Summary | ZeroBOX

ramos.exe

Client SW User Data Stealer info stealer Amadey ftp Client Code injection HTTP Escalate priviledges PWS KeyLogger Internet API Http API ScreenShot Socket AntiDebug ftp PE File PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 12, 2024, 8:50 a.m. Aug. 12, 2024, 9:54 a.m.
Size 1.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 83847cf6a192b9983d7a07be74cdab7b
SHA256 4e5a7df168270d5bfd2491582da2a10c921cf04b1b5daed922af9c8bce20f4ce
CRC32 B6DFC223
ssdeep 49152:ExRFPlGjyvW1YqvRhXBERh7qzxwALvCODAE7/JvpmbFHiM4:ElPlGoqvnXu7qtwGCC3vcFHiM
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
185.215.113.100 Active Moloch
185.215.113.16 Active Moloch
185.215.113.19 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.19:80 -> 192.168.56.101:49164 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49165 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49165 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 185.215.113.100:80 -> 192.168.56.101:49175 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49168 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044243 ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in Malware Command and Control Activity Detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044244 ET MALWARE Win32/Stealc Requesting browsers Config from C2 Malware Command and Control Activity Detected
TCP 185.215.113.100:80 -> 192.168.56.101:49175 2051828 ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044246 ET MALWARE Win32/Stealc Requesting plugins Config from C2 Malware Command and Control Activity Detected
TCP 192.168.56.101:49171 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.100:80 -> 192.168.56.101:49175 2051831 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49168 -> 185.215.113.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044248 ET MALWARE Win32/Stealc Submitting System Information to C2 Malware Command and Control Activity Detected
TCP 185.215.113.16:80 -> 192.168.56.101:49171 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49171 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49171 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044301 ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 185.215.113.100:80 -> 192.168.56.101:49175 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.100:80 -> 192.168.56.101:49175 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49171 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49171 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49171 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044303 ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044302 ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044305 ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044306 ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 185.215.113.100:80 2044307 ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity A suspicious filename was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
file C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l2-1-0.dll
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayVersion
registry HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section \x00
section .idata
section
section zghbmtmp
section ekzcdlcs
section .taggant
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: ramos+0x3150b9
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 3231929
exception.address: 0xd550b9
registers.esp: 1570928
registers.edi: 0
registers.eax: 1
registers.ebp: 1570944
registers.edx: 15687680
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 04 24 c7 04 24 9d 6e 3c 46 89 04
exception.symbol: ramos+0x6cf8e
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 446350
exception.address: 0xaacf8e
registers.esp: 1570896
registers.edi: 1968898280
registers.eax: 11222266
registers.ebp: 4001214484
registers.edx: 10747904
registers.ebx: 1968898280
registers.esi: 3
registers.ecx: 1969094656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb b9 ec 05 eb 7f e9 6a ff ff ff 53 55 bd 2e e3
exception.symbol: ramos+0x6d797
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 448407
exception.address: 0xaad797
registers.esp: 1570896
registers.edi: 1968898280
registers.eax: 11196830
registers.ebp: 4001214484
registers.edx: 0
registers.ebx: 1968898280
registers.esi: 3
registers.ecx: 237801
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 b2 05 00 00 8b 1c 24 e9 d1 01 00 00 89 04
exception.symbol: ramos+0x6e094
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 450708
exception.address: 0xaae094
registers.esp: 1570892
registers.edi: 1968898280
registers.eax: 32785
registers.ebp: 4001214484
registers.edx: 1104926759
registers.ebx: 11198146
registers.esi: 3
registers.ecx: 478115951
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 c8 00 00 00 81 c1 75 0b 6f 7b 57
exception.symbol: ramos+0x6e672
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 452210
exception.address: 0xaae672
registers.esp: 1570896
registers.edi: 1968898280
registers.eax: 32785
registers.ebp: 4001214484
registers.edx: 1259
registers.ebx: 11230931
registers.esi: 3
registers.ecx: 4294937896
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 ba 13 0b f3 4f 01 d7 8b 14 24 56 89 e6 e9
exception.symbol: ramos+0x1e4bb8
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 1985464
exception.address: 0xc24bb8
registers.esp: 1570892
registers.edi: 12732789
registers.eax: 30306
registers.ebp: 4001214484
registers.edx: 11190237
registers.ebx: 425984
registers.esi: 12732194
registers.ecx: 2062942208
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 89 2c 24 c7 04 24 81 8b dd 5f e9 71 06 00
exception.symbol: ramos+0x1e4aeb
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 1985259
exception.address: 0xc24aeb
registers.esp: 1570896
registers.edi: 12763095
registers.eax: 30306
registers.ebp: 4001214484
registers.edx: 4294939572
registers.ebx: 425984
registers.esi: 12732194
registers.ecx: 82608976
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 d7 01 00 00 89 c6 58 e9 f1 00 00 00 01
exception.symbol: ramos+0x1eaf2a
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2010922
exception.address: 0xc2af2a
registers.esp: 1570892
registers.edi: 12763095
registers.eax: 27156
registers.ebp: 4001214484
registers.edx: 2130566132
registers.ebx: 50135805
registers.esi: 12757229
registers.ecx: 765
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 74 00 00 00 57 bf 40 59 e6 3e 81 f7 e9 6e
exception.symbol: ramos+0x1ead4b
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2010443
exception.address: 0xc2ad4b
registers.esp: 1570896
registers.edi: 0
registers.eax: 27156
registers.ebp: 4001214484
registers.edx: 2130566132
registers.ebx: 1549541099
registers.esi: 12760585
registers.ecx: 765
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 89 00 00 00 f7 db 81 eb b1 eb 61 8e 89 da
exception.symbol: ramos+0x1f2a62
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2042466
exception.address: 0xc32a62
registers.esp: 1570892
registers.edi: 4730383
registers.eax: 12788569
registers.ebp: 4001214484
registers.edx: 95
registers.ebx: 12760611
registers.esi: 0
registers.ecx: 1969148396
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 56 55 68 1c 29 fb 0b e9 c5 04 00 00 58 21
exception.symbol: ramos+0x1f24bf
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2041023
exception.address: 0xc324bf
registers.esp: 1570896
registers.edi: 4730383
registers.eax: 12821317
registers.ebp: 4001214484
registers.edx: 95
registers.ebx: 4294937792
registers.esi: 1114345
registers.ecx: 1969148396
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 ec 04 e9 65 19 00 00
exception.symbol: ramos+0x1f6f95
exception.instruction: in eax, dx
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2060181
exception.address: 0xc36f95
registers.esp: 1570888
registers.edi: 4730383
registers.eax: 1447909480
registers.ebp: 4001214484
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 12795977
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: ramos+0x1f9174
exception.address: 0xc39174
exception.module: ramos.exe
exception.exception_code: 0xc000001d
exception.offset: 2068852
registers.esp: 1570888
registers.edi: 4730383
registers.eax: 1
registers.ebp: 4001214484
registers.edx: 22104
registers.ebx: 0
registers.esi: 12795977
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 77 2b 2d 12 01
exception.symbol: ramos+0x1f8263
exception.instruction: in eax, dx
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2064995
exception.address: 0xc38263
registers.esp: 1570888
registers.edi: 4730383
registers.eax: 1447909480
registers.ebp: 4001214484
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 12795977
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 6a 00 52 e8 03 00 00 00 20 5a c3 5a
exception.symbol: ramos+0x1fcada
exception.instruction: int 1
exception.module: ramos.exe
exception.exception_code: 0xc0000005
exception.offset: 2083546
exception.address: 0xc3cada
registers.esp: 1570856
registers.edi: 0
registers.eax: 1570856
registers.ebp: 4001214484
registers.edx: 461029562
registers.ebx: 12831775
registers.esi: 10
registers.ecx: 392732831
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 89 e0 05 04 00 00 00 e9 fc fa ff ff 83 c0
exception.symbol: ramos+0x1fd5c4
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2086340
exception.address: 0xc3d5c4
registers.esp: 1570896
registers.edi: 6379
registers.eax: 31993
registers.ebp: 4001214484
registers.edx: 4294938116
registers.ebx: 12864471
registers.esi: 24878
registers.ecx: 2027002322
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 b8 41 cc 7f 4e e9 03 fa ff ff 89 e7 81 c7
exception.symbol: ramos+0x20d287
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2151047
exception.address: 0xc4d287
registers.esp: 1570892
registers.edi: 11190674
registers.eax: 32169
registers.ebp: 4001214484
registers.edx: 6
registers.ebx: 28860940
registers.esi: 12896664
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 89 e7 52 50 b8 15 09 bf 6b e9 d1 03 00 00
exception.symbol: ramos+0x20cf64
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2150244
exception.address: 0xc4cf64
registers.esp: 1570896
registers.edi: 11190674
registers.eax: 32169
registers.ebp: 4001214484
registers.edx: 6
registers.ebx: 28860940
registers.esi: 12928833
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 14 20 00 24 89 1c 24 52 ba c3 16 e6 79 89
exception.symbol: ramos+0x20d311
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2151185
exception.address: 0xc4d311
registers.esp: 1570896
registers.edi: 11190674
registers.eax: 4294938620
registers.ebp: 4001214484
registers.edx: 2298801283
registers.ebx: 28860940
registers.esi: 12928833
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 e9 5d f7 ff ff 01 c6 58 89 74 24 04 8b 34
exception.symbol: ramos+0x20e1da
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2154970
exception.address: 0xc4e1da
registers.esp: 1570892
registers.edi: 11190674
registers.eax: 28524
registers.ebp: 4001214484
registers.edx: 1524682713
registers.ebx: 2084216892
registers.esi: 12928833
registers.ecx: 12900566
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 89 0c 24 e9 3a 00 00 00 bf 74 6f db 3e 89
exception.symbol: ramos+0x20e272
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2155122
exception.address: 0xc4e272
registers.esp: 1570896
registers.edi: 11190674
registers.eax: 28524
registers.ebp: 4001214484
registers.edx: 1524682713
registers.ebx: 2084216892
registers.esi: 12928833
registers.ecx: 12929090
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 8a 01 00 00 81 ea 46 ae fe 27 5e
exception.symbol: ramos+0x20de14
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2154004
exception.address: 0xc4de14
registers.esp: 1570896
registers.edi: 11190674
registers.eax: 28524
registers.ebp: 4001214484
registers.edx: 1524682713
registers.ebx: 4294941472
registers.esi: 1179202795
registers.ecx: 12929090
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 31 c9 e9 6b 07 00 00 81 ed c5 ec 81 ad 29 ea
exception.symbol: ramos+0x2138d8
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2177240
exception.address: 0xc538d8
registers.esp: 1570888
registers.edi: 11190674
registers.eax: 31449
registers.ebp: 4001214484
registers.edx: 12956566
registers.ebx: 686164844
registers.esi: 1179202795
registers.ecx: 358888575
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 c7 04 24 23 c2 f9 64 89 04 24 e9 e0 00 00
exception.symbol: ramos+0x213f18
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2178840
exception.address: 0xc53f18
registers.esp: 1570888
registers.edi: 11190674
registers.eax: 31449
registers.ebp: 4001214484
registers.edx: 12956566
registers.ebx: 686164844
registers.esi: 4262367416
registers.ecx: 4294938452
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 67 00 00 00 89 e7 81 c7 04 00 00 00 81 c7
exception.symbol: ramos+0x214f6d
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2183021
exception.address: 0xc54f6d
registers.esp: 1570884
registers.edi: 11190674
registers.eax: 30982
registers.ebp: 4001214484
registers.edx: 12928154
registers.ebx: 686164844
registers.esi: 4262367416
registers.ecx: 4294938452
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 5c 03 00 00 55 c7 04 24 00 4a 5f 6b 89 04
exception.symbol: ramos+0x214949
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2181449
exception.address: 0xc54949
registers.esp: 1570888
registers.edi: 11190674
registers.eax: 30982
registers.ebp: 4001214484
registers.edx: 12959136
registers.ebx: 686164844
registers.esi: 4262367416
registers.ecx: 4294938452
