9.6
极危

f0a64eb1fbfe33aa1521936f4d87fd398a8c5a7b5f56ce6981f657d9693dea41

8d62eb133e68427fd77054fec625a2df.exe

分析耗时

56s

最近分析

文件大小

352.0KB
静态报毒 动态报毒 100% AGENSLA AGENTTESLA AI SCORE=81 AIDETECTVM ARTEMIS ATTRIBUTE AUTO AZORULT BTTDOH CLASSIC CONFIDENCE DOWNLOADER33 DVRJ ELSW EMKM FAREIT GENKRYPTIK HIGH CONFIDENCE HIGHCONFIDENCE HLAUAT IGENT KRYPT KRYPTIK MALICIOUS PE MALWARE1 MALWARE@#2EBMWZOC42RFU MASSLOGGER MINT NETWIRE PWSX QTDYQ R340936 SCORE STATIC AI SUSGEN TROJANPSW TSCOPE UNSAFE WM0@AUQYMRAI ZEVBAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanPSW:Win32/Agensla.197303f5 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:PWSX-gen [Trj] 20201210 21.1.5827.0
Kingsoft 20201211 2017.9.26.565
McAfee Artemis!8D62EB133E68 20201211 6.0.6.653
Tencent Win32.Trojan.Inject.Auto 20201211 1.0.0.1
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
Queries for the computername (4 个事件)
Time & API Arguments Status Return Repeated
1619705555.887626
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619705558.621626
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619705561.512626
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619705563.168626
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
Checks if process is being debugged by a debugger (2 个事件)
Time & API Arguments Status Return Repeated
1619705540.465626
IsDebuggerPresent
failed 0 0
1619705540.465626
IsDebuggerPresent
failed 0 0
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1619705540.512626
GlobalMemoryStatusEx
success 1 0
The file contains an unknown PE resource name possibly indicative of a packer (1 个事件)
resource name CUSTOM
One or more processes crashed (50 out of 91951 个事件)
Time & API Arguments Status Return Repeated
1619686135.717689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637056
registers.edi: 5051648
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 352736353
registers.esi: 5047864
registers.ecx: 5046272
exception.instruction_r: fb e9 13 f5 ff ff 58 59 58 59 5a 9d 59 5d 58 5a
exception.instruction: sti
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1063
success 0 0
1619686135.717689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637064
registers.edi: 5051648
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046782
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: e4 28 e9 55 ee ff ff 5e e9 eb 00 00 00 e8 0f f0
exception.instruction: in al, 0x28
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1336
success 0 0
1619686135.717689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635244
registers.edi: 0
registers.eax: 0
registers.ebp: 5050233
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: 6f 87 7a a0 28 6b 7b 8a f0 c3 f8 9e b7 3c d5 5f
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0fa3
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635228
registers.edi: 5049679
registers.eax: 0
registers.ebp: 1635940
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: ec e9 01 fd ff ff b8 5b ed 00 16 e9 ee f5 ff ff
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f5c
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637016
registers.edi: 5048438
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 1637292
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: cc e9 1b 02 00 00 e9 23 01 00 00 e9 a9 08 00 00
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol:
exception.address: 0x4d054f
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635204
registers.edi: 0
registers.eax: 16
registers.ebp: 1635892
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 5050883
registers.ecx: 5048438
exception.instruction_r: cf b2 8a 3d 48 ce 39 6a a1 75 b9 5f 8e e4 83 19
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x4d11d0
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637012
registers.edi: 5051648
registers.eax: 4462375
registers.ebp: 5050573
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: f4 e9 2b 02 00 00 51 56 e9 24 01 00 00 a5 65 80
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0185
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637036
registers.edi: 5051648
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: 66 6d eb 06 59 e9 e1 0b 00 00 85 67 96 cf 1f 66
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0065
success 0 0
1619686135.732689
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635228
registers.edi: 0
registers.eax: 16
registers.ebp: 1635296
registers.edx: 2010606285
registers.ebx: 1635912
registers.esi: 5049101
registers.ecx: 5046405
exception.instruction_r: 66 6d e9 c7 01 00 00 55 64 ff 35 00 00 00 00 64
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f8d
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637056
registers.edi: 5051652
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 3554037984
registers.esi: 5047864
registers.ecx: 5046272
exception.instruction_r: fb e9 13 f5 ff ff 58 59 58 59 5a 9d 59 5d 58 5a
exception.instruction: sti
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1063
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637064
registers.edi: 5051652
