Summary | ZeroBOX

leon.exe

Gen1 Generic Malware Malicious Library Admin Tool (Sysinternals etc ...) Antivirus UPX Malicious Packer OS Processor Check PE32 PE File .NET EXE DLL
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 17, 2024, 10:12 p.m. Aug. 17, 2024, 10:27 p.m.
Size 1.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 962f3de7b7ee4a08179142efffa50372
SHA256 15310086db4e19ecf15468ac16241539cfd1378eb762b7f640b213ce066eef7f
CRC32 3BCCE9AB
ssdeep 49152:+yCkU1MWOu1V1/x0edzVPa/QfIpwhBAOx7IMkV:+yCkUidIDXNapwAOx7a
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.67.202.34 Active Moloch
185.215.113.100 Active Moloch
185.215.113.16 Active Moloch
31.41.244.10 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 31.41.244.10:80 -> 192.168.56.101:49165 2400001 ET DROP Spamhaus DROP Listed Traffic Inbound group 2 Misc Attack
TCP 185.215.113.16:80 -> 192.168.56.101:49170 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49168 -> 31.41.244.10:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49170 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49166 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 31.41.244.10:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 185.215.113.16:80 -> 192.168.56.101:49166 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49166 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49166 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49170 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.101:49170 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49170 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 31.41.244.10:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 185.215.113.100:80 -> 192.168.56.101:49173 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044243 ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044244 ET MALWARE Win32/Stealc Requesting browsers Config from C2 Malware Command and Control Activity Detected
TCP 185.215.113.100:80 -> 192.168.56.101:49173 2051828 ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044246 ET MALWARE Win32/Stealc Requesting plugins Config from C2 Malware Command and Control Activity Detected
TCP 185.215.113.100:80 -> 192.168.56.101:49173 2051831 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044248 ET MALWARE Win32/Stealc Submitting System Information to C2 Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044301 ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49170 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.100:80 -> 192.168.56.101:49173 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.100:80 -> 192.168.56.101:49173 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49170 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.101:49170 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044303 ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044302 ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044305 ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044306 ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 185.215.113.100:80 2044307 ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity A suspicious filename was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section \x00
section .idata
section
section yulglecm
section difuzlzn
section .taggant
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: leon+0x3120b9
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 3219641
exception.address: 0x12e20b9
registers.esp: 4652584
registers.edi: 0
registers.eax: 1
registers.ebp: 4652600
registers.edx: 21487616
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 89 14 24 50 b8 50 fe 0a 62 89 44 24 04 58
exception.symbol: leon+0x6d227
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 447015
exception.address: 0x103d227
registers.esp: 4652552
registers.edi: 240873
registers.eax: 30284
registers.ebp: 4007047188
registers.edx: 0
registers.ebx: 414384191
registers.esi: 3
registers.ecx: 17029784
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 b3 f7 ff ff 33 2c 24 31 2c 24 33 2c 24 e9
exception.symbol: leon+0x6e8f9
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 452857
exception.address: 0x103e8f9
registers.esp: 4652548
registers.edi: 240873
registers.eax: 17031136
registers.ebp: 4007047188
registers.edx: 0
registers.ebx: 2060145951
registers.esi: 3
registers.ecx: 1460278093
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 c9 ff 34 01 8b 1c 24 51 89 14 24 89 e2 83
exception.symbol: leon+0x6e1ef
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 451055
exception.address: 0x103e1ef
registers.esp: 4652552
registers.edi: 240873
registers.eax: 17061399
registers.ebp: 4007047188
registers.edx: 0
registers.ebx: 2060145951
registers.esi: 3
registers.ecx: 1460278093
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 50 e9 d3 fd ff ff 89 e2 81 c2 04 00 00 00
exception.symbol: leon+0x6e5df
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 452063
exception.address: 0x103e5df
registers.esp: 4652552
registers.edi: 240873
registers.eax: 17061399
registers.ebp: 4007047188
registers.edx: 0
registers.ebx: 1259
registers.esi: 3
registers.ecx: 4294939548
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 e9 b2 f7 ff ff b8 c6 95 f2 13 29 c7 58 68
exception.symbol: leon+0x1e7dfb
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 1998331
exception.address: 0x11b7dfb
registers.esp: 4652548
registers.edi: 18576160
registers.eax: 25551
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 43975327
registers.esi: 18559884
registers.ecx: 671
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 3c 24 e9 f2 03 00 00 89
exception.symbol: leon+0x1e7903
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 1997059
exception.address: 0x11b7903
registers.esp: 4652552
registers.edi: 18601711
registers.eax: 25551
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 43975327