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 34 01 00 00 83 ec 04 89 24 24 81 04 24 04
exception.symbol: ramos+0x214702
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2180866
exception.address: 0xc54702
registers.esp: 1570888
registers.edi: 11190674
registers.eax: 0
registers.ebp: 4001214484
registers.edx: 12931364
registers.ebx: 686164844
registers.esi: 84201
registers.ecx: 4294938452
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 93 01 00 00 f7 d0 92 92 35 77 0e 7d 5d 51
exception.symbol: ramos+0x233ae8
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2308840
exception.address: 0xc73ae8
registers.esp: 1570856
registers.edi: 13088208
registers.eax: 32743
registers.ebp: 4001214484
registers.edx: 2130566132
registers.ebx: 237783825
registers.esi: 13051235
registers.ecx: 2062942208
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 d2 05 00 00 87 0c 24 8b 24 24 fb e9 93 01
exception.symbol: ramos+0x233adc
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2308828
exception.address: 0xc73adc
registers.esp: 1570856
registers.edi: 13058340
registers.eax: 0
registers.ebp: 4001214484
registers.edx: 2130566132
registers.ebx: 237783825
registers.esi: 116969
registers.ecx: 2062942208
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 b9 32 c9 fe 1d 01 c8 59 05 00 19 6e 3d 03
exception.symbol: ramos+0x2357c6
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2316230
exception.address: 0xc757c6
registers.esp: 1570852
registers.edi: 13058340
registers.eax: 13061730
registers.ebp: 4001214484
registers.edx: 2105246407
registers.ebx: 237783825
registers.esi: 116969
registers.ecx: 1827966415
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 33 95 63 54 59 81 c9 03 14 f3 3f f7 d9 e9
exception.symbol: ramos+0x235692
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2315922
exception.address: 0xc75692
registers.esp: 1570856
registers.edi: 1716958048
registers.eax: 13064529
registers.ebp: 4001214484
registers.edx: 2105246407
registers.ebx: 237783825
registers.esi: 0
registers.ecx: 1827966415
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 e9 21 89 df 7f e9 8b ff ff ff 5d 81 ec 04
exception.symbol: ramos+0x236563
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2319715
exception.address: 0xc76563
registers.esp: 1570852
registers.edi: 13065136
registers.eax: 25811
registers.ebp: 4001214484
registers.edx: 2105246407
registers.ebx: 417201301
registers.esi: 13065149
registers.ecx: 13065635
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 1c 24 89 0c 24 b9 4b c8 ef 6f 53
exception.symbol: ramos+0x2366d0
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2320080
exception.address: 0xc766d0
registers.esp: 1570856
registers.edi: 13065136
registers.eax: 25811
registers.ebp: 4001214484
registers.edx: 2399949160
registers.ebx: 417201301
registers.esi: 4294944112
registers.ecx: 13091446
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 78 fb ff ff 01 fe 5f e9 bd fb ff ff 59 68
exception.symbol: ramos+0x236efa
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2322170
exception.address: 0xc76efa
registers.esp: 1570852
registers.edi: 13065136
registers.eax: 29769
registers.ebp: 4001214484
registers.edx: 2399949160
registers.ebx: 2051009052
registers.esi: 13068674
registers.ecx: 13091446
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 57 01 00 00 83 c4 04 83 c7 04 e9 c6 00 00
exception.symbol: ramos+0x237551
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2323793
exception.address: 0xc77551
registers.esp: 1570856
registers.edi: 0
registers.eax: 703045005
registers.ebp: 4001214484
registers.edx: 2399949160
registers.ebx: 2051009052
registers.esi: 13072083
registers.ecx: 13091446
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 8d fd ff ff 89 0c 24 89 e1 81 c1 04 00 00
exception.symbol: ramos+0x23ba0e
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2341390
exception.address: 0xc7ba0e
registers.esp: 1570856
registers.edi: 13090673
registers.eax: 28464
registers.ebp: 4001214484
registers.edx: 0
registers.ebx: 0
registers.esi: 13072083
registers.ecx: 101609
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ef 86 fe fe 1f 03 3c 24 e9 00 00 00 00 68
exception.symbol: ramos+0x23e8c0
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2353344
exception.address: 0xc7e8c0
registers.esp: 1570852
registers.edi: 13098635
registers.eax: 30895
registers.ebp: 4001214484
registers.edx: 0
registers.ebx: 775972864
registers.esi: 13072083
registers.ecx: 670234227
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 e5 52 ba 44 87 8d 76 f7 da f7 da 83 ec
exception.symbol: ramos+0x23e59f
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2352543
exception.address: 0xc7e59f
registers.esp: 1570856
registers.edi: 13101838
registers.eax: 30895
registers.ebp: 4001214484
registers.edx: 0
registers.ebx: 0
registers.esi: 3939837675
registers.ecx: 670234227
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 c8 03 00 00 83 ec 04 89 14 24 ba
exception.symbol: ramos+0x240cf4
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2362612
exception.address: 0xc80cf4
registers.esp: 1570852
registers.edi: 13109555
registers.eax: 28263
registers.ebp: 4001214484
registers.edx: 29517
registers.ebx: 4006486429
registers.esi: 29588739
registers.ecx: 13137101
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 50 89 1c 24 bb e1 ee 1c 36 89 d9 5b 56 e9
exception.symbol: ramos+0x240a91
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2362001
exception.address: 0xc80a91
registers.esp: 1570856
registers.edi: 13112738
registers.eax: 157417
registers.ebp: 4001214484
registers.edx: 29517
registers.ebx: 4006486429
registers.esi: 29588739
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 54 5f 81 ec 04 00 00 00 89 2c 24 51 55 bd
exception.symbol: ramos+0x242249
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2368073
exception.address: 0xc82249
registers.esp: 1570856
registers.edi: 13112738
registers.eax: 30748
registers.ebp: 4001214484
registers.edx: 29517
registers.ebx: 907865825
registers.esi: 29588739
registers.ecx: 13146310
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 ae 01 00 00 50 b8 c6 f9
exception.symbol: ramos+0x2428f3
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2369779
exception.address: 0xc828f3
registers.esp: 1570856
registers.edi: 13112738
registers.eax: 30748
registers.ebp: 4001214484
registers.edx: 604277075
registers.ebx: 4294939344
registers.esi: 29588739
registers.ecx: 13146310
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 51 e9 7b fe ff ff bd 93 1e 6a 39 e9 9b 00
exception.symbol: ramos+0x248813
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2394131
exception.address: 0xc88813
registers.esp: 1570852
registers.edi: 13112738
registers.eax: 32480
registers.ebp: 4001214484
registers.edx: 2130566132
registers.ebx: 2147483650
registers.esi: 13139719
registers.ecx: 2062942208
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 1b 31 db 49 89 0c 24 51 89 e1 81 c1 04 00
exception.symbol: ramos+0x248629
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2393641
exception.address: 0xc88629
registers.esp: 1570856
registers.edi: 13112738
registers.eax: 4294937752
registers.ebp: 4001214484
registers.edx: 2130566132
registers.ebx: 1416696936
registers.esi: 13172199
registers.ecx: 2062942208
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 bd 3b 5f db 5b 81 c5 4c 09 7b 1e 50 e9 ff
exception.symbol: ramos+0x25a069
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2465897
exception.address: 0xc9a069
registers.esp: 1570856
registers.edi: 428788132
registers.eax: 27633
registers.ebp: 4001214484
registers.edx: 51620
registers.ebx: 13181191
registers.esi: 4702472
registers.ecx: 13240144
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 68 1d dd 77 5b 5f 81 e7 70 bd ff 6b c1 ef
exception.symbol: ramos+0x25a710
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2467600
exception.address: 0xc9a710
registers.esp: 1570856
registers.edi: 428788132
registers.eax: 27633
registers.ebp: 4001214484
registers.edx: 51620
registers.ebx: 0
registers.esi: 1544302440
registers.ecx: 13215708
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 0c 24 b9 8d 54 96 3d e9 28 00 00 00 03
exception.symbol: ramos+0x2659a6
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2513318
exception.address: 0xca59a6
registers.esp: 1570856
registers.edi: 4294944084
registers.eax: 607422807
registers.ebp: 4001214484
registers.edx: 2481736
registers.ebx: 1971716070
registers.esi: 1544302440
registers.ecx: 13287123
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 e5 ff ff ff bf 69 80 96 3f 81 cf 96 bb 7b
exception.symbol: ramos+0x266bce
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2517966
exception.address: 0xca6bce
registers.esp: 1570856
registers.edi: 4294944084
registers.eax: 13291540
registers.ebp: 4001214484
registers.edx: 2481736
registers.ebx: 1971716070
registers.esi: 1544302440
registers.ecx: 1621786296
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 14 24 ba 59 65 e9 19 e9 c1 01 00 00 33
exception.symbol: ramos+0x26689b
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2517147
exception.address: 0xca689b
registers.esp: 1570856
registers.edi: 210327126
registers.eax: 13267456
registers.ebp: 4001214484
registers.edx: 2481736
registers.ebx: 0
registers.esi: 1544302440
registers.ecx: 1621786296
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 31 c9 50 89 c8 51 89 3c 24 68 04 a0 39 6c 89
exception.symbol: ramos+0x274850
exception.instruction: sti
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2574416
exception.address: 0xcb4850
registers.esp: 1570856
registers.edi: 428788132
registers.eax: 31869
registers.ebp: 4001214484
registers.edx: 2130566132
registers.ebx: 13352192
registers.esi: 3998900148
registers.ecx: 2062942208
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.19/Vi9leo/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/well/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/steam/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/num/random.exe
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.100/e2b1563c6670f193.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/sqlite3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/freebl3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/mozglue.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/msvcp140.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/nss3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/softokn3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/vcruntime140.dll
request POST http://185.215.113.19/Vi9leo/index.php
request GET http://185.215.113.16/well/random.exe
request GET http://185.215.113.16/steam/random.exe
request GET http://185.215.113.100/
request GET http://185.215.113.16/num/random.exe
request POST http://185.215.113.100/e2b1563c6670f193.php
request GET http://185.215.113.100/0d60be0de163924d/sqlite3.dll
request GET http://185.215.113.100/0d60be0de163924d/freebl3.dll
request GET http://185.215.113.100/0d60be0de163924d/mozglue.dll
request GET http://185.215.113.100/0d60be0de163924d/msvcp140.dll
request GET http://185.215.113.100/0d60be0de163924d/nss3.dll
request GET http://185.215.113.100/0d60be0de163924d/softokn3.dll
request GET http://185.215.113.100/0d60be0de163924d/vcruntime140.dll
request POST http://185.215.113.19/Vi9leo/index.php
request POST http://185.215.113.100/e2b1563c6670f193.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a41000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02300000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02390000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02420000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02430000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02480000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02490000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02600000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02690000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02910000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02920000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02930000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02940000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a90000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02aa0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02af0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02420000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02420000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02420000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02420000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02420000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73402000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03160000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00061000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02430000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02440000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02450000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02510000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02560000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02620000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02800000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description explorti.exe tried to sleep 1135 seconds, actually delayed analysis time by 1135 seconds
Application Crash Process firefox.exe with pid 2584 crashed
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0xcd1f04
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030
0x7fe00000030

