception.address: 0x1271ef6
registers.esp: 4192972
registers.edi: 19370166
registers.eax: 2112443472
registers.ebp: 4007178260
registers.edx: 4294939180
registers.ebx: 19310155
registers.esi: 5881836
registers.ecx: 12
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 51 e9 4d 01 00 00 5d e9 13 01 00 00 83 ee
exception.symbol: herso+0x28b66e
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2668142
exception.address: 0x127b66e
registers.esp: 4192972
registers.edi: 19370166
registers.eax: 31333
registers.ebp: 4007178260
registers.edx: 2130566132
registers.ebx: 352302288
registers.esi: 2005598220
registers.ecx: 19408390
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 89 14 24 89 0c 24 52 ba 64 c5 f9 4d 81 f2
exception.symbol: herso+0x28abdd
exception.instruction: sti
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2665437
exception.address: 0x127abdd
registers.esp: 4192972
registers.edi: 19370166
registers.eax: 31333
registers.ebp: 4007178260
registers.edx: 0
registers.ebx: 352302288
registers.esi: 13887824
registers.ecx: 19380342
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.19/Vi9leo/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/well/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/steam/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/num/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.24/e2b1563c6670f193.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/0d60be0de163924d/sqlite3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/0d60be0de163924d/freebl3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/0d60be0de163924d/mozglue.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/0d60be0de163924d/msvcp140.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/0d60be0de163924d/nss3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/0d60be0de163924d/softokn3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.24/0d60be0de163924d/vcruntime140.dll
request POST http://185.215.113.19/Vi9leo/index.php
request GET http://185.215.113.16/well/random.exe
request GET http://185.215.113.16/steam/random.exe
request GET http://185.215.113.16/num/random.exe
request GET http://185.215.113.24/
request POST http://185.215.113.24/e2b1563c6670f193.php
request GET http://185.215.113.24/0d60be0de163924d/sqlite3.dll
request GET http://185.215.113.24/0d60be0de163924d/freebl3.dll
request GET http://185.215.113.24/0d60be0de163924d/mozglue.dll
request GET http://185.215.113.24/0d60be0de163924d/msvcp140.dll
request GET http://185.215.113.24/0d60be0de163924d/nss3.dll
request GET http://185.215.113.24/0d60be0de163924d/softokn3.dll
request GET http://185.215.113.24/0d60be0de163924d/vcruntime140.dll
request POST http://185.215.113.19/Vi9leo/index.php
request POST http://185.215.113.24/e2b1563c6670f193.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7793f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x778b0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ff1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ca0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00cf0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00da0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00db0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00e40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00f90000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00fa0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ca0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ca0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ca0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ca0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ca0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1676
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ed0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1236
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000006830000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7793f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x778b0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x013d1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00900000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00950000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00960000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00970000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00bc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00bd0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00be0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2232
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description 6e18515bc8.exe tried to sleep 278 seconds, actually delayed analysis time by 278 seconds
description explorti.exe tried to sleep 1097 seconds, actually delayed analysis time by 1097 seconds
Application Crash Process firefox.exe with pid 2868 crashed
Application Crash Process firefox.exe with pid 2600 crashed
Application Crash Process firefox.exe with pid 1712 crashed
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0xcd1f04
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030

exception.instruction_r: 83 3d 8d d1 02 00 00 ff 25 00 00 00 00 53 12 69
exception.instruction: cmp dword ptr [rip + 0x2d18d], 0
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0xcd1f04
registers.r14: 10219112
registers.r15: 8791540668016
registers.rcx: 48
registers.rsi: 8791540599680
registers.r10: 0
registers.rbx: 0
registers.rsp: 10218744
registers.r11: 10222128
registers.r8: 2004779404
registers.r9: 0
registers.rdx: 8796092883536
registers.r12: 14925488
registers.rbp: 10218864
registers.rdi: 249667616
registers.rax: 13442816
registers.r13: 10219704
1 0 0

__exception__

stacktrace:
0xcd1f04
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030

exception.instruction_r: 83 3d 8d d1 02 00 00 ff 25 00 00 00 00 53 12 69
exception.instruction: cmp dword ptr [rip + 0x2d18d], 0
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0xcd1f04
registers.r14: 8973992
registers.r15: 8791415428720
registers.rcx: 48
registers.rsi: 8791415360384
registers.r10: 0
registers.rbx: 0
registers.rsp: 8973624
registers.r11: 8977008
registers.r8: 2004779404
registers.r9: 0
registers.rdx: 8796092887632
registers.r12: 14922608
registers.rbp: 8973744
registers.rdi: 252813344
registers.rax: 13442816
registers.r13: 8974584
1 0 0