registers.esi: 18559884
registers.ecx: 671
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 aa f7 ff ff 8b 04 24 83 c4 04 33
exception.symbol: leon+0x1e7ddb
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 1998299
exception.address: 0x11b7ddb
registers.esp: 4652552
registers.edi: 18601711
registers.eax: 25551
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 43975327
registers.esi: 4294944604
registers.ecx: 670697
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 e9 8f 00 00 00 89 04 24 b8 b1 e4 ff 76 01
exception.symbol: leon+0x1e9cd1
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2006225
exception.address: 0x11b9cd1
registers.esp: 4652548
registers.edi: 18601711
registers.eax: 18584803
registers.ebp: 4007047188
registers.edx: 1405087254
registers.ebx: 43975327
registers.esi: 4294944604
registers.ecx: 819063340
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 68 98 95 fb 5e 5d 55 e9 0f 00 00 00 4b 81
exception.symbol: leon+0x1e9948
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2005320
exception.address: 0x11b9948
registers.esp: 4652552
registers.edi: 18601711
registers.eax: 18611307
registers.ebp: 4007047188
registers.edx: 1405087254
registers.ebx: 43975327
registers.esi: 4294944604
registers.ecx: 819063340
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 33 01 00 00 89 0c 24 b9 00 bb ff 7d bd e1
exception.symbol: leon+0x1e9be0
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2005984
exception.address: 0x11b9be0
registers.esp: 4652552
registers.edi: 18601711
registers.eax: 18611307
registers.ebp: 4007047188
registers.edx: 1405087254
registers.ebx: 4294943884
registers.esi: 4294944604
registers.ecx: 1549541099
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 be 36 ee 7f 5e 81 c3 14 c1 16 77 01 f3 81
exception.symbol: leon+0x1ee5a9
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2024873
exception.address: 0x11be5a9
registers.esp: 4652548
registers.edi: 0
registers.eax: 30848
registers.ebp: 4007047188
registers.edx: 3230260929
registers.ebx: 18605369
registers.esi: 1988670905
registers.ecx: 14288
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 f6 ff 34 1e ff 34 24 ff 34 24 5f 51 89 e1
exception.symbol: leon+0x1ee5c4
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2024900
exception.address: 0x11be5c4
registers.esp: 4652552
registers.edi: 0
registers.eax: 30848
registers.ebp: 4007047188
registers.edx: 3230260929
registers.ebx: 18636217
registers.esi: 1988670905
registers.ecx: 14288
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 c3 02 00 00 8b 0c 24 83
exception.symbol: leon+0x1eead7
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2026199
exception.address: 0x11bead7
registers.esp: 4652552
registers.edi: 1259
registers.eax: 30848
registers.ebp: 4007047188
registers.edx: 3230260929
registers.ebx: 18636217
registers.esi: 4294939176
registers.ecx: 14288
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 51 89 3c 24 54 5f 50 e9
exception.symbol: leon+0x1f6279
exception.instruction: in eax, dx
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2056825
exception.address: 0x11c6279
registers.esp: 4652544
registers.edi: 5320206
registers.eax: 1447909480
registers.ebp: 4007047188
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 18622344
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: leon+0x1f343c
exception.address: 0x11c343c
exception.module: leon.exe
exception.exception_code: 0xc000001d
exception.offset: 2044988
registers.esp: 4652544
registers.edi: 5320206
registers.eax: 1
registers.ebp: 4007047188
registers.edx: 22104
registers.ebx: 0
registers.esi: 18622344
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 19 2c 2d 12 01
exception.symbol: leon+0x1f59d2
exception.instruction: in eax, dx
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2054610
exception.address: 0x11c59d2
registers.esp: 4652544
registers.edi: 5320206
registers.eax: 1447909480
registers.ebp: 4007047188
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 18622344
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 be 04 00 00 81 ee af 67 ff 77 e9 1f 02 00
exception.symbol: leon+0x1fb739
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2078521
exception.address: 0x11cb739
registers.esp: 4652548
registers.edi: 5320206
registers.eax: 30040
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 18657778
registers.esi: 10
registers.ecx: 2116157440
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 bc bf f0 08 89 14 24 89 04 24 89 0c 24 51
exception.symbol: leon+0x1fbded
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2080237
exception.address: 0x11cbded
registers.esp: 4652552
registers.edi: 1222541664
registers.eax: 30040
registers.ebp: 4007047188
registers.edx: 4294940400
registers.ebx: 18687818
registers.esi: 10
registers.ecx: 2116157440
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 6a 00 57 e8 03 00 00 00 20 5f c3 5f
exception.symbol: leon+0x1fc075
exception.instruction: int 1
exception.module: leon.exe
exception.exception_code: 0xc0000005
exception.offset: 2080885
exception.address: 0x11cc075
registers.esp: 4652512
registers.edi: 0
registers.eax: 4652512
registers.ebp: 4007047188
registers.edx: 18661410
registers.ebx: 18661671
registers.esi: 18661410
registers.ecx: 4294929226
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 b9 ee 19 db 4f c1 e9 07 81 e9 9d c8 b1 88
exception.symbol: leon+0x20ad0a
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2141450
exception.address: 0x11dad0a
registers.esp: 4652548
registers.edi: 18721563
registers.eax: 26150
registers.ebp: 4007047188
registers.edx: 6
registers.ebx: 12061753
registers.esi: 1968968720
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 c0 ff 34 07 ff 34 24 5a 50 e9 37 04 00 00
exception.symbol: leon+0x20abfc
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2141180
exception.address: 0x11dabfc