exception.instruction_r: 83 3d 8d d1 02 00 00 ff 25 00 00 00 00 53 12 07
exception.instruction: cmp dword ptr [rip + 0x2d18d], 0
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0xcd1f04
registers.r14: 9890984
registers.r15: 8791562032752
registers.rcx: 48
registers.rsi: 8791561964416
registers.r10: 0
registers.rbx: 0
registers.rsp: 9890616
registers.r11: 9894000
registers.r8: 1994752396
registers.r9: 0
registers.rdx: 8796092887632
registers.r12: 14927648
registers.rbp: 9890736
registers.rdi: 269595360
registers.rax: 13442816
registers.r13: 9891576
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\fldfpgipfncgndfolcbkdeeknbbbnhcc\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.4_1\_locales\te\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Local Extension Settings\lpilbniiabackdjcionkobglmddfbcjo\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.2_0\_locales\fil\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Local Extension Settings\jhfjfclepacoldmjmkmdlmganfaalklb\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.47.0_0\_locales\am\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\fr\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma\Local Extension Settings\fooolghllnmhmmndgjiamiiodkpenpbb\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo\4.2.8_0\_locales\uk\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\7619.603.0.2_0\_locales\fr\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Local Extension Settings\djclckkglechooblngghdinmeemkbgci\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma\Local Extension Settings\pnlccmojcmeohlpggmfnbbiapkmbliob\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\7619.603.0.2_0\_locales\nb\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek\0.10_0\_locales\zh_CN\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\14.1_0\_locales\es_419\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Current Tabs\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\topbar_floating_button_close.png\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\gjagmgiddbbciopjhllkdnddhcglnemk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\es_419\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal\Local Extension Settings\oeljdldpnmdbchonielidgobddffflal\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\14.1_0\manifest.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.47.0_0\_locales\lo\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\1256\_platform_specific\all\sths\03019df3fd85a69a8ebd1facc6da9ba73e469774fe77f579fc5a08b8328c1d6b.sth\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\GPUCache\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_2\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.2_0\_locales\cs\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.2_0\_locales\ar\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.4_1\_locales\fr_CA\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\52\manifest.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.47.0_0\_locales\ka\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT
file C:\Users\test22\1000037002\e72857cb8a.exe
file C:\ProgramData\vcruntime140.dll
file C:\ProgramData\msvcp140.dll
file C:\Users\test22\AppData\Local\Temp\1000038001\4e6c60056f.exe
file C:\ProgramData\nss3.dll
file C:\Users\test22\AppData\Local\Temp\1000036001\59d7dfe3f8.exe
file C:\ProgramData\freebl3.dll
file C:\ProgramData\mozglue.dll
file C:\ProgramData\softokn3.dll
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000036001\59d7dfe3f8.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000036001\59d7dfe3f8.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\1000037002\e72857cb8a.exe
parameters:
filepath: C:\Users\test22\1000037002\e72857cb8a.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000038001\4e6c60056f.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000038001\4e6c60056f.exe
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2584
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x0000002bc7d30000