__exception__

stacktrace:
0xcd1f04
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30

exception.instruction_r: 83 3d 8d d1 02 00 00 ff 25 00 00 00 00 53 12 69
exception.instruction: cmp dword ptr [rip + 0x2d18d], 0
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0xcd1f04
registers.r14: 9894704
registers.r15: 9894208
registers.rcx: 48
registers.rsi: 14759008
registers.r10: 0
registers.rbx: 0
registers.rsp: 9893256
registers.r11: 9895456
registers.r8: 2004779404
registers.r9: 0
registers.rdx: 8796092887632
registers.r12: 9894039
registers.rbp: 9893376
registers.rdi: 100
registers.rax: 13442816
registers.r13: 2
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Local Extension Settings\cjmkndjhnagcfbpiemnkdpomccnjblmj\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Local Extension Settings\djclckkglechooblngghdinmeemkbgci\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Last Version\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Last Version\Local Extension Settings\lpilbniiabackdjcionkobglmddfbcjo\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Local Extension Settings\apenkfbbpmhihehmihndmmcdanacolnh\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Local Extension Settings\aodkkagnadcbobfpggfnjeongemjbjca\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\fil\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\Local Extension Settings\aijcbedoijmgnlmjeegjaglmepbmpkpi\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Local Extension Settings\ciojocpkclfflombbcfigcijjcbkmhaf\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opfgelmcmbiajamepnmloijbpoleiama\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\14.5_0\_locales\sv\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Local Extension Settings\fiikommddbeccaoicoejoniammnalkfa\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Local Extension Settings\oboonakemofpalcgghocfoadofidjkkk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal\Local Extension Settings\fooolghllnmhmmndgjiamiiodkpenpbb\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi\LOCK\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\8620.824.0.0_0\_locales\fa\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Local Extension Settings\bfogiafebfohielmmehodmfbbebbbpei\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\MANIFEST-000001\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\Local Extension Settings\naepdomgkenhinolocfifgehidddafch\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\omaabbefbmiijedngplfjmnooppbclkk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\Local Extension Settings\pdadjkfkgcafgbceimcpbkalnfnepbnk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Local Extension Settings\bmikpgodpkclnkgmnpphehdgcimmided\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Local Extension Settings\fdjamakpfbbddfjaooikfcpapjohcfmg\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobl\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Channel IDs\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch\CURRENT
file C:\ProgramData\freebl3.dll
file C:\ProgramData\msvcp140.dll
file C:\Users\test22\1000037002\8bc9ea3c13.exe
file C:\ProgramData\nss3.dll
file C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
file C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe
file C:\ProgramData\vcruntime140.dll
file C:\ProgramData\mozglue.dll
file C:\ProgramData\softokn3.dll
file C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
file C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
file C:\Users\test22\1000037002\8bc9ea3c13.exe