registers.esp: 4652552
registers.edi: 18747713
registers.eax: 26150
registers.ebp: 4007047188
registers.edx: 6
registers.ebx: 12061753
registers.esi: 1968968720
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 1e e1 e0 2f 89 1c 24 89 14 24 c7 04 24 3f
exception.symbol: leon+0x20ac33
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2141235
exception.address: 0x11dac33
registers.esp: 4652552
registers.edi: 18747713
registers.eax: 4294943664
registers.ebp: 4007047188
registers.edx: 607453008
registers.ebx: 12061753
registers.esi: 1968968720
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 89 e2 50 b8 dc c4 d7 35 e9 4f 00 00 00 bd
exception.symbol: leon+0x20d2f3
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2151155
exception.address: 0x11dd2f3
registers.esp: 4652548
registers.edi: 18747713
registers.eax: 31870
registers.ebp: 4007047188
registers.edx: 607453008
registers.ebx: 1763798295
registers.esi: 18729909
registers.ecx: 1403793664
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 31 d2 e9 cb 00 00 00 5a 42 81 ea e7 1f fc e1
exception.symbol: leon+0x20d32f
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2151215
exception.address: 0x11dd32f
registers.esp: 4652552
registers.edi: 18747713
registers.eax: 31870
registers.ebp: 4007047188
registers.edx: 607453008
registers.ebx: 1763798295
registers.esi: 18761779
registers.ecx: 1403793664
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 3b 05 00 00 89 f9 e9 49 00 00 00 89 e1 e9
exception.symbol: leon+0x20d0cc
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2150604
exception.address: 0x11dd0cc
registers.esp: 4652552
registers.edi: 18747713
registers.eax: 31870
registers.ebp: 4007047188
registers.edx: 4294938128
registers.ebx: 663785
registers.esi: 18761779
registers.ecx: 1403793664
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 fe 00 00 00 bd 7b cf 7e 37 81 ed e3 83 fe
exception.symbol: leon+0x2117c8
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2168776
exception.address: 0x11e17c8
registers.esp: 4652544
registers.edi: 18778884
registers.eax: 30292
registers.ebp: 4007047188
registers.edx: 4294938128
registers.ebx: 975452702
registers.esi: 18761779
registers.ecx: 4294938128
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 13 13 5e 00 89 14 24 e9 de 02 00 00 58 55
exception.symbol: leon+0x211c22
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2169890
exception.address: 0x11e1c22
registers.esp: 4652544
registers.edi: 18751392
registers.eax: 30292
registers.ebp: 4007047188
registers.edx: 4294938128
registers.ebx: 975452702
registers.esi: 0
registers.ecx: 3909414019
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 06 f8 ff ff 09 c1 8b 04 24 83 c4 04 87 d9
exception.symbol: leon+0x216204
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2187780
exception.address: 0x11e6204
registers.esp: 4652544
registers.edi: 18793486
registers.eax: 27463
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 975452702
registers.esi: 0
registers.ecx: 2116157440
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 68 fb ff ff c1 ef 07 e9 57 01 00 00 8b 34
exception.symbol: leon+0x215f1a
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2187034
exception.address: 0x11e5f1a
registers.esp: 4652544
registers.edi: 18768894
registers.eax: 27463
registers.ebp: 4007047188
registers.edx: 84201
registers.ebx: 975452702
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 e9 00 00 00 00 53 68 03 be ff 7f 5b 53 81
exception.symbol: leon+0x2344a6
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2311334
exception.address: 0x12044a6
registers.esp: 4652508
registers.edi: 4007047188
registers.eax: 32475
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 2148925497
registers.esi: 18889681
registers.ecx: 2149453945
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 3f 01 00 00 f7 d5 81 ed a8 48 05 0b 89 e8
exception.symbol: leon+0x2342e0
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2310880
exception.address: 0x12042e0
registers.esp: 4652512
registers.edi: 4007047188
registers.eax: 32475
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 2148925497
registers.esi: 18922156
registers.ecx: 2149453945
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 51 e9 2d f8 ff ff 81 c2 d1 8f 53 7c 29 d6
exception.symbol: leon+0x23454c
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2311500
exception.address: 0x120454c
registers.esp: 4652512
registers.edi: 236303720
registers.eax: 32475
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 4294937676
registers.esi: 18922156
registers.ecx: 2149453945
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 e9 17 00 00 00 83 c4 04 87 04 24 8b 24 24
exception.symbol: leon+0x234c0a
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2313226
exception.address: 0x1204c0a
registers.esp: 4652508
registers.edi: 236303720
registers.eax: 31924
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 18892981
registers.esi: 18922156
registers.ecx: 1060616465
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 59 07 00 00 51 e9 28 00 00 00 89 14 24 51
exception.symbol: leon+0x234c22
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2313250
exception.address: 0x1204c22
registers.esp: 4652512
registers.edi: 1442867808
registers.eax: 0
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 18895821
registers.esi: 18922156
registers.ecx: 1060616465
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 c1 73 16 dd 5f 50 89 14 24 e9 c7 00 00 00
exception.symbol: leon+0x235fc9
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2318281
exception.address: 0x1205fc9
registers.esp: 4652508
registers.edi: 1961667722
registers.eax: 32711
registers.ebp: 4007047188
registers.edx: 0
registers.ebx: 1961667722
registers.esi: 18895851
registers.ecx: 18897140
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 16 7f 10 31 89 0c 24 b9 3a fe f6 2f e9 d0