process_handle: 0xffffffffffffffff
1 0 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELO¹fà  ’Ž° À@ `…<°OÀàœ(&à ¯  H.text” ’ `.rsrcàÀ”@@.reloc àš@Bp°H(¡Ü  *':„r(Àö¾%µT¤sÔ6(̈—ÄJåúcv1EÅJôuͤ€Aõ8ئ<Á³ ¼à"Wt 4æ>u•Ý„"Yt‰ín)Qªªý#&kˆÔ:Ó `—_ §3a¾Vª$à@¤ŸýýßôP ŠÿŒ…V· FûëÀJà{ÛN™cÐT#‰(¼Œw^Q³¸M-r½’J’Ð3‡\x‡´Çó£K&|…~\CPXqo •D_DéªQ¬EÆ“²wTŒÁ~)ïD·'·¡Ÿµ÷š f ‹c6â7Ÿsò >x€³×Î#ü]TîôC˲게‡7bâ/“=¤i7’aîË;“žÑÇ῔l~ìøÕøÇ¥˜øÚJæ!é·ãä¤`³åä=.uXzá¿R†µŒíÀ0¦üî>XEÓÀl»q“O¥€„+›¿ ¹xx© ¶3ïˆ$(öš›C83Ü]Iãs¹çñ»i¦æQ¡Œo_ßIã“ùÙÄ׊ڜ~4tì¬l‚^éxåـ0& ÒS¡EZï=%à{÷2b¥`AC‚Ùª"ýkãã±<ñ[Ðs#Óþ‡XçùnµûÕ"ùYP&KAüA*'—¢14/SE³åOäIæœǐ%)fÌ&úB²Ýhúå¢H݀œ?È\V$'ªO­(}Ÿ¤ò®UÉeÀlƒí O6CveK`­l¸<9îFÊ( 0¿„§W¤v߁ „ðõ/”û‚iOmבaJ̤°ÏÜx/–ÃJ“jMØÐîTª ¼øþJ³É1?eƒ•XA‘ì¯J˜(×à¿]ôÍ8qŠI¨ç±£xø}Š–i%BÁ9@°í`s„, tä¯ï|e- îò™)ª3~gGc~ûØçU„Z¡S’‘­X¦T„y:£U(÷É2©²T‚!ïÝÃB1­Ÿ…%vÖ¶HW®n-ºb2UˆLo ˜ˆ"Ì'²$è&Áì)F™Gõ° Öy‹YÏ5¡.Š=µ­Ì¿W¹¡òp¸¹½vÕ㡉s!ú¢Ô·´ø‘ìWÚìV€#4Mã<3,’˒ƒ I´<)„ñô³~´ UÅïÈ!®MÈóVµ¹…Q"®Âæp59„.'AW²ò<îq[Åé8`CU[‘r¯Ÿñ†Ì²—ý°£|w=ÈcÂòÝGøE® ‰›•ÓEÊGÕý·¤e€ØÕyCbNc[¹b$P)”I_}˜õØJdÚø„òæå}o$CF_Ÿ- Eºže·ëÿÀx1idÒN€/¿¤$ë Ê;P9–¯ ZÀ… ~ùќ¬sûA®_fBdɦO=ÅmÙ·—ÑþB䙷 ПÁbB¿ò:æ9‘ÎæëjZ|Uì¯ØtÕªK KÞasŒZµöÜd}L_±„ÿ€žGG¦ˆKlk“fcM-Î䔬O'÷hC,mnàã w&‰uECč ÆÇ¹2¢CäqÔv€×אÎÄ Åÿg[<è F}Z ÝípáøVÊέNeñk´lIÕ¬=–&v¹üØJTG#?qèHgL8[ú²À(4ÀæøPÂ9˜lM ôóû_Š!ÎÓ#§M‚&ݳ7G+vÈ"u~¨ÜÔ=Í¢–ó4_Î1cž[wQ–`Šû¼R˜vÉÑe& [@s%¾c­ ‹áý×ز\ì¡?ߧÝ7Q4\ôÅ¢aã1ÙávÝÅÁj&©™ukÛîC†ÎiqýR÷땩p¡±d°FW҅•´±6Á)ÆÓæ̃îKSθøUêiñ¸O£Å”D0< åO¤Q΀œ%X·ÛÕû¨[mö¡‹~ûðó5T|€¹ ›TÅóì“Áö÷·vâA*±RoŸýEi^ž:ºÆˆNéF¼Ý”?8{AB¿å¨9³ADÜÈ+QìeÇUvëתQ¬ª‚[Ój¡žQK¥Òmh.юhA‘˜¼4Êb]™î 0ͦ Չ2©^0ìú¥ÉUS¶qK=DïeÔ£,I»d…R¯ À¾~úÙù‹Ÿl ÐZWCö8*üÙZظVô ×b#Üâ¸ë¿Aö(¿&ÀÞí¥¿¯»£PXR…èi…[2rÅíãû‰äûUñ—7dyoÖ^)ÍÀcù;sú²Þ”@qáb¬Gˆ»`?Ûã,› ºj‘áwr©$]Ýñ’Ð bþ^LPnØJ¯š§!…ûkc²0û)iÚ&óàGÆ0jðºÜ»9•Vt‘™Yð¾â‹øX˜ÌAÁ⛸«ÙýÍ© Ý6js„Ge­Œ…Ž ŠlHW#ºÃüååC³Ç»vXEKW|3×Òlµj€vNý>á48K›%íV œv¢9»c5­€:^¥k‹@&BÄk€|„Šdԕ›è ÇΙEÖÄÕNPJg W› ŽÜ s˜pêùÓa€Ë~Žç`³Á• ™ü~q!£Ö'ˆ/8kÖûQOûQÄú ‚ó‰é’×O™GX$?zñø9$A»Ï‚=!ëGgéw®Rb­'--ª2jŸƒ 6ú`4ݽߢ²Úøµô–}¶ùò©ç‡ÒÃ1J½¬^!<›b«ó©l„q7J”—à óº3È(qNºÜS tÊV“¤Óó€J7%ß°þÈÙAˆîâàó]¢€žgmÜý'¦Ú¸È¦y²¹Ã `2Ï{É]¼~Ü‹ÔÖнÑZÃ$XY-â+§Èf3–Gº^’÷…òT_^Œ “Šq^¼Â9ž*æÝs¢š‘ª˜å±Š¡g¾ü‹˜|N 6#ø Æ»/‡-7¾‡ÃFERæ¥ATÜÇeéEXÒ᧠[×DÀ×^²ÝƒØ.í ¹e¹åß|®EEàhßò…~… ¨fŠT&ø¼©žØª…¤ñki„16A GöÑÚ ÇcϤ‘_ü¢¡²T§)‚µ-¼2«óxÚùÛ¬n² Ãáwà{_Ygµˆ£ IÚ^­Xóü6±+k<Üw%R¥à—³&ZL £Áõ¯”„ô'ë+¶•´(2[ -cò†‹#8eה‘þb¿È¨¡”Z¸˜jp‡/âQzL î^ºú6'éTC‡±2!ɒ…Gžî›7b?N_SÚ¶9*à¯À‘¬JN}òÔ3~xyu†¤qGäé]NƺټUŸàz¹”]çg+'ŽŸR¿»ÖÿR‰ŸÏiM½¾,ßí ÌdË·]½úÊö¾G\9ò{ݑõ½?l—y_†~à@îCvð͎ÁºÁ{ù0>Š\ÝÐõbü¤üãþœ;o…øq*Ÿþ®bÝo’1ù±×öQ“¨8£YJV'pë±ð¢à[G_[~÷ñ‘.]ðr•ñ<zâî7™› ™²,I‰(gzg™ú¦>Tkø0žSn‡#»¶¶{¡¢ÜC±C¢‘Œt'aeےR#_çE«i;GlZ»äKÓÍ!}àjÒî›]Ÿ?1-pêùø|? ¤/’¸¤O߁¢Þ$”‚;‚߈§}3àªC õ ›òlìŠ¢ÿ^‹Á–îî¶÷;ò‰ñYKªtˆ}ܕzš¯›N]×1BÎ-1Wb!I:¼ˆÒ=QõªŒ–”e /1Xc¢.(Ñ=rþ¹-èPfèuÝð?ïþ¨íkÍÕoÄa”J F­º£7Ç*¿:õãm»°H7¬Òb3ngaº®~Êú; ¤HðÊëÁ(l¦u^àu Ý¿û›Þ…Ãh5´E|PÝ?<ÿ£®«ah‡Ñ†'0ü#¸¾Ý£?­Ð2.ÝĵͦFŽI«È™NH6‡)¤é²öé¬Û¦Eùじ%oÙTìêK¤“Æ›Ÿ+\iµÛ<:Ò­#„§ñ+%^í¤Ç{¡ž„’ýAoeŒÁ¸6Hì³ aâs;ÀùI- «oîåÊÇBþª'/_ª\ÇØԒ3öÜßõŸxè§×ÆnTd»ó”·î½XrÇ~0>ׁ¥Ãr#@™WkNºÆvçœRîIñ$Šcó؉Bu:äüÈsGÃëÖÖÄX §ó4Í÷ö¥žOP!â1¸³85tí™È½‰nÑböÅNué56… Ý ˆ47qöΖ‰XìÙL,‘–í­¤Mœ‰õºØ]T+͞Ÿ¥#X|nc‰xp<E·=¡èH€ÖkÈ I5V¡¬ˆ×dh‰Pbc° wtoæ!Iž|¿yàÜÂAûûãB •{¾·_ÉÙ[ԑßTª¥|𗌺¬þŸŸuþ¶|%Û ÝÞaИ$R˔·çÙ©4= xø+Īíźò{Ÿl½ñ+¾ÞÎÎg_ï=uš]'C¡Ž¬±¹‹x4RMuÿþœàJIàÀ—«‚òy`Xô\::ý@ö¾Äíx]O¤ðÕ¶v™îj¼#wö‘¤ye\¢¶MXŠHÂqÈ8û¼&êuS¤ðŒ!"¥¾0Ö}}™ÑZ&ÿ7ð—¯\̌ÅI" Ê';„„Rå–üT’«ÑTÛ]®Ã«ƒ®¤uñWîÅ`†_¯‰ìª²;cThø#lå1°“¦²Š1°Û(Àý ¿
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL¤[¹fà  Ž( @@ €`…<(O@à(&` '  H.text”  `.rsrcà@ @@.reloc `@Bp(H(Ü  Ô®fgåï­8?€o7ˆ„øüj©ØØ2,ÆÛhTâ6RñFÕÊÀÎ4¦9 H“-ºÕ’†›7ðJ¡ $´ÝÉ O*F$.J¥%SÀ@i$#›} ‰—gvyê)Ž}º¸î~züq74Éš€²µ¼ lD1‡Vá­@~#Ò(½r(CRÀªÔxmO*5¨j93Ÿ`αk º®„›Òù„+eíŒ,‚º^Õ"ÏÿçMûQSŠ6ÇA;òˆhÂðwóÚešÙòn5ŸÿJ³¸Ô÷lM÷ä;”Ÿu÷ A6[äÁŠ ßܱ°;AÑnâã‚ÜC ¦9("¸‚ hŽ”9ׇ‹½kDÒcuY,à9⻿iö°ÏÁñçF÷Ò棑›äºéb½Í~TßñeE7Ö iCì…`Zy±O„vBt$ñ{?BÁ¼yqë@ðáۛØÕÀÍÊV¥X„žœ‘'òÛ©çÚdÞÉÝæKʝó/÷¬;΁¡ä∂yµb¨zR֓ʌx'›ÈÜÙ¤˜×;ïʓÛQÉ{‡\M ›Lª¥×#·ñ9R&·ÓÁyï± J.v $©®÷°)[¶ƒÈÚx§Ÿ®K«Ž‡å¦å 0ËYó:ß(yu΅†Äm›ä—PHYî«ÄØ,ê„òY4H¾~©æ„kagÌõ°æDÒ.·Æ ѯö«—IͲúƒ÷Ìy‚:mo¦ƒ³È+©é6,‹=*ÕŒËãÊöÝØåš]lÕóÉ 2§f a³x-'òÜå„w— -Å$öb?Å8'ÕVRÿeŒéÚÐêù}Õ¾œí¤aIàÈâågòVä•*%zzæ„W¨µb¬U;×6Þ 2I¦Ujäz&hƒjÁŽZ~I™‡ƒPáL o·ùúÔö博'7%V¾ûF€óôqc¦ÚpA±|ÈëçÞvMµ”úu Ÿ9FŠKXrІ ÝŠ¬`2cqwÉÂzÝO9š6 rfrÆ;¨Ö¤ªª$ÎPYMA³•4v¨±Á¯+û{L<â;¸\ ~ç «2Ù{_#?Á¼S•Ô:÷{Ü)¥òk 3¾CÔ#ٖ^KÙHÊÈ·€Àê9Œl›ÖFðéϺp®^éýïg”Ïî⿺v0=Iht†ðÃC”d€èïÄìÁq!