2.6
中危

004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691

004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691.exe

分析耗时

144s

最近分析

392天前

文件大小

1.2MB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.70
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Agent-AXZD [Trj] 20200420 18.4.3895.0
Baidu Win32.Trojan.Kryptik.ks 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200421 2013.8.14.323
McAfee GenericRXFL-UV!82779F0A2CA4 20200421 6.0.6.653
Tencent Malware.Win32.Gencirc.10b07678 20200421 1.0.0.1
静态指标
查询计算机名称 (2 个事件)
Time & API Arguments Status Return Repeated
1727545273.37475
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545275.936625
GetComputerNameW
computer_name: TU-PC
success 1 0
可执行文件包含未知的 PE 段名称,可能指示打包器(可能是误报) (1 个事件)
section .imports
一个或多个进程崩溃 (22 个事件)
Time & API Arguments Status Return Repeated
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1994992764
registers.edx: 3221225610
registers.ebx: 0
registers.esp: 1637576
registers.ebp: 1637596
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637596
registers.ebp: 1637616
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637616
registers.ebp: 1637636
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637636
registers.ebp: 1637656
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637656
registers.ebp: 1637676
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637676
registers.ebp: 1637696
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637696
registers.ebp: 1637716
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637716
registers.ebp: 1637736
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637736
registers.ebp: 1637756
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637756
registers.ebp: 1637776
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x160d @ 0x40160d
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545270.84375
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637776
registers.ebp: 1637796
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x161b @ 0x40161b
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x11ed @ 0x4011ed
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1373 @ 0x401373
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x15bb @ 0x4015bb
004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1994992764
registers.edx: 3221225610
registers.ebx: 0
registers.esp: 1637576
registers.ebp: 1637596
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637596
registers.ebp: 1637616
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637616
registers.ebp: 1637636
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637636
registers.ebp: 1637656
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637656
registers.ebp: 1637676
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637676
registers.ebp: 1637696
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637696
registers.ebp: 1637716
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637716
registers.ebp: 1637736
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637736
registers.ebp: 1637756
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637756
registers.ebp: 1637776
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x160d @ 0x40160d
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545273.624625
__exception__
exception.address: 0x775a22c2
exception.instruction: btr dword ptr [eax], 0
exception.instruction_r: f0 0f ba 30 00 0f 83 6e 02 01 00 64 a1 18 00 00
exception.symbol: RtlEnterCriticalSection+0x12 RtlRestoreLastWin32Error-0x2d ntdll+0x222c2
exception.exception_code: 0xc0000005
registers.eax: 32
registers.ecx: 1995019596
registers.edx: 998
registers.ebx: 0
registers.esp: 1637776
registers.ebp: 1637796
registers.esi: 32
registers.edi: 28
stacktrace:
FindClose+0x3a FindFirstFileExW-0xa0 kernelbase+0x194b4 @ 0x76e994b4
biwagox+0x161b @ 0x40161b
biwagox+0x11ed @ 0x4011ed
biwagox+0x1373 @ 0x401373
biwagox+0x15bb @ 0x4015bb
biwagox+0x1b4c @ 0x401b4c
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
行为判定
动态指标
分配可读-可写-可执行内存(通常用于自解压) (2 个事件)
Time & API Arguments Status Return Repeated
1727545273.35875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00400000
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1784
success 0 0
1727545275.936625
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00400000
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2660
success 0 0
在 PE 资源中识别到外语 (12 个事件)
name RT_BITMAP language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000dc2e0 size 0x00000b28
name RT_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e7894 size 0x000010a8
name RT_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e7894 size 0x000010a8
name RT_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e7894 size 0x000010a8
name RT_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e7894 size 0x000010a8
name RT_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e7894 size 0x000010a8
name RT_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e7894 size 0x000010a8
name RT_DIALOG language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e1cc8 size 0x00000096
name RT_GROUP_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000dd4d0 size 0x00000014
name RT_GROUP_ICON language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000dd4d0 size 0x00000014
name RT_VERSION language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e8990 size 0x0000011c
name RT_HTML language LANG_RUSSIAN filetype None sublanguage SUBLANG_RUSSIAN offset 0x000e1ca0 size 0x00000022
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\biwagox.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\biwagox.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\biwagox.exe
一个进程创建了一个隐藏窗口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545273.43675
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\biwagox.exe
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\biwagox.exe
parameters:
show_type: 0
success 1 0
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 61 个反病毒引擎识别为恶意 (50 out of 61 个事件)
ALYac Trojan.Upatre.ET
APEX Malicious
AVG Win32:Agent-AXZD [Trj]
Acronis suspicious
Ad-Aware Trojan.Upatre.ET
AhnLab-V3 Downloader/Win32.Upatre.R231156
Antiy-AVL Trojan/Win32.TSGeneric
Arcabit Trojan.Upatre.ET
Avast Win32:Agent-AXZD [Trj]
Avira TR/Dldr.Upatre.MX
Baidu Win32.Trojan.Kryptik.ks
BitDefender Trojan.Upatre.ET
BitDefenderTheta Gen:NN.ZexaF.34106.lrZ@aqFiITkc
Bkav W32.AIDetectVM.malware
ClamAV Win.Downloader.Upatre-5744089-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.DLF@5t0aja
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.a2ca41
Cylance Unsafe
Cyren W32/Nitol.R.gen!Eldorado
DrWeb Trojan.Upatre.5834
ESET-NOD32 a variant of Win32/Kryptik.DQFN
Emsisoft Trojan.Upatre.ET (B)
Endgame malicious (high confidence)
F-Prot W32/Nitol.R.gen!Eldorado
F-Secure Trojan.TR/Dldr.Upatre.MX
FireEye Generic.mg.82779f0a2ca41ffb
Fortinet W32/Kryptik.DQBA!tr
GData Trojan.Upatre.ET
Ikarus Trojan.Upatre
Invincea heuristic
Jiangmin TrojanDownloader.Upatre.rnk
K7AntiVirus Trojan ( 0049a84a1 )
K7GW Trojan ( 0049a84a1 )
Kaspersky Trojan-Downloader.Win32.Upatre.dmid
MAX malware (ai score=85)
Malwarebytes Trojan.Agent.MBF
MaxSecure Trojan.Upatre.Gen
McAfee GenericRXFL-UV!82779F0A2CA4
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.tz
MicroWorld-eScan Trojan.Upatre.ET
Microsoft TrojanDownloader:Win32/Upatre.A
NANO-Antivirus Trojan.Win32.Upatre.duciqm
Panda Trj/Genetic.gen
Qihoo-360 QVM41.1.Malware.Gen
Rising Worm.ServStart!8.10D (TFE:dGZlOgXif9ckj9ge1w)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Agent-BDRM
Symantec SMG.Heur!gen
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2015-07-16 19:57:30

PE Imphash

080b979eabbabd1eb8c588088cbbead9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x000dd000 0x000dc600 0.4027725745921125
UPX1 0x000de000 0x00006000 0x00005200 2.1573438562384837
.rsrc 0x000e4000 0x00005000 0x00004e00 5.515413836401483
.imports 0x000e9000 0x00001000 0x00000600 3.6902899509462124

Resources

Name Offset Size Language Sub-language File type
RT_BITMAP 0x000dc2e0 0x00000b28 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_ICON 0x000e7894 0x000010a8 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_ICON 0x000e7894 0x000010a8 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_ICON 0x000e7894 0x000010a8 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_ICON 0x000e7894 0x000010a8 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_ICON 0x000e7894 0x000010a8 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_ICON 0x000e7894 0x000010a8 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_DIALOG 0x000e1cc8 0x00000096 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_GROUP_ICON 0x000dd4d0 0x00000014 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_GROUP_ICON 0x000dd4d0 0x00000014 LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_VERSION 0x000e8990 0x0000011c LANG_RUSSIAN SUBLANG_RUSSIAN None
RT_HTML 0x000e1ca0 0x00000022 LANG_RUSSIAN SUBLANG_RUSSIAN None

Imports

Library KERNEL32.DLL:
0x40500c GetModuleHandleW
0x405010 InterlockedExchange
0x405014 GetFileAttributesA
0x405018 GetLastError
0x40501c GetCurrentThread
0x405020 VirtualFree
0x405024 GetModuleHandleA
0x405028 TerminateProcess
0x40502c GetProcAddress
0x405030 OpenEventW
0x405034 OpenEventA
0x405038 OpenSemaphoreW
0x40503c FindClose
0x405040 GetStringTypeA
0x405044 LCMapStringW
0x405048 LCMapStringA
0x40504c MultiByteToWideChar
0x405050 Sleep
0x405054 VirtualAlloc
0x405058 RemoveDirectoryA
0x40505c LoadLibraryA
0x405060 GetOEMCP
0x405064 GetACP
0x405068 GetCPInfo
0x40506c WriteFile
0x405070 GetStartupInfoA
0x405074 GetCommandLineA
0x405078 GetVersion
0x40507c ExitProcess
0x405080 HeapReAlloc
0x405084 HeapAlloc
0x405088 GetCurrentProcess
0x40508c HeapSize
0x405094 GetModuleFileNameA
0x4050a0 WideCharToMultiByte
0x4050ac SetHandleCount
0x4050b0 GetStdHandle
0x4050b4 GetFileType
0x4050b8 HeapDestroy
0x4050bc HeapCreate
0x4050c0 HeapFree
0x4050c4 RtlUnwind
0x4050c8 GetStringTypeW
Library GDI32.dll:
0x405000 CreateBitmap
0x405004 SelectObject
Library ole32.dll:
0x4050f0 CoUninitialize
Library USER32.dll:
0x4050d0 LoadIconA
0x4050d4 SetWindowPos
0x4050d8 EnableWindow
Library WinSCard.dll:
0x4050e8 SCardForgetReaderW
Library WS2_32.dll:
0x4050e0 select