exception.symbol: leon+0x235bcb
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2317259
exception.address: 0x1205bcb
registers.esp: 4652512
registers.edi: 1961667722
registers.eax: 32711
registers.ebp: 4007047188
registers.edx: 0
registers.ebx: 1961667722
registers.esi: 18895851
registers.ecx: 18929851
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 7e fc ff ff 89 04 24 89 e0 05 04 00 00 00
exception.symbol: leon+0x235ee4
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2318052
exception.address: 0x1205ee4
registers.esp: 4652512
registers.edi: 1961667722
registers.eax: 0
registers.ebp: 4007047188
registers.edx: 3904063336
registers.ebx: 1961667722
registers.esi: 18895851
registers.ecx: 18899891
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 4c 00 00 00 81 c1 bd 15 d7 7f 83 c1 ff 81
exception.symbol: leon+0x236c21
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2321441
exception.address: 0x1206c21
registers.esp: 4652512
registers.edi: 1961667722
registers.eax: 31982
registers.ebp: 4007047188
registers.edx: 3951126112
registers.ebx: 1961667722
registers.esi: 4294938076
registers.ecx: 18932306
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 7b cb b6 15 89 1c 24 89 3c 24 bf 1d 76 39
exception.symbol: leon+0x23b57c
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2340220
exception.address: 0x120b57c
registers.esp: 4652512
registers.edi: 18952509
registers.eax: 4294938208
registers.ebp: 4007047188
registers.edx: 18919203
registers.ebx: 17030497
registers.esi: 4294938076
registers.ecx: 93673
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 c7 04 24 c3 ee f7 3d ff 04 24 f7 1c 24 e9
exception.symbol: leon+0x23fc94
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2358420
exception.address: 0x120fc94
registers.esp: 4652512
registers.edi: 4025975081
registers.eax: 28583
registers.ebp: 4007047188
registers.edx: 1902225489
registers.ebx: 268436083
registers.esi: 18966033
registers.ecx: 1921160947
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 c7 04 24 e0 af f7 7f e9 bc 00 00 00 87 34
exception.symbol: leon+0x240076
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2359414
exception.address: 0x1210076
registers.esp: 4652512
registers.edi: 3939837675
registers.eax: 28583
registers.ebp: 4007047188
registers.edx: 1902225489
registers.ebx: 0
registers.esi: 18940401
registers.ecx: 1921160947
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 ec 00 00 00 81 c1 d0 40
exception.symbol: leon+0x24166a
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2365034
exception.address: 0x121166a
registers.esp: 4652508
registers.edi: 0
registers.eax: 25746
registers.ebp: 4007047188
registers.edx: 18941614
registers.ebx: 18943765
registers.esi: 18957387
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 31 c0 ff 34 18 8b 0c 24 55 89 e5 81 c5 04 00
exception.symbol: leon+0x240fa8
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2363304
exception.address: 0x1210fa8
registers.esp: 4652512
registers.edi: 0
registers.eax: 25746
registers.ebp: 4007047188
registers.edx: 18941614
registers.ebx: 18969511
registers.esi: 18957387
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 ac fd ff ff 89 14 24 83 ec 04 89 0c 24 b9
exception.symbol: leon+0x2417e8
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2365416
exception.address: 0x12117e8
registers.esp: 4652512
registers.edi: 0
registers.eax: 4294944300
registers.ebp: 4007047188
registers.edx: 18941614
registers.ebx: 18969511
registers.esi: 18957387
registers.ecx: 157417
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 86 01 00 00 81 c5 04 00 00 00 e9 0f 09 00
exception.symbol: leon+0x241e56
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2367062
exception.address: 0x1211e56
registers.esp: 4652512
registers.edi: 0
registers.eax: 26912
registers.ebp: 4007047188
registers.edx: 18941614
registers.ebx: 422464690
registers.esi: 18957387
registers.ecx: 18974571
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb b8 92 f6 ff 7b e9 13 03 00 00 52 89 2c 24 bd
exception.symbol: leon+0x242283
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2368131
exception.address: 0x1212283
registers.esp: 4652512
registers.edi: 0
registers.eax: 26912
registers.ebp: 4007047188
registers.edx: 5630288
registers.ebx: 4294943404
registers.esi: 18957387
registers.ecx: 18974571
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 e9 60 ff ff ff 5b c1 ea 03 51 e9 ed 00 00
exception.symbol: leon+0x247cf0
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2391280
exception.address: 0x1217cf0
registers.esp: 4652508
registers.edi: 0
registers.eax: 18971625
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 2147483650
registers.esi: 18952157
registers.ecx: 2116157440
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 bb 64 7b 67 89 34 24 50 89 14 24 ba 81 c6
exception.symbol: leon+0x248727
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2393895
exception.address: 0x1218727
registers.esp: 4652512
registers.edi: 0
registers.eax: 18974738
registers.ebp: 4007047188
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 18952157
registers.ecx: 9431381
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 89 14 24 c7 04 24 df a1 e3 3b ff 04 24 e9
exception.symbol: leon+0x248de7
exception.instruction: sti
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2395623
exception.address: 0x1218de7
registers.esp: 4652512
registers.edi: 0
registers.eax: 2179107154
registers.ebp: 4007047188
registers.edx: 1195731897
registers.ebx: 0
registers.esi: 18952157
registers.ecx: 18977895