ß·»ªìX)/©‘fÏÕD]Ãvý³3yzÜBNÔDL æcþÍ0‰ƒ«Gµç¹Pš<o·Ñ¦ëHÆê•! Âé}¸—wYX(©ïÁ¨ÐOS6ò¿õÊ ®Ó,ºÐÚk¹ ŽÜµ•ye%â~`øœOÄ2Ñ×ÊzbjõS¾DB¯žhn¹fÓî,]î1(ðTؓ$ò¶ÊÙ9'ugqt9èhXp`ªÚm#ñ†½#ûiÁl9£ŒtÎ\àE‚Ûulû†yvÒ6öGÞÔqúªu²û!í3St©'û:&Dr3Bٖ*‰°Åð»*ÀŠ-IöTŠŽûÚ1'…Ïñø4â½ã5­º­äS#yBöïÓæÙîo“ÿÀôõ(Ú¤­tÂN½wèZ@òÍ+òŽ¬î;þÌ&ﻉ„vG´y7ú(ü<#>æu|«Ôû¦º+E•*E¦>6çqÇ!ɵ\±×çA‰,j&„/à –å¬$Ë~fÚr*XHF.¯ݤ».r5áRâziûþ)AêĈ/3¦R•6úˆDQ­ÐÜlôºiÍ!{/SŸò!ÔúS8~ɊÌPËO´ Æ ³n¤¡² É8%};Ãøkñ¶ù ¤7»¡Kð¾ógÓcQ£@.EºTAÛo;ÎdÑò<u×»à#8|ÛP+o¤+YåÅôRM¸< `4e ÚeAU~ÊÙûÄåèˆMK31ÞpYg°„mmbk”§‘0°©ÇBÒ=­”Þïv×,Õ£‘ê[¸ò¤Í‘¤ç»‘Çî¶ H ¤f~nº§Kr­ „ LþWù¿ùÄL7þ;ŽYÔÙß\ŠÆþêÔê,²=¡Yµã¶¾äª6tÒp3ʜ`ê¯'Xø4œóón®÷fø„Ó]•HÁTãÎëÄ° ²O êò¤‡6otŠ'·JrÅ™°!òËp”uûÄb¦ÀC<µ-‰ù„Ôñž «65f€Ég8œ\=S`a$[I—SÚ6Œäõ¸¾9|¯4üOøÞªöV``ºªY‘N¨P×ýŸ‹øy„ñÇ`’—ö['¦À«>œáÙcf\6 /³ûãdF¼{q'b>Uÿ\¢´‚âmtöFم‹…Öü-ÁŸ_ÒDö š2Òâœw³• F2G$ǧË£¡‘­gÞ÷•ù*2êújø.`Ù^á2tZ¢R¡`À»tv‡ßÞÛ°[*œfN-J Ú¡÷©þOö{†YÓÄ*GдØH_֒Ƽ®1¢rG*}I>›JzÍf“!vú]Íh¶Ç¦q)-pÎcš¹_×w—¾BÞÏÙëGJ?†3·µh™î >¦£½W=H¼æ¥#0ò檓´Œ‹å‡_Šîo¸f‚oË*UOò¿”¼*¬bse× žDŠ,y$ò–3L5Dûm1n;Ö<ۊïíóL¾Õumòc¬bÆ¥.&AF'$‚O õß{Ð5¡ÑÖiʛ³ý k}؉)ù™*”̈́Ô÷p žóÀFMyÈ¿üëSã• |¼Èãßë×öt-µÀåQ¹?Hß³‡>;näô(ë—w!O•+úŽ¦ƒœY¬¸²Œ‹:Ý|{{Û{Z XIÛ7JØ­h"®:ú €›¨VìÉ WDo,‡ˆ¬¬¬Áþ®¹þÌvzŠš1ߊa:›ïv|êC1Ù^àÁ½A`ß«Ä2½¤ WüA¥2BMÓù €$*%Gó=ÑðÇÀZÕã;í#™Q‚U(£µDš^æp&×ÚÓÄíy}ŽZÐ"ÓptœcSë;«Ø"ë<4ùyg°¥Œ5ë[o[{ÞI)‘u™<G Zbý]àº<ðNZz—Ëù‡Ó- Ž‚ËšBm½Ò=öÐ=)3_’oyzä –aҐݔáÚ.<ßùµq®…ÒÄæ3Öº “¸÷g°!1|R4iv*Á½•°tÐ9x —°¾ UjÃ{€þdõ·P <œÿY›ë×æ‚B}¬ê”\qêAJ³SÂëˆÕަݍTáñџDà0¡n>㖟ú]ÿô*57@²QÙ¨É\˜©5ɊÛÌ+?–5öµ'Õ_y45XÞR£);Ãë»RéyvÖÙVñ¡ÀÀÞ.`Ñ vo`c-Ú'»­éõ4 ÆpOr¤,½ÊGšꚡE²-šp³ÍNÌ L y€Íä‘ÙE}m ŽÒf’7b!ŠOOÞ®™V_Z·¸EsæÍršØ`Ôføœ’ëò|©{Ó錿ª{0§ÒÓ ¬êRár̜,Ðo½›+ZLØMå»xËÚdšŒä2}AUiÍü¥¶pك#éKýO˜Js¿%'ßÍٞßò`Ïð+ó§…\Š—¸Ä”яÏ뚞ÐZ„nK%Ãv”, ·¯¾¨UcyOӓA=ņ }ŦˆK¿ \QgŸòà<³k n?«üہj©ì­¥úh215ƒkã#ù8­wëh{@àõÓ*)¯lu‘U¡ŠO¾å·ý0 * AóLMÆ ‡a=!7;Q‹«‹â´[ë¢F†”1M³ .ù½íÑþ;Z`¹A‚«çÅçÀFd4¡£.Q‚.ãô)àè•JÆ®ðöˏÁ¶»ƒ¨5”ü +¹ç¢õ@.ŸÜE^ E*U0Ï­]c&Ï°lz Sî¥èVÈðí+(¿tw#GŠK+Û¹IMÕüÇYxƒ"ögڟp Ô (»¦V¸H~–§LœêuU2 ÆwÐË.+´/*#Œ‹J¯Œ¶*×9sàd¿!}Ez Lµ^aÚëÒ¼·ktêÍ~„¼S´ ÅdTΓ=˜ÆŽ¡¿óýܓµ[8W·[¥É\ÛZ0*@´S4Ú Ì3ðëðÍ:‰å‚ám¸rÞI– ,k(ªúKÝ×®{‹SWçóßcäµ?ãŽIå}+4󊤱×}:ûƒÂ^páËên«Ãœ`«mø½O"0¨¹ p¿å"$âڙE0©w")6fÐkb#Õýr_w-™tQaíO??22‡¼çTìÌxž&•°o»m•…¢Ï½“чŒ KþUAE}À˜Üô"jÏ¿#‰Vua2Is4wv³[oØõÚø2Ý0–¼§ÛHƒ<u6•Ù!ð+Mܯ/ Žì´ç¾3ûÙÔ¸“b§®|ññ<ìf`As9g%RèN‰m0¾ƒ_÷lœüð@›YÝت›åæ`á"tqˆë™!µnBøl¯Å…ëÅÑêÙ¤ uş³º½†ûj…Fw^†ÛôC.­H¤çS½ g^ç´¹EQ¬*(¶ÿ¿Qø7ߝή¦ÆM\Ԉ•!‚Ë¿b7§«íªs³"UP©NÐðÔæq:{“>7ÐÕ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $¢b›åæõ¶æõ¶æõ¶‰u^¶þõ¶‰uk¶ëõ¶‰u_¶Üõ¶ï{v¶åõ¶fzô·äõ¶ï{f¶áõ¶æô¶õ¶‰uZ¶ôõ¶‰uh¶çõ¶Richæõ¶PEL¡Â´fà  ÈB"dà@0$@Щ<à#|$àô.textJÆÈ à.rdataæÎàÐÌ@@.data”+!° œ@À.reloc*Dà#F¨@By¹ApÈAÙÈAU‹ìQ‹E‰Eüƒ} t‹MüÆ‹UüƒÂ‰Uü‹E ƒè‰E ëà‹E‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ì‹Eƒè‰Ex‹MÿU‹MM ‰Mëä]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQSjh0hÀAÈjÿ$Ðb‰EüPƒøt‹Àü…É ÀøXƒ}üt,ŠÀhÀžæ‹EüPèNsSŠÉŠÉü[h€hÀAÈ‹MüQÿdÏb[‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQÇEüjj@h0hÐjÿØÐbPÿœÐb‰Eüƒ}üujÿìÏbèRÿÿÿ‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì(EÜPÿtÏb‹Mð‰M؃}ØsjÿìÏb‹å]ÃÌÌÌÌÌÌÌÌU‹ì¡@ÍbPèâaPè,sƒÄ…Àu!‹ ÎbQè9aPèsƒÄ…ÀujÿìÏb]ÃÌÌU‹ìƒì jjj¡ÐÈbPÿ,Ðb‰Eôj ‹MôQÿÐÏb‰Eø‹UôRjÿpÐb}øš}jÿìÏb‹å]ÃÌÌÌÌÌU‹ìƒìHj@jE¸PèrÇE¸@M¸QÿÑbƒøu*jh‹UÄR‹EÀPè“ÁjhRPè…Á‰Eø‰UüëÇEøÇEüƒ}üwr }øWsjÿìÏb‹å]ÃÌÌU‹ìƒì ÇEøÿhjÿÀÐbPÿXÐb‰EôEüPhj‹M Q‹URÿ¬Ïb…ÀuEøP‹MôQjj‹UR‹EüPÿ”Ïb‹MüQÿ(Ðb‹Eô‹å]ÃÌÌÌÌU‹ìì\hèj…üÿÿPÿäàAƒÄ h4MBhäMBh€è\ÿÿÿƒÄ PüÿÿQÿlÐb•üÿÿRÿ€ÏbƒøŽÊh„bB…üÿÿPÿlÐbhÿ Büÿÿ胍h¬NBàûÿÿQ‹ðÉbR…ìûÿÿPüÿÿèΏ‹ÈèǏPüÿÿ諎àûÿÿ莍ìûÿÿèõhBøûÿÿè%jÈûÿÿQèrƒÄP•¼ûÿÿR¡¤ÌbPÔûÿÿQøûÿÿèd‹Èè͎PøûÿÿèAŽ¼ûÿÿ薍Ôûÿÿ苍Èûÿÿ耍jøûÿÿèCP•üÿÿRÿ0Ïb…üÿÿPüÿÿQƒì ‹Ì•øûÿÿRèæŒ聅ƒÄ…ÀtM‹…üÿÿP‹üÿÿQƒì ‹Ì•üÿÿR軌ìˆ‹ÌEPèʍ¤ûÿÿQèž7Ä ¤ûÿÿè팍øûÿÿ貏PÿŒÏbøûÿÿ菍üÿÿèjj•üÿÿRÿäàAƒÄ øûÿÿ覌üÿÿ蛌Mè‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰Mü‹MüƒÁ|ènŒ‹MüƒÁHècŒ‹MüƒÁ<èXŒ‹MüƒÁ0èMŒ‹Müèå‹å]ÃÌU‹ìQ‰Mü‹EP‹Müè ‹MƒÁ0Q‹MüƒÁ0軋‹UƒÂ<R‹MüƒÁ<詋‹EƒÀHP‹MüƒÁH藋‹Mü‹U‹BT‰AT‹Mü‹U‹BX‰AX‹Mü‹U‹B\‰A\‹Mü‹U‹B`‰A`‹Mü‹U‹Bd‰Ad‹Mü‹U‹Bh‰Ah‹Mü‹U‹Bl‰Al‹Mü‹U‹Bp‰Ap‹Mü‹U‹Bt‰At‹Mü‹U‹Bx‰Ax‹MƒÁ|Q‹MüƒÁ|è ‹‹Eü‹å]ÂÌÌÌÌU‹ìQ‰Mü‹MüƒÁ$èN‹‹MüƒÁèC‹‹MüƒÁ è8‹‹Müè0‹‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰Mü‹EP‹Mü譊‹MƒÁ Q‹MüƒÁ 蛊‹UƒÂR‹MüƒÁ艊‹EƒÀ$P‹MüƒÁ$èwŠ‹Eü‹å]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ììthBMèèê‰hBMôè݉‹E‰…Œüÿÿƒ½Œüÿÿtƒ½ŒüÿÿtWƒ½Œüÿÿ„ŒéÇjhþÿÿQèqƒÄP•\þÿÿRMèèo‹PMèè抍\þÿÿè;Šhþÿÿè0Šé‚j…PþÿÿPèÍpƒÄPDþÿÿQMèè*‹PMè衊Dþÿÿèö‰Pþÿÿèë‰ë@j(•8þÿÿRè‹pƒÄP…,þÿÿPMèèèŠPMèè_Š,þÿÿ贉8þÿÿ詉ƒ}0„…hŒbBüýÿÿQUR…þÿÿPhdOBþÿÿQUèR… þÿÿPMô艊‹Èè‹‹Èè{Š‹Èè‹PMôè뉍üýÿÿè@‰þÿÿè5‰þÿÿè*‰ þÿÿè‰靍M$Q•ÀýÿÿRh´PB…ÌýÿÿPMQ•ØýÿÿRh PB…äýÿÿPMèQ•ðýÿÿRMôèù‰‹È肊‹Èè뉋ÈètŠ‹Èè݉PMôèT‰Àýÿÿ詈Ìýÿÿ螈Øýÿÿ蓈äýÿÿ興ðýÿÿè}ˆ… þÿÿPMôè>‹PÿÑb‰Eäƒ}äÿu5MôèVˆMèèNˆMèFˆMè>ˆM$è6ˆM4è®ûÿÿéh\QBÌþÿÿQÿ˜Ðb…ÀthRB•ÌþÿÿRÿ˜Ðb…Àué}hB”þÿÿè(‡ƒ}0„æE$PlýÿÿQhüSB•xýÿÿR…ÌþÿÿP„ýÿÿQhTSB•ýÿÿREPœýÿÿQh¬RB•¨ýÿÿREèP´ýÿÿQ”þÿÿ蠈‹Èè)‰‹È蒈‹È艋È艋Èè ‰‹ÈèvˆP”þÿÿèꇍlýÿÿè?