L!This program cannot be run in DOS mode.
P111Z.11-1.111Z.1
71Rich1
.imports
rtualAllocEx
7uygfhjgh4jg6h54j345874jhg
U,SVWE
_^[]U SVWE
MEiURh
EE_^[]UtSVWE
uu_^[]U
]U]%P@
DDDDDDDDDDDDDD
Yt$CH;r
PSWLSU
tACH;r
s^h p@
YYh(p@
Yu3Vt$
YtF>"u
< v^S39
PqY;5pM
8t9UW
YE?=t"U<;Y
8u]5<M
[UQQS39
EPEPSSWM
YEPEPE
@"t)t%
F8"uF@C
@C8"u,
VW333;u3
SS@SSPVSSD$4
t#SSUPt$$VSS
;t<8t
u+@UY;u
3_^][YY
DSUVWh
_^][D3j
XUSVWUj
t.;t$$t(4v
VC20XC00U
]_^[]UL$
YY\WP\R
@Y<v)\P?
j?UIZ;
r;]uy;
;uY;]s
pD#U#ue
j #M_|
]#\D\D
VW3;u0DP
X_^[Vt$
t$VYVt
90tr0B= zA
@;vAA9
t7SWU
BBBu_[j
VPVPV5
@AA;rI3
tAt2t$
VWuBhi@
;tg5,P@
GIt%t)
Gt/KuD$
GKu[^D$
[^_UWVu
DDDDDDDDDDDDDD
^_Ujhi@
SVWe39=
"WWShi@
M]9}tfSuu
tMWWSuu
Mu;tVSuuu
3;u>EPj
EPVhi@
E;tc]<
e33M;t)uVu
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
IZDS>L#E'>
~}|Awvu:~pon3xihg,rba`%l[ZY
N876H10/B*)((""!s
fz]sYlTe@^GW@P
{zy>tsr7mlk0fed)_^]"XWV
W<;:Q543K.-,E'&%q? 
pF<i@Hb:J[4ET.?M($F"(?
vwwv;pppo4jiih-dbba&^\[ZXUTS
@987:2100}+*)nw$#"q
S[{MVtG]mAVf;
k}}|Aevvu:_oon3Yhhg,Saa`%MZZY
/776)00//r}njfba^Z
@ey:br4Mk.)d(;]"AV
Xyyx=Rrrq6Lkkj/Fddc(@]]\!:VVU
,,++njfb^ZAVsRwNsJ
h<]0ukM=dGG]A?V;-O53H/%A)|:#
Q?"ssrrqpoY|
_100.q
.$#"su
M>GJ|w}zy
8q:56hcf]#]
"TO=RY
2-K0''
qpodidUV[VTTS
BGB@@?
::9|.3.u
1+:)(s
yg5rak[
OCH=A7
|:1u3+on*e["_
*W,)3ggffedca^]\]XWVUP
NKI8FED
5110++*z(&#
Dca_G4r+gj%i*
5.+7b{12,U'nN#
xxwwvut:aponmWtP(fJL
VUTS;ONM;KXFED>>==K987
>A/.-x
TO@IC|>9
dg"fa\B]
^|_]RMF
ssrdr&ggf-Pcba`
RRQYMe
B~G@vrk}1tc
ZSH\]g
Cd7q%96.+(
Sponejihx
GGFU@@?
z5mhiZ]`O|7V8ENt?7|y
:$+_fedcba`_^]\
~}|B]xwvu;Zqpon4gjihg-<ba`e:7\V
303A/.-p&u/)mDo
=B~G+@
`.ng\"p)m.j3[b-a
?97T41
fnml)`
m5sgYUvl[u#l+kQ
F<}3E<n
C)g"3k!#e
QeTM?}6ru0t5!2Vl52f
xwvvuts9onml2hgfe+a`_^$ZYXW
J54w0/.-p)('&i"! b
F?8q3k
FiS!{BI
{zyyxwv
{<6elkji^
A3%ICRA@
z w)0/.-p"
$#""]k
>C?wy<xAmp;
8W;0m3n
rWKV+*)(
mEiL@ua)g[)4
;R?N3f
*L<5u.p+o0j-i2d/c
rDczyxwa~Z2pTeNlR`C [XB7
5<;:9|
qspa#je
>-@nozCW
t-qqh+g0Da
vcevyx;^rqpbP,hgfedcba`_^]\[ZYXWVUTSRQPONMLKJIHGFEDCBA@?>=<;:9876543210/.-,+*)('&%$#"!
0%{z946@Q>A`
BHa=fi&X=TdY
TdYr`|&
9u|,F0%3
9tk|,F@%
{[{|`M!.)~,b94}G+oM0
WqG</c
[Gf;sh-
-/R#:G%WN:`6
y7SLQ[
.S9Tc:
<,C!cck
s#8SQM4n#
BO._J%
6r:J%M4
F<C5RHP
hPbu-KL U341
nIKH+[t>
(4>&de`JCP\'
g8*O`v
4+.hr,
.tKH|wb
R;&PUKH,;
!s+Z/
yd=toD0%23
<(S%oK?A
czqTMs
Ec=t/8q!E
@g`vB
=AoZ(baza
|@/BtW
D<_w^g*q|/h
qG1/4,K
\\4.Q5
wCX0.h
*]0.h1&
tF0.Q7
=[S|+g0%
SE/$=U8s/|
c_AqG*X0
{Q5r*<s
2+s&>78
Z?K6xA97F\
G8~LF==3G
{3q\y/
/pgD/$
5[uN7D"
LQI4/.qRq
1T;{s^20%Q;Rq
}w_dwK.
uS5t,8
u(P/7
K`&9'Z
2|9tC:[+
4?yS"^1L
?{31?E
d?y#m+I/p
zTe[lL
7ttEs$
{>1:2F
twC~+CR 0jn>+C<BU^>f
{6-3Ul%$NG6F
mRB&~6
<Of'FGIB:B9B6O&(S
&O&>(Z
h(m.972z#,mID
:6|#NWt+
~B~-~FGIB:B96
_&~->NWQ
6~,&mID
Ns&.+%\
mRB&nv2
66Ofn'FGIB:B9:6Oh.S%
mRB&NyG6F)
)tB$O^U%
yGW?->WR
6>(OWR>6
Bs&.+%
FO&(FGIB:B9^
WQI>vJ~-T
|#NWt+
O8F&[d.G2
mRB&N><6O'
-B-NOWR
yGW?&-NZ
6PBN1E
U.3~&,
<0ts]|
Fvlhhup"F~
*$dhik|
SSTRT[TNQT\A
Y_^LM`A
?w{&cm!
y<t@Df
b#23650441354003/]
ret2wer3t1wer3twer42342X{V
GetModuleHandleW
InterlockedExchange
GetFileAttributesA
GetLastError
GetCurrentThread
VirtualFree
GetModuleHandleA
TerminateProcess
GetProcAddress
OpenEventW
OpenEventA
OpenSemaphoreW
FindClose
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
VirtualAlloc
RemoveDirectoryA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
WriteFile
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapAlloc
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
RtlUnwind
GetStringTypeW
CreateBitmap
SelectObject
CoUninitialize
LoadIconA
SetWindowPos
EnableWindow
SCardForgetReaderW
`.rdata
@.data
/A_!w_
^__j2 &91~
?#2wPa?
n>L#CR
\l7Rc^_i
;Jnn3M
PdWp?s
po|3{z
\.QqM4?
-?Rc4M4v4MM4
!&4M4,>Xq%M
Fvlhhup"F~
*$dhik|??e(
+-=>g/v
SSTRT[TNQT\A
Y_^LM`A
,z%H)J
?w{&cm!
y<t@Df
Vab#2365044135400
re"t2wer3t1
@GeMo*mduleHand
Intj(edExch
nvge&Fi
Attribu sAzPQ
e=TEEv
eg>Tn(lPr
2`OpMEvQW
SemaphxRC7wsfSTypdLCM&
ltiByToWideCSA
EryWo?a
nb<aYpl}
8ComnLne
sion8Ex
oUnhmtU/
Nam{ENHBQ's
O6@bIKZ,
w[;;$D:o{y
fCF}Rtlwi
(}8IcA4FP{(2q
/SCd+F5g,R
.telxt3@
`.Aaj.
k.&K\F
GPGWHUH{
XPTPSWXaD$j
xxy1q599
xSSy17
Fvlhhup"F~
*$dhik|
SSTRT[TNQT\A
Y_^LM`A
?w{&cm!
y<t@Df
b#23650441354003/]
$flEP}^e
sq * /
*8 0 / 1
ss"-#.
/"2#0 0
:D:D=KESCP8DAN@N7D?KDQ?L:G:F<H7B
0@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@mnf
@H9Cos@
z%.w}@
XaLTUd@
CQBU\chp?JAQFP@
+ZaOT~!,+:R`@
KX]hy]mRaYjyu,9
0<N+80?2D2D5C5CQ[@
CSZk#:Yh@
'>)>ly@
WkVi9k{@
88HTh@
6$@Vc@
$@$,@
-@ 0@ 0@
"@U]Za[eZa[a[`Z_XcXbZ`[`Z^ZbZbZbZb[bZbZbZbZb[`[`
rss@+2@ #"0!-
&NTinn@+2@ $"-
$QXhp1>
)AItwlr=D
*gkU[%2
& .V^;88@.3@#"(,(
#IR -#2.}.9
'5>".!0. -!.#3.!-#0
~}rv}rusz}{
.3@# *!0"1#0 -
bk)4."/
$3B#1&5#1"-$.!0!/#0#0
nsonso|} .3@#'#5#5%9&4
&am?P -ek/?$6#5$8#5"2$8$6 -RZ
+0@#'5%5"3#4!2
,S`cq#1#17?"/$5"1#4!2#4$5!0S_
+0@#&2$6%9$8#4!1M\q~es#2"4bnKW(<#3&:'9&6%9$8&7!0U_
+0@#(5&4*6'<#5
(MZo{clYc
23>'8)?+A%;':&7'=*@&:"1U_
.4@#'4'4(.'9(;"1HUP]
+cq&8';';'<+0'9)>#1T_
/4@ $+:*<+:,?%9$5wXc(9gtXb&;#3Tc':(;(;+@,A*=*?(>\j
29@ $(8)?)?*@*?(>2F:J;K0@*=-B3G:J8K1B)?+A+<<Q9I8M:N2F+<*=->*;*=->+?$3\j
$*9"-!+*=(9'9
5M.EOaWbPZU`\nZkYgR^Q]TbZgZk\hXeUbXeVcXeVe[hZfVeQ[~
EgkcgkcflaenaemcikefkbenaenaenaenaenaenaenaenaenaenaenaenaenaenaenaenaE
:E/9qwj
BXntswj
9KjtxFX8Fouh
"7$4UhYmWiNXouj
@U'>mrh
F]":mrh
@XL`mrh
9V%;lsf
PVO78E (
4@zAN~BO~FR
CN~@N~BM~DO~BO~ETDR
ETCPBN
49/('
()5QZ7D
#zvovnnviE!(
)r~4A\i4F
&"( /!6
/r|^q^n5C
-ES!4"74"8"8 4
!("+"+"73r}bp
/ 5#9$4#9
#,#,#:$:%=-ACR4C"60EAR:K!6#6DVCUAS$8$8$7#6%91
&#7!3/J_q|}y{|
GDI32.dll
KERNEL32.DLL
ole32.dll
USER32.dll
WinSCard.dll
WS2_32.dll
CreateBitmap
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
CoUninitialize
LoadIconA
SCardForgetReaderW
KERNEL32.DLL
GetModuleHandleW
InterlockedExchange
GetFileAttributesA
GetLastError
GetCurrentThread
VirtualFree
GetModuleHandleA
TerminateProcess
GetProcAddress
OpenEventW
OpenEventA
OpenSemaphoreW
FindClose
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
VirtualAlloc
RemoveDirectoryA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
WriteFile
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapAlloc
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
RtlUnwind
GetStringTypeW
GDI32.dll
CreateBitmap
SelectObject
ole32.dll
CoUninitialize
USER32.dll
LoadIconA
SetWindowPos
EnableWindow
WinSCard.dll
SCardForgetReaderW
WS2_32.dll
L!This program cannot be run in DOS mode.
1bbbbb>bbbbbb~
bbbbUbbzbbRichb
7*@C'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz012345w6789+/htons
WS2_32.dll
KERNEL
CopyFileA_oclosesocketDVAPI'RegigerS
viceCtrlHan
6l\Ch-g
tnfig2sUnl=oOpenKey[v%S
t\0ValueEx
lSCMage
l rcN/
4ebQ1tH
8sd5RAQEd3NHkCRQLCgpDH@VY9
D M',
FC P Xy H
}eMmpr
WNjAdd%nect)NULL#"%s"
\ipc${a
admin$\g1fd.exe#
VwA-{XnC:.#D
" %d:
hAomzjc
Y63rootm
oi N'y
cacktXpb
9zOeQu
ac=la|.
$f\8h%u#OMSPEC
/c dp
coWgw
.lx-i3.c
SizeKteofRuKeg
"RIPTION\Sy
mVJq3(RlP)o7\0~MHz*k
sH-=Wi~CSF+
FengnuDir
Ps3t>t
AJupdco!
GET$HTTP/1.1
-Ty=:
U]}-Ag=:Mozi^a/5/mo* (Xs; U
4$)Me/!08Mo(
fox/0m^kY
R"nZkq
tp:/,s:%;/
^&he-l
m8s @
IE b02Wdow
"#VR 
?x-xbitp
/sh1wav
v.ms-q
po\B3>
HkR-Ll:uezhn
-En[dAg
Ke}^v0
65aQ"Y
W^&&m%$
.$0B!Dp
%3MM|U
UfYUEH
hFhD}ll
h"PjRs`g
#/3oz}]j
89]n664
dpB.y$H&d
yIvuDE<#9
3sYM9P
Pfh`$o
9r$(08
9rPX`h#Gpx
i04iF8<f
iFHLPfTX
4#x4|8
RR;bVX[
=.ptJ^
=T}5}ri%
627S\$
HHuQtJ
C}co<ANH
7K{Ou
[|}K9:g
-&P{{t
2is)rP
|rvB[0[11
'D4Rj!<p
7J4h?0
lH;VPS
Bv^=hzjS+m
)$ 1YlK
4c7=t<
<McElm<
wf]xt)0
%K\SS[GB6t/0
S)Olm}K
u!rlmron.dr[6l*URm
LDw.v]&
heJW2rA
`k#xd*]
b6m@:lHDT
Xt|xes.Y%
Vpud{H;tlSD
%7 TUj
y!YX*@@NI!inX
VJm]v\SY
\.EM\CuZfrQsm
mlrlKk+
ics,,7\<l]1OH
9 *9E
6 eih&9nqlsib.f33i22.net+@vAZGi+E
n(G<yL9
yY'8(,
"thU%q\
$h9 O^8[\+3"lAA8E
P S4$
DD$J3Vc
h@aV?j
"`H#jds
Y#~L7C%.?(Q
p5dtwH%F<$
3mn`t?\
h0L#8h4
'gePah`
|WcSSj
lCSWz<
SQd*Xvu
#8sXQ`ah
327YhYGeeYetLastNEro2r,
.RGeA.tC=i-iT
IZdKi&
reiateMu
lYuMr!
=s_r[
"]`s-h
_V=q\k
+-0V P,9V
(w`{{!W$
&e=BtpeO
`v,pT,T
@Muj*GAzJ
dulx,4"0S
yoI8]V<P
]`3#h0