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://31.41.244.10/Dem7kTu/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/well/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/steam/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.16/num/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.100/e2b1563c6670f193.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/sqlite3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/freebl3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/mozglue.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/msvcp140.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/nss3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/softokn3.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.100/0d60be0de163924d/vcruntime140.dll
request POST http://31.41.244.10/Dem7kTu/index.php
request GET http://185.215.113.16/well/random.exe
request GET http://185.215.113.16/steam/random.exe
request GET http://185.215.113.16/num/random.exe
request GET http://185.215.113.100/
request POST http://185.215.113.100/e2b1563c6670f193.php
request GET http://185.215.113.100/0d60be0de163924d/sqlite3.dll
request GET http://185.215.113.100/0d60be0de163924d/freebl3.dll
request GET http://185.215.113.100/0d60be0de163924d/mozglue.dll
request GET http://185.215.113.100/0d60be0de163924d/msvcp140.dll
request GET http://185.215.113.100/0d60be0de163924d/nss3.dll
request GET http://185.215.113.100/0d60be0de163924d/softokn3.dll
request GET http://185.215.113.100/0d60be0de163924d/vcruntime140.dll
request POST http://31.41.244.10/Dem7kTu/index.php
request POST http://185.215.113.100/e2b1563c6670f193.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00fd1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00aa0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ab0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00bb0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00bc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c80000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d90000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00de0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00df0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00f40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b80000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b90000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ca0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02db0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02dc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73402000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02f60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01381000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00600000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00650000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00710000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00720000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00730000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2836
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\fldfpgipfncgndfolcbkdeeknbbbnhcc\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.4_1\_locales\te\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Local Extension Settings\lpilbniiabackdjcionkobglmddfbcjo\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.2_0\_locales\fil\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Local Extension Settings\jhfjfclepacoldmjmkmdlmganfaalklb\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.47.0_0\_locales\am\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\fr\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma\Local Extension Settings\fooolghllnmhmmndgjiamiiodkpenpbb\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo\4.2.8_0\_locales\uk\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\7619.603.0.2_0\_locales\fr\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Local Extension Settings\djclckkglechooblngghdinmeemkbgci\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma\Local Extension Settings\pnlccmojcmeohlpggmfnbbiapkmbliob\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\7619.603.0.2_0\_locales\nb\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek\0.10_0\_locales\zh_CN\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\14.1_0\_locales\es_419\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Current Tabs\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\topbar_floating_button_close.png\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3a15fe.TMP\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\gjagmgiddbbciopjhllkdnddhcglnemk\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\es_419\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal\Local Extension Settings\oeljdldpnmdbchonielidgobddffflal\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\14.1_0\manifest.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.47.0_0\_locales\lo\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\1256\_platform_specific\all\sths\03019df3fd85a69a8ebd1facc6da9ba73e469774fe77f579fc5a08b8328c1d6b.sth\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\GPUCache\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_2\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.2_0\_locales\cs\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.2_0\_locales\ar\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.4_1\_locales\fr_CA\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\52\manifest.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.47.0_0\_locales\ka\messages.json\Network\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT
file C:\ProgramData\freebl3.dll
file C:\ProgramData\msvcp140.dll
file C:\Users\test22\1000003002\61b112e7ef.exe
file C:\ProgramData\nss3.dll
file C:\Users\test22\AppData\Local\Temp\1000002001\dd0dbe53a9.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\6e0e2db711.exe
file C:\ProgramData\vcruntime140.dll
file C:\ProgramData\mozglue.dll
file C:\ProgramData\softokn3.dll
file C:\Users\test22\AppData\Local\Temp\0e8d0864aa\svoutse.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\6e0e2db711.exe