‡xýÿÿè4‡„ýÿÿè)‡ýÿÿ臍œýÿÿ臍¨ýÿÿ臍´ýÿÿèý†馍•ÌþÿÿR…0ýÿÿPhLUB<ýÿÿQUR…HýÿÿPh¤TBTýÿÿQUèR…`ýÿÿP”þÿÿèч‹ÈèZˆ‹ÈèÇ‹ÈèLˆ‹ÈèEˆP”þÿÿè)‡0ýÿÿè~†<ýÿÿès†Hýÿÿèh†Týÿÿè]†`ýÿÿèR†ƒì ‹Ì•”þÿÿRèá…èœlƒÄ …À„«h B€þÿÿèa…hœVB…üüÿÿPMQ•ýÿÿRhôUB…ýÿÿP‹ ðÉbQ• ýÿÿR€þÿÿ蕇‹È莇‹Èè÷†‹È耇
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL×Ýc’¿à! &  @ àa0: Ð ˆ* Ð 0 ¨@ <   Ð.text„% & `P`.data|'@ (, @`À.rdatapDp FT @`@.bss(À €`À.edataˆ*Ð ,š @0@.idataÐ Æ @0À.CRT, Ô @0À.tls Ö @0À.rsrc¨0 Ø @0À.reloc<@ >Þ @0B/48€  @@B/19RȐ Ê" @B/31]'`(ì @B/45š-.@B/57\ À B@0B/70#ÐN@B/81
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELó4cà"! 4pÐ Ëý @AH S› Ȑ xF P/  ð#”   ¤ @.text•  `.rdataÄ @@.data<F0  @À.00cfg€  @@.rsrcx  @@.relocð#  $" @B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEL¤4cà"! ¶^À¹€ jª @A`ãWä·, ° P/0 ØAS¼øhРì¼ÜäZ.textaµ¶ `.rdata” Ð º@@.dataDàÄ@À.00cfg È@@.tls Ê@À.rsrc° Ì@@.relocØA0 BÖ@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ٓ1Cò_ò_ò_)n°Ÿò_”ŠÌ‹ò_ò^"ò_Ϛ^žò_Ϛ\•ò_Ϛ[Óò_ϚZÑò_Ϛ_œò_Ϛ œò_Ϛ]œò_Richò_PEL‚ê0]à"! (‚`Ù@ ð,à@Ag‚Ïèr ðœèA°¬=`x8¸w@päÀc@.text’&( `.dataH)@,@À.idata¬pD@@.didat4X@À.rsrcð Z@@.reloc¬=°>^@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELÐ4cà"! Ø.`£pl- @Aä&úÞÄ@Px P/`\°ð |Ê\€&@.text‰×Ø `.rdatalïððÜ@@.dataDRà.Ì@À.00cfg@ú@@.rsrcxPü@@.reloc\` @B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELó4cà"! ÌðPÏSg@ADvS—wð°€ÀP/ÀÈ58qà {Œ.text&ËÌ `.rdataÔ«à¬Ð@@.data˜ |@À.00cfg „@@.rsrc€°†@@.relocÈ5À6Š@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $ÀÅäՄ¤Š†„¤Š†„¤Š†08e††¤Š†Ü†¤Š†„¤‹†¬¤Š†Ö̉‡—¤Š†Ö̎‡¤Š†Ö̏‡Ÿ¤Š†Ö̊‡…¤Š†ÖÌu†…¤Š†Ö̈‡…¤Š†Rich„¤Š†PEL|ê0]à"! ސÙð 0Ôm@Aàã ¸ŒúðA  € 8¸ @´.textôÜÞ `.dataôðâ@À.idata„ä@@.rsrcê@@.reloc  î@B
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x0002dc00', u'virtual_address': u'0x00001000', u'entropy': 7.98261885585991, u'name': u' \\x00 ', u'virtual_size': u'0x00068000'} entropy 7.98261885586 description A section with a high entropy has been found
section {u'size_of_data': u'0x0019fc00', u'virtual_address': u'0x00315000', u'entropy': 7.953479306807753, u'name': u'zghbmtmp', u'virtual_size': u'0x001a0000'} entropy 7.95347930681 description A section with a high entropy has been found
entropy 0.994076467421 description Overall entropy of this PE file is high
process system
url https://aus5.mozilla.org/update/6/%PRODUCT%/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%SYSTEM_CAPABILITIES%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/update.xml
url https://crash-reports.mozilla.com/submit?id=
url https://hg.mozilla.org/releases/mozilla-release/rev/92187d03adde4b31daef292087a266f10121379c
description Communications over RAW Socket rule Network_TCP_Socket
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Communications over HTTP rule Network_HTTP
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Match Windows Inet API call rule Str_Win32_Internet_API
description Run a KeyLogger rule KeyLogger
description Client_SW_User_Data_Stealer rule Client_SW_User_Data_Stealer
description ftp clients info stealer rule infoStealer_ftpClients_Zero
description Match Windows Http API call rule Str_Win32_Http_API
description PWS Memory rule Generic_PWS_Memory_Zero
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2056
process_handle: 0x000001ec
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2056
process_handle: 0x000001ec
1 0 0
host 185.215.113.100
host 185.215.113.16
host 185.215.113.19
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2056
region_size: 1232896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001ec
3221225496 0