file C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe
file C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
file C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe
file C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\1000037002\8bc9ea3c13.exe
parameters:
filepath: C:\Users\test22\1000037002\8bc9ea3c13.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000000d48bf00000
process_handle: 0xffffffffffffffff
1 0 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $šÇƒ®Þ¦íýÞ¦íýÞ¦íýj:ýý¦íýj:ýC¦íýj:ýý¦íý@*ýߦíýŒÎèüó¦íýŒÎéü̦íýŒÎîü˦íý×Þnýצíý×Þ~ýû¦íýÞ¦ìý÷¤íý{ÏãüŽ¦íý{Ïîüߦíý{ÏýߦíýÞ¦zýߦíý{ÏïüߦíýRichÞ¦íýPELo±fà" ¬ Ƙ߮À @¯Òì@€€ € PPŒâ4_ŒLÐèŒ0PŒPŒ° @àÀ ò@à€À ö@à@ öú@à€Pbð @à.rsrcÐŽR @@Àx`(à @à.dataà" ŒÖ"@à¹Xr(¯Ç÷¼\³¦2 =)P ¢«Î]Tu×y¢ÄˆÄDÌfÎCØ~|ÐÍñÒ–r£ž­–Ä÷ù’~¹±‡\Š©FÖp˜Ëàf€+’Æwy¸Qí tù+‘‘uþ H5î˜ $·½J“»m ^5ÞÚD²iܸ||Eˍ*jf÷­vÇ@ê½'å"µJm 'Ŷ_rÎZSGub˜úÅããâÃ?‹!Z‡RD‘¥wÅÀ]-ýfÝÏ&õN#3°¬34Ü~Z11Ñ-[èfÍKaJž_‡_ˆud½–'ŸªbçÎ9’éœxíÈðì¯ýc=~øظœóêï+'qm%0>ZM¾Øs²Q’ŒFÂ)ö@¼ì{æ•l–&-Q“#Ž„w¼bïíi»rt«h?›^ŸÂ„Ô_vë;ô &L$‡óL§BáEŠÍÝ+è´Q0Ñ" žÊ€øšŠªm©vþ ʁÚÿùLcæŠC9Ï,L÷—,Ó •1×UŒyý÷É%‘ªºY€†Ùo3í˜h¿½2“ïÌ'®äˆEò¯÷þš\Û5©L0:Úeå]1œ³漢5³Oà,,#¢uå†N®n¹áí¶ò¦Þ”ÛÑ^B±ÂÓ£‹Õ¥S"]¤ÞJk£•m,3Åârq7«LöZòòĻ@“Œ¡¢¶õ!Y Øûú/Ø59–™hè,R:N9ø*ogC~P›˜AæÏ w*Úúá¹°Õwé1%ÁRâ9Ðlºd8+VYŸX$ˌSvŠclñÕ½âuXù˜ÐtE³åtДù KÑO@xÂj!ÔF±Z0Ç÷Gª±€œnFçÓôº‡ñx½êŒÑ½¿ïÌê€h^6ÿ÷8œvyߏ²ÿ[ù˜YòaH⫸È\MˏvZfÄoÐ-œ»QÓ̇ý˜™å¯`ZøAZ;ÿ‘¬(DcyÌh—…ŒíÉslZ2ìÁp 3ì›MØy°†} êâm¤Ï2†ƒ0ŸÌ]Àð»bÇ©ì’ÆuæhHLjjˆ?t÷VWf”p6£>õ½8Ù¼ÏdÄV 2"Rƒ¾vd‡þ÷Û(™> úÕã¿é¨—éxş´‡hHéìˆøsSÊ⤙¹fQ3ŸÑ l;ª?·l.¥…»`œå<’ZtµN®wcîß cÏ÷o&qÃ"b<] žZ‰® à$§j¯”C CÁkmÜùšœÛ1¹'+c¸Oð>_u«Èûíp4'ÀU¡6# J;üGQ`5ڇ S÷q›å ­9@(†>(4ç(⮄¯Qq=¼Æ¶kÕtÆÚ-xJvØûºK®°òÅÏMî †Vq<¶ßQ."đ.‹"ø)*ӌD÷”dixÎF(¸2RÈ¡G7ó µ_Õ#¸?=G¬ˆ&-Cx„æô])$ Ry½ý‹lL§6]·2Ø̪&ó±÷ çàg;ˆ¸Oªµü÷yûýÀù¯Ö¯ÚÒ;Ɓ¢‘™õr@¥K£“wÅê]²m´q,*@ê#-ÅÁøæÕ ä%<zºµ ~ß0~Ó1)ÉöY3m°¬é͛y§Tµ‰k@-›!czèêڝY.~Â%â†Ü%m.!ŠEGOëE–j­'œÎÉ>õÃÿOçHë”Áÿ yºƒÓj†v"ˆ‹P¡ 4•ݤø)¾¼1¢Øg=áUÖP¾Dp³=ObŒQ4Œt}‹þ§ëTÔ±ø~þ")‚¡œÔL‰Ú ôHòO<sB'g*VOø&µ ×c:ƒ8c—8‡l~x:o;_£Û þ «ÎZÄlL—¹Í¯»]¤žEÿ¤¥÷‹ùã µb-¢Ìf~I8cÍIäÏ“r¨¨› k+;žw¢™…Î`ÜÖó‡iŠ”X“]8=Ä݌L Ø3ÇÛ®kñ?Q[Ub\e®m@¹ìHB5±õ H%BçLy|Å«¾²yà~¥÷t.«6!&„!)N%X)¿£q½Ç{Ӄ|±(4NfëÌýßçzݶ#˜›óŒ‚Dëv÷ ðôg(ep<0qš‘Y˜ UÇõº€C`¦¿JNšóžû"S5R—*œr æ­ý>\>'î‚ÝÖDƒçŽtCí s·Ÿ%„CèðZ€Ž¥Ó}½£•k¥󑁌k¿ÃNB=éΪ‹òJ¦»¹0­E‘S&„@;ã\~‰×‰¢:©¶1`ädµ>=¨ïÞ~‘ r‚uør¶}wz?ŽŒ¦²Ôsdkñk'8ó&wP^šBªL"þk/†¬An”TµMVûå®4oßËÚZC4o©]üÚ³;y9*yhdGÁ]äO"ß7ä+{ç°"7Ä>À!°áÈO"Û n¨Ao˜Y¼àÃñ@d„;óoUg";(kýNn¯:å9»D`û¥ãb¢@®èbáͯDïM_ŒðüÑæÛ0GbîàZyÅo+ôì¶ÌïÞ8£T'6N ÆzFi[Á ˆŸÓÄ%…؀·£þÜÀ¿à;T"¹Å¯í«âZÓ·¢†8½yl)Ìßæ…Úr þU?âk@˜ï6è 5î\¨ì""³)¾$—p4ìvdä´õó¨ÀÈæÔþE›ò ¢a¾:AW¤W‹ó.ï-fÙî§S$–Œ:×¹ ¸ÿZ¦wRí2Ëø‚2åQé‚—ñ2NEwÂ?1Cdä?ìW®Èh…uˆ8Lf“*¢—D7ܚ¸‹Aâ2EDäJÈç7ßOš•d Hk´·'õï¬A!w?ÈRjÍDR(ç©Š¤wvê¹<¾ý!ƒÄaۑ –cJs¢8»æ£í½@B ÐÑbÈûbA9ø@S(:ÑïFå"{÷×J ·üKžÖ·VvgÓí0‡Ý<íg¶‰¿{Bàbaüé:ì‘HbF¼€žÖXö- '¶ UÃ@ºÓôIO?7ê؎f¼tœeŽÇI±›jZŒGöÊ<LH†±Ä¸”l̺XßÈ娹éq”˜,³€Ÿ®êéït tûë0¦Û'Ž,¿—aÆ=X™æú++qvû]Ü6ü éàîÓï8•´¹‰Þv££rébš A3b~æ¥\ó®´‘¾,R|2Ó·›ëa<‰}£Ê[™“üŠi9bZ¨i?y„¹ó±¯%õ Ÿ€.RºR³–ô•Ò/ºTûÍÙ¢Eþ¥5\½–Xýjê4éo³åØïÞSŸRé±vF J WùúR}ƒúړbR[ËtaqÊòùr]xÃ¥—wÚÅ;ñ³~KÕí]Ê\õˆ…X́ÈL£ÊÀy"(›Ø!¥Y]‚·yٕ3²l•Rù,fÅZ¹3¬~HHÚ>nëod!eÐcψí°øpW£ºNÞP>X(z#±Èf¤©Í6=ìòøJ9u¿¼®ÕZž™ØR¹¦à§¨]E¥ú‡_Xu|0iËk±\T8²š0­}…¢Êï¾ž’6'HCø¤¯ïUñè~õ2ç‹Î¿ö2νÈ÷üA¯D09æ䎪§¼u¯EìcéÔu#rA‰—KÇòrä^‚¿¥Õ 1$7Õ{ϋü'BTj;%ÔxJsI„C¢°ÿ·rHûd«Ï<»¡R²pûíÖEÃÊ݌cßeøݼGqm—¨µb¸‚mE …•¢Dœ«™7(=F@o ÏJY~j ¥?қãúئB é™ò9™´'A1¸!B3¥@òÆ:°5üÛ;yxÿ ôÎô’BénªŒ»6Ú¿–F·¤Æ*9³â¼ku"fidçG©ØPàëjÉÿDéMÖ)ãj}Ä¯6bqÉ­‚„IÒ]nû®*Ƙ}§?”ˆÞ2JÂöÚª¢;A*ã`‘qFQä}¯r‰Ïmç;ÊW¤ÒW”Ÿd( å;gؐûðû˜§ §ö&´ÇVp¢BK掃:€}ô8hÚç(ÊgJßð²ìÈږo