file C:\Users\test22\AppData\Local\Temp\1000002001\dd0dbe53a9.exe
file C:\Users\test22\1000003002\61b112e7ef.exe
file C:\Users\test22\AppData\Local\Temp\0e8d0864aa\svoutse.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\6e0e2db711.exe
file C:\Users\test22\AppData\Local\Temp\1000002001\dd0dbe53a9.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\0e8d0864aa\svoutse.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\0e8d0864aa\svoutse.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000001001\6e0e2db711.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000001001\6e0e2db711.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000002001\dd0dbe53a9.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000002001\dd0dbe53a9.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\1000003002\61b112e7ef.exe
parameters:
filepath: C:\Users\test22\1000003002\61b112e7ef.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL‹¢Àfà  ί À@ `…x¯SÀÈš(&à @®  H.textԏ  `.rsrcÈÀ’@@.reloc à˜@B°¯H€ŸÀ•ý¢Ir9£´ûb–$9~t‚$€‰“r>—í.Åù¸ð¿wq !çCÎinIçi¢šöøªD„¡<œéj»TêÚ3‹½ _û´/‚ÇÀãGŸüŽ¸³à³ðdº J7÷=ƒu(&ÁìÖåfœO-¤ãô6èBóŸhb€Ÿ„4Ž^ƒ8‰nû—GI î <' Š4gRJåû¤"îN ãß™1{Örk3è"ËîÒamY Æcu”\v ÛϬà @V œ.Õ^¦u·Õ+ÃëÕûk5[ ¢m3þýZöt-iñ-ô…Bº§Ê&¾W <<?FS¢>Lá:^µ¤wcaù‡4C.Ô± Z¤RœX_S4!z"˜šVm;¨ …Äè­@ݙ܍¼)¢k¬Ó~˕6†Õdù¯Np½¼µ|à öÑÔ]·©ý7‹_öj¨1›Àz§zêvF&©G¤Ö6ÇTæ>ƒJ[œ2'À%ôºî{Úñ@=Ñq*àplc4éë&mphrúp+YäaK3"¼èó£]¯g/@Õ]‚)ßÄÄ9{p{Ï ìÄÐqz–“üwóàlUÁØKFDOZ#l `ÞµN}!<‘ï$3¢ŽúG|ïƒq ”ÜWMø!“cx„ò;ßëšñ㍠®g#¿§ÿy®¢ÈÛ#8Ç$:ž9ôýš,ìS€™Øo8j:ÉRƒséoª®^gšÿ¤‰ ÊB˜6ÞΒ·ˆŸÇŠcÅäH]ÀÆÎƎìÏvè^£j* Ðã´Ü6Ê÷Wë\Õþy¾CF¯Ü_bL¿ TbÞ͔²¼©c˜¬õ¥»©ímݳ¹æ¹}禰†Ü޹龳¡®øô{Ïöп¤ãÞ÷†³©ÑvŒ˜e ós—5sG ¢1κ:0 Þ ãFŸÊZ©VÇMŒÛ·“\7K1G®Ñ‘2ð„â4µ¢¢çwµ…281ÆSHþP¡Ü‘!áý!»]€Œ->èbÄ •+ª-ÉÀRf÷¤!¡3$ºòZK-{Ñ-ßåé4#pÌq¨õ¼£ÀqëÜJß¡5· ÑË cíӘtªW‹Öþ¸‡{ˆ “F_‚½èó–U²,‘Ž¦D_ Ķ aáÊLcB‹ «X,þר*Á`±/’…ç–Õ0@qm{:=k؆\ ©tØÁ#~©óµ¸€ *B¢ñEÂD};H§Õ¨©ü®<› !þ™·ûó}c4 ŠŒ„ã0 lˆH)'2ù{Õ:´{a8ö® Õ ·0ÃÝlÍÞ}v`¹ H ’pQ.§ÚˆÇzù2½u;S^<+ž†9Í]¶ûP8jWN´áçÎ`“î!ÿ•K'´ýpS 4vfªª#.œ‡Ô¼JŠß“#ã‘ÜN…èù–•Å{iŒ_øÚ¢Ó:£m%MQaȒêð 1èã[© ¡=DÐó(¸äíÁ_JW ¹F6WÛX¬=p2’€»øê]ü¤NÞeš©ò4$oàы¼ÁTFE\šØ¦9Ðx}ÁNeÚï×ýpÎæ_FìƒÁšìŠMÇb2L–‚8 eõJ‡h-¿è²¿ ý“|U¯˜¥ƒ•…ÀH7•{4ÝS¨ <ŶÑ$¦Âóy×-á*‘ ë!2>b›éêæÃþÆþ«oäŠißd&ÿÛ· I Cy»KR§Î$[‚ìÚ¬8ׄû£©×5¹Ñ1[nkX"µlåï2›¶q0¬˜²MÒræÑ0“Ö‹õÁ{5F“…i¼ó]öS™˜ÏS2šlÀ¹`b±ŠáȧqafïG×Þ÷ß}«]ڕ¿ºÀ‰Â7׉ÅãÛáÀ>l4—hÇ ö+4O윴!²xFS$í?¿aöc ó¤ÝCLW£ïàËë#ž0}aìV; ¿š¦à+{hâŸÄ)]°gjó<ª мKcpƒ%”â xZû*Ÿ•T}õó'¾”/’[{¨ É°d¾„¯”XÜÞ6O¥¾rÝû¢Z´<¬5_xìÚý¢)¥[º!äڕ§oPxÓk±ú¢…ÙϺ2Ê¿[âˆ>c–"NŸP”y¤ÄxŽ¯C„ ê-F °c8²û Š„‚ÆÌ#º"=äB ’\Û‘XÃÆ?ø~ïhу™¦ã¯¦þøyî#s­0Œùõ–>1 GO11eš–¶¯B’º%â}ÊR£ºíÈãV%ó´ˆ=ÍÙT3ñLyG£Ð]ÌÖHÆD&ÊT!ñÀ½((ý`¤ žk×£¹Xòً$¢> ÇNOkqÈç—ç’h㻿“ot˜9j…ëÅelå¥hzôd?-¾N|Þýߒþî¯òPÈÂ,#+X±;mŒZØ\ò¶~ 4äGÿ<ÈeÒA(®Ò³l†…•¢z.OáS$3á+;¸µÏÐD³HýÿçÞÌA–Ù·eMA7ñbŒc~ԆáÁÿ$ç™qï˜û¶D(Ú •—àu7ãÄÔåîn†ÛXŸTv¤—µíá”\+ÉU:T7öëéÎSs+}¹óbæ§û £?‘Ä••i$/QÓçÔ3ÿvh,2¾xdÖBÌX³»E·£ À¯;•›6Ä?+[…×w±r0Ö«] ²;òØÚùuŽ‚UJPB8ß>Ȇuä="†@÷æ“vàû15'rJJ O=%³ûƒ˼œ6ŒÙE e&ó÷ÏFùFËÄÝîؤ—ôšŽD΁íföái<Q[+qµRí‡$šûš¡#X ~eÎÛä(?<¶J¯snÓxüß!Èïß@ꊼFÙßÃÍJ(þkýÉMÛÚµorŠÐïœð/y™”2îÁº$[ÄxÖÅ'H û’_uQŽF%Ìõp`>­L‚-”Sï%³%dùÃÈ3 ï3®¿uZÁäO´}öZžÌvn²š',َT(0Ñqa¢K*s´1e°q¥[ 3‚¢’T»œ ‹>sgbÞYT|8!g´î¡­G‚Mš¥ÎÐɐê:i¡wÞ®n¯2zCÁ”.ûÞ¥`ø+ø·åÔ®ìSÕêÝ2ê` 뜟Xž—·E¿$µ®l%iñÃÁ“åсk‰êL«M)îmŒWO:Ÿd‡>‹>F™ø½º‚Æ"}ãe¦Ÿ§`“U)Pi+ Z‰ù±]“õ‰vC1·ófŽ“ ƒÑœ’"o"ÂT7}ô,DځV|‘fê¡í•N;ÏÅækŠ=ºIA®²6DÙ°ÝU׶Rx⑑…÷¼`‡õÐÿÎq©¼]°bç±'ˆû4®‹AºãtíoLÏԀ `€¨¹à-úÿ:j% PÐ _·HÑØN0ʜ*Š(¸ ôÓå€Ö¶nDW@L—ŽqW—ªÒNò”H·>%*6 îXR1>P‡ dê¶3ò ÜSòFF˜3^ʙ¼&¯®^aZK]/ÚV •?ÅYŒWNÆ¥·Ÿ],‘êDթֆê hu=p¢v|Z4R½ÏqSÙàŸ¯°š£@b2žÙNÀN:‡þØ5âŘÏtp-J¿øØù®½ï ¸°‹ôĘJÏc³[š {1'õ Ï9¢Ñѯ&U®üJ‘Î)£®¤»Šâ½ðŸÙÖ"à#¥`§zwSx¢Cž) 몟é}6Û3ꔘ42›§ˆN³Y\ÑyõõßÇ@i‹ï>u'¯fu¥? UknÚ¡µß[õ Ÿ ¹‚qfů¬ø»mî ¬ÝTHÓçTTß 1éÜÁð¶ä7)žwbõ d»µ‹¥t'bG9•3½âd?9¼³Ÿ3ädIgÉÒ9¦u$¡s—äà¹ûÚ ¶Á÷,„®",⟐›/Å'uóõ^d¤»–5'Ãô†ç{ÉO€QboG6LdzS|ŸÚ*ë®®Uon òš.²º0o¿@ “ö& ÙxM/gN–>¦1Ù xn¹üF@ÏAXž·Š¨ã@ˆÙ1N¹'¿>5áˆÑ8¡×Õ´ÊzDð(_[ªçÀ.P¦Åçÿi ­ 1”v•¨=<I9ÍJ/ OAÚNŠ(tu÷Ø5Zî-ÉMŽsD³²×H”C¨hâR–ŠÊ3׳@G†ÄºÅ8,~æ4à›IîÛu0Ðño4=± Ÿ¡Š®ÁE ø…qÒ>ÛÉqº—û©áÒԚ륍Tq}Á˜üŸ– *‹lõùxÐ3@$>)Ԙ„$>Îæõ¯|˜h—ŽýñË8-þx$\Í/›-¸%¹Ñ-|³?ÎÂÜí¥"gŽÊ8öð~ ¾ê bíÏÖÎç'’´œ:~Òi…hr–ð§r‘œ¨Yªw(I…n-å+îrî°ê#›X$‡‚â‘GÈЭ»n,¬8.n ‰š6$‹ª²×GoÙLlàeÌ|À mI+?.’â9cËü xåã&nAígU"> ÿ-ƒ¤ÚIrŽ‡ rבÕ^8ãö´QH½¾&T‘À6I´È`Û{¹F'cαë _^¤8ÆÇÈ÷-.…¡ ›
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELØ Àfà  Î' @@ €`…x'S@È(&` @&  H.textÔ  `.rsrcÈ@ @@.reloc `@B°'H€ÀQÃn#Ôù gPY xMÚíò!­Hwxk`åû¨Ý¯æ{„cã+,… ýߟÆ2ÑóÂäï©èç ôæî{›¨“qc$Ä6ܚ‰[ô®¯ ½¥eüÎZ­ø¶Ó «z5ŸïFH1^ˆÉ!v 4«Áñ;G’ Fü+öò±(Š¥û¿pú½òih¢Ø›™èÉÄIP]%á®jʕÚ-n‚Ü( Dññ'È:~Œޣ_™m‰ôþæLÉg…ã|P¨lú™/´è“/4ôÇ£ùbe8ÓÄ0 \¼Èf£ÂdYê¢^⍿½ž„o;#ÝÃJò3Âýܛ)6ࢦžW *H}À픠‰"åKq¯¨öŠo½dòc–!¬ç.LË0Âeà<ÐóŸC•Rõ„$f¤M¾)OA{pÒïT‚dXŒ¢›ÌARÛ¼Pœÿs°–ScløÄÌZ#Ì$÷¿Ô…UO¾kH|…˜’)Šy oY'ø$ ¤….ÑÛ !Ä,~ûûÐWsºnøڈQ4Zu©ûïãÄ*T÷ÊÅqª£ìøvÔwᵶÿ„Ø<Åâ¢]K[µ9«®©EÂc‰9¼‚‡n2ùìë¶'Íþã¢f4É;}+õû{ëÑbIY¿Ñ G"ò )žµwó²ßü?ðå=ŠÜbêER5Üí<¥›Q° ´×gSÜ×$¥E²SH y/«$K ý"$¼¢ó‰ÄÚ©ü¾¼ñjˆ:•*ϲDòsäJ~¸ŸÅ½ßâ®mƒƒ€>IÀà¢kÀó’ìêùî@ÆlR\kr¾SÈàqs%ŽK—ÈÈ· ¬ø Ø=£bW‹Y4þN¼+q&žvU«¿%¿ož`[°Ï© m¶%Z‚pî°gñõ†"C¤q° ìӍŠÐفîàVŸi[BšÓ§éäÛÉ»úªQD؅-ÀX„ŽhØ B[…fÇ*ü2Ôþe§t[¨…²vk¸º$…r|—GZ*7Ëؒ/¢ž[”´ 0‹œü¶I|! ñ؍«9§´µ88?»ýÃ.ôX뵨ˆLNib@Vè§E[` LÔãY` ¡žT@ښxêùݲ“£Ò ¸Frse‚¡‡<^šîoΞì<†ëá3[D…ИCßõ·Â<j #¼Ïd°ž^¢å 뤌Mz©'û~jCºRV‚ Œ ÁËkqÙèKV¥¥ØÞÖsV?"(šÜˆƒGJ –]·ûp¸åø{υ"Rxßl­^oú ù·uñEtZ€PyÜ×OV…—–• >éØLÑ,l´È<ïúÃ]m„ɅޝÖ.‘Ï¥“zlD¥DÞzJ³æÓÕàîüÝ *×ÃW߸åb÷šolVgHÎ`– ]S¶Æ;BO¿4_†'C¡Ò ¶á–„æB8 \VaÕ×Õ-iètË»§k;æð–ænºñ²ê‡Ëêßd¥‹ÅΦØ,u”]êh‚êü§ÕÉI®ŽT’¯ídéVñéûƒµq1`ó\0ÄYÆlð1$B!Qˆ AœÁsÌznßqüøÇ÷n´ ŠZ¥Æ|‡6ûÔÜ8ÜÍyc^3ŸºF\^–·Ñň÷vÌaÐÆSºœ=ÿÅæÑÖ心’Šn‡ÇËië𨥸`¼Ð„»iÿ—è9 <$ŧõ ×ÝŒü·PΕ ß8 Ѕ8…ºiÚki© fh8‰Å™jig£¡`–Ø(nNŒ ®~´v)äݪÁu æŽËg/uÓWãOç Ì(ʺ‡j?lu.áAAÙëÍ+¿p>H%£Iç±à{—ª._ª¯B˜;¡tÚ¾í?zsB¶àc©z#=1ò›ç֐3ØR ¯ÛpelZ˜Ëú¼«‡Ó×ص¸-Û|ÛÏÈÑT“ÿc¯]ð¢g’kW¬½В«áäS™Lä›<Š±¬Á®æ©qRåŠø¢°ƒ§K9]–—ÜÕÅúMrx?yUc†“¹!è”ÇëZÁáB˜"ȟæʁ2t¯¤®Î̤?Y©h ÐS9a‚Þ¯—½èTÈ7q6/˚®p¨=±›_–P~ÂÜÊ ðYtVd@¶ 따_?>ƒ¥†N<8ݽ K…dF.° òd¤@d¹·¯ü —‰$ÚÑQ }}#æËB|‹²'t´ ‘3àei‘þíù^k „‡T+Õ®/ûUI‘6 ¼»X Üi]²—¯%ÌPzGóA9ùÿ‹ˆ"+»yÈ(§ObàÖÅj_"6&.X<*·ï‚C›ØßmÌ¢XöÏ2L‚ˆøï« ß¯ð¶ós¤T^¶¤ŽWýý`÷ì˜xiè÷FF%)ÊŸ½Ja~¡E})›â¿þ:h•°ÞΑ‘i¦hF¥BªH¬ Ö`Hâ¿Á<¨A`fáf%w ¼Ù#82CJ÷9ó5ù–<øXЇä+mŒvÂp‚.ár¼È…Ó`¸â¨.šy>wåÒìŸÑ ËzšÌ²kŽNó0­"bGúú  ó!—)D¿= KÑÝÝьYZGmè(´É¨Ç¬›’ž¾éC¯Ñ!{5>”®lJù&à˜ô‡I¿®V:Ðо6±Â€ÊÀ|蝍b_ñ6Bošp\nP /*Œ‘Õ´ ÂóRÊdæÈm8;èÒF¶~T°ä]M³õ(Ñð2HùܯOxš¦ `S7Œ¬­‡ÌË}Ûé.