NtAllocateVirtualMemory

process_identifier: 2088
region_size: 1232896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001f0
1 0 0

NtAllocateVirtualMemory

process_identifier: 2220
region_size: 2371584
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001f0
1 0 0

NtProtectVirtualMemory

process_identifier: 2584
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000076d81000
process_handle: 0x0000000000000050
1 0 0

NtProtectVirtualMemory

process_identifier: 2584
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000076d57000
process_handle: 0x0000000000000050
1 0 0
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\59d7dfe3f8.exe reg_value C:\Users\test22\AppData\Local\Temp\1000036001\59d7dfe3f8.exe
file C:\Windows\Tasks\explorti.job
Process injection Process 3040 manipulating memory of non-child process 2056
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2056
region_size: 1232896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001ec
3221225496 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $šÇƒ®Þ¦íýÞ¦íýÞ¦íýj:ýý¦íýj:ýC¦íýj:ýý¦íý@*ýߦíýŒÎèüó¦íýŒÎéü̦íýŒÎîü˦íý×Þnýצíý×Þ~ýû¦íýÞ¦ìý÷¤íý{ÏãüŽ¦íý{Ïîüߦíý{ÏýߦíýÞ¦zýߦíý{ÏïüߦíýRichÞ¦íýPELO¹fà" ¬ ÆwÀ @ÐjA@€@@dŽ |@  P”uð 4  @À ”.text« ¬  `.rdata‚ûÀ ü° @@.datalpÀ H¬ @À.rsrc @ ô @@.reloc”uPv@B
base_address: 0x00400000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $¢b›åæõ¶æõ¶æõ¶‰u^¶þõ¶‰uk¶ëõ¶‰u_¶Üõ¶ï{v¶åõ¶fzô·äõ¶ï{f¶áõ¶æô¶õ¶‰uZ¶ôõ¶‰uh¶çõ¶Richæõ¶PEL¡Â´fà  ÈB"dà@0$@Щ<à#|$àô.textJÆÈ à.rdataæÎàÐÌ@@.data”+!° œ@À.reloc*Dà#F¨@B
base_address: 0x00400000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: LáA.?AVtype_info@@Næ@»±¿D        ! 5A CPR S WY l m pr €  ‚ ƒ„ ‘)ž ¡¤ § ·Î×   “ÿÿÿÿÿÿÿÿŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAC$÷A ÷A÷A÷A÷A÷A ÷A÷AüöAôöAèöAÜöAÔöAÈöAÄöAÀöA¼öA¸öA´öA°öA¬öA¨öA¤öA öAœöA˜öAöA„öA|öAtöA´öAlöAdöA\öAPöAHöA<öA0öA,öA(öAöAöAüõA ôõAìõAäõAÜõAÔõAÌõAÄõA´õA¤õA”õA€õAlõA\õAHõA@õA8õA0õA(õA õAõAõAõAõAøôAðôAèôAØôAÄôA¸ôA¬ôA õA ôA”ôA„ôApôA`ôALôA8ôA0ôA(ôAôAìóAØóA³B³B³B³B³BȺB¨øA0ýA°þA³Bx´B abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZXµB¤`‚y‚!¦ß¡¥Ÿàü@~€ü¨Á£Ú£ þ@þµÁ£Ú£ þAþ¶Ï¢ä¢å¢è¢[þ@~¡þQQÚ^Ú _ÚjÚ2ÓØÞàù1~þÿÿÿÿ€ þÿÿÿ¬úA..ÀºBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBĺBÈBÈBÈBÈBÈBÈBÈBȺB¨øAªúA.LáA.?AVlogic_error@std@@LáA.?AVlength_error@std@@LáA.?AVout_of_range@std@@LáA.?AVexception@std@@LáA.?AVbad_alloc@std@@
base_address: 0x0042b000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x00000001400122b0
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x0000000140020d88
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: I»`#þ?Aÿã
base_address: 0x0000000076d81590
process_identifier: 2584
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: "|
base_address: 0x0000000140020d78
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: I» þ?Aÿã
base_address: 0x0000000076d57a90
process_identifier: 2584
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: "|
base_address: 0x0000000140020d70
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: ϝT
base_address: 0x000000013ffc0108
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: Øv@Øv Øv@ØvØv°Øv €ÕvàTÕv 3ØvØvÀ´Óv`,ØvÀ‚ÖvöÔv YØv2ØvVØv°Þv€“Õv€RØv ›ÕvQØvÂÕv ?ÖvP€Õv°TÕvàtÕvð„ÖvÐ1Øv™ÔvÐOÔv`ê×vÐæ×vÐæ×vÐ.Øv
base_address: 0x000000014001aae8
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x0000000140020c78
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $šÇƒ®Þ¦íýÞ¦íýÞ¦íýj:ýý¦íýj:ýC¦íýj:ýý¦íý@*ýߦíýŒÎèüó¦íýŒÎéü̦íýŒÎîü˦íý×Þnýצíý×Þ~ýû¦íýÞ¦ìý÷¤íý{ÏãüŽ¦íý{Ïîüߦíý{ÏýߦíýÞ¦zýߦíý{ÏïüߦíýRichÞ¦íýPELO¹fà" ¬ ÆwÀ @ÐjA@€@@dŽ |@  P”uð 4  @À ”.text« ¬  `.rdata‚ûÀ ü° @@.datalpÀ H¬ @À.rsrc @ ô @@.reloc”uPv@B
base_address: 0x00400000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $¢b›åæõ¶æõ¶æõ¶‰u^¶þõ¶‰uk¶ëõ¶‰u_¶Üõ¶ï{v¶åõ¶fzô·äõ¶ï{f¶áõ¶æô¶õ¶‰uZ¶ôõ¶‰uh¶çõ¶Richæõ¶PEL¡Â´fà  ÈB"dà@0$@Щ<à#|$àô.textJÆÈ à.rdataæÎàÐÌ@@.data”+!° œ@À.reloc*Dà#F¨@B
base_address: 0x00400000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0
Time & API Arguments Status Return Repeated

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: ????? ?? 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: ????? ?? 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Access MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Excel MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office PowerPoint MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Publisher MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Outlook MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Word MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office IME (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office InfoPath MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OneNote MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove Setup Metadata MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 ActiveX
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 NPAPI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x00000308
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24215
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\DisplayName
1 0 0
Process injection Process 3040 called NtSetContextThread to modify thread in remote process 2088
Process injection Process 2068 called NtSetContextThread to modify thread in remote process 2220
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 1995571652
registers.esp: 3472288
registers.edi: 0
registers.eax: 4326775
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x000001f4
process_identifier: 2088
1 0 0

NtSetContextThread

registers.eip: 1995571652
registers.esp: 2554792
registers.edi: 0
registers.eax: 4285584
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x000001ec
process_identifier: 2220
1 0 0
parent_process firefox.exe martian_process "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
file C:\Users\test22\AppData\Roaming\Mozilla\Firefox\Profiles\qxo5wa6x.default-release\parent.lock
file C:\Users\test22\AppData\Local\Temp\firefox\parent.lock
Process injection Process 3040 resumed a thread in remote process 2088
Process injection Process 2088 resumed a thread in remote process 2448
Process injection Process 2068 resumed a thread in remote process 2220
Process injection Process 2448 resumed a thread in remote process 2584
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000001f4
suspend_count: 1
process_identifier: 2088
1 0 0

NtResumeThread

thread_handle: 0x000002a4
suspend_count: 1
process_identifier: 2448
1 0 0

NtResumeThread

thread_handle: 0x000001ec
suspend_count: 1
process_identifier: 2220
1 0 0

NtResumeThread

thread_handle: 0x0000000000000044
suspend_count: 1
process_identifier: 2584
1 0 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 ec 04 e9 65 19 00 00
exception.symbol: ramos+0x1f6f95
exception.instruction: in eax, dx
exception.module: ramos.exe
exception.exception_code: 0xc0000096
exception.offset: 2060181
exception.address: 0xc36f95
registers.esp: 1570888
registers.edi: 4730383
registers.eax: 1447909480
registers.ebp: 4001214484
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 12795977
registers.ecx: 20
1 0 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000001ec
suspend_count: 1
process_identifier: 2544
1 0 0

CreateProcessInternalW

thread_identifier: 2808
thread_handle: 0x000003d8
process_identifier: 2804
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000003e0
1 1 0

NtResumeThread

thread_handle: 0x000001a0
suspend_count: 1
process_identifier: 2804
1 0 0

CreateProcessInternalW

thread_identifier: 3044
thread_handle: 0x00000470
process_identifier: 3040
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000036001\59d7dfe3f8.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000036001\59d7dfe3f8.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000036001\59d7dfe3f8.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000474
1 1 0