*P l`|
.NC8-u6AhdhP
SXUuWoN@f;l
:LOfl{$#y
d3c41@
<fldHD1
u8mM=1
~2Y<Ao
TEM,\Cu,r0e,,nt
%$r4_$D%&wvvv't()*tg'Kp+,
0K.n/NnV
x<x<N=Fpb>
(@Xf;KAPB
\di2]0^_"Bp3`mVi
,sta:D999EFG84
jklR"mn
M7N01O
w\P SBu
u&1/fH
Q*)wXh`
v2]]dh]VM-!coB
:u1.(W
=#7i>nD?4
R<njl@
l,C8@T{E
8Bd;03
:8YUCE38;Y
hdU-`RY\
nfDR*U
?3<i\
5l^?6&6ml6R
FFFF8<@FFFDXNddd+/
ud=!D}/
H9hPF/6e$6
n0um>"u:F
in?F@C
28:<rlx2]\
I4 n#/>$n'(E
)3*p]+$,o-
/;0O41i#34567kv
Bom-Z;Q
~][W_D
<NK|@$X?h<
0Ix.VlVPin[
P't4-.
.R^`&o?lQVYOuj
3a'88'
HNR$elkxB}~^eW'
q.2|r~
fiois4g|"
V@%$W!
t@;S|KYlJ
7!8C3c5l
|{mlP|N2
s1tGfm @$P
M40(,$
LwtPKmW,Q
+Pmy@/L$DQ
#]SP*\d
`?h=8xZ4
HY3vcfZP%`
JBuC@k!
j,3Lp3
],!:.tg$|#&
`j3Qx/KC{
m:$m<8Dl,p"
4LP5<axI]R6
DrgM6u:wr45Q
B4&2x0:
;|Lu.{Nz
tNPu$V
1F;WMGu;)g;lL
[APkllQ8
K<5?d\
I&Urj>6(p@}X
?RVPU8[
DqK(#Vf")e9(
RI>g-
K'd"u$(7<u[tP
(Br(,K
(^-@|Q
2%X.:;
HS;+1!
uV1@5DQ9
X?]f'b
r;dEp4%FEm
J .Qpf>
Pq5* "fc$
Cu}pqt!^
\&amRx(
8.L7 $;*4
5rPLhJ.,r
BEP&LX
R0X6@=J(
L6G$OK
wORB(0
67$p1U4
H22$;H}A
0xSE.@
\|mb8h
!HsTQxM}
1D`E]KWt\
!YV_SRM69
.`b$QPt
@0B[C]?
u^_o[3
B8t6Y8st
ThdPrioe
wb71Cla
$EnvPvi nm(Va
\5xeMu
WaVFiS
Obj"VPs
GbalF[
InfoMMA
aultUI*`!
`SATmpSepf8mM
>eModk
*Lraxo
nF:0Xr@d
en)sp)ch
apsp9/@
_c*m7f
__t_Ep_k
YjuHdh
??2@YAPAXI@Z3X
py1#F+0tHxo[tf
_hr3y:L
SHFNo4
;fy A8Fx48&H
skp|2]m
GPGWHU
XPTPSWXaD$j
6MIm:(.
KERNEL32.DLL
ADVAPI32.dll
iphlpapi.dll
MSVCRT.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
WS2_32.dll
LoadLibraryA
GetProcAddress
VirtualProtect
VirtualAlloc
VirtualFree
ExitProcess
OpenServiceA
GetIfTable
ShellExecuteA
SHDeleteKeyA
wsprintfA
R5(\I3A{w
7&2E00^
jihu7]X
7}!l# H[#Aj8l
)f1u3NV,XCZxUqdOx
Vn<5j~P
#j,YIOUnE[4i;.5(a]Q>7,}m
~bWOB-o
c[3hwnZ.(y
s0(o-.@q
(|85&I
*??R#iv4kR6
5T#V'
zrnl74^Y#e\F@[&
8\IF+Z?
Z$I!Y7*
85\lsz\R1V(
\C??!U
h*D$"!3j@E
=#]k7+T
~m~^5E
pL"9 &$0HP4
`cqv-. *NF
F/biV[9
i{u:MjR2
>_uRo5
I|'9G$\L
EUm8`+B
xYERn1G"f
+)|!x3b+D5y,
Dc>b>^m}z@o.jkmWYr6RU&
U1fF)[]
(y4sYI|
~kAd-~1
G5yT4 K
6_r?(l7t{6u>c
Q3vC|#i
ap4V`I+-
D5=EM1s
{S0u;RR
|DrS.5|9
$%S~NnJ9
n>@^nUJN6-gaq+h2x#u
]q0iP-[%I
i2Tshh
v|OwHi
5~qu7AU1I`W)d]
pFH!'N>4L
Jl<j!ne{("%s
{i$>5<
YC=cGGp
//BCT'
<g!8H
4~~h>N
IB'<=@D$'
p=t7dJ
/,N'GSD
Dc12xA
yHftmk:
^QfoR|q
$`=*Ryg
+X_T8X7F2xpqvfvir
[\_Tia
3WfC16.
q^J?Q){C.b
Lvm9v}
f6e##AE\
pjEtC"
g**DW]
/!dcGi
YorrJl[
,ZX$_OQ
Bb0+Ebo:%-<$6eJ^IsmO
zE0zXtpaX8}m,H-
Go;pY8
4Z:NT7.:W
05We*u~g
y07q)Z4B1PY0DoH
?17YCq8H-Z@
x%/"Xj].mU!
b$Ti8c
"\[rrCQF
4mdLcG:=i
TM&>NE(
TO[zXhE+]z!`c
4AF?RvIgxmv
I]o0;<xUhM8]&
^3oS~qQH"x<AQ
P34rc6
v@[i6%s
ddSX[
De$Y%[ov
8 \l!UQ:jkW(o
5$\N6p
p&ARH7
Y/CI`M
7!_&He
sW-2Neh
S?f=`_
c7:l69
OBH6rvm9
&R+{mV/
TM1|XAN
HV,O4<]
a_i,eT
vC}fOI0
3V1SR
6jY&7Q'
~7v"-rs
tgt@M*Pb#a7
<US"2]
7{t6X!I0
&mV}`$=$
>iur#1
UYT7(_ A[
=Bb1UEw
G,(mKwv=E
6E3B:m_R
f3">r~9
'ah'-3U
xe_c`%B7;rB
1L8ZO8Fd-D
9Fr?Oe{
ov'8UwX/O>
/nBoEXA
.Hgn80"k
qd?Wk+
>g^V;au=
@+1\J7!Y
ZtJRLH\*
u=:~<.
Rtt{V$&
*wUtnB)B
]&?C0J)7mJ(_$W-h
^R]Oso{
)1Acx-"T-T
D5gEiuO>.
]_*J[I
^E\K6Bui
sLBr=e]YW&
,/OVWucq
8C\wA;
Z}1v-XV*
je+{f>I
5/+lK=
@,#_4$+xv1WFI
m((;[K
k*~.9o
9V/@$D
&t~@*h_:
W[_{),(-=#]e*g\4@
+#R2+/+0
!_{-Mp
<6\bK+_"9vr
Y6z}F'
zh]6:FnP
xEd,Px#{O
Ee,&'gZHN'
cwYjx]F
spQ1/3
+GB1&vM
`p|NO#Jt
v2S@v_l
,EeU;~:F;
>7BcG9JiL76s
/LbCR,
@(BO9/
Mr~=sq`OW!2;X
6hKS/*'R
?s:dKy
{2wJ'D
bO%e:_V%5
@Tg P'
[.aqO#_w.
;)UP8@m"tgOF
10HRiu
10dAs=
[?1PR>#
fVv+5<CWG0U"$efPH\Uw:
5i(_WA?
3cl.R/e.
PQ`&w3+!W}_=Z&;v,,D5
?C&#~*=
a3Bu$YO
~v9yDb}
{^Tr#,9f
govT(q
VV#Wr#/Y1
m*HJT.2
<%AI=dXT6!
r z5N3GI
!"q@k5Qe&%
,A%!mI3#}/
zZZ;OX
;zbCDuPS=
t^8=v!
6#Gw[-/
ag6m>sj#-1
`:+:bK
(\Apz/
b'`}xm
BflC!8/I
.n|?1_
>ohj5Fv
#@!9>b>ygA4^^Z4u
9?W*zln
~c=)6kaj9
2}%Yf'
Ija9:AN
RD9wiN>Y
)Lw'ma
m|~LfVWYW
9r$y.d[nk
m^3h"fv
;zQB*zv
q*;]y1 L
YS`Gec
_T:ZjNz
(7-}wiq8
Gf`SVhf%
IpN($OG
qk%Z?(i<
O\si_uyP\ZS#x
s J,(!
u,U)+
e}2O7\>iB~I&
;FxT.[
-__N" PST_
Sv5LgNKH3,S)&ty&ux
'Hu<K"
I-P3|I
t`TD|T
xt,YBq0;z
UY> S}?TQ@l
!r(kh#P4R
0$u~j5S
osHU,/Ui
fC)b2rIDI
Ymm?"[-
8h]`$cQ3[
'Vq=U@*${cqB
]Ff +w*uR
dlJ$5j
_V$|wPC&
#i_I-'`
to&}!F
tX\V+%&1
}-taY!3^5
jwh79~/
BB&5}][
V9}+g%
=Du#ND
ZUv"aQ{Z-
\~}$kP_Li
A`l1T"aD**
(9nd5Nt}l}zv
1u|K'5
s!Xb i
[oZgL*
q(:W;wyRK^
d?Gw/VOQ
+abrz@rgJRI
9#*z%WL5a#P2
ReWpwO
h}J;vF
a=Y"D@7fm$KwzsKGT
71y,>!3*H6}
yN#BRoN
's#i);
{~+%CA
"@iz<]n
U;<JdT
zMlg&%?bVe
9MRW3t-IP>|X{
AM7=W>^_E
o*E^?$7[
0DZlY
3;A(>f
@d+SVE\
[?)7%I
+_$DErq-6$FpC"
e:(DS"icJ/y
6vE#(e
uL6N,l
%;Ww>^B(gd
SsHl|;
3#vshhM*
#3#K9szY
8E{?O*fIE79nH_
8;fo]G
sPMn3I`oi`JO?
'c[IIk
HKKdUI~+
Qh?nTe"0
]S}V~/#h1*
9Q\HwU
+csui4''o@
GT@@Yl~
B%PNf
`OFv-_DsL|
^< >u;
AP*u@0Sd_
PMtfQn[jA
xt?x+pBx=]
Q;1F"q
.]%=BM3
G;"%w-
dit$_4ya
G~of:L
\Uzz${
-zG;ym+
!;JyxI
[X]?m5>Fk5
g:)U1J9q wfrB
g}C=Wg
h:O9b2N
@!)CJosy:G{
$&f\E<v
'9u7og66
$10qe
R[&eOn L
gbyW> vq?
\5{`FX
b8]Of}x_N$A<K|Iw(-
j.;&OahlZqjvlyr
Alm)7Tq
Ao8|+v2
nRFiwSV`
e/L$I
nP{YyR
"v\o@w
7w~a$l
tmf~.Uq
!"I9}m%b+#>R5
(](L]r?x'Bb!
0NAlix.&VAgwCT
60;JN'=M8.l|l
chD``\n^
>uh{1b
bC8-iLx
1xQRby6
g[)6,PYk~w
8N2bU]l}n@xV7Tfw
~6onjG]!j>z}
Ut;&UZe
q[kKGp6
mH*qkxPFd
vaUJ*"mN6
,@K1lB
*N3aO6>D
dRHG`JD
kDnb{c
d1z71Y7o'U
I9\hRaS(11_^e>UjhN
NY~u_SeC
FH6w$-
W-Lw:3-hMtJI:ox
E!dRb^n2-
o-nC8Bf|
xC_zm,3
?ax]"p+
DCFngf9z
fs~#)%GW@Ws26^i
tVHG&(5sN Z\
5E%%b{+
5C3!UcU
9V-x"Fo,!hK<kH0q
8mwAiJdTS
9cWTmc30w
RAjam0
E[-KWBPEOo
bh*r}Bl
PaU&o_4(zTZkfj
U|o0^vV
lU&RT\
Vh9'OVn7k
=Cfn;D
OD+;z*
w^A-~AxI_48a)56=FH
"HHK&b<s:+J4
i9JGP;wm28pC
_GZu@T=-Q[
^ANXUR@-
'r(o+E@&R.
$PLxG3tkA+
kNIJK,
mfN'k]
#3&JUT/
\.~r-6m`w;!*
FbV9lRDeS*!
!+ Aw+Ev2
7U| fHmuvDil
:1194~
{-QW\#j},
6UZbN=
{T!-,5[
o(e=Zyd
O/)G$
e>q(YN
(L=~ wc
mCM<xA
lY8rg!@G*L]ErUb
B<@)aV6v2?
WwVi|i#&
1fiG`HG0Qr[k
ess+@n
cC'E>
A} {*s
Y:?u6tw-
#bvY.lZ}
MM1|kxt
[/VYHjP
q*gSmJ"x
7iI5n
.%5!5i|
;CtJk,
860jVAl
_>h``_w0|!100
_i<%4j
'w{\pG(
UT[J<pV
Wxq\_spo
Oi1wTr7Z*'m(N(qo
i\biSX[
ED<'Z#}z}Sy`
rHL BT
x[S=.]q[dB
WrDP7"pub'3-@?~
s$/P'LTN
|Qf2?
$D{QQeu|
]3@=dcH/?
-+AE}sRKeI
Hp.O((BMsb
=`%~[mK5
us1>e=xH52
f:;EG6Z0c
1U="rXN#R?2R
x,Fd3Bd&JP1L
z>JJ[j
8Dv]( w=
m@n]_T;w3!iE
6rZZlW
,:h<,>o
BZAe15g
g.P37&f}
}[TrBV
G{rP0&+
qO.UX%[#
!H!<G\-a0
&-NZ?*d
P{k8#c
SH oAK
91^9sRqgh
:F1"66J
VJ);_pp
U[F+JR
RD!K.&b\
)`'czfs
oG$d8hyJ'Z`tl
\i^skb2O
N-cox5\
N{!OrZud
S[8`yO
GS]gc^wL
$k=<b.
j2u#[w
[>%`s$
_9qt|^+?
n[FnASP`vn
Y)`$CG/7=i
;@Li#9x
n:yQC4u2&,]5Ogq>,
l*pS#gaLP
w?c%)fH|I
wwxZxaM
"*4p8RO
xBk!$T
N7(}Rw
+hvZH+
Fo>'\)l
)Q8]x0+
AQ:DI~H8Af)9
!z"k}N C
V+0@C1
A>UqtTP$
,0R2>pAap%*<4p
X+mj7e
mp]#bcdb4>
{wLXh"jO
S5Xrwe
L!This program cannot be run in DOS mode.
898k8k8Rich8
`.rdata
@.data
@.reloc
uEWuEV
_3^@[VP
BVMQuPu
VuVuh @
tVVVVh @
EV;t=\ @
0EPVVh(!@
_EPEPju}
WEPju
tVEPEPh
uEPuuu
WPh`!@
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetQueryOptionW
InternetSetOptionW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
WININET.dll
GetModuleHandleW
ExitProcess
HeapCreate
HeapAlloc
GetModuleFileNameW
GetTempPathW
CreateFileW
GetFileSize
lstrlenW
ReadFile
lstrcmpW
WriteFile
CloseHandle
DeleteFileW
GetCurrentDirectoryW
KERNEL32.dll
wsprintfW
USER32.dll
ShellExecuteW
SHELL32.dll
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
10>0L0R0t00000000
1N1u1~1111111
2!232F2M2T2j22222
3*313E3L3^3k3r3
L!This program cannot be run in DOS mode.
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
COMCTL32.dll
vwwwxw
|f|(|b_|)|1
||7|N|
|,|Q(|
|,|W|?
|))||=
|@z||Y|C|*|+|
|*|||]|
wwwRw`ww
w|wwkwwbww
description
EXPORT
IMPORT
shlwapi.dll
DllGetVersion
wab32res.dll
wab32.dll
Software\Microsoft\WAB
Software\Microsoft\WAB\DLLPath
WAB32.DLL
WABOpen
MailSupport
Software\Microsoft\Office\8.0\Outlook\Setup
Import
Export
CorExitProcess
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
grC|"))
wabmig.pdb
u<ME_^[
WEPEPEPj
t(MQPEPj
3PPPEP
ujPPPSh
P3PQPPPh
3@M_^x
u8EPEPEPVh<
UQS39]
;t^;W=
SSSSSSSPSSS
3SSSSPP
uVP@Pj@
@:u+@PPQ
HHth39
W;t,W=
3SPfShY
HHte39
3SP}ShY
Wffffff
YY]j`h
+SVWEePEEEEd
Y_^[QVC20XC00U
33333]^]
]_^[]UL$
UV3F95l
3^YY[]
3BYY[]
SVEW3;
@u+@<v)P
<"u>"u
3Y[^_5L
@B8\t8"u&
UQQSVW39=
W33;u.
;tuf9t