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046782
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: e4 28 e9 55 ee ff ff 5e e9 eb 00 00 00 e8 0f f0
exception.instruction: in al, 0x28
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1336
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635244
registers.edi: 0
registers.eax: 0
registers.ebp: 5050233
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: 6f 87 7a a0 28 6b 7b 8a f0 c3 f8 9e b7 3c d5 5f
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0fa3
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635228
registers.edi: 5049679
registers.eax: 0
registers.ebp: 1635940
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: ec e9 01 fd ff ff b8 5b ed 00 16 e9 ee f5 ff ff
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f5c
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637016
registers.edi: 5048438
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 1637292
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: cc e9 1b 02 00 00 e9 23 01 00 00 e9 a9 08 00 00
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol:
exception.address: 0x4d054f
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635204
registers.edi: 0
registers.eax: 16
registers.ebp: 1635892
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 5050883
registers.ecx: 5048438
exception.instruction_r: cf b2 8a 3d 48 ce 39 6a a1 75 b9 5f 8e e4 83 19
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x4d11d0
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637012
registers.edi: 5051652
registers.eax: 4462375
registers.ebp: 5050573
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: f4 e9 2b 02 00 00 51 56 e9 24 01 00 00 a5 65 80
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0185
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637036
registers.edi: 5051652
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: 66 6d eb 06 59 e9 e1 0b 00 00 85 67 96 cf 1f 66
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0065
success 0 0
1619686135.732689
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635228
registers.edi: 0
registers.eax: 16
registers.ebp: 1635296
registers.edx: 2010606285
registers.ebx: 1635912
registers.esi: 5049101
registers.ecx: 5046405
exception.instruction_r: 66 6d e9 c7 01 00 00 55 64 ff 35 00 00 00 00 64
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f8d
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637056
registers.edi: 5051656
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 1974683521
registers.esi: 5047864
registers.ecx: 5046272
exception.instruction_r: fb e9 13 f5 ff ff 58 59 58 59 5a 9d 59 5d 58 5a
exception.instruction: sti
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1063
success 0 0
1619686135.732689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637064
registers.edi: 5051656
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046782
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: e4 28 e9 55 ee ff ff 5e e9 eb 00 00 00 e8 0f f0
exception.instruction: in al, 0x28
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1336
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635244
registers.edi: 0
registers.eax: 0
registers.ebp: 5050233
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: 6f 87 7a a0 28 6b 7b 8a f0 c3 f8 9e b7 3c d5 5f
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0fa3
success 0 0
1619686135.732689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635228
registers.edi: 5049679
registers.eax: 0
registers.ebp: 1635940
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: ec e9 01 fd ff ff b8 5b ed 00 16 e9 ee f5 ff ff
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f5c
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637016
registers.edi: 5048438
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 1637292
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: cc e9 1b 02 00 00 e9 23 01 00 00 e9 a9 08 00 00
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol:
exception.address: 0x4d054f
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635204
registers.edi: 0
registers.eax: 16
registers.ebp: 1635892
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 5050883
registers.ecx: 5048438
exception.instruction_r: cf b2 8a 3d 48 ce 39 6a a1 75 b9 5f 8e e4 83 19
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x4d11d0
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637012
registers.edi: 5051656
registers.eax: 4462375
registers.ebp: 5050573
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: f4 e9 2b 02 00 00 51 56 e9 24 01 00 00 a5 65 80
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0185
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637036
registers.edi: 5051656
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: 66 6d eb 06 59 e9 e1 0b 00 00 85 67 96 cf 1f 66
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0065
success 0 0
1619686135.748689
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635228
registers.edi: 0
registers.eax: 16
registers.ebp: 1635296
registers.edx: 2010606285
registers.ebx: 1635912