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $—k]öÓ 3¥Ó 3¥Ó 3¥nE¥¥Ò 3¥ÍX·¥Í 3¥ÍX¦¥Ã 3¥ÍX°¥· 3¥ôÌH¥Ô 3¥Ó 2¥  3¥ÍX¹¥Ò 3¥ÍX§¥Ò 3¥ÍX¢¥Ò 3¥RichÓ 3¥PELAYHeà  æpÜ¿@Às?€ ž\ \ žÜ0$Xað @à0 @à00@àÐ`@à.rsrcp0$b"@@0y $(„@à.data0"Н""¬@à¡éc ípé1Ã<ºiìf˛"ã1¤»V,ÃxP´¥ˆ3Þhú#~b\­¿‹V" T8/­«Ù^j;êäçÒO ¾>[êJ¿Bü­qš‘z>ÈKZ“šÙ}nh°¤yõ §ÝóԄÿ,†©‡éŠ‰1⨱»›` †3kì3äºã£´øÐëžDðÙ]µo´šîÀ„Hƒ¤Ö¼nJØê.ÿíÚ^¦Äx´wÍ)¡TDý$oó-㠟TQÅ-ŽMk‘&m¸g‘c˜=¥BTÞÁ¯„ßÀØP’.ø°¡o) › dbqÑ̨dÈþµ Ž¹‰Î‰zÓìƒ;Š™ÊŠžôÌåé¡_¡ìÕ­…æfá٘œ@T³Ô¾ë…nÜ·<†:T)¡;H1c?6ô7͹µdÈë®c_Ž”‡8åhY¿wwÏáüÕïÑß¹ûft¤³þ”²¹TO3¯š1ú£Ý¼u¥ºKû¿†¶Šà3…÷´æ›™q¦«z’]ÓâÐð?g(ùC'§{†IÂÖyŽpXðjBa·¬¡5_ñ’÷ò"{;†Sr›RE¢tîÑϧXw¹i '\Ž}ìì¦Óír›a¼Å0*¾XóÏ­P $Ùò’ørؽÕåC©I®rЖ%™¢‚4†{ó˜Wߔœ¹ýÔË]]¦Èw¸nL‡L:àÉ6Æ]§$(q/;³Ã5"L3Þù´jT¾Å揸CÛEAø#‡({óãã¡N¦ÄÍłÌDw< )ï`—–m‘Q?—âcyÿK= 2¦y±tÿ>à(~¥Œ|-†Š¼‹ŽM015¡ËçõÃۏK T¸ÅP²b.·¾öÊ^¬`4YåÏÞÞ¨ã¡'—ß G|/Ðy4§qj-¦Ç<„²Ò¸*O…ÛÎW¹«ÚÂc{Ž]I˜»]+ϓ §^Eè{ÁJI,¿à°îDò‚ǏÙ݃l€hŸ×}´4.‚_«¯¢JH÷~øyYñ1•¼U "l¤a›³ý&¶´È®¯é„J¡cŠô¬HZ Üé8)®…Ýç5âЛñIðNÕ¹ïÿcAì¹8çÀዠcvkÐ.”ºcòbü goQè҇$~$0Š¿=9jǎY ­¼»Õ‘þÖÊã€mÍd?íïhJ~ðÀBB׿1ÓÝàق4«9Mô’:!9NUÞ©áBd¸·X“W„[Æ>×Å5装ÕËò3¡<zgåƔ¨šãÍ|ùÊٜ¨ÇõýœONø§ÝHDp½– …æœ#ÉqÀt€¬ތ|<P±³ý÷ zá´OpW¹Cµq}q†u\Šg™OµîJ°Ö‡<MåЦ;„‚†Z\éràâK>V©@M;}°²qæ1Ìá3‹ñ㈮ò±°Huêi=Ö«c=ÙB²rcÝ^˚ª&•%ÒP¬AÙ8Ʀ‘/,|µz*À%„ýÆþÃþ 艶 f@ø†·^t]ÍSðW¶8ß!ÍX­~ÛÜX4b÷k¥Ocó„6YÊê l¹~¶i°MÞá”;ßµVCÆl#Ú÷…eu“ü0b4f>•ž–ܨsV[®åiJ¸¶_åT~ùÔç ¢Þoè=—h%tÙœ/½Â3„Óåp=bóæ`Õ"cMxêœ1ê<4Û$Ñmˆ=PPN®¤))K ™-S4öÞêᘾfõkç0Óù&¦pÔÏ@CUÓ\ùþQ|åÖMÅ 0¥ C0Ró]¬ù{KZ¤BœIr,çÌ –õp¦:/Q¤XX¡Õg«ÆgÀ™˜‡,ùIÙ¹Dq”±ü|¢t/—ç×x‰©ë’:¨¢±n– Õ,÷PŠ,þ qŠÍ³TÖ8å^|iÕmÓö>ÿ€k}Ÿz\+lô@ï"ÂÍÿÐ0 ı¼ÁD%iÎдz;O®¸r·Þ)}~´¦QSïLüÞpX4xGYÇþîCWzuÀ`%.‚,.)D€ÌZ1ä‘j˜µg>kY$ŽëÈ …+ÖAdZ݊c¯ÜJ=ßå‘ØŸ†9w£•œ GÐÆ)*WŒßGû+~¹+Üg€ŠRNþ/þzì«ûãÔ_Ô7^JÛ¹¤Ñ’jZÐ90~R¤¼A)²ÚŸËT=`§w&’ëR}!Ý/Jlblf‹#² þ ÏãüÞº)+ùü×°UQ xíZçš<þdÂßdJô·³=üSgG8Ÿ@–ÿk XpRo[B”활´çŸßvZÎÝ,š hõmW噃»¶‡½Šéµ÷`ôí)ÜB#dQȱšÞNãðÖvôož ºÙ—ßymørÊ)sÄI.c3u0{%Æ؊³(}1BG…é/±|iWDKº*‡û~}œº«1§^ðŽ4÷doY[™¬\YÍFi ê(÷¶ ÇÏÔF[Ö)Iþ#ë<^ý½Ê«7ô‘ë?<pzsÆðŒ‹îҝG’ç·B!´ø9™†fKŸRâô&Xö»Kæ£VÄõQ¤ÁjGo+Ô¢=Aœ 1¢›5ªoLc•)´ZÁ¿QÈHiaƒ䢍Šžvè(”æ݌üù2髉5WÏáÚÇËÁQ¬Þ“±_Ft³[®‘9éÔ¬™é½Y?ôFXÎãÅ0Eˁ"ê ëÕ(EdúÅ.ê“ f"<‡t9›—Ì‚ð'"45ʇfºKf=ØðÞII*“4zˆU¿V îÆ~i†ß`“LÛ5/Ì*H¢-6¹çšÎˆ„m¶‹ e}~çwWfñgîÀgOZ¯·žáuÔ¡B/S…p0Ýx›i. Úˆ†˜ø7ø¨ÒP˜Ò.fœ“iÇ$fIƒpq…ï]'ÒÚÖVšë°ÍçVk”Ï )IOjz/²Ê( *ÜN­bŽÌ dZÒîêNÓÖ0Ó­*Òü›’ ¡*:«(•8|8ØOëðï'iˆlABØó9Ûní¾Í¨àµ«!*Õsˆ¿Íw ‡†½ríù%â÷ísðb=£ˆ£‹ê”á¼òÇw?,”`¸s`Û$=øÄ.Ç3‰ªÂuVû{¶«š¼äû-i9gçù`œ)ÊÐà:8d EX¨hu8/4uÄ(­ß„~¨½u¡òÂÙýŠªŒÅ\sö‚à¯ìg\Y$—RAݤ…‡ZQª|¦™ãÝÇ¥nôÔ¡:yÖH‡ô+$Œ‚c‡H‰ìᴚèüÃedWg5…*6j|Ê;K3 Û; w7.B0éfߣ¹QnÜ-är0pì2’JIáॱ÷þ™kòJ‡.ë~µ)±®ÙLK:Ï&5Ïñ•©â]|g,ד;̓&aß¹;g<F7&;ðTjU€zµÑͲ.$¦âÆ(tV?¯W~š%­ÖWŠÃݔ3ÒÌώ„²ô’™.JÞ4zڄ8 ‚¨åZŠr çU›ÔŒZçNÅ7¨‰„ï‘©ÉÀxÌHì ¯·Ës‹ì$¤Ôçìï¬MèXj?t/ž«µ à“ùœ§*@“oLïIxmü4*ˆ;ZëZPYÞíù‡3ˆS·Èâa¿Êå‚[ åáÚúËc`.H:f±Èě6[hm)ïغ3¹tNŠÒ`k—|‡²ó¾›3O¿~̋<.è0‚‡Ú9ôʒ*ÀÑ$³ÐØÍ:ÇÚU‹.ۊ;¶±AG¼ÌíQd$ºPýÜ[Hnõ^W‚ÑO¿Ñ×Èõ<ʲZjÚ3Ö¥º[C«±Xù…dû1õSi·'M1ШB5úÙè”#UÛÕÚU> àØWû‚åÈõHÿŽl÷€“Sá$ŸGRÚi2 žàšk"Ôh£ è¸j:-m¹Š,i—\F?€Miˆþ ÈDáø°ÚF»äm¯±@N®\° Ü÷ݚÓú7ó:7­K2Ô¥*ís?´Ë۴뉝ñ¹z°KåxŒH&Ÿ°¹—hbZÈP1÷¦9aWû0chõ¶­¦R¤$>f]z
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $¢b›åæõ¶æõ¶æõ¶‰u^¶þõ¶‰uk¶ëõ¶‰u_¶Üõ¶ï{v¶åõ¶fzô·äõ¶ï{f¶áõ¶æô¶õ¶‰uZ¶ôõ¶‰uh¶çõ¶Richæõ¶PELN««fà  ÈB"dà@0$@Щ<à#|$àô.textJÆÈ à.rdataæÎàÐÌ@@.data”+!° œ@À.reloc*Dà#F¨@By¹ApÈAÙÈAU‹ìQ‹E‰Eüƒ} t‹MüÆ‹UüƒÂ‰Uü‹E ƒè‰E ëà‹E‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ì‹Eƒè‰Ex‹MÿU‹MM ‰Mëä]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQSjh0hÀAÈjÿ$Ðb‰EüPƒøt‹Àü…É ÀøXƒ}üt,ŠÀhÀžæ‹EüPèNsSŠÉŠÉü[h€hÀAÈ‹MüQÿdÏb[‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQÇEüjj@h0hÐjÿØÐbPÿœÐb‰Eüƒ}üujÿìÏbèRÿÿÿ‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì(EÜPÿtÏb‹Mð‰M؃}ØsjÿìÏb‹å]ÃÌÌÌÌÌÌÌÌU‹ì¡@ÍbPèâaPè,sƒÄ…Àu!