SSS+S@PWSSE;
;YEt!SSuPuWSS
;rSVWEP
3]3@]=
u8WW3FVh4
YE;t@E
t!SS9]
E;tWWu
EPSu u5
USVWUj
P(RP$R
UPjhXO
t5|$(t
;t$(v(4v
UQPXY]Y[
EtVMf9MZ
GIt%t)
Gt/KuD$
GKu[^D$
Wj@3Y`
VPVPV5@
@;rD3Ar
@;rM^K
3G9}5d
@;vAAy
W3;u4DP
WI <}}
MLD3#um
#Mj _^{
;]r;]u&
]#\D\D
39}t WWu
tjEEb9}u
WWWWVSWu
;tG3Vj
YYE;t43WWVPVSWu
UDSVWj
u5EP3GWh4
3@]3]UWVu
DDDDDDDDDDDDDD
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
ADVAPI32.dll
LocalFree
LocalAlloc
lstrcpynA
GetFileAttributesA
ExpandEnvironmentStringsA
LoadLibraryA
lstrlenA
FreeLibrary
GetProcAddress
FormatMessageA
lstrcmpiA
GetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LCMapStringA
MultiByteToWideChar
LCMapStringW
RtlUnwind
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
KERNEL32.dll
DispatchMessageA
TranslateMessage
PeekMessageA
SendMessageA
ShowWindow
GetDlgItem
SetDlgItemTextA
LoadStringA
MessageBoxA
DialogBoxParamA
EndDialog
SetWindowLongA
IsDlgButtonChecked
GetWindowLongA
EnableWindow
DefWindowProcA
IsWindowEnabled
PostMessageA
USER32.dll
COMCTL32.dll
""""""p
""""""pp""""""""pp""p''/'/p""rrr
pp''/'
xx'''rrrx'/
;^A[1}
;E1:;h
nz^%r2
k][TDC?3
fT"-\N78
7 p(O1w*
)`s `y
ccs:'fw
60oF$8
K$-S)r]
so J'G{c
PJ-c{D
oZKpI~6<]Lu1Z
&=sGS{4I6&M
3PV:ku
y}Lz0k,AUI
MZd.l]
k:~$7M
O"1?]&Y
4F%XxO
zd9r/,J>%hSJ
tL*G'%=H
I$#xVMzHS
SaFJ&M\|`_I
?uvzvB
RAPF-c8ny;"N,c
LaqWMp?
;30iwmU.
y:00"%
BPW-cC};Bg'^
#Z=OEhw)q
Uu9jw
B@G6t)(
mDzn,{1
RAPF-c8l;" g
w#YxOEb`'V
H|2a0&Md
43ji_^U
B@G6t)(
mDzn,{1
RAPF-c8l;" g
w#YxOEb`'V
H|2a0&Md
43ji_^U
B@G6t)(
mDzn,{1
RAPF-c8l;" g
w#YxOEb`'V
H|2a0&Md
43ji_^U
B@G6t)(
mDzn,{1
RAPF-c8l;" g
w#YxOEb`'V
H|2a0&Md
43ji_^U
B@G6t)(
mDzn,{1
RAPF-c8l;" g
w#YxOEd`'v
~x3!0&M
cfh^_+W
_!/sD#rnAD
RAPF-c8l;" g
w#YxOEb`'V
H|2a0&Md
43ji_^U
aT`Mv,JWj
"9\{&y
Au-c,oqg
SQVH=s
Wx|$Z|PF
t.b>0Ol0O\
Q5k_XD
pAGju*)
nFzxv{1
ku2+gW
XSA-cKNW;g
=s(N"K
FLz`'z
_rW]^{
JCzog@
JGD++
fN*JCv#>
NDoo`'
R{192`OI
LehQr7
MD' 0Lq!k!
C>yo0e
fzmDi}<D,l*N
v JO|wwgXS<>
NzM6":_
q)fQ_E
fUTr>C
I*Ro2_h[-wb_;x
;7O<r!p
\o1U\Gnis9xKi.Ha#e),I(|
a-g6q?Yk
u@CtC(
_DOFzS#S
M++)uANgC[
Dz&_H|7
H0c)4d
TK~)* QeS
Oli8N7
3Mz.(K
#~.m/lZq4
$B?Vzd
I!|zw9
%su&4Q
pKdx:xOE
]_cejB#Qr
]aEVd^mN
9IgFjb
Rik:!~bmR8
Y:s**
)z0f`'
fcFLS{
`3ji(]8.f!_3
CV](r&XW:|
2DI<Bn
"VgaJ:~
c@~5Ko>
f^8j?X-NQG]idp*g#_=
`'UO%I
owxlP^U
E$=<=r$g-dHk
5kb@3_~8/^EAR-wP
DO|AGq3
3k\~UMS
;hsy[T,
Idz4@DE+i
cE21@|
wQ'GWwNWf`'V~WPL(
j!<.mm=
rs+E"fR
mXq9/
Kro 
/%vp%+<
=_zVoe@d
oC8mR3c,RH
jMV+Y
BIHG]&Ppu#!
VVOdYN $
11.W"9s
E^/7(6XNQ
't#L<k
ai|wn ;q
5<_*B]&
2J'GMMY
,3b%kg
h4i<.W`9
!|"SbI#dwn
;k*9/`xp2P
+" [q!D
5;D7VE
'r%v-&
CixcdaFY
4/WMkV
hs-1BrsQ9
gc=F(:3mR324[C#L
<="t#rV
43j.hWe/}
S}!pS)
8G((r,z
C8V,{$sY
9w]x .
0HRPFmbO[_
e83jiu
HAh[ec
Lnwjq~o,0tEc>
Yq8Y#Tm
QK"+J0uN&
k$r).z
XoF-OaeX)0
JKR{4\
6`Q=@q8A[#YC?Bh
B#T$tEvAB'?Kk[`F_
Ml;"Gg
]M\dkuz
vYI9)zEog2
W2}dA\I8
p5_-&r
}HH89Y;tsVJ}LO
VIo}NQd>_W
{._(Ms
>uZVj{yk=
B.h~&c
i\^}":71v
ZcedRh8XoABF
2k{w#L@
DY&rJf;
eM_h2l
NBe=K7
z)d$%%
"Yo(;Y
*uKC]&sJ`-
E/Yh4^
P*DrckmQ
S-D;?UL
.>|20o2
<A6:tG
,#Y:cb`
=F%pU}-
|po/oYp
SFROLPTe?YG
C,z,bBq
):~*sMN
mE#CGf
n@Ag-(~#s&|8
LAe}p3Nf
K{55mnfb
3ZKr4biJ2%*c
a5 ?u+\,MY
n"x^sb!e2T
~2rl2,$:
J|2#XR
^gw]Uhpv
$I*-ghL
Un+(OS
uN|4;u
@yXw{]9Z5
K1zk%pY_mTotEkW
mmrUBg
1<}4JKp
JsKVC,
c`yc!5]P
Nu<K/bS
$=@uNF
:1n[NRB#|v
9=?s*$hW
LH<}-V
gK+,M}4ad<M,
=0x9-P
nygA3@
ObW]&&.W
sl]#^&G{
@H8.,N
Un[K'buZK3
M;o_8@&d
n9O:uN[
Q^V%Dz
[2K=11
>NYo/*
d S-';
<2(`(e
&riB.G8
T#JQ^f
))VW|r
v$PG|l
m!(t!@KH5
d0<=#qv
VZ7XJ8;0 F
i:WTQ" OS
0Z]!n.W
uib<F"
ghFkzet9?VY
NKQ@s!r
q$!YXG
bwbT!Re
k8v]LS
7GGHQQ
KPr~1XZ_S<
{8:r0?g
BTk6)(
Yw}>,kd7lU
E/zdT}
eO#Gs]
WL8pYQ
36{f<Dy
aeaU<IZoClbNDh2<
>>&)(<
\8JdLIl
)Rh.SAPH>Te/
n<"](V
gH=!WH]&q
HC'{4E
|.W^L[,.0
Nkr!;v
R_XoI[BG6!Kr
:1>;1grBw
`^uC3A
fBe%*x
V1c{SFoqw
1FR:k^e?U[o!<c
2~=%/g
O_)MA"
jZ*Xd/
-G>sr~
].Yi`Y
v|'|U`1
f];7jP
V;SVC,=e
6kKPcWA9
z5ppUW.:B#f
G2aLd./
SJtEDY&\B
seT;3!Ll17
n?aWJ5;FWhX{
1H >sKM!
?7D{+Yxh7N
B(<W*zu8
Ftn;A#K'G
"-bN7<
X~3nS;Pn(
Je15*ivfjn
%5cUC=2B=0
j;Dl4;D
TP43j^]^7IP:
$rr!pNNB
g{5S<-
"lRB;3$
GXf7U+Mh
rs-|8[
jRB#o,
gq\v],^
-Fv.\h1
g[TOLPTe
w#YxO.Eb`'f
H|2b0&Nd
43jj_^V
D@G6t*(
RBPF.c8l;$ g
w#YxOEb`'V
H|2a0&Md
43ji_^U
H@G@t)(
nDzn,{1
SAPG-c8l;# g
w#ZxOFb`'V
H|2a0&Md
43ji_^U
B@G6t)(
mDzn,{1
AP-c8l;b gVT
w#YxOEb`'V
H|2b0&Nd
43jj_^V
C@G7t)(
mDzn,{1
RAPF-c8l;" g
w#YxOFb`'V
H|2b0&Nd
43jj_^U
C@G6t*(
nDzn,{2
RAPF-c8l;" g
w#ZxOFb`'V
H|2b0&Nd
43jj_^V
B@G6t*(
nDzn,{2
RBPF.c8l;" g
Q=sj^K
w#:YxO.E`'
H|2b0&Nd
43jj_^V
B@G6t)(
nD{n,{1
SBPF.c8l;" g
w#YxOEb`'V
H|2b0&Nd
43jj_^V
B@G6t*(
nDzn,{2
RBPF.c8l;" g
m[,i'
!p=sAg
7 ~i0&k
t@O-c]
;" 1gjl}I6u=
a| PkL0^
k `@SEM
PWDFCQm
)^=FjT}g*
Ay$%#~jSM|@u
kr!2fCy@
)(`A\Xf
4<Xn,{m
3.7!O@]G
yG\{3"m'j
G/d0i|
l4*D7+
;"m",f
Bf6n.TS>~
:@~#MUL?K
T%Z\=]Wm
Ct2^OTr
Hz*#_/
?]=*{TO
AS4a+%Q)
Zn\>g?k1e,
\yX2*e
RAPF-c8l;" g
@CE*aL
,1%JE1U56b
e%(i&rn
L!This program cannot be run in DOS mode.
5C^4q"0gq"0gq"0ggp"0g|pg["0g|pgf"0g|pg"0gxZgt"0gq"1g*"0g
[gs"0g|pgp"0g
[gp"0gRichq"0g
`.rdata
@.data
@.reloc
f9FXuy
FFftpk(@
eE3@.k
SUV3W3
G(JuFt+-
D_^][j
FF;sTW
j$h8HD
E3u;sG
QQSUVW
3_^][YYj
XUQSVW33
f;GFsh$
XMEQPFv
GFC(;r3_^[]j
@C$E3DC
uuuuuuE
jEPhpaD
QHLYYuL3uL
Y3}fMQ
L"jEPhpaD
ejMQhpaD
u1]t*H}
GH;}rSL
3@^Vt$
D$ SUVWpaD
3PD$8d
3T$,fD$
!D$@3y
Gc<}u8Ou\tXj}L$ -
Y_^][L$ 3G
@_^YjhVQA
SUVWpaD
\$(\$,\$0T$ D$$$
PL$ TP
G03D$P
\$LfD$<D$h
\$dfD$T\$t\$x\$|$
PL$ PL$@*
PL$ xPL$X*
L$l+D$p
;s69D$tw0+\$t
QL$xx3
JL$xT$
PL$ lPO@)
P)PO`S)
Y_^][$
SUVWpaD
D$(D$,D$0$
D$,L$(+j
t$T|$\
jDC`]P;
t&HuA~
D$DPD$hP
F4T$4t$
D$8F0QD$@^YY
s0[4\$4;
l$$j@D$DD$lj
D$ @uB
L$dQt$Dt$(t$(
D$DPD$hP
T$(t$@D$,C
QD$4YY
\$4l$$DDl$$;
Y_^][$
D$PSUVWpaD
3PD$hd
D$ \$ P
UD$ P*
D$4+IQUP"$
D$4|$H
CD$4PF
WD$TP#
jWPL$(D$|
L$TD$x
PUL$$;)
PD$TP#
jWPL$(D$|
L$TD$x
D$ WPQ(
Y_^][L$P3=
`jh@RA
D$@SUVWpaD
3PD$Xd
PL$@u!
L$D\$h)
D$ PQO
L$4L$$D$`
L$$|$4
L$(+D$8P$
6QQWPQV
D$ PQN
Y_^][L$@3;
PVW39~8t
Y~8~<~@Wj
_^jh(SA
D$0SUVWpaD
3PD$Hd
VEU\$X$
\$PVUL$
V\$TUL$
V\$TL$
D$,D$P
Y_^][L$035
@jh[SA
SUVWpaD
;ul$ \$
Y_^][$X
SUVWpaD
3PD$(d
t$$PQL$(t$0|$ R/
t$0|$<+SD$
Y_^][ UE
^]jhSA
D$XSUVWpaD
3PD$td
_jSQL$`|$t\$p\$`d
L$@SV|$\\$X\$HD
L$TD$|
t$@\$(|$X
Ct$@T$
Y_^][L$X30
E3fE0E
fEfE3@
D$ SUVWpaD
3PD$8d
3YL$0T$,T$
!T$@33f;
L$0T$,
Y_^][L$ 34.
SUVW|$$
tJ?#uE 8
f;r2v4u
;w3_^][
j hHLD
E3fE,E
fEfE3@
UQQVWA
W_^]QQVW@A
_^YYQVWB
W_^YUQQVWB
u$3u QQQQQQWQ_^]QQVB
W_^YUQVC
UjhETA
\$L3\$dfD$<fD$Tj
YL$PL$h\$l\$p\$t\$x$
L$<L$<o
3@^YYVF
E2]2]2
E2M2M2
E2U2M2M
ZA0AA0
A0AA0AOu
^[A0AA0
A0AA0AJuSUVWj
1D10D1
SUVWl$
[G@|$ u
+W +D$
L$ |$%Y3$
\$ j@SfD$HPB
3rVt$ U
_^][3!
QQSUV3
Y_^][YYQSUVW3j
3VUfD}
Y_^][YUQQSVWN
Fu+FVa(
1t+"t"
Q\M?I"E
t1HHt)HHt!HHu2EPE
^_^[]QQSUVW3
f;u+3F
1t+"t"
Uj\Qj?Mj"Ij
t5+t-+t%+u9D$
3j\Zf9
J_^][YYQSUVWN
9A;|7.
<_^][YQSUVWN
9A;|7-
_^][YUQEP
V3jPt$
SV3W|$
;rCS\$
_F(^[]
;s69>w2+>Sj
VW>t,S^
][_^VW>t,S^
;s>9>w:+>j
VW>t'S^
;s>9>w:+>jD[;N
+;v>t3S
;rr+9|$
tg;wc3@+
+;v[tD
+WV?NN
+;vBt6U,
;rd+9|$
V;su+;wo3@+
Hu3t5T$
s6+1W?
UVWjD]~
SVDW|$
ySO[_^
Ut$$QQ
t+;t|$
Ut$$QQ
t+;t|$
M;Mu7T
PQQSUVWpaD
BPnY3;
M3}90t
O8F0G0F4G4F8P
t2?w2Vh
t.w/PVsU
;t]UWj
G;u_]^[SVt$
u;t?uE
AC;u_^[;
3^]UVu
on0v00f
on0v00f
on0v00f
DDDDDDDDDDDDDD
HuYU]2
3wWu.95(xD
uK5,xD
tJ2t#2t
t'@-rA
u';v#RU
Map_^[]U=
jxYf;t
jXYf;t
jxYf;t
jXYf;u
YuHjAXf;w
_^[]Uj
UQSV5P`A
;r>PS,
3_^[]Uu
0ffffffE
YM3_h]UE
3PPPPP
;r=cD
+SVWpaD
1E3PeuEEEEd
Y__^[]QU
8csmu(=
t6hpaD
2E_^[]
URPQQh~@
t;T$4t
;v.4v\
UVWS33333[_^]
33333USVWj
_^[]Ul$
3@]3]UE
]UQEPhaA
YYuCh1@
VVFVQ!
C;r_^[]UVu
YYh|aA
Yu=PxD
@Y<v5hxD
[M_3^]SSSSSUE
3^]USVu
t9W>+~
tWPVYYE
PYtG}
rdUVW}
3_^]UVu
^]U%~D
EMEineIE5ntel5
E5Genu
MMtCE%?
_^3[]UVu
^0^]W+
Ju3_uf
;kSjA[jZ^+
8jZZf;r
+(SWSu
Map^_[]UVu
|3_@^UE
]SV5tD
GV2Y4F
j=YfuG
YYt5tD
tDVYj=X
YYtAVSPv
Y_^[5,xD
3PPPPPPUQV5(xD
W3}KWWjPWW
EYYtAWPj63WW
t$EWPG
u_^]9}t
tGS3Vf9t
v$;Y~,
v,,Y~4
vHY~\qA
YYt3V5(fD
~pjCXf
YYt-V5(fD
A_^[]USVu
tf=hoD
t_FxtX9
uVuY_^[]UU
1N_^[]j
Npt"~l
t4V0;t(W8Yt
Map]US]
AJu_^[]U
A;rM_^3[B]j
,Yuwhu;5\jD
Gh5\jD
Eph33Su
YEXh3@
3U paD
C9]vO}
kE0EpjD
OuVIY3_M^3[