registers.esi: 5049101
registers.ecx: 5046405
exception.instruction_r: 66 6d e9 c7 01 00 00 55 64 ff 35 00 00 00 00 64
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f8d
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637056
registers.edi: 5051660
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 477206976
registers.esi: 5047864
registers.ecx: 5046272
exception.instruction_r: fb e9 13 f5 ff ff 58 59 58 59 5a 9d 59 5d 58 5a
exception.instruction: sti
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1063
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637064
registers.edi: 5051660
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046782
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: e4 28 e9 55 ee ff ff 5e e9 eb 00 00 00 e8 0f f0
exception.instruction: in al, 0x28
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1336
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635244
registers.edi: 0
registers.eax: 0
registers.ebp: 5050233
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: 6f 87 7a a0 28 6b 7b 8a f0 c3 f8 9e b7 3c d5 5f
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0fa3
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635228
registers.edi: 5049679
registers.eax: 0
registers.ebp: 1635940
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: ec e9 01 fd ff ff b8 5b ed 00 16 e9 ee f5 ff ff
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f5c
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637016
registers.edi: 5048438
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 1637292
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: cc e9 1b 02 00 00 e9 23 01 00 00 e9 a9 08 00 00
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol:
exception.address: 0x4d054f
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635204
registers.edi: 0
registers.eax: 16
registers.ebp: 1635892
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 5050883
registers.ecx: 5048438
exception.instruction_r: cf b2 8a 3d 48 ce 39 6a a1 75 b9 5f 8e e4 83 19
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x4d11d0
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637012
registers.edi: 5051660
registers.eax: 4462375
registers.ebp: 5050573
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: f4 e9 2b 02 00 00 51 56 e9 24 01 00 00 a5 65 80
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0185
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637036
registers.edi: 5051660
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: 66 6d eb 06 59 e9 e1 0b 00 00 85 67 96 cf 1f 66
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0065
success 0 0
1619686135.748689
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635228
registers.edi: 0
registers.eax: 16
registers.ebp: 1635296
registers.edx: 2010606285
registers.ebx: 1635912
registers.esi: 5049101
registers.ecx: 5046405
exception.instruction_r: 66 6d e9 c7 01 00 00 55 64 ff 35 00 00 00 00 64
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f8d
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637056
registers.edi: 5051664
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 2316583585
registers.esi: 5047864
registers.ecx: 5046272
exception.instruction_r: fb e9 13 f5 ff ff 58 59 58 59 5a 9d 59 5d 58 5a
exception.instruction: sti
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1063
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637064
registers.edi: 5051664
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046782
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: e4 28 e9 55 ee ff ff 5e e9 eb 00 00 00 e8 0f f0
exception.instruction: in al, 0x28
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1336
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635244
registers.edi: 0
registers.eax: 0
registers.ebp: 5050233
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: 6f 87 7a a0 28 6b 7b 8a f0 c3 f8 9e b7 3c d5 5f
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0fa3
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635228
registers.edi: 5049679
registers.eax: 0
registers.ebp: 1635940
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: ec e9 01 fd ff ff b8 5b ed 00 16 e9 ee f5 ff ff
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f5c
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637016
registers.edi: 5048438
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 1637292
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: cc e9 1b 02 00 00 e9 23 01 00 00 e9 a9 08 00 00
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol:
exception.address: 0x4d054f
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635204
registers.edi: 0
registers.eax: 16
registers.ebp: 1635892
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 5050883
registers.ecx: 5048438
exception.instruction_r: cf b2 8a 3d 48 ce 39 6a a1 75 b9 5f 8e e4 83 19
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x4d11d0
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637012
registers.edi: 5051664
registers.eax: 4462375
registers.ebp: 5050573