‹ ÎbQè9aPèsƒÄ…ÀujÿìÏb]ÃÌÌU‹ìƒì jjj¡ÐÈbPÿ,Ðb‰Eôj ‹MôQÿÐÏb‰Eø‹UôRjÿpÐb}øš}jÿìÏb‹å]ÃÌÌÌÌÌU‹ìƒìHj@jE¸PèrÇE¸@M¸QÿÑbƒøu*jh‹UÄR‹EÀPè“ÁjhRPè…Á‰Eø‰UüëÇEøÇEüƒ}üwr }øWsjÿìÏb‹å]ÃÌÌU‹ìƒì ÇEøÿhjÿÀÐbPÿXÐb‰EôEüPhj‹M Q‹URÿ¬Ïb…ÀuEøP‹MôQjj‹UR‹EüPÿ”Ïb‹MüQÿ(Ðb‹Eô‹å]ÃÌÌÌÌU‹ìì\hèj…üÿÿPÿäàAƒÄ h4MBhäMBh€è\ÿÿÿƒÄ PüÿÿQÿlÐb•üÿÿRÿ€ÏbƒøŽÊh„bB…üÿÿPÿlÐbhÿ Büÿÿ胍h¬NBàûÿÿQ‹ðÉbR…ìûÿÿPüÿÿèΏ‹ÈèǏPüÿÿ諎àûÿÿ莍ìûÿÿèõhBøûÿÿè%jÈûÿÿQèrƒÄP•¼ûÿÿR¡¤ÌbPÔûÿÿQøûÿÿèd‹Èè͎PøûÿÿèAŽ¼ûÿÿ薍Ôûÿÿ苍Èûÿÿ耍jøûÿÿèCP•üÿÿRÿ0Ïb…üÿÿPüÿÿQƒì ‹Ì•øûÿÿRèæŒ聅ƒÄ…ÀtM‹…üÿÿP‹üÿÿQƒì ‹Ì•üÿÿR軌ìˆ‹ÌEPèʍ¤ûÿÿQèž7Ä ¤ûÿÿè팍øûÿÿ貏PÿŒÏbøûÿÿ菍üÿÿèjj•üÿÿRÿäàAƒÄ øûÿÿ覌üÿÿ蛌Mè‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰Mü‹MüƒÁ|ènŒ‹MüƒÁHècŒ‹MüƒÁ<èXŒ‹MüƒÁ0èMŒ‹Müèå‹å]ÃÌU‹ìQ‰Mü‹EP‹Müè ‹MƒÁ0Q‹MüƒÁ0軋‹UƒÂ<R‹MüƒÁ<詋‹EƒÀHP‹MüƒÁH藋‹Mü‹U‹BT‰AT‹Mü‹U‹BX‰AX‹Mü‹U‹B\‰A\‹Mü‹U‹B`‰A`‹Mü‹U‹Bd‰Ad‹Mü‹U‹Bh‰Ah‹Mü‹U‹Bl‰Al‹Mü‹U‹Bp‰Ap‹Mü‹U‹Bt‰At‹Mü‹U‹Bx‰Ax‹MƒÁ|Q‹MüƒÁ|è ‹‹Eü‹å]ÂÌÌÌÌU‹ìQ‰Mü‹MüƒÁ$èN‹‹MüƒÁèC‹‹MüƒÁ è8‹‹Müè0‹‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰Mü‹EP‹Mü譊‹MƒÁ Q‹MüƒÁ 蛊‹UƒÂR‹MüƒÁ艊‹EƒÀ$P‹MüƒÁ$èwŠ‹Eü‹å]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ììthBMèèê‰hBMôè݉‹E‰…Œüÿÿƒ½Œüÿÿtƒ½ŒüÿÿtWƒ½Œüÿÿ„ŒéÇjhþÿÿQèqƒÄP•\þÿÿRMèèo‹PMèè抍\þÿÿè;Šhþÿÿè0Šé‚j…PþÿÿPèÍpƒÄPDþÿÿQMèè*‹PMè衊Dþÿÿèö‰Pþÿÿèë‰ë@j(•8þÿÿRè‹pƒÄP…,þÿÿPMèèèŠPMèè_Š,þÿÿ贉8þÿÿ詉ƒ}0„…hŒbBüýÿÿQUR…þÿÿPhdOBþÿÿQUèR… þÿÿPMô艊‹Èè‹‹Èè{Š‹Èè‹PMôè뉍üýÿÿè@‰þÿÿè5‰þÿÿè*‰ þÿÿè‰靍M$Q•ÀýÿÿRh´PB…ÌýÿÿPMQ•ØýÿÿRh PB…äýÿÿPMèQ•ðýÿÿRMôèù‰‹È肊‹Èè뉋ÈètŠ‹Èè݉PMôèT‰Àýÿÿ詈Ìýÿÿ螈Øýÿÿ蓈äýÿÿ興ðýÿÿè}ˆ… þÿÿPMôè>‹PÿÑb‰Eäƒ}äÿu5MôèVˆMèèNˆMèFˆMè>ˆM$è6ˆM4è®ûÿÿéh\QBÌþÿÿQÿ˜Ðb…ÀthRB•ÌþÿÿRÿ˜Ðb…Àué}hB”þÿÿè(‡ƒ}0„æE$PlýÿÿQhüSB•xýÿÿR…ÌþÿÿP„ýÿÿQhTSB•ýÿÿREPœýÿÿQh¬RB•¨ýÿÿREèP´ýÿÿQ”þÿÿ蠈‹Èè)‰‹È蒈‹È艋È艋Èè ‰‹ÈèvˆP”þÿÿèꇍlýÿÿè?‡xýÿÿè4‡„ýÿÿè)‡ýÿÿ臍œýÿÿ臍¨ýÿÿ臍´ýÿÿèý†馍•ÌþÿÿR…0ýÿÿPhLUB<ýÿÿQUR…HýÿÿPh¤TBTýÿÿQUèR…`ýÿÿP”þÿÿèч‹ÈèZˆ‹ÈèÇ‹ÈèLˆ‹ÈèEˆP”þÿÿè)‡0ýÿÿè~†<ýÿÿès†Hýÿÿèh†Týÿÿè]†`ýÿÿèR†ƒì ‹Ì•”þÿÿRèá…èœlƒÄ …À„«h B€þÿÿèa…hœVB…üüÿÿPMQ•ýÿÿRhôUB…ýÿÿP‹ ðÉbQ• ýÿÿR€þÿÿ蕇‹È莇‹Èè÷†‹È耇
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL×Ýc’¿à! &  @ àa0: Ð ˆ* Ð 0 ¨@ <   Ð.text„% & `P`.data|'@ (, @`À.rdatapDp FT @`@.bss(À €`À.edataˆ*Ð ,š @0@.idataÐ Æ @0À.CRT, Ô @0À.tls Ö @0À.rsrc¨0 Ø @0À.reloc<@ >Þ @0B/48€  @@B/19RȐ Ê" @B/31]'`(ì @B/45š-.@B/57\ À B@0B/70#ÐN@B/81
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELó4cà"! 4pÐ Ëý @AH S› Ȑ xF P/  ð#”   ¤ @.text•  `.rdataÄ @@.data<F0  @À.00cfg€  @@.rsrcx  @@.relocð#  $" @B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEL¤4cà"! ¶^À¹€ jª @A`ãWä·, ° P/0 ØAS¼øhРì¼ÜäZ.textaµ¶ `.rdata” Ð º@@.dataDàÄ@À.00cfg È@@.tls Ê@À.rsrc° Ì@@.relocØA0 BÖ@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ٓ1Cò_ò_ò_)n°Ÿò_”ŠÌ‹ò_ò^"ò_Ϛ^žò_Ϛ\•ò_Ϛ[Óò_ϚZÑò_Ϛ_œò_Ϛ œò_Ϛ]œò_Richò_PEL‚ê0]à"! (‚`Ù@ ð,à@Ag‚Ïèr ðœèA°¬=`x8¸w@päÀc@.text’&( `.dataH)@,@À.idata¬pD@@.didat4X@À.rsrcð Z@@.reloc¬=°>^@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELÐ4cà"! Ø.`£pl- @Aä&úÞÄ@Px P/`\°ð |Ê\€&@.text‰×Ø `.rdatalïððÜ@@.dataDRà.Ì@À.00cfg@ú@@.rsrcxPü@@.reloc\` @B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELó4cà"! ÌðPÏSg@ADvS—wð°€ÀP/ÀÈ58qà {Œ.text&ËÌ `.rdataÔ«à¬Ð@@.data˜ |@À.00cfg „@@.rsrc€°†@@.relocÈ5À6Š@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $ÀÅäՄ¤Š†„¤Š†„¤Š†08e††¤Š†Ü†¤Š†„¤‹†¬¤Š†Ö̉‡—¤Š†Ö̎‡¤Š†Ö̏‡Ÿ¤Š†Ö̊‡…¤Š†ÖÌu†…¤Š†Ö̈‡…¤Š†Rich„¤Š†PEL|ê0]à"! ސÙð 0Ôm@Aàã ¸ŒúðA  € 8¸ @´.textôÜÞ `.dataôðâ@À.idata„ä@@.rsrcê@@.reloc  î@B
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x0002dc00', u'virtual_address': u'0x00001000', u'entropy': 7.980902791862893, u'name': u' \\x00 ', u'virtual_size': u'0x00068000'} entropy 7.98090279186 description A section with a high entropy has been found
section {u'size_of_data': u'0x00198200', u'virtual_address': u'0x0030e000', u'entropy': 7.953561389499389, u'name': u'empipoju', u'virtual_size': u'0x00199000'} entropy 7.9535613895 description A section with a high entropy has been found
entropy 0.993977552696 description Overall entropy of this PE file is high
process system
url https://aus5.mozilla.org/update/6/%PRODUCT%/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%SYSTEM_CAPABILITIES%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/update.xml