EPQEPEj
Map[]j
f;rQvf;
f;rQvf;
f;rQvf;
Qvf;rgJ
Pf;rSPf;
]UVW3j
_^]USVW=
Yu#tV
u_^[]UVW3u
YYu*9E
_^]UVW3u
u_^]UU
8_]UQQM
3GW3Au
EmIuEt
@tJ=nD
E]UQ}M
E]UQQM
u2t&:a
8csmu%x
S^`F`y
j$_F\d
3_^]jdhRD
]j@j _WYY
jEPhpaD
Y8Y4@M
} j@WYY
2t[;tW
Y8Y4@MFu
EtLtHP
YUQQSVWh
3S3f D
EPEPWWVc
;r6QYt)EPEP
_^[]UQQE
tj"Xf9
j"_f9y
t"f;Et
ME3M3M3;u
_^]VWGD
;r_^VWGD
3@]UQV5
]VWh@rA
3SVWH<
B(;r3_^[]UjhRD
SVWpaD
1E3PEd
Y_^[]UE
]USVWUj
P(RP$R
t:|$,t
;t$,v-4v
UQPXY]Y[
]j$hHSD
Y+t"+t
+t^+uH
u?GdEGd
u wdVUY
Gd3\UU
tAt2t$
^0R_^]
ft%Ou +
3jPfTAX3f
j"U$paD
}E95PD
VVh$uA
;tO9=`D
tGP5`D
MEt/t+
3M_^3[
on0v00f
on0v00f
on0v00f
DDDDDDDDDDDDDD
KuZ^UM
t7=PxD
]UQQVu
WVcY;u
EU_^]QL$
trWQYuE
t(WJYP
V38W30@9u
YtD0,+
,3@@QQj
8Q$PEP(
Y4f;uu
Y4f;uOFD@,;U
<+0;sD
r3VVhU
QH++PPVh
+[M_3^
Wtsj=S6
YYtc;t_3f9w
E;5DxD
EY5,xD
ey\>tS
PYYtTSSlY
3R3PPPPPUVu
x=t!ft
_^]+5,xD
PKYF ;
P9YF$;
P'YF8;
Y^]UVu
PxYF0;
PfYF4;
PTY^]UVu
v$v(v,v0v4
v`wvdovhgvl_vpWvtOvxGv|?@
^]UQQpaD
E$39E(j
3tAEWVPSu
t!3PP9E u
e_^[M3]U
u(Eu$u u
Map]UE
PkY]UQpaD
W39E Wu
e_^[M3e]U
Map]Uj
YY]US]
_^[]UTD
]3]UpD
jA[jZZ+U
_+[^]U}
gY3MS0u
t@VyYt
3[^]|q
t*f u!f t
ZmZ,$Z
et_EtZfu
]U,SVWj0Xu
(lj"_8w
uy3;uu;t
]u'j0XF
EfyfxW
v6j0F[
Wj0XPV\
ap_^[]Uj
MSWu Bi]
hj"_8nt
-jd[;|
Map_[]WWWWW{sU,paD
^VQMQp
rg0%stu
M_^3[\]U
Wj0V^|
Map^[]U,paD
[SQMQp
^M_3[[]U0paD
[SQMQp
E3H}-E
^M_3[ Z]Uj
uVJ:0t
E`p]Uj
Fu^8Et
E`p]UE
3@]3]UW}
^VVVVV(nUVu
^0m^]W+
3^[]Wu
P[YYt@}
~';_t|%39E
;_tr.~
Map_4Uj
3_[]3PPPPP'lSQQ
Ht+Ht$Ht
HtHHt
PQW|PEP
YM_3^YT][U
E`p]U=
;s`Myt
Et%Map
Map_[]U=
YY]UW=~D
#3+#I#[
SL@PSVCR
3[_^]U,paD
EZE3PWWWWVEPEPs
apM_^3[O]U(paD
ZE3PSSSSVEPEP
MapM_^3[BO]Uj
_^[]U0paD
3^[M]3PPPPPcWVU33D$
YY3^]VD$
IA+3@u
DJx.t'D
<+3M9]t
j EX+j
MTCE;|
IAjX+E3M@D
OGD+3G
};Ej_r
3ADJx(t!D
UTMEE@E;|
IAMj X+]
IAj ]X+
Iy}jX+
7M_^3[.F]UDpaD
IA+3@u
DJx.t'D
<+3M9]t
j EX+j
MTCE;|
IAjX+E3M@D
OGD+3G
};Ej_r
3ADJx(t!D
UTMEE@E;|
IAMj X+]
IAj ]X+
Iy}jX+
7M_^3[@]U
E3S3@VE
]W}]]]]]9E$u
+tHHt
X]3@EA<
+t+-t&0tC
3@E0|*Eu9
B0}uEE$
kE3@EEEu
HB0tEE0|%u9
B0}uE+
+t"HHt
v09] t"BE
mH3@E9
B0}JEM
HAO8tMMQPEP?
U_E}}~Xu
Uf~;x2E
f;r3]f9E]
Mfu 3f9E
M_^3[D9]
A#EE?UEWft
;u%u!h
u]]]]}
U^|uu~ru
uEf~;x2E
E}B}Ut
M]Euuj
u@Eu4E]u fE
f;s fE
}fEEEuMUf}!3f9E
UX~X}E
[f~[fM
fMU<f@fE
f;s fE
}fEEEuUuf}
u]Ou}]Uuj
UuuE@E~
AEHME~
EE>u}A
0I;s;s
3@M_^3[/]
3SSSSS!EUM
YEm}E3
_^[]UM
PM>ohPD
Po%X`A
G;r_^]
Y__^[]QPd5
SVW(paD
3PuEEd
SVW(paD
3PeuEEd
^]UQSE
k 3@[]U
E[]UQQE
MuWx3U
UQQSVWd5
^]UV#Pu
u3@]3]U
SVWE3PPPuu
E_^[E]U
m)zVW_^]M
tr8csmujx
VO2Y^]
EPYYE N
>csmuH~
u,uVu$6u
WP_]UE
8csmu9x
]3]U<E
u>csmu+~
YYuD}9
EPEPuu WrM
u*EUHM
u$u uuuWu
SV,UEMA
YYuVHHH
u3u$u uWu
is_^[]sj
PMgbh\UD
cu$]jWu
\UQQW}
t1?MOCt)?RCCt!u$u Su
rEPEPu
;F|c;F
u$Nu Qj
M;r^[_]UQQSVu
;>|_^[]kqqUM
HtHu4j
WxE03@
e0o3.UE
8RCCt!8MOCt
8csmu*C
USVWBM
RM 3@_^[]UVu
PQZYYt
t3@_^]UE
+SVWpaD
EPeuEEEEd
(MMMMT$
MMMMMMMMMMMMMMMMMxMpMhM`MXMPMHM@T$
6M.8*T$
bad allocation
CorExitProcess
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
_hypot
_nextafter
Unknown exception
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
CreateEventExW
CreateSemaphoreExW
SetThreadStackGuarantee
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
FlushProcessWriteBuffers
FreeLibraryWhenCallbackReturns
GetCurrentProcessorNumber
GetLogicalProcessorInformation
CreateSymbolicLinkW
SetDefaultDllDirectories
EnumSystemLocalesEx
CompareStringEx
GetDateFormatEx
GetLocaleInfoEx
GetTimeFormatEx
GetUserDefaultLocaleName
IsValidLocaleName
LCMapStringEx
GetCurrentPackageId
GetTickCount64
GetFileInformationByHandleExW
SetFileInformationByHandleW
MessageBoxW
GetActiveWindow
GetLastActivePopup
GetUserObjectInformationW
GetProcessWindowStation
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
1#SNAN
1#QNAN
permission denied
file exists
no such device
filename too long
device or resource busy
io error
directory not empty
invalid argument
no space on device
no such file or directory
function not supported
no lock available
not enough memory
resource unavailable try again
cross device link
operation canceled
too many files open
permission_denied
address_in_use
address_not_available
address_family_not_supported
connection_already_in_progress
bad_file_descriptor
connection_aborted
connection_refused
connection_reset
destination_address_required
bad_address
host_unreachable
operation_in_progress
interrupted
invalid_argument
already_connected
too_many_files_open
message_size
filename_too_long
network_down
network_reset
network_unreachable
no_buffer_space
no_protocol_option
not_connected
not_a_socket
operation_not_supported
protocol_not_supported
wrong_protocol_type
timed_out
operation_would_block
address family not supported
address in use
address not available
already connected
argument list too long
argument out of domain
bad address
bad file descriptor
bad message
broken pipe
connection aborted
connection already in progress
connection refused
connection reset
destination address required
executable format error
file too large
host unreachable
identifier removed
illegal byte sequence
inappropriate io control operation
invalid seek
is a directory
message size
network down
network reset
network unreachable
no buffer space
no child process
no link
no message available
no message
no protocol option
no stream resources
no such device or address
no such process
not a directory
not a socket
not a stream
not connected
not supported
operation in progress
operation not permitted
operation not supported
operation would block
owner dead
protocol error
protocol not supported
read only file system
resource deadlock would occur
result out of range
state not recoverable
stream timeout
text file busy
timed out
too many files open in system
too many links
too many symbolic link levels
value too large
wrong protocol type
bad exception
generic
unknown error
iostream
iostream stream error
system
yehoron
KKPSSSSSamw|&-29EGPVZZaipvx}+.:AHIT\bkz$%*8FQXagu|,6ANTVbor"(7BNU]bllssx
PYZ]]]]]dqqv!.09AJXfjty}")77:?FHT[`fr!+0
O]`iiiiiu"$$12=GVW[hpuw}}!-8DSWbky'.9>>BGNU^mtz{++33@NPTUYelt%4@BIS[`jr!
KSZaaaaaemmmoos}+:?HRRW[ijt}$%+1;;ENY`cr
KY_nnnnnv&+5BKP[jssty %+59<KY\ft}*+9?JY\^^mp (.;ET_fu%)099FLP[^cffnw|!++
JMOUUUUU[jwz##2AMP[et""((11;CGJSV^bq!&+3
LRX`````hw{}&059GGPVZcrr#(,-7:GRT_boy *4=KVV]jp !'-6<EJRRSTYbflqz"-:GMQR
PVWccccciipy"*//<GPU[ehm{,9@BKRYccjx}$.7
NQSaaaaakv'+/8<ALWfnwz&(+7?KN]l{+7CCCKMOQQTX[fltt!%((-;=GIKZZanz|-0>FGJX
BDFQQQQQ_nny&/7:;ENUZckv}} ,3<HPSY]hlw .
AHIRRRRR]iu%)49@KMV]`ly '17FFUWadeeq}&.:@EPY]fqz&'028@KS\`bnq}-0>GSZ`ix(
OSYfffffio}-/9HT`dfq{#)3;@HW^ajor!#169AB
AKRVVVVVachu$02AGQ]dky -<=FTW_jklu!#.:<GTXfky{*14BIOT`o{%'.9ACFPS]^^koos
GOSWWWWWakr{}'446DMSV_anqr"..=HOXaho{&&(
ETVYYYYYdjuz)5@DO^`hiw}+-4AIPSV\^etx)39BN]iruy#((*/4?LRX^`gpw(,59?GJQWai
M[[]]]]]bitx ,6DLQVekt!(/3?BELVaaaaor##/
HQXXXXXX`iist{"&/22:>MMSWcdeo|,4>L[[bmx#,05:GMS]iqt")-.24BJYdor{{)7AMTWe
HKLPPPPPS\fnsz'-24@LLNNQ_jw '+3<ACQZhirz
JPP_____bgt%*8EFTaioy")+,7>HUXegmwwx#'.3>HQT^bpz{|#)0>@CJWdjnyz*..<GGJR`
O]aiiiiinxz#%4?AFN]efpsy|+6@IP\ffjp $2?C
HWYdddddllt}!'5;HUZghr{!$+-8;CFGIJUahnx|+05>ITbcry!!!*,889GTUV`jsx".66EO
NY\hhhhhqx$-57AACGSVYelq{}'+-89@JQYcnntv
M\coooooz'6:GN\gp}++08>@DLM[eouu %2=?BHT``fr{*66:GS\hv})4>CLMOQ^`bekx(7>
AEKOOOOO[``iwx&48;<JVW_bknrv#*7BOYfnsttv
PQVaaaaalru"%'.2>KYdepx ((099<IRYbehkz*,3;<DPUcnrru|&)6DRS_deo}"&+:AMRZe
JQRUUUUUbqy&)*59>MMVZ[fiopz'+17<GGVejmv$
BBFPPPPP\ghnx')-.//<EKX\`ky$%(6>AO[hw{$./;HS^eikkru{,,0<JMXffmw!+69ACDR`
MQWaaaaaehu#-:@OWZhs"#%%.4CEEKN]lu!.118A
GTYccccccot$0<CJRWZ`dq}.:EL[fgs #0>EQT`lsx$&,56BLSbfpr!!/7AKS]et$$.6=LL
FGKVVVVV\ku#(379DS`my"0036:=INOPWbfpu ,4
NUYhhhhhht$04CP\ds#149EOS[couuy'*9:BPVXcemx#,56>JUao|'4BKQUdoow'4==EHTTZ
CLQ]]]]]bdm|(,6<DKKNYffhlsx%.26>DLT]cr %
MX[iiiiiuw&)2;HIRU\agr| #$08CJJRZipv},4CPVcdryy}%3BGOZ^mq"+9EGJLUZ\dlw()
OY_mmmmmpqz!-1>CGHJKSV`ko -0?DPSWaiqsw".