ÊR¬Wñ‚:Y|³)±1ãWžøD{|bxŸ´ôH¢‚SÍüà Òa’.k3Ç@rf‘ž} ”CjkK¦©±x½-åe撍$‘ }^- ãä)¡åBiA7‘¬Óÿ:ÎY(&]' +‘ò7¦ùŒÎð›ùë p¶ˆk›]¤¸†¸>|Ce”… &}µ8öP•;!¦üøEe»Ð“r»+½wÖ¡´B°#W¡Ó©gH‹–H¬DÔ lŸzŠ h– ¡i]ˆÆ«~q\¢ÆŠ*$æ$ú±nLŽ,àÿ|SbPñIãôžýT<Zèn[òR¥³°ÛIûÿri‹é͋ôƒ¾)hd|P°#†eW ä]¿ÄÀ¬Ã½®g?ÎøhS>ºÒE­DÖI¥¿!F‚ÿð)ü<ñçÎܞšoŽ>¹ùâÔ[ãšF©•,»¨M¢~[í‹<BBÜQ8à(͌Œ^ ÃOŸo9=ä¨ÝÕ 1m1-èrӑ¡èv TÝ1@—,˜¾Y€[¬¸Ýͦ.mض8҅²Û.»6E±É}V§Ê%·ä´mƒ"i~礂· )ýqþ†;âAÂv£[µ‹ößãYvù÷u‘¾Õޒê.%.´ê­ðü'ȹ*PA®uQƒKéé×̀öÇP |?K£‹#NÈeÉ„Ù‚*xPPÏ5Q¬ 4w„£±)â]W֏? ÆXhû?*Òb Z­y×ñ çôWBZ›´=xaÁ±Ø€ˆmùx„ðºƒx±ªBr97Ŕ† ­}\” %žµìƒúg+n}Às•D®mN𪊸„tD o-ù"60Ϊe=”mK}7sEɜN>φµ hO¿Î‚”ØgדÒ3ŒË5-[3+ÓŕyÒ éxêÞþuäêéÉò2ÅÃcì|Ý%UòUÁ¡3µ¦Zµ;g„a#÷Þjú%¿ø–e^—CѵE=x´ÏI«8*_÷Ûo®¨:*õ_Uƒ7ý“:újVLø’#')-à=ž¨w áÑÄçÛÎÊØ¡üzV®(d«+ÛlఁèµÑÛÆ粬0.×äò±‡ u…ڎ„ÙÀr9VuMÝóäˆx¸UP² áBˆº÷&>¯ @…ŒÜã—´ñ6ê÷ N+ú¿É\÷ÿº4Y‡#1d¥xpÙq ÝõÚ:K"{n'L¦o!‡ߣcàáÀ$#R‰?í´$Í]oKe ~B! éèÝàìS#úȾŸ˜2ó†3JÐÑÉ«ø/Ý9Ž÷hÙíRC`•\ýÇ f`?¡VQž~`ï‰æpºbaO´˜OZ¯ š>î_¢&ŠCÓ ;†áò®¬õcûW{õå.ŒÇîW 4¡º&ébÔØ»îÝ×wFøú4”]´‹‰d84MøDHñÀº£ê/44ªëGA »•EÔg j¸ŒEM‘9d¾:}®iWÚ½ƒ_÷M%ÞÆj÷@Æm0OFDˆÛ_¡Ü>»"ïbuôÞç‹à¨ "|i˙Y*™ñޞõ„MDµã¸ƒ˜!°¢„°`4NyAšª£i™ë<CM‚qÁà ̗ógiŝí"õŽÝdD¥Ý!Ìëiæ † ¦¯l qðø¡S•sU.õn˨pŒÑÚ°ŽJ0 ,R¿lä`YRn¶„he š¾-§è%änKÃ0V&(îõꛮW-¾…Õ†YƏÕÞ À‚Ë¿‰× g“‚•hÒe§"HdÁÇ0°ÊFÀónÇ;x½ÿž.ucÞݵÚгjŠ.Ò³„ 풶ü°~9ÅÑW}lªÀšMêz4]ÎÜ?ÙZC]Fµ_ Zo'‹ |
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $¢b›åæõ¶æõ¶æõ¶‰u^¶þõ¶‰uk¶ëõ¶‰u_¶Üõ¶ï{v¶åõ¶fzô·äõ¶ï{f¶áõ¶æô¶õ¶‰uZ¶ôõ¶‰uh¶çõ¶Richæõ¶PEL¡Â´fà  ÈB"dà@0$@Щ<à#|$àô.textJÆÈ à.rdataæÎàÐÌ@@.data”+!° œ@À.reloc*Dà#F¨@By¹ApÈAÙÈAU‹ìQ‹E‰Eüƒ} t‹MüÆ‹UüƒÂ‰Uü‹E ƒè‰E ëà‹E‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ì‹Eƒè‰Ex‹MÿU‹MM ‰Mëä]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQSjh0hÀAÈjÿ$Ðb‰EüPƒøt‹Àü…É ÀøXƒ}üt,ŠÀhÀžæ‹EüPèNsSŠÉŠÉü[h€hÀAÈ‹MüQÿdÏb[‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQÇEüjj@h0hÐjÿØÐbPÿœÐb‰Eüƒ}üujÿìÏbèRÿÿÿ‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìƒì(EÜPÿtÏb‹Mð‰M؃}ØsjÿìÏb‹å]ÃÌÌÌÌÌÌÌÌU‹ì¡@ÍbPèâaPè,sƒÄ…Àu!‹ ÎbQè9aPèsƒÄ…ÀujÿìÏb]ÃÌÌU‹ìƒì jjj¡ÐÈbPÿ,Ðb‰Eôj ‹MôQÿÐÏb‰Eø‹UôRjÿpÐb}øš}jÿìÏb‹å]ÃÌÌÌÌÌU‹ìƒìHj@jE¸PèrÇE¸@M¸QÿÑbƒøu*jh‹UÄR‹EÀPè“ÁjhRPè…Á‰Eø‰UüëÇEøÇEüƒ}üwr }øWsjÿìÏb‹å]ÃÌÌU‹ìƒì ÇEøÿhjÿÀÐbPÿXÐb‰EôEüPhj‹M Q‹URÿ¬Ïb…ÀuEøP‹MôQjj‹UR‹EüPÿ”Ïb‹MüQÿ(Ðb‹Eô‹å]ÃÌÌÌÌU‹ìì\hèj…üÿÿPÿäàAƒÄ h4MBhäMBh€è\ÿÿÿƒÄ PüÿÿQÿlÐb•üÿÿRÿ€ÏbƒøŽÊh„bB…üÿÿPÿlÐbhÿ Büÿÿ胍h¬NBàûÿÿQ‹ðÉbR…ìûÿÿPüÿÿèΏ‹ÈèǏPüÿÿ諎àûÿÿ莍ìûÿÿèõhBøûÿÿè%jÈûÿÿQèrƒÄP•¼ûÿÿR¡¤ÌbPÔûÿÿQøûÿÿèd‹Èè͎PøûÿÿèAŽ¼ûÿÿ薍Ôûÿÿ苍Èûÿÿ耍jøûÿÿèCP•üÿÿRÿ0Ïb…üÿÿPüÿÿQƒì ‹Ì•øûÿÿRèæŒ聅ƒÄ…ÀtM‹…üÿÿP‹üÿÿQƒì ‹Ì•üÿÿR軌ìˆ‹ÌEPèʍ¤ûÿÿQèž7Ä ¤ûÿÿè팍øûÿÿ貏PÿŒÏbøûÿÿ菍üÿÿèjj•üÿÿRÿäàAƒÄ øûÿÿ覌üÿÿ蛌Mè‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰Mü‹MüƒÁ|ènŒ‹MüƒÁHècŒ‹MüƒÁ<èXŒ‹MüƒÁ0èMŒ‹Müèå‹å]ÃÌU‹ìQ‰Mü‹EP‹Müè ‹MƒÁ0Q‹MüƒÁ0軋‹UƒÂ<R‹MüƒÁ<詋‹EƒÀHP‹MüƒÁH藋‹Mü‹U‹BT‰AT‹Mü‹U‹BX‰AX‹Mü‹U‹B\‰A\‹Mü‹U‹B`‰A`‹Mü‹U‹Bd‰Ad‹Mü‹U‹Bh‰Ah‹Mü‹U‹Bl‰Al‹Mü‹U‹Bp‰Ap‹Mü‹U‹Bt‰At‹Mü‹U‹Bx‰Ax‹MƒÁ|Q‹MüƒÁ|è ‹‹Eü‹å]ÂÌÌÌÌU‹ìQ‰Mü‹MüƒÁ$èN‹‹MüƒÁèC‹‹MüƒÁ è8‹‹Müè0‹‹å]ÃÌÌÌÌÌÌÌÌÌÌÌÌU‹ìQ‰Mü‹EP‹Mü譊‹MƒÁ Q‹MüƒÁ 蛊‹UƒÂR‹MüƒÁ艊‹EƒÀ$P‹MüƒÁ$èwŠ‹Eü‹å]ÂÌÌÌÌÌÌÌÌÌÌÌÌÌÌU‹ììthBMèèê‰hBMôè݉‹E‰…Œüÿÿƒ½Œüÿÿtƒ½ŒüÿÿtWƒ½Œüÿÿ„ŒéÇjhþÿÿQèqƒÄP•\þÿÿRMèèo‹PMèè抍\þÿÿè;Šhþÿÿè0Šé‚j…PþÿÿPèÍpƒÄPDþÿÿQMèè*‹PMè衊Dþÿÿèö‰Pþÿÿèë‰ë@j(•8þÿÿRè‹pƒÄP…,þÿÿPMèèèŠPMèè_Š,þÿÿ贉8þÿÿ詉ƒ}0„…hŒbBüýÿÿQUR…þÿÿPhdOBþÿÿQUèR… þÿÿPMô艊‹Èè‹‹Èè{Š‹Èè‹PMôè뉍üýÿÿè@‰þÿÿè5‰þÿÿè*‰ þÿÿè‰靍M$Q•ÀýÿÿRh´PB…ÌýÿÿPMQ•ØýÿÿRh PB…äýÿÿPMèQ•ðýÿÿRMôèù‰‹È肊‹Èè뉋ÈètŠ‹Èè݉PMôèT‰Àýÿÿ詈Ìýÿÿ螈Øýÿÿ蓈äýÿÿ興ðýÿÿè}ˆ… þÿÿPMôè>‹PÿÑb‰Eäƒ}äÿu5MôèVˆMèèNˆMèFˆMè>ˆM$è6ˆM4è®ûÿÿéh\QBÌþÿÿQÿ˜Ðb…ÀthRB•ÌþÿÿRÿ˜Ðb…Àué}hB”þÿÿè(‡ƒ}0„æE$PlýÿÿQhüSB•xýÿÿR…ÌþÿÿP„ýÿÿQhTSB•ýÿÿREPœýÿÿQh¬RB•¨ýÿÿREèP´ýÿÿQ”þÿÿ蠈‹Èè)‰‹È蒈‹È艋È艋Èè ‰‹ÈèvˆP”þÿÿèꇍlýÿÿè?‡xýÿÿè4‡„ýÿÿè)‡ýÿÿ臍œýÿÿ臍¨ýÿÿ臍´ýÿÿèý†馍•ÌþÿÿR…0ýÿÿPhLUB<ýÿÿQUR…HýÿÿPh¤TBTýÿÿQUèR…`ýÿÿP”þÿÿèч‹ÈèZˆ‹ÈèÇ‹ÈèLˆ‹ÈèEˆP”þÿÿè)‡0ýÿÿè~†<ýÿÿès†Hýÿÿèh†Týÿÿè]†`ýÿÿèR†ƒì ‹Ì•”þÿÿRèá…èœlƒÄ …À„«h B€þÿÿèa…hœVB…üüÿÿPMQ•ýÿÿRhôUB…ýÿÿP‹ ðÉbQ• ýÿÿR€þÿÿ蕇‹È莇‹Èè÷†‹È耇
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL×Ýc’¿à! &  @ àa0: Ð ˆ* Ð 0 ¨@ <   Ð.text„% & `P`.data|'@ (, @`À.rdatapDp FT @`@.bss(À €`À.edataˆ*Ð ,š @0@.idataÐ Æ @0À.CRT, Ô @0À.tls Ö @0À.rsrc¨0 Ø @0À.reloc<@ >Þ @0B/48€  @@B/19RȐ Ê" @B/31]'`(ì @B/45š-.@B/57\ À B@0B/70#ÐN@B/81
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELó4cà"! 4pÐ Ëý @AH S› Ȑ xF P/  ð#”   ¤ @.text•  `.rdataÄ @@.data<F0  @À.00cfg€  @@.rsrcx  @@.relocð#  $" @B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEL¤4cà"! ¶^À¹€ jª @A`ãWä·, ° P/0 ØAS¼øhРì¼ÜäZ.textaµ¶ `.rdata” Ð º@@.dataDàÄ@À.00cfg È@@.tls Ê@À.rsrc° Ì@@.relocØA0 BÖ@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ٓ1Cò_ò_ò_)n°Ÿò_”ŠÌ‹ò_ò^"ò_Ϛ^žò_Ϛ\•ò_Ϛ[Óò_ϚZÑò_Ϛ_œò_Ϛ œò_Ϛ]œò_Richò_PEL‚ê0]à"! (‚`Ù@ ð,à@Ag‚Ïèr ðœèA°¬=`x8¸w@päÀc@.text’&( `.dataH)@,@À.idata¬pD@@.didat4X@À.rsrcð Z@@.reloc¬=°>^@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELÐ4cà"! Ø.`£pl- @Aä&úÞÄ@Px P/`\°ð |Ê\€&@.text‰×Ø `.rdatalïððÜ@@.dataDRà.Ì@À.00cfg@ú@@.rsrcxPü@@.reloc\` @B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PELó4cà"! ÌðPÏSg@ADvS—wð°€ÀP/ÀÈ58qà {Œ.text&ËÌ `.rdataÔ«à¬Ð@@.data˜ |@À.00cfg „@@.rsrc€°†@@.relocÈ5À6Š@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@躴 Í!¸LÍ!This program cannot be run in DOS mode. $ÀÅäՄ¤Š†„¤Š†„¤Š†08e††¤Š†Ü†¤Š†„¤‹†¬¤Š†Ö̉‡—¤Š†Ö̎‡¤Š†Ö̏‡Ÿ¤Š†Ö̊‡…¤Š†ÖÌu†…¤Š†Ö̈‡…¤Š†Rich„¤Š†PEL|ê0]à"! ސÙð 0Ôm@Aàã ¸ŒúðA  € 8¸ @´.textôÜÞ `.dataôðâ@À.idata„ä@@.rsrcê@@.reloc  î@B
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x0002dc00', u'virtual_address': u'0x00001000', u'entropy': 7.979699103732625, u'name': u' \\x00 ', u'virtual_size': u'0x00068000'} entropy 7.97969910373 description A section with a high entropy has been found
section {u'size_of_data': u'0x0019ac00', u'virtual_address': u'0x00312000', u'entropy': 7.953601939832694, u'name': u'yulglecm', u'virtual_size': u'0x0019b000'} entropy 7.95360193983 description A section with a high entropy has been found
entropy 0.994011976048 description Overall entropy of this PE file is high
process system
Time & API Arguments Status Return Repeated

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x000002ac