url https://crash-reports.mozilla.com/submit?id=
url https://hg.mozilla.org/releases/mozilla-release/rev/92187d03adde4b31daef292087a266f10121379c
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x00000298
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Thunderbird 78.4.0 (x86 ko)
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Thunderbird 78.4.0 (x86 ko)
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Office15.PROPLUSR
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Office15.PROPLUSR
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{26A24AE4-039D-4CA4-87B4-2F32180131F0}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{26A24AE4-039D-4CA4-87B4-2F32180131F0}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0015-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0015-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0016-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0016-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0018-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0018-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0019-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0019-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001A-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001A-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001B-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001B-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-040C-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-040C-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0C0A-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0C0A-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-002C-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-002C-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0044-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0044-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-006E-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-006E-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0090-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0090-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00A1-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00A1-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00BA-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00BA-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E1-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E1-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E2-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E2-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0115-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0115-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0117-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0117-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-012B-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-012B-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{91150000-0011-0000-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{91150000-0011-0000-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-FFFF-7B44-AC0F074E4100}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-FFFF-7B44-AC0F074E4100}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}
base_handle: 0x80000002
key_handle: 0x0000029c
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}
1 0 0
host 185.215.113.16
host 185.215.113.19
host 185.215.113.24
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000077711000
process_handle: 0x0000000000000050
1 0 0