DJKQQQQQ]ixx$34ADQ[]``abggtu!&19DJVXZesv{(6>EIIJTTWeenv%..118?AMW]ikls"#
ENOXXXXXacqx)24>BHW[[efrsz)8>DO\_ckt{+3@
JQTTTTTTaalq /6?JOV`cijlw{}-28:<KOR^mu$+-.8GGV_cgnrx!(*5<DP]fhhqx(38>DEK
BJPPPPPPXYcp{'2:CGKKSZdpqx#-3:@MXfhu|(6=
ACESSSSSVdlr!(6:GLN\bgpz!'4<CHUZ`cdgmsy|%(*8@NZ[hlmm{))+78<DDFPQ^^ir{!""
NNNPPPPPS[jww!')3AP\^cpuu ()-;?EP\^biirr
KPR]]]]]]_fmsv$%44<BLU`fu|#.7<FFNTZft!-169=BPUbkt{$%3;EIWZ^jsy%+/099?KZi
EHKPPPPPXcftx!$2@KZ\is '37::;FKOP]flru&5
LNOOOOOOUZ[alu!,4<EEO^kooz+,.7CM[]ku!!&39GIMXeor|}$.3>EGOV^fp|,7ESWfgp (
DPQYYYYYboxy).;?LLMV]jx)1;BLZix|)-;>FGIW
DPPZZZZZ^dmz|(2>DINPVVeor!!#%*17AEQXfgmy|%.;EN[ir"/8ELRY_kz'///1;CEGGINT
GLNPPPPPW[dnv"-:HW\iu$3<IIO]kp !%%,25@MV
LOVXXXXXY[achnx$+,.9;AILTXcijkmu{+3BBEOPTTYeiv})8CJT[jmyy .8ACCLUcdmy}"0
BIJKKKKKL[]]_gn}!-9@EHRUWdenpt!"&26EKQY[
OVYbbbbbqtw&38FS\bggqt!/:GGLXdknnr##))/0=>CIMTTcerr"1:GGN\dp{""%11<=CORU
KZ`nnnnnpq!$)18DLOSVY_iss %/39FGIMQ\\egi
MNUWWWWW\]gpqx{*8:<HWZ^jlv|*6>ACJU]hirtu{(48?GLLZcjprx(.45<JSabdlr"+8CHV
HNOPPPPPU^^gtv"158AHHP]gjo| &5@EFGJNNO\`
MNQTTTTT]^blz!''49FIV_`emnz+9<ACOOR_et ,7:EHHMW_jv#$(003@KR[gt!*27DGHLRV
KSVdddddry$24AILO\eetz|((+8GUZZblpwx -<?
KV[gggggky*/5677>AADLOZefgp}$,9CQ_jvz}'(168DGLX_kx)3>KXgtu$'',,-0>JRS`dp
GJQRRRRR]eksv'(68CORRTWW\ioqqrv|,1?NQW\c
NRWZZZZZ[^flw$&17BIX_gv"+4@@APWalx"&,558:=AKTXdks",,4==?MQTYeiiw"&'1?EEN
P^`iiiiiv{},8CN[`gsz -19ACRXeoqrv{)7>HIO
KW[bbbbbcksz),6;GQT_jmo %268@IW^behvz#'6<>GQ`esy*4CEMY`lvwz",47AOYapz +.
FU\gggggnz")68>JJOSVeqy!(/55:HKYY_hquz"/
IVZ\\\\\ho|$,;EM\ky(,3AJNY_klw%'59HSU^cpy)38:?NNS`hlrv|$%(.56>JRZafhpwz{
DEHIIIIIJV]ky'')+/:@IQ\dfsw{+9HVV\hv$*27
GSTXXXXXem{&+-8@FQS_hox"-27=L[_elz#&3>KS^_hr#/27CMQZhpw!)35:DMU`jpz!+.9=
PTXaaaaajw|&-.=?COO^js"&++:FSTUackw|)8;F
BLQVVVVVcguvv|%/<?GRWepu#+-28@O[[gq!".2>?HHR[jx#*6:?AMMW\bhu%08<HSValllx
LPWfffffrs"&00:=FMS[got#)7BPYbqruz{+7EOO
AFLOOOOOVYeq!$/4<HVWcfu!//;BJY]`ll{+/=LYdly*02;GOUV]_bot!'48?MVbpr!)6:;D
LQQ\\\\\bfs}%%4CRako|*0=EFOP_jw $/<JNVV_
HPWaaaaabnrwy*7>FGKU_cfr!06>>HMS`iky",6CMQR`jjxy|,.5DFM[inruv})47;ANN]`c
PYYccccciu%*-005?BDPX[gjnsy"/5;DGKY^lmw!
IIIPPPPP[fghjrw|,789GPZeqt$*7ENPW\\hnq{|,19CQW[[hhkx%3AJXerw!$'68=LZccr"
HVY^^^^^^m{)*/26;BLS^`mnp!%/38FKT]]fnx"%
AIKQQQQQ^_dirry **27ES\gu&.;ABKMYfnx%0>CRXcftv##19?LMS[ellr!")1<FJSWefu{
APRRRRRRX[```bm|&(+/17@MMWZgpsxx$3BPYdn|
ORS\\\\\gox *58>HKQUdov{ &/6<HO\bdjs"*/=KQ`dp!!.7=AEN[anx|,488<KZ`kr}.7?
JPSbbbbbjt|$,,6:ILUV_mtu #+8>MPZ_jmqu#(3
AFIQQQQQZfu##.4CLLSSUX]^itv$%+4>FLVdr")/<BPQQQ]ju{#)668DNOW]`bjuz!$36ERR
IJMNNNNNVepvx(5DJUY_fjjkvv"#*37=FTbbms *
DOVcccccjxy%.9DQTXckuv"*8<KNV]flu&,,0>FKY^cptvy"$+1=DJOZais}-119=LWdimr"
CGISSSSS\kow".01=>DMUbluw!01>KTVW_adsxx$
BJOPPPPPT[\abgmz(4;IQTX[dp|'09AHSX\bjkt$3=LVdkns$)+.;=CIJX`hps"038:IV]_b
PPVWWWWWeq{)39;HWXYdgjkv&&18BLLYds '+6BH
ABITTTTT]blqxz!*28>BDMZ`iktx !.<CCGRapqv"..78ESW[`lu !&57>CCEPZamvz*4AJS
EORWWWWWZ_jt%%0:@FQZ_ipwy$)--..9HMX]ccoq
MTV\\\\\kux$$.66;IQZfu!(+6=HILUbdit{}.//:BPZbhvy"$/168AJLR^`dkx$$$,7FR\]
JUUXXXXX]kv"*18ACDS`ipty'--6CKP]hhjv%)16
LZ]`````jopy $&--3AMTacgsx)167:;<HLPSSVV^_cfprsz%+.08;FSZ_ejx)*/>LZcdqtz
CPSYYYYYaknnu #057BNRVboq /<BLY\]kls"(38
GQT]]]]]ix|(5>JU[gpu#,:GMY]lu!()/35DS]kosv{{'/=INPQ[ehu%0;ABES[ioq}+//6?
HTUWWWWW``hv#)-/66CIP_iot$.3@KLQ\jx!-./:
HV\\\\\\dehkrz})1=IMM\hox)13<IKNW```ggt%''.46BLYap},2@JKU\^eovv#014<FSUV
P[\\\\\\_mt!"/2@NVdjnz+1144?NUVY_ceflrs#
CHN]]]]]jnp -7CLMW\_dott *47EJOS`fs| *-9>KMS[ipv&1:;=FU`dfl{*+9GGUcrty $
HIOSSSSS`fjppz"-::>EKP[\acpx},/039:DNVci
GVZccccciv|)*66;HHVWapxz(6ELMM[_mrvwxz|%*-:HQQ_aktv|(58==BGGQ^fr|"-27CQU
HRVcccccm|*117?DOV[bgry{(2>GSYadp!*6AFJP
BOQRRRRRaivx!,,,4@DMN[fuwy!$$.2=KTYacqww#.7FMZboooz!(2<DIVefuwz{+49DP\hh
IVV^^^^^blpwy)/=GS_jwz*9CEKY[hmz#12346CH
IIPYYYYY\]]_gv!,,9HPV]iu#)/>JWZajl{#1?ELNS_ls"12AGM\kty|)006>JOSblu|"'1<
JPU\\\\\apx%&+3=JPPW_cm||}$2;JXdfju&*88C
NNRaaaaabght|$(4BQ^js}&/==GNU`hny'+0<?M[\ejmx&(-;DMZefpt$+,:CMYbdennx)0?
FHJJJJJJVbn{)-9@N\^joy{$-14?JV\kkv#,9>DL
N\`aaaaapz%&(17>FOP[eeeggqsuw{&1<IOSV[\afox$)3?MQ[_kw&&&,668GMRSUbgoz)00
M\apppppy &*.;;CEQTX]is$/:FKS_`gt"".44=L
EFLMMMMMNS_joy#1;ACRU]lltwx(/4<JTT\bgu#.8=KPVZblqy}.09CDES_ht"+8=>GTaivz
ENSUUUUUbflmxz{%3?NWddgkt!'+7@MOT[[bkq!!
KX^`````hmqw!#)4>IQXbhp}#1=AGKQXZ`jor{{)*7AIWbfky*5;CCLSVV_cqqv|+9<<BJO^
ENT^^^^^ix -/1>BKOVco}#2:?ELZhwy'28EM[``
N[_aaaaaegsv|%%29;ADIJM\iw'4<JY\`o ')-<@GMNS]fiit#,8C
JKLADKwe
 !"#$%&'()*+,-./0123456789:;78<
;<=>????@?????????7???@B?@?@B???????@?????
Pu^t~MY
Y=T rt
P@UV7P@;<t
9V4H9u$x
kernel32.dll
@jjjjj
((((( H
,/KPip
/-P?pR
Dialog
Cancel
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInfo
041924b2
BuildVersion
7, 15, 22, 129
VarFileInfo
Translation
C:\j5DVLMKT.exe
C:\qH8CARhS.exe
C:\TP1JHYc6.exe
C:\OsmynneR.exe
C:\FRC575Pi.exe
C:\dunnOD7J.exe
C:\1vkOogwm.exe
C:\tM7aDmZc.exe
C:\QE6Sin6y.exe
C:\5E7BO013.exe
C:\4CWqWuaX.exe
C:\Fyw5EfIo.exe
C:\cebd1e4e41f91c0d9d7c602dbd1ed342c3f081bd75e540d62f7806b801a8da17
C:\h4Qq2G6L.exe
C:\6540068617477157e6240d1a05907d350b88d4576e3351245c9a139a4db854a3
C:\l_zz6PvA.exe
C:\v_bcebtv.exe
C:\LXnw4NJp.exe
C:\vx5hl04e.exe
C:\KGdZFc6Z.exe
C:\waQaSxBp.exe
C:\9nZoWDfT.exe
C:\IIJxbIXq.exe
C:\6NoPQq5h.exe
C:\apYhgWle.exe
C:\dJpMDRkO.exe
C:\05pGLv_2.exe
C:\wVN_qtwj.exe
C:\Ll8xDmit.exe
quip.exe
Updates downloader
traderstruthrevealed.com
text/*
application/*
/images/do15.exe
wipet.exe
C:\NI5hd1hS.exe
C:\EbFOhdxS.exe
C:\HTMmUr04.exe
C:\i5XF0q9a.exe
C:\6i_tySeK.exe
C:\50mDnVl3.exe
C:\n2LimEQr.exe
C:\NYHe8Yh2.exe
C:\fnayO_Qk.exe
C:\Y3GLqNVy.exe
C:\MxiTe3Xf.exe
C:\4oJxF94v.exe
C:\ZTGnvPsw.exe
C:\hMz3FLmB.exe
C:\mYE_aKqi.exe
C:\5COTU7St.exe
C:\10EbMXnX.exe
C:\W5L95qMy.exe
C:\8rwXff2d.exe
C:\jkIDPd_7.exe
C:\OiebxEuO.exe
C:\CNujCPlM.exe
C:\BmSHRnlX.exe
C:\68M2fKHi.exe
C:\oeQtZhl3.exe
C:\GnzVXTvZ.exe
C:\mbGIbmrp.exe
C:\TZWOHZbh.exe
C:\51qn3bP0.exe
C:\WLDisO3P.exe
C:\Tw9tRTN3.exe
C:\QEw7fK6J.exe
C:\kdSMX0Vy.exe
C:\v2C_PpGe.exe
C:\1QygKYvn.exe
C:\wFP2Y8w_.exe
C:\gQ4jh8R_.exe
C:\Iat2Zrrw.exe
C:\uy6iqjgf.exe
C:\8_FlxVD0.exe
C:\XJ0cVBaP.exe
C:\x4J6mcat.exe
C:\OB9MkNtd.exe
C:\g3fY66xH.exe
C:\DU93BQA4.exe
C:\8D8SGGjl.exe
C:\cIZAI0Ej.exe
C:\O4f3kWEg.exe
C:\mSq7IK7K.exe
C:\7Y2RPmhj.exe
C:\WP8XFm_X.exe
C:\xWVMmCkD.exe
C:\oJZD4u6h.exe
C:\XchhViAL.exe
C:\KiTnjw_P.exe
C:\U1oS9Sll.exe
C:\rsSb92F8.exe
C:\MItbZTuv.exe
C:\78OxpnZQ.exe
C:\GQeHjGEa.exe
C:\813037056a8a6cd0b7513f00ce82f658682d8118709951ebcf0b7114a49187ab
C:\luhv0wSS.exe
C:\Z0KOz0is.exe
C:\8tAu9TZf.exe
C:\4So2jHFx.exe
C:\51VMBcTq.exe
C:\WXaZ9JxB.exe
C:\XOQrDh9U.exe
C:\DYQVKdog.exe
C:\52y2ntMr.exe
C:\5Ktu25bI.exe
C:\0Riti26s.exe
C:\0LUcQqa0.exe
C:\XZAwUOPd.exe
C:\mP95VHyl.exe
C:\us0KfAVI.exe
C:\CjLUlfEB.exe
C:\94HE4kLc.exe
C:\V3_wyRkU.exe
C:\_i7aesZg.exe
C:\3D6OtRZn.exe
C:\qF9Ooo1p.exe
C:\g8KD4oA9.exe
C:\b_n8SWe9.exe
C:\fHqIUgq8.exe
C:\uFDFiq2s.exe
C:\YYuTu1DB.exe
C:\VuivQtWX.exe
C:\f33CsFve.exe
C:\f7gMWSYc.exe
C:\PQxp297k.exe
C:\cDsP7Ry0.exe
C:\P_qxVEx4.exe
C:\4VE0bzH5.exe
C:\A8otESlv.exe
C:\1WfGRTcv.exe
C:\M0L39GvK.exe
C:\GIFDRNmQ.exe
C:\TQDpZ0Fg.exe
C:\m6Y0cu0i.exe
C:\c51xTtbM.exe
C:\pNLxWuRI.exe
C:\8lE3mIXF.exe
C:\h36hAIAr.exe
C:\f9dH2XUL.exe
C:\eXEC2QsP.exe
C:\djUCgD9Y.exe
C:\VoJIAONu.exe
C:\o4DXxr4f.exe
C:\EwZeVzHh.exe
C:\7md2RIhV.exe
C:\bExjWsId.exe
C:\WVzH6uhc.exe
C:\6pihHErC.exe
C:\nc25wkm_.exe
C:\8haPiDNY.exe
C:\9WCdqMwH.exe
C:\kkTjIQQb.exe
C:\GjoBK_bu.exe
C:\CZ0WsnRa.exe
C:\1Ma5coLU.exe
C:\Wxdo5J2v.exe
C:\zS7GLA4v.exe
C:\rzm2qj9X.exe
C:\VhjGr7Rv.exe
C:\SEDryql3.exe
C:\7eebgwfU.exe
C:\15gfRbjr.exe
C:\HtxqS7nw.exe
C:\qDRnRXCH.exe
C:\R0EeXjkx.exe
C:\pKA4x_0C.exe
C:\45k9pXvC.exe
C:\FsHPL0sE.exe
C:\yuguyand.exe
C:\rX6z9jph.exe
C:\0dUq6Gsv.exe
C:\HZ6SeDwE.exe
C:\6snYTWq2.exe
C:\UGQ9pZXE.exe
C:\CGl9Gnn_.exe
C:\BLdGtADk.exe
C:\iBnlxEYF.exe
C:\pckaoVI0.exe
C:\H4Xd23gb.exe
C:\J2LkWIhj.exe
C:\f4gQdsPu.exe
C:\dmh9i_Vd.exe
C:\zqM24Iwe.exe
C:\xI7wMxud.exe
C:\nZrI3_m7.exe