CreateProcessInternalW

thread_identifier: 192
thread_handle: 0x00000460
process_identifier: 2068
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\1000037002\e72857cb8a.exe
track: 1
command_line: "C:\Users\test22\1000037002\e72857cb8a.exe"
filepath_r: C:\Users\test22\1000037002\e72857cb8a.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000484
1 1 0

CreateProcessInternalW

thread_identifier: 2816
thread_handle: 0x000003b0
process_identifier: 2824
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Users\test22\AppData\Local\Temp\1000038001\4e6c60056f.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\1000038001\4e6c60056f.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\1000038001\4e6c60056f.exe
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000480
1 1 0

NtResumeThread

thread_handle: 0x000000dc
suspend_count: 1
process_identifier: 3040
1 0 0

NtResumeThread

thread_handle: 0x00000150
suspend_count: 1
process_identifier: 3040
1 0 0

NtResumeThread

thread_handle: 0x0000018c
suspend_count: 1
process_identifier: 3040
1 0 0

CreateProcessInternalW

thread_identifier: 1152
thread_handle: 0x000001e8
process_identifier: 2056
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x000001ec
1 1 0

NtGetContextThread

thread_handle: 0x000001e8
1 0 0

NtAllocateVirtualMemory

process_identifier: 2056
region_size: 1232896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001ec
3221225496 0

CreateProcessInternalW

thread_identifier: 1384
thread_handle: 0x000001f4
process_identifier: 2088
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x000001f0
1 1 0

NtGetContextThread

thread_handle: 0x000001f4
1 0 0

NtAllocateVirtualMemory

process_identifier: 2088
region_size: 1232896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001f0
1 0 0

WriteProcessMemory

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $šÇƒ®Þ¦íýÞ¦íýÞ¦íýj:ýý¦íýj:ýC¦íýj:ýý¦íý@*ýߦíýŒÎèüó¦íýŒÎéü̦íýŒÎîü˦íý×Þnýצíý×Þ~ýû¦íýÞ¦ìý÷¤íý{ÏãüŽ¦íý{Ïîüߦíý{ÏýߦíýÞ¦zýߦíý{ÏïüߦíýRichÞ¦íýPELO¹fà" ¬ ÆwÀ @ÐjA@€@@dŽ |@  P”uð 4  @À ”.text« ¬  `.rdata‚ûÀ ü° @@.datalpÀ H¬ @À.rsrc @ ô @@.reloc”uPv@B
base_address: 0x00400000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x0049c000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x004cc000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x004d4000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00525000
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2088
process_handle: 0x000001f0
1 1 0

NtSetContextThread

registers.eip: 1995571652
registers.esp: 3472288
registers.edi: 0
registers.eax: 4326775
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x000001f4
process_identifier: 2088
1 0 0

NtResumeThread

thread_handle: 0x000001f4
suspend_count: 1
process_identifier: 2088
1 0 0

NtResumeThread

thread_handle: 0x00000280
suspend_count: 1
process_identifier: 2088
1 0 0

CreateProcessInternalW

thread_identifier: 2488
thread_handle: 0x000002a4
process_identifier: 2448
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Program Files\Mozilla Firefox\firefox.exe
track: 1
command_line: "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
filepath_r: C:\Program Files\Mozilla Firefox\firefox.exe
stack_pivoted: 0
creation_flags: 67634196 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000002ac
1 1 0

NtResumeThread

thread_handle: 0x000002a4
suspend_count: 1
process_identifier: 2448
1 0 0

NtResumeThread

thread_handle: 0x000000dc
suspend_count: 1
process_identifier: 2068
1 0 0

NtResumeThread

thread_handle: 0x00000154
suspend_count: 1
process_identifier: 2068
1 0 0

NtResumeThread

thread_handle: 0x00000198
suspend_count: 1
process_identifier: 2068
1 0 0

CreateProcessInternalW

thread_identifier: 2248
thread_handle: 0x000001ec
process_identifier: 2220
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x000001f0
1 1 0

NtGetContextThread

thread_handle: 0x000001ec
1 0 0

NtAllocateVirtualMemory

process_identifier: 2220
region_size: 2371584
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001f0
1 0 0

WriteProcessMemory

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $¢b›åæõ¶æõ¶æõ¶‰u^¶þõ¶‰uk¶ëõ¶‰u_¶Üõ¶ï{v¶åõ¶fzô·äõ¶ï{f¶áõ¶æô¶õ¶‰uZ¶ôõ¶‰uh¶çõ¶Richæõ¶PEL¡Â´fà  ÈB"dà@0$@Щ<à#|$àô.textJÆÈ à.rdataæÎàÐÌ@@.data”+!° œ@À.reloc*Dà#F¨@B
base_address: 0x00400000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x0041e000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: LáA.?AVtype_info@@Næ@»±¿D        ! 5A CPR S WY l m pr €  ‚ ƒ„ ‘)ž ¡¤ § ·Î×   “ÿÿÿÿÿÿÿÿŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAŽÈAC$÷A ÷A÷A÷A÷A÷A ÷A÷AüöAôöAèöAÜöAÔöAÈöAÄöAÀöA¼öA¸öA´öA°öA¬öA¨öA¤öA öAœöA˜öAöA„öA|öAtöA´öAlöAdöA\öAPöAHöA<öA0öA,öA(öAöAöAüõA ôõAìõAäõAÜõAÔõAÌõAÄõA´õA¤õA”õA€õAlõA\õAHõA@õA8õA0õA(õA õAõAõAõAõAøôAðôAèôAØôAÄôA¸ôA¬ôA õA ôA”ôA„ôApôA`ôALôA8ôA0ôA(ôAôAìóAØóA³B³B³B³B³BȺB¨øA0ýA°þA³Bx´B abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZXµB¤`‚y‚!¦ß¡¥Ÿàü@~€ü¨Á£Ú£ þ@þµÁ£Ú£ þAþ¶Ï¢ä¢å¢è¢[þ@~¡þQQÚ^Ú _ÚjÚ2ÓØÞàù1~þÿÿÿÿ€ þÿÿÿ¬úA..ÀºBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBŒÈBĺBÈBÈBÈBÈBÈBÈBÈBȺB¨øAªúA.LáA.?AVlogic_error@std@@LáA.?AVlength_error@std@@LáA.?AVout_of_range@std@@LáA.?AVexception@std@@LáA.?AVbad_alloc@std@@
base_address: 0x0042b000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer:
base_address: 0x0063e000
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2220
process_handle: 0x000001f0
1 1 0

NtSetContextThread

registers.eip: 1995571652
registers.esp: 2554792
registers.edi: 0
registers.eax: 4285584
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x000001ec
process_identifier: 2220
1 0 0

NtResumeThread

thread_handle: 0x000001ec
suspend_count: 1
process_identifier: 2220
1 0 0

CreateProcessInternalW

thread_identifier: 2580
thread_handle: 0x0000000000000044
process_identifier: 2584
current_directory:
filepath: C:\Program Files\Mozilla Firefox\firefox.exe
track: 1
command_line: "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
filepath_r: C:\Program Files\Mozilla Firefox\firefox.exe
stack_pivoted: 0
creation_flags: 1028 (CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT)
inherit_handles: 0
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x00000001400122b0
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x0000000140020d88
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

NtMapViewOfSection

section_handle: 0x0000000000000060
process_identifier: 2584
commit_size: 0
win32_protect: 32 (PAGE_EXECUTE_READ)
buffer:
base_address: 0x000000007c220000
allocation_type: 0 ()
section_offset: 0
view_size: 65536
process_handle: 0x0000000000000050
1 0 0

NtAllocateVirtualMemory

process_identifier: 2584
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000000007c220000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0x0000000000000050
1 0 0

WriteProcessMemory

buffer: I»`#þ?Aÿã
base_address: 0x0000000076d81590
process_identifier: 2584
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: "|
base_address: 0x0000000140020d78
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0

WriteProcessMemory

buffer: I» þ?Aÿã
base_address: 0x0000000076d57a90
process_identifier: 2584
process_handle: 0x0000000000000050
1 1 0

WriteProcessMemory

buffer: "|
base_address: 0x0000000140020d70
process_identifier: 2584
process_handle: 0x000000000000004c
1 1 0
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
Skyhigh BehavesLike.Win32.Generic.tc
ALYac Gen:Variant.Kryptik.260
Cylance Unsafe
VIPRE Gen:Variant.Kryptik.260
BitDefender Gen:Variant.Kryptik.260
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Packed.Themida.HZB
APEX Malicious
Avast Win32:TrojanX-gen [Trj]
Kaspersky HEUR:Trojan.Win32.Generic
MicroWorld-eScan Gen:Variant.Kryptik.260
Emsisoft Gen:Variant.Kryptik.260 (B)
F-Secure Trojan.TR/Crypt.TPM.Gen
McAfeeD Real Protect-LS!83847CF6A192
Trapmine malicious.high.ml.score
FireEye Generic.mg.83847cf6a192b998
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
Google Detected
Avira TR/Crypt.TPM.Gen
MAX malware (ai score=89)
Gridinsoft Trojan.Heur!.038120A1
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Gen:Variant.Kryptik.260
Varist W32/Agent.JDU.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.R645974
BitDefenderTheta Gen:NN.ZexaF.36810.0DWaaanY7kci
DeepInstinct MALICIOUS
Malwarebytes Trojan.Amadey
Zoner Probably Heur.ExeHeaderL
Fortinet W32/Themida.HZB!tr
AVG Win32:TrojanX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (D)