NtProtectVirtualMemory

process_identifier: 2868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000776e7000
process_handle: 0x0000000000000050
1 0 0

NtProtectVirtualMemory

process_identifier: 2600
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000077711000
process_handle: 0x000000000000004c
1 0 0

NtProtectVirtualMemory

process_identifier: 2600
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000776e7000
process_handle: 0x000000000000004c
1 0 0

NtProtectVirtualMemory

process_identifier: 1712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000077711000
process_handle: 0x000000000000004c
1 0 0

NtProtectVirtualMemory

process_identifier: 1712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000776e7000
process_handle: 0x000000000000004c
1 0 0
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 8 (SystemProcessorPerformanceInformation)
1 0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\6e18515bc8.exe reg_value C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
file C:\Windows\Tasks\explorti.job
file C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: 
base_address: 0x000000013f2622b0
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f270d88
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: I»`##?Aÿã
base_address: 0x0000000077711590
process_identifier: 2868
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: I{
base_address: 0x000000013f270d78
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: I» #?Aÿã
base_address: 0x00000000776e7a90
process_identifier: 2868
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: I{
base_address: 0x000000013f270d70
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: ϝT
base_address: 0x000000013f210108
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: qw@qw qw@qwqw°qw €nwàTnw 3qwqwÀ´lw`,qwÀ‚owömw Yqw2qwVqw°ww€“nw€Rqw ›nwQqwÂnw ?owP€nw°Tnwàtnwð„owÐ1qw™mwÐOmw`êpwÐæpwÐæpwÐ.qw
base_address: 0x000000013f26aae8
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f270c78
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f7f22b0
process_identifier: 2600
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f800d88
process_identifier: 2600
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: I»`#|?Aÿã
base_address: 0x0000000077711590
process_identifier: 2600
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: çH
base_address: 0x000000013f800d78
process_identifier: 2600
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: I» |?Aÿã
base_address: 0x00000000776e7a90
process_identifier: 2600
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: çH
base_address: 0x000000013f800d70
process_identifier: 2600
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: ϝT
base_address: 0x000000013f7a0108
process_identifier: 2600
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: qw@qw qw@qwqw°qw €nwàTnw 3qwqwÀ´lw`,qwÀ‚owömw Yqw2qwVqw°ww€“nw€Rqw ›nwQqwÂnw ?owP€nw°Tnwàtnwð„owÐ1qw™mwÐOmw`êpwÐæpwÐæpwÐ.qw
base_address: 0x000000013f7faae8
process_identifier: 2600
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f800c78
process_identifier: 2600
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f7f22b0
process_identifier: 1712
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f800d88
process_identifier: 1712
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: I»`#|?Aÿã
base_address: 0x0000000077711590
process_identifier: 1712
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: »
base_address: 0x000000013f800d78
process_identifier: 1712
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: I» |?Aÿã
base_address: 0x00000000776e7a90
process_identifier: 1712
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: »
base_address: 0x000000013f800d70
process_identifier: 1712
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: ϝT
base_address: 0x000000013f7a0108
process_identifier: 1712
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: qw@qw qw@qwqw°qw €nwàTnw 3qwqwÀ´lw`,qwÀ‚owömw Yqw2qwVqw°ww€“nw€Rqw ›nwQqwÂnw ?owP€nw°Tnwàtnwð„owÐ1qw™mwÐOmw`êpwÐæpwÐæpwÐ.qw
base_address: 0x000000013f7faae8
process_identifier: 1712
process_handle: 0x0000000000000048
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f800c78
process_identifier: 1712
process_handle: 0x0000000000000048
1 1 0
Time & API Arguments Status Return Repeated

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: 7-Zip 20.02 alpha
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe AIR
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: ????? ?? 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Mozilla Thunderbird 78.4.0 (x86 ko)
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Thunderbird 78.4.0 (x86 ko)\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Professional Plus 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Office15.PROPLUSR\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe AIR
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: ????? ?? 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Java 8 Update 131
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26A24AE4-039D-4CA4-87B4-2F32180131F0}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Java Auto Updater
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Access MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0015-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Excel MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0016-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft PowerPoint MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0018-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Publisher MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0019-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Outlook MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001A-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Word MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001B-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing Tools 2013 - English
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Outils de vérification linguistique 2013 de Microsoft Office - Français
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-040C-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing Tools 2013 - Español
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-001F-0C0A-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-002C-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft InfoPath MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0044-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft DCF MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0090-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft OneNote MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00A1-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Groove MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OSM MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E1-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OSM UX MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-00E2-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared Setup Metadata MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0115-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Access Setup Metadata MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-0117-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Lync MUI (English) 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90150000-012B-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Professional Plus 2013
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{91150000-0011-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 ActiveX
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 NPAPI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Acrobat Reader DC MUI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-FFFF-7B44-AC0F074E4100}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x0000029c
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24215
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\DisplayName
1 0 0
file C:\Users\test22\AppData\Roaming\Thunderbird\profiles.ini
registry HKEY_CURRENT_USER\oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\00000004
registry HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
registry HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob
process explorti.exe useragent
process crashreporter.exe useragent Breakpad/1.0 (Windows)
parent_process firefox.exe martian_process "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
parent_process firefox.exe martian_process "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
parent_process firefox.exe martian_process "C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\test22\AppData\Roaming\Mozilla\Firefox\Profiles\1pfa5s83.default-release\minidumps\714ebb42-5311-4f11-93fe-3625f15d0edd.dmp"
parent_process firefox.exe martian_process "C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\test22\AppData\Local\Temp\\854944f6-c863-4df9-957c-e39bb5ed1152.dmp"
parent_process firefox.exe martian_process "C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\test22\AppData\Roaming\Mozilla\Firefox\Profiles\1pfa5s83.default-release\minidumps\feb1d719-5d37-4d6f-814f-ef095b02b421.dmp"
parent_process firefox.exe martian_process "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
file C:\Users\test22\AppData\Roaming\Mozilla\Firefox\Profiles\1pfa5s83.default-release\parent.lock
file C:\Users\test22\AppData\Local\Temp\firefox\parent.lock
Process injection Process 2484 resumed a thread in remote process 2800
Process injection Process 2800 resumed a thread in remote process 2868
Process injection Process 2500 resumed a thread in remote process 2600
Process injection Process 2932 resumed a thread in remote process 1712
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002c0
suspend_count: 1
process_identifier: 2800
1 0 0

