Checks if process is being debugged by a debugger
(3 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619364067.578751
IsDebuggerPresent
|
|
failed
|
0 |
0
|
1619364067.578751
IsDebuggerPresent
|
|
failed
|
0 |
0
|
1619364077.984501
IsDebuggerPresent
|
|
failed
|
0 |
0
|
This executable has a PDB path
(1 个事件)
| pdb_path |
D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619364067.672751
GlobalMemoryStatusEx
|
|
success
|
1 |
0
|
The executable contains unknown PE section names indicative of a packer (could be a false positive)
(1 个事件)
The file contains an unknown PE resource name possibly indicative of a packer
(1 个事件)
One or more processes crashed
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619364077.156751
__exception__
|
stacktrace:
RtlFreeHeap+0x7e RtlAllocateHeap-0x23 ntdll+0x2e003 @ 0x77d5e003
GlobalFree+0x27 GlobalAlloc-0x11f kernelbase+0x13e88 @ 0x778f3e88
sghgbomj+0x10ccd @ 0xc80ccd
sghgbomj+0x7536e @ 0xce536e
sghgbomj+0x7557a @ 0xce557a
sghgbomj+0x3fa6 @ 0xc73fa6
sghgbomj+0x8f8d @ 0xc78f8d
sghgbomj+0x96f5 @ 0xc796f5
sghgbomj+0xa2f7 @ 0xc7a2f7
sghgbomj+0x962c @ 0xc7962c
sghgbomj+0xa2f7 @ 0xc7a2f7
sghgbomj+0x962c @ 0xc7962c
sghgbomj+0xa2f7 @ 0xc7a2f7
sghgbomj+0x962c @ 0xc7962c
sghgbomj+0xa2f7 @ 0xc7a2f7
sghgbomj+0x962c @ 0xc7962c
sghgbomj+0xd87e @ 0xc7d87e
sghgbomj+0xd967 @ 0xc7d967
sghgbomj+0x1648e @ 0xc8648e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
7006288
registers.edi:
14909912
registers.eax:
1394129972
registers.ebp:
7006340
registers.edx:
14909920
registers.ebx:
14909920
registers.esi:
16171536
registers.ecx:
15728640
exception.instruction_r:
8b 46 04 89 45 f4 c6 47 07 80 c6 47 06 00 8b 5e
exception.symbol:
RtlInitUnicodeString+0x196 RtlMultiByteToUnicodeN-0x1a7 ntdll+0x2e39e
exception.instruction:
mov eax, dword ptr [esi + 4]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
189342
exception.address:
0x77d5e39e
|
success
|
0 |
0
|