C:\IZiNWu0e.exe
C:\BscfG2EY.exe
C:\d_8zOaAw.exe
C:\BVyeYsfn.exe
C:\vG_RP_bK.exe
C:\B4RnHtZM.exe
C:\qpYKgKbo.exe
C:\UJEOP2v9.exe
C:\1DkRn81g.exe
C:\SpyWpBaD.exe
C:\jwXDsQH1.exe
C:\FNvEZtJ1.exe
C:\JGZcXDZ3.exe
C:\Yf_3jn2H.exe
C:\dNJbyLXH.exe
C:\b1k8GEwX.exe
C:\hRxZGT9M.exe
C:\6BX9fyGT.exe
C:\xLGAUU69.exe
C:\Pcqzpp8a.exe
C:\aYCfhZ1V.exe
C:\0zrREz9l.exe
C:\tkMw2vNe.exe
C:\rwhvKrVa.exe
C:\jdxW3Abk.exe
C:\wP849ugO.exe
C:\fOhLFHZZ.exe
C:\XmShbNl_.exe
C:\IfnpeMXz.exe
C:\qMg96vFV.exe
C:\jI83G9q7.exe
C:\kEKE5cwO.exe
C:\f2Z9mTCl.exe
C:\_XwQc4sy.exe
C:\FQfZfmXM.exe
C:\SUs4ko35.exe
C:\1_uyYckp.exe
C:\ety4RRFV.exe
C:\_0kjEU7m.exe
C:\caJGO4Ie.exe
C:\9BNH5HJX.exe
C:\UoqFKkEL.exe
C:\RO0kGsRu.exe
C:\gSwRxYwW.exe
C:\11WlBxl0.exe
C:\sYG37fSK.exe
C:\TpJbn7W4.exe
C:\Ji3wquUG.exe
C:\z3c7_t21.exe
C:\5DA4FR0V.exe
C:\ahX0IxQB.exe
C:\wrQijxIK.exe
C:\s9zBRJWn.exe
C:\xzy4VaDS.exe
C:\k4vxsL1B.exe
C:\_VfRZgPq.exe
C:\DC1PJcCt.exe
C:\v5HUGyet.exe
C:\BFxJqRaP.exe
C:\gWPD_gRr.exe
C:\WI5Tz6eR.exe
C:\9eROoCbu.exe
C:\Ho0R0Hwl.exe
C:\jMAxf9re.exe
C:\fqJawTak.exe
C:\sUwsJK07.exe
C:\LljzPXU2.exe
C:\aDbUDfpo.exe
C:\a3290ae892940424158e14b42109fe93ed7a735c82fbb7181bedc40d80785a9a
C:\pMeVKdWF.exe
C:\QUZusZCf.exe
C:\uv46n8nI.exe
C:\OFSQXPnl.exe
C:\k_wiWAq5.exe
C:\9M1wEBzE.exe
C:\p1aqYCla.exe
C:\m4Ns4FDv.exe
C:\67lsDFak.exe
C:\p9URKoDQ.exe
C:\lx7_eJj7.exe
C:\iUgIgmTi.exe
C:\kBl8OHYs.exe
C:\DJp0dh_D.exe
C:\Qj1bSsG5.exe
C:\76bzRyqF.exe
C:\CMRo_2Wn.exe
C:\IoZi9itb.exe
C:\Le_jxvQm.exe
C:\ESXfCOVI.exe
C:\XhQiZWxj.exe
C:\9JVQrzFQ.exe
C:\mpDvAB3w.exe
C:\vuyuFfAY.exe
C:\wAoDcK4V.exe
C:\46fPthvx.exe
C:\ZsoHVST0.exe
C:\esZJdrwl.exe
C:\GPuuYrGM.exe
C:\uw8VRsuZ.exe
C:\I0wl1S0d.exe
C:\0y04WHH_.exe
C:\3xyiEX6D.exe
C:\CcTEDwwJ.exe
C:\0SX8lcfK.exe
C:\bBDSP0x_.exe
C:\Av3tEP4c.exe
C:\NcDhPraL.exe
C:\pFj8JY_B.exe
C:\mMXpBoaZ.exe
C:\qEop5mrY.exe
C:\i8iFy0So.exe
C:\yhXTrrH0.exe
C:\u5UOGQFo.exe
C:\b7BJdF37.exe
C:\4MLEyAWG.exe
C:\uK2Brmh2.exe
C:\FcXSXEyL.exe
C:\MX2Hi4jx.exe
C:\R_TiftHI.exe
C:\cp8Aef84.exe
C:\QRhKGGDE.exe
C:\tXPc_YJm.exe
C:\0rZvYiPY.exe
C:\zWBmGUql.exe
C:\dJR0vtAi.exe
C:\6vpEAwfU.exe
C:\yGZca9Qm.exe
C:\yJPjCkjj.exe
C:\BR77DOzM.exe
C:\9ZxQIvU7.exe
C:\O_vbTrFR.exe
C:\GyPj3AtH.exe
C:\MV96pVVM.exe
C:\4ddgMobb.exe
C:\LuCAojG4.exe
C:\iCX6BD1J.exe
C:\6QcET8B8.exe
C:\20gC7jzv.exe
C:\QgVrc1HX.exe
C:\Xf3s4bdd.exe
C:\g5yNhf2A.exe
C:\DtgAV3S8.exe
C:\3d2dQXMi.exe
C:\zsZZCRi4.exe
C:\6MeriwqQ.exe
C:\ijBXHNb5.exe
C:\CPxHkuUL.exe
C:\69mSPF7F.exe
C:\ZUw0ZlkU.exe
C:\M8jnq_hi.exe
C:\AVo_UwaE.exe
C:\F_VTz0yJ.exe
C:\sAgtBxT_.exe
C:\Mh3KMhMn.exe
C:\BoUyveU8.exe
C:\ayi4mE1N.exe
C:\naCNoNJq.exe
C:\5fQoW8zR.exe
C:\MWlZm4IJ.exe
C:\lBaj0dsu.exe
C:\MbvsB5Up.exe
C:\0pnoWlUY.exe
C:\Yj3uLVDS.exe
C:\O2T_4QBa.exe
C:\gXQTBKg5.exe
C:\1SwklkOf.exe
C:\j29kn4Bm.exe
C:\W2S0i1AO.exe
C:\67WadGLb.exe
C:\731OLW4A.exe
C:\ziocfvFg.exe
C:\BP9HMUHY.exe
C:\8x8MeTHj.exe
C:\DzGE61Rz.exe
C:\sMnWlyqu.exe
C:\1YwFUabv.exe
C:\_8LNkH7n.exe
C:\l8e58etB.exe
C:\zZt6QI9z.exe
C:\nYo7PTJc.exe
C:\SwIgxHqj.exe
C:\2avtcb6r.exe
C:\_ZIp28Tr.exe
C:\3aE8cEfK.exe
C:\wwPv5or1.exe
C:\3GnqXN3n.exe
C:\kQV9GbhZ.exe
C:\n3y63lZQ.exe
C:\REbwMyJD.exe
C:\NW3HeHaP.exe
C:\_9RLMdv3.exe
C:\D9EVeFAr.exe
C:\LRBzVDng.exe
C:\cfSNOev8.exe
C:\0FHnWVGO.exe
C:\G1p9huvq.exe
C:\YDdZwkWd.exe
C:\sFqf0eRk.exe
C:\5J1Dc6p1.exe
C:\SXy5xKla.exe
C:\RRjcENft.exe
C:\Ec_YRL6W.exe
C:\TYtnw6eN.exe
C:\I0Ps91Xx.exe
C:\ldbD35d9.exe
C:\qt1_mhdB.exe
C:\hW12pVi3.exe
C:\cvL_erY_.exe
C:\Ru1XaPUP.exe
C:\s6ybGkhF.exe
C:\kipJnWGX.exe
C:\YLBgphVK.exe
C:\ZwFiww__.exe
C:\X0BndPb2.exe
C:\_fQQ2Foq.exe
C:\uoS_CCgl.exe
C:\XfMHRmeN.exe
C:\YeedFH9i.exe
C:\SvPFOqxA.exe
C:\piKBLE0F.exe
C:\srTSyX6U.exe
C:\OKBFvwO4.exe
C:\HXRjkfeL.exe
C:\5JA4qgYa.exe
C:\rWUGiLr6.exe
C:\CPVO12Nc.exe
C:\O6cCph0v.exe
C:\Ch1Eq9K4.exe
C:\eIOBNIKB.exe
C:\Y8Df34CK.exe
C:\jro8gG6b.exe
C:\LF8_P4dU.exe
C:\ZjlGkxpu.exe
C:\Bsw6BdR3.exe
C:\n7d7eLqI.exe
C:\pHdi3XD8.exe
C:\PPaWkRPp.exe
((((( H
h(((( H
H
IDI_ICON_IMPORT
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Microsoft (R) Address Book Import Tool
FileVersion
6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
InternalName
WABMIG.EXE
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
WABMIG.EXE
ProductName
Microsoft
Windows
Operating System
ProductVersion
6.00.2900.2180
VarFileInfo
Translation
@I@@@@@@@
UTF-16LE
UNICODE
mscoree.dll
AR6002
- floating point support not loaded
- not enough space for arguments
- not enough space for environment
- abort() has been called
- not enough space for thread data
- unexpected multithread lock error
- unexpected heap error
- unable to open console device
- not enough space for _onexit/atexit table
- pure virtual function call
- not enough space for stdio initialization
- not enough space for lowio initialization
- unable to initialize heap
- CRT not initialized
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- not enough space for locale information
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- inconsistent onexit begin-end variables
DOMAIN error
SING error
TLOSS error
runtime error
Runtime Error!
Program:
<program name unknown>
Microsoft Visual C++ Runtime Library
Aja-JP
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
kernel32.dll
USER32.DLL
((((( H
((((( H
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
AAAAAAA
AAAAAAAAA
AAAAAAA
CONOUT$
C:\cFONslVs.exe
C:\KhDTrrMx.exe
C:\uLJjKIpZ.exe
C:\eggghbN5.exe
C:\ZiA94ezq.exe
C:\YEsWHBSy.exe
C:\CH5FDqZM.exe
C:\HsrHmXqp.exe
C:\Iv52tLNM.exe
C:\hC83x5I7.exe
C:\Gj0jG6Wa.exe
C:\DNbU4vsq.exe
C:\i3Xv85ns.exe
C:\cWjz7e7o.exe
C:\f_fT9fVx.exe
C:\5LButWHS.exe
C:\iUDtv_S8.exe
C:\Ssj1dEVX.exe
C:\rmiCjTgu.exe
C:\mvBNlwjH.exe
C:\CUHeULv7.exe
C:\0pPj1eoS.exe
C:\qm7AhyyS.exe
C:\pnrxRQ57.exe
C:\RDHEhV57.exe
C:\WSbMSFK5.exe
C:\dnP5Mlnm.exe
C:\oOK8cZhV.exe
C:\NDBGReOY.exe
C:\bLy8HAEU.exe
C:\eumsv6vz.exe
C:\LJGwTbFF.exe
C:\4VqVPFXr.exe
C:\Qj2oHUNj.exe
C:\nzTo8MLq.exe
C:\hNPQqKlt.exe
C:\bRQc2K7N.exe
C:\TYWDHch6.exe
C:\3ro0z4jU.exe
C:\J5KFPenq.exe
C:\ZFx9oUm7.exe
C:\05yDpzDU.exe
C:\Ldg06ekJ.exe
C:\xtawtmql.exe
C:\nABnsTBj.exe
C:\XIPdWwCg.exe
C:\yIAUIuJ4.exe
C:\b7KbtRoi.exe
C:\8u5KbTsT.exe
C:\K5ZJQs34.exe
C:\af836bb4ed0b719fa4efb069da5c27a1a0a8b42d86c703eb97974d0af875ed5d
C:\qyQ8ZMmX.exe
C:\PAPFa7Qd.exe
C:\BcZQQ20E.exe
C:\B2VAgnMx.exe
C:\4eZ4cnnn.exe
C:\Vjsn3IU4.exe
C:\BlF0FDhD.exe
C:\aPrU53WI.exe
C:\2Rm6WLoT.exe
C:\zhr7h_N2.exe
C:\kNIsK4so.exe
C:\oY2LSABw.exe
C:\smqB5GIY.exe
C:\G3Dfl1y6.exe
C:\5UUeX2Nv.exe
C:\cNTAe_ud.exe
C:\XUfmfJX3.exe
C:\ewwHZ7yS.exe
C:\amZTj78m.exe
C:\uTZmuf4h.exe
C:\hse20y3R.exe
C:\fFir1r_R.exe
C:\F_VB_idM.exe
C:\Ngoz456v.exe
C:\cV_GCxTk.exe
C:\q5VLWZvd.exe
C:\7mW9_PWb.exe
C:\V79xUCkT.exe
C:\oGvaYLdS.exe
C:\U2CBR5z8.exe
C:\fhQV12oC.exe
C:\Ecpy7WPY.exe
C:\HYTZUs7P.exe
C:\JmeRUxOD.exe
C:\WWjOkOrL.exe
C:\GPSwUkqQ.exe
C:\mWfjcyGA.exe
C:\7iwI9n_1.exe
C:\X8ywxcnx.exe
C:\cGKf11xu.exe
C:\ymE0A7VV.exe
C:\Oi8z6Pti.exe
C:\kTwph0wy.exe
C:\3DydtV4G.exe
C:\w5cAnl4y.exe
C:\wqJhVhGT.exe
C:\R5h46Vlv.exe
C:\cDqsigbc.exe
C:\OkXb0WNI.exe
C:\_l03U0gX.exe
C:\GNUmujX6.exe
C:\CWMFPj6u.exe
C:\5lSwBj5G.exe
C:\afnie5rw.exe
C:\7bXymdQM.exe
C:\E1zJCIDN.exe
C:\bdMLT1AQ.exe
C:\pOIScYec.exe
C:\BOcgIzqv.exe
C:\ur7g8w8i.exe
C:\z4KzgojI.exe
C:\s9JZCqGd.exe
C:\vw0Gusmg.exe
C:\syuSMVyG.exe
C:\LOWHcd2J.exe
C:\tSUPp2_b.exe
C:\Igif5ekf.exe
C:\rtyJTXA3.exe
C:\U4GiRP8y.exe
C:\lquImfBz.exe
C:\hnQw2pd3.exe
C:\JEMDsivL.exe
C:\ntCEHB2z.exe
C:\8VZ0E2GE.exe
C:\4ZrfMpwC.exe
C:\FrK_VXGe.exe
C:\DDVTZivY.exe
C:\WI7uU4jD.exe
C:\LCEiBNdN.exe
C:\NjxpllXw.exe
C:\1LtsjfPm.exe
C:\r37bXvTY.exe
C:\eVC2wlZR.exe
C:\RHKUAfV_.exe
C:\nyy53g58.exe
C:\Cf1V_xT1.exe
C:\UxkfwkNn.exe
C:\xuXF6wNE.exe
C:\gORVTKSN.exe
C:\OGHW4HNP.exe
C:\uFSmlys2.exe
C:\F9hJ3ZBD.exe
C:\AI5Z0KBE.exe
C:\3ODP6qvs.exe
C:\mS0Q0uLs.exe
C:\PRQdwAtT.exe