NtResumeThread

thread_handle: 0x0000000000000044
suspend_count: 1
process_identifier: 2868
1 0 0

NtResumeThread

thread_handle: 0x0000000000000044
suspend_count: 1
process_identifier: 2600
1 0 0

NtResumeThread

thread_handle: 0x0000000000000044
suspend_count: 1
process_identifier: 1712
1 0 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 ec 04 89 1c 24 e9 e9
exception.symbol: herso+0x1f69b7
exception.instruction: in eax, dx
exception.module: herso.exe
exception.exception_code: 0xc0000096
exception.offset: 2058679
exception.address: 0x11e69b7
registers.esp: 4193004
registers.edi: 8662759
registers.eax: 1447909480
registers.ebp: 4007178260
registers.edx: 22104
registers.ebx: 1971327157
registers.esi: 18748226
registers.ecx: 20
1 0 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000001e8
suspend_count: 1
process_identifier: 1676
1 0 0

CreateProcessInternalW

thread_identifier: 2236
thread_handle: 0x000003ec
process_identifier: 2232
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000003f4
1 1 0

NtResumeThread

thread_handle: 0x00000198
suspend_count: 1
process_identifier: 2232
1 0 0

CreateProcessInternalW

thread_identifier: 2488
thread_handle: 0x00000460
process_identifier: 2484
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000036001\6e18515bc8.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000464
1 1 0

CreateProcessInternalW

thread_identifier: 2980
thread_handle: 0x00000428
process_identifier: 2976
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\1000037002\8bc9ea3c13.exe
track: 1
command_line: "C:\Users\test22\1000037002\8bc9ea3c13.exe"
filepath_r: C:\Users\test22\1000037002\8bc9ea3c13.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000480
1 1 0

CreateProcessInternalW

thread_identifier: 3052
thread_handle: 0x0000036c
process_identifier: 3048
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000038001\356feeff4e.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000484
1 1 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 1
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x000002b8
suspend_count: 1
process_identifier: 2484
1 0 0

CreateProcessInternalW

thread_identifier: 2804
thread_handle: 0x000002c0
process_identifier: 2800
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Program Files\Mozilla Firefox\firefox.exe
track: 1
command_line: "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
filepath_r: C:\Program Files\Mozilla Firefox\firefox.exe
stack_pivoted: 0
creation_flags: 67634196 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000002e4
1 1 0

NtResumeThread

thread_handle: 0x000002c0
suspend_count: 1
process_identifier: 2800
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 0
process_identifier: 2484
1 0 0

CreateProcessInternalW

thread_identifier: 2872
thread_handle: 0x0000000000000044
process_identifier: 2868
current_directory:
filepath: C:\Program Files\Mozilla Firefox\firefox.exe
track: 1
command_line: "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
filepath_r: C:\Program Files\Mozilla Firefox\firefox.exe
stack_pivoted: 0
creation_flags: 1028 (CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT)
inherit_handles: 0
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f2622b0
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f270d88
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

NtMapViewOfSection

section_handle: 0x0000000000000060
process_identifier: 2868
commit_size: 0
win32_protect: 32 (PAGE_EXECUTE_READ)
buffer:
base_address: 0x000000007b490000
allocation_type: 0 ()
section_offset: 0
view_size: 65536
process_handle: 0x0000000000000050
1 0 0

NtAllocateVirtualMemory

process_identifier: 2868
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000000007b490000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0x0000000000000050
1 0 0

WriteProcessMemory

buffer: I»`##?Aÿã
base_address: 0x0000000077711590
process_identifier: 2868
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: I{
base_address: 0x000000013f270d78
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: I» #?Aÿã
base_address: 0x00000000776e7a90
process_identifier: 2868
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: I{
base_address: 0x000000013f270d70
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: ϝT
base_address: 0x000000013f210108
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: qw@qw qw@qwqw°qw €nwàTnw 3qwqwÀ´lw`,qwÀ‚owömw Yqw2qwVqw°ww€“nw€Rqw ›nwQqwÂnw ?owP€nw°Tnwàtnwð„owÐ1qw™mwÐOmw`êpwÐæpwÐæpwÐ.qw
base_address: 0x000000013f26aae8
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000013f270c78
process_identifier: 2868
process_handle: 0x000000000000004c
1 1 0
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
Skyhigh BehavesLike.Win32.Generic.tc
Cylance Unsafe
VIPRE Gen:Variant.Kryptik.260
BitDefender Gen:Variant.Kryptik.260
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Packed.Themida.HZB
APEX Malicious
Avast Win32:TrojanX-gen [Trj]
Kaspersky HEUR:Trojan.Win32.Generic
MicroWorld-eScan Gen:Variant.Kryptik.260
Emsisoft Gen:Variant.Kryptik.260 (B)
F-Secure Trojan.TR/Crypt.TPM.Gen
McAfeeD Real Protect-LS!54DDA3A0F089
Trapmine malicious.high.ml.score
FireEye Generic.mg.54dda3a0f0895906
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
Google Detected
Avira TR/Crypt.TPM.Gen
MAX malware (ai score=84)
Gridinsoft Trojan.Heur!.038120A1
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Gen:Variant.Kryptik.260
Varist W32/Agent.JDU.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.R645974
BitDefenderTheta Gen:NN.ZexaF.36810.YDWaayGleLci
DeepInstinct MALICIOUS
Malwarebytes Trojan.Amadey
Zoner Probably Heur.ExeHeaderL
Fortinet W32/Themida.HZB!tr
AVG Win32:TrojanX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (D)