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}
base_handle: 0x80000002
key_handle: 0x000002b0
options: 0
access: 0x00020019
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}
1 0 0

RegOpenKeyExA

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00020019
regkey: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
2 0
host 172.67.202.34
host 185.215.113.100
host 185.215.113.16
host 31.41.244.10
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0
description svoutse.exe tried to sleep 1437 seconds, actually delayed analysis time by 1437 seconds
description explorer.exe tried to sleep 120 seconds, actually delayed analysis time by 120 seconds
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\6e0e2db711.exe reg_value C:\Users\test22\AppData\Local\Temp\1000001001\6e0e2db711.exe
file C:\Windows\Tasks\svoutse.job
file C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml
Time & API Arguments Status Return Repeated

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: EditPlus
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EditPlus\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ENTERPRISE\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Chrome
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: ????? ?? 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Haansoft HWord 80 Korean\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: HttpWatch Professional 9.3.39
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{01B845D4-B73E-4CF7-A377-94BC7BB4F77B}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: ????? ?? 2010
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D91F7DA-F517-4727-9E62-B7EA978BE980}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Google Update Helper
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Access MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0015-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Excel MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0016-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office PowerPoint MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0018-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Publisher MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0019-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Outlook MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001A-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Word MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001B-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proof (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-001F-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office IME (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0028-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Proofing (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-002C-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Enterprise 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0030-0000-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office InfoPath MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0044-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Shared MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-006E-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office OneNote MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00A1-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove MUI (English) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-00BA-0409-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Office Groove Setup Metadata MUI (Korean) 2007
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90120000-0114-0412-0000-0000000FF1CE}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 ActiveX
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{939659F3-71D2-461F-B24D-91D05A4389B4}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Adobe Flash Player 13 NPAPI
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{9B84A461-3B4C-40E2-B44F-CE22E215EE40}\DisplayName
1 0 0

RegQueryValueExA

key_handle: 0x000002b0
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
value: Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24215
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\DisplayName
1 0 0
file C:\Users\test22\AppData\Roaming\Thunderbird\profiles.ini
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 51 89 3c 24 54 5f 50 e9
exception.symbol: leon+0x1f6279
exception.instruction: in eax, dx
exception.module: leon.exe
exception.exception_code: 0xc0000096
exception.offset: 2056825
exception.address: 0x11c6279
registers.esp: 4652544
registers.edi: 5320206
registers.eax: 1447909480
registers.ebp: 4007047188
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 18622344
registers.ecx: 20
1 0 0
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
Skyhigh BehavesLike.Win32.Generic.tc
ALYac Gen:Variant.Kryptik.260
Cylance Unsafe
VIPRE Gen:Variant.Kryptik.260
BitDefender Gen:Variant.Kryptik.260
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Packed.Themida.HZB
APEX Malicious
McAfee Themida-FWSE!962F3DE7B7EE
Kaspersky HEUR:Trojan.Win32.Generic
MicroWorld-eScan Gen:Variant.Kryptik.260
Emsisoft Gen:Variant.Kryptik.260 (B)
F-Secure Trojan.TR/Crypt.TPM.Gen
McAfeeD Real Protect-LS!962F3DE7B7EE
Trapmine malicious.high.ml.score
FireEye Generic.mg.962f3de7b7ee4a08
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
Google Detected
Avira TR/Crypt.TPM.Gen
MAX malware (ai score=81)
Gridinsoft Trojan.Heur!.038120A1
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Gen:Variant.Kryptik.260
Varist W32/Agent.JDU.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.R645974
BitDefenderTheta Gen:NN.ZexaF.36812.ZDWaaWC@eFoi
DeepInstinct MALICIOUS
Malwarebytes Trojan.Amadey
Zoner Probably Heur.ExeHeaderL
Fortinet W32/Themida.HZB!tr
CrowdStrike win/malicious_confidence_90% (D)