C:\292a15c9850a80d3534d192bfc045df85cd9ba1ac141cd9eaaab35f841d6c74e
C:\EC1h9VUv.exe
C:\zlE0VfNB.exe
C:\Herah89c.exe
C:\gCjRn1Ru.exe
C:\BVri6kpF.exe
C:\VXuoyugv.exe
C:\7EEXtUBc.exe
C:\ZIcT_8fO.exe
C:\5ugRZXS6.exe
C:\DbTZYFWq.exe
C:\pijLtjdO.exe
C:\5avP6bEm.exe
C:\HWrj0NO9.exe
C:\GhTP759Q.exe
C:\A36GIxdj.exe
C:\hg_SBvxR.exe
C:\iuSMz6pY.exe
C:\X8xXTIIv.exe
C:\ATriKMVf.exe
C:\tHUtJmUk.exe
C:\oyU55O0Z.exe
C:\Anfb9_rt.exe
C:\Q3LoYKrO.exe
C:\qxCdYfYO.exe
C:\romWd8eq.exe
C:\5tvSEUPT.exe
C:\px03_Hqo.exe
C:\qjT4Wrdz.exe
C:\zsnaNdjq.exe
C:\JXgzigfy.exe
C:\m2rRVHhb.exe
C:\JLA_5c0f.exe
C:\wa3pyNoE.exe
C:\hP1AcRUB.exe
C:\QlQ8qtZt.exe
C:\fh8xTL5f.exe
C:\MOOKv106.exe
C:\83913233d5900f7d2cb4348a4ea20b4dc6cea341359dc83d99e5108c8f2ba228
C:\7feb505f08d932846cd0992a08f3f0a69f34cdff77e07f208e6681f091b53e9f
C:\J1H_lXY0.exe
C:\IZ4e0n45.exe
C:\vl6w9wFP.exe
C:\kq1vToEt.exe
C:\d7AW0pTh.exe
C:\pL_0Rprx.exe
C:\UzO8rz6M.exe
C:\3U4lZH42.exe
C:\I5AFK3A5.exe
C:\y7_m4gKh.exe
C:\iw63COV5.exe
C:\YDW1bSmN.exe
C:\jFNdqB0u.exe
C:\sGI2iXOC.exe
C:\oSgPt0CI.exe
C:\L_Q173Q2.exe
Lrmaso
.nNaroratrararavfadC
lryeeerodydo
errarhrhrano
nnnnangn
ara/n-nnaodln
naranarnu
C:\Users\admin\Downloads\5d744190a5a241c2efabbb0129a850142424a90c1fcccd86254624217d1c2540.exe
C:\23e5c3f2433f9cbf57ccb36382a5d13690bc17189e402a569117fa1f9eff7243
C:\Users\admin\Downloads\biwagox.exe
C:\e2c628c3d74ef7c9b5b11b5288121993041a084a1fbcdb13bb90f69fb579f4d8
C:\e743154737779472e2d1aea86815db451fc831159df98f8835049033240de5c2
C:\Users\admin\Downloads\biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\0df2579b32d1bcf750a5c1c74d141ed7df89ce88807d0f124949a490b3fcd6ae
C:\5306084fda45aa8361133eac572f02834773885b2405091e0610d696d375e1e4
C:\41e00688cd0868b864d008c3c3c7bcf82e3c0b430248c36d1b2205ae870703fa
C:\6ac260129b367e49be7de9b8c8a8217404f78869f612539d1826a50c82cf03c0
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\6fa74e2574f05d14ea2dd95cac954522daddae0811014cf994a847f7267064e5
C:\d6c695a539a0cb14f818077e1c236c04962a5cace1a2959e15ef2bd5f015d907
C:\Users\admin\Downloads\biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\dfd102c330e96b8ad78fb4e68c6eefd12024771fd3617ad6843f89bbe5c83de2
C:\ea69150ad51e3bfe583c27c4cef06877884c8d23d585d156367fd44c70bb2bd7
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\986f9b49b8b08ef0_biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\Petra\AppData\Local\Temp\540ce82bf267f5a8-biw.pe32
C:\Users\Petra\AppData\Local\Temp\da6401634a2063d0-biw.pe32
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\573bb3eb4b666449_biwagox.exe
C:\86d2e3ae6a1f5e0759c2da45fb3df29d678e40d11302c05b4eef2600a249e11f
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\eb641a7a5745ac89_biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\de2dee5566b0634a_biwagox.exe
C:\b60c8f0479b006915f7d776effdd7a753240909324cade187f0c56b9bc738e46
C:\Users\admin\Downloads\biwagox.exe
C:\daf28e123aba6a435d35f7aad96baf1e7f39a298cf625b6cd9e1b6deee8add7d
C:\Users\admin\Downloads\biwagox.exe
C:\4ca5015c5437a23a2e45891b9a257ae01cd86385d7affa8d142da3278882e655
C:\Users\admin\Downloads\biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\ee0e046c97086ba9_biwagox.exe
C:\9ad0ad801d407d21ab311a6eda3b6e85b95742fa805915eee5a3cd868a371105
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\d74dc5c520b95772_biwagox.exe
C:\29f4676078adc61a3272a176cb35591ac956e195b538e1e2cb5dc7e49a77037f
C:\Users\admin\Downloads\biwagox.exe
C:\f6ba34e70101c53dd0cc6c52d30f0911d98f6d0f31b54f922001b1d5f87c764f
C:\41f164ab8b29b1690cdcad2dd7c54ce02318dd25d883584471830663c9077370
C:\b55b0bcbdff6384e0d819b00805fef40fa48bca17108e0374ed14b306ba39329
C:\Users\admin\Downloads\biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\848ebdb6ab582bb61955f68c0dd66c99505cdeff677272ec900cef03498d4e60
C:\1308e27bcec5a878ec2c90507f7478190117633df480f957cc2b4367971bb05e
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\c430d6763b57f0f7_biwagox.exe
C:\d2ad5d0d32ce63fd85063745937c779afcc1bf2a5358a9fc90e6e6058a2923e4
C:\Users\admin\Downloads\biwagox.exe
C:\9e487375359402894d08334a23ceb778b0070d1bd315366f54607957753bd6f5
C:\Users\admin\Downloads\biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\fKLubvRx.exe
C:\Users\admin\Downloads\f91ad52faee63dbe39cce9041daa3142.virus.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\08a2a3ffbbb9ea27_biwagox.exe
C:\8bc1db0bfdce2ca96d55062aa50318933887ae5d9f8c98400f9e2549f886ff69
C:\356bf52b1e6a60ed032efb811538cb98e6a962f599283b41748f6dc425b97a13
C:\e01aafa981eef478d9ba8b94d57306c20c8a58d635432c4f42d36344f734139b
C:\5f743d938096a2cb511437c40c529217cd455c7c2a8807fabf85734ddccbe69c
C:\0d24f626a9f1db0566adeae1708fff27e267fc65c233c503eba47015e004cd55
C:\99d2d32be9d646f871f65571a51d1172548f3ec8f4b080a157bae55638da4a96
C:\c113b3acb2ebe3461ca36111b2300ffca99723fe4db180d4e4c41208de028bc7
C:\Users\admin\Downloads\biwagox.exe
C:\adb701087df0edd62f65aa362ff956eb11302133b830b13fb6b7dc1b08d8027e
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\f23ad6efd77f4499a6d6cf262047becdbf22fa62b74a5ce7e56a1b3882390c76
C:\078f27f532ff3fc54b7bbfe72d16134bd6e763110634e083ec21bdb72ee7a0f2
C:\Users\admin\Downloads\biwagox.exe
C:\6be71acfeb52bf2111bfd91df069df6545ef19ebfc1f7419d87e0bebb1564024
C:\d4c4cd237444e196dec55d8ccc1e566e883d1302e5edfde860baf19f888ab9a2
C:\d52754670075f6995d753535b43a61cc90aa1caf77c4a7cb58667faeeefe182a
C:\e521b916fb6e121bf3b6c8910ae1e6438547546a71ae39b3896fe18274e8c20f
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\9454f7cad3492106ba9fd75795bc9e5b9b4834d3cd5c5539ddc4b2d0db4a8b2f
C:\Users\admin\Downloads\biwagox.exe
C:\b0fd1cee78ba5d1cc2f251d784c1c6d9fb9f56555bfbc9b20bf3d950dfc9c2b8
C:\6315d168a19f7b944ceab16dc10f6dc268b6ece6d9d9dec9a5ed0bc5212b3ef7
C:\33yYiGc6.exe
C:\Users\Petra\AppData\Local\Temp\file.pe32
C:\Users\admin\Downloads\d2e9d704eb7ae256_biwagox.exe
C:\Users\admin\Downloads\32b75dac34540add7eb2aa178346a8d7f10e1ca8ee561490ed576acc95dedae3.exe
C:\62d38a1b581bbb9a3a85489680199f02e027d9193c0785bd5942e305cc88c835
C:\Users\admin\Downloads\biwagox.exe
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\fb05bd53785d56bd9c8597e3d5a67eec3379c7f4741811a40b6ac6f79b18a943
C:\05fe2520b49a36cfb00bc7c98006aacbe2ed67dedd3d0f2d3f8feed6b8d6be3f
C:\Users\admin\Downloads\biwagox.exe
C:\34fa49440167cb26ffb33fe67c62c0a78330e995b36379c2f72dd8a1ec4f3336
C:\Users\Petra\AppData\Local\Temp\biwagox.pe32
C:\Users\admin\Downloads\fa348707148f1988_biwagox.exe
C:\f490aa072f0039ea6e81c40b549c2e24f6bfc3d94f13c2a594da5808de02ba8d
C:\ba8c098794e796ffa9a6141a436217426a995c7d88b36187be0b07b991154288
C:\14ee573af53316fa154efd1842980c79a7147a464e103d3f40686f4256451b83
C:\64999863a111355f744ff4f98f4eaaa60033daebc695a3f54d7d523989dcc298
C:\Users\admin\Downloads\biwagox.exe
C:\4d2a82ea1fff28ff123a283d9499760163e9f5739d4abf5994668118808c2652
C:\Users\admin\Downloads\biwagox.exe
C:\53ea4bd1087d932445d4c2ad7966606d18677c2e5adbaa59fd4f7f747609a8e9

Process Tree


004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691.exe, PID: 1784, Parent PID: 2600

default registry file network process services synchronisation iexplore office pdf

biwagox.exe, PID: 2660, Parent PID: 1784

default registry file network process services synchronisation iexplore office pdf

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 1159fcfaf770daf2_biwagox.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\biwagox.exe
Size 1.2MB
Processes 1784 (004075580a54abaf6813519828cba9fe01742a9712c47182e98fa1e91305c691.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 b231f892e4473c9c99179e7561229c1c
SHA1 0ba5345f5e5d5c672f63827f118a2a4f565243ac
SHA256 1159fcfaf770daf2a68916227d417daea3d8f340004528d09909b9a080300ebd
CRC32 32C51460
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.