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: f4 e9 2b 02 00 00 51 56 e9 24 01 00 00 a5 65 80
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0185
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637036
registers.edi: 5051664
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046405
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: 66 6d eb 06 59 e9 e1 0b 00 00 85 67 96 cf 1f 66
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0065
success 0 0
1619686135.748689
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635228
registers.edi: 0
registers.eax: 16
registers.ebp: 1635296
registers.edx: 2010606285
registers.ebx: 1635912
registers.esi: 5049101
registers.ecx: 5046405
exception.instruction_r: 66 6d e9 c7 01 00 00 55 64 ff 35 00 00 00 00 64
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f8d
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637056
registers.edi: 5051668
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 247454368
registers.esi: 5047864
registers.ecx: 5046272
exception.instruction_r: fb e9 13 f5 ff ff 58 59 58 59 5a 9d 59 5d 58 5a
exception.instruction: sti
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1063
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637064
registers.edi: 5051668
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 5046782
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: e4 28 e9 55 ee ff ff 5e e9 eb 00 00 00 e8 0f f0
exception.instruction: in al, 0x28
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d1336
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635244
registers.edi: 0
registers.eax: 0
registers.ebp: 5050233
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: 6f 87 7a a0 28 6b 7b 8a f0 c3 f8 9e b7 3c d5 5f
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0fa3
success 0 0
1619686135.748689
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635228
registers.edi: 5049679
registers.eax: 0
registers.ebp: 1635940
registers.edx: 2273739162
registers.ebx: 0
registers.esi: 0
registers.ecx: 0
exception.instruction_r: ec e9 01 fd ff ff b8 5b ed 00 16 e9 ee f5 ff ff
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x4d0f5c
success 0 0
1619686135.748689
__exception__
stacktrace:
8d62eb133e68427fd77054fec625a2df+0x40592 @ 0x440592
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
8d62eb133e68427fd77054fec625a2df+0x14be @ 0x4014be
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637016
registers.edi: 5048438
registers.eax: 4462375
registers.ebp: 1637308
registers.edx: 1637264
registers.ebx: 1637292
registers.esi: 5063388
registers.ecx: 5046272
exception.instruction_r: cc e9 1b 02 00 00 e9 23 01 00 00 e9 a9 08 00 00
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol:
exception.address: 0x4d054f
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself) (50 out of 89 个事件)
Time & API Arguments Status Return Repeated
1619686135.389689
NtAllocateVirtualMemory
process_identifier: 2852
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x004b0000
success 0 0
1619686135.389689
NtProtectVirtualMemory
process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d4f000
success 0 0
1619686135.717689
NtAllocateVirtualMemory
process_identifier: 2852
region_size: 20480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x004d0000
success 0 0
1619705539.934626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00580000
success 0 0
1619705539.934626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d4f000
success 0 0
1619705539.981626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x74fd1000
success 0 0
1619705540.012626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 655360
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x006c0000
success 0 0
1619705540.012626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00720000
success 0 0
1619705540.215626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x73e71000
success 0 0
1619705540.215626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x74771000
success 0 0
1619705540.262626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 917504
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x00860000
success 0 0
1619705540.262626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00900000
success 0 0
1619705540.356626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x73e71000
success 0 0
1619705540.465626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 1769472
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x02820000
success 0 0
1619705540.465626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02990000
success 0 0
1619705540.481626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006ca000
success 0 0
1619705540.481626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x73e72000
success 0 0
1619705540.481626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006c2000
success 0 0
1619705540.715626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006d2000
success 0 0
1619705540.809626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006f5000
success 0 0
1619705540.824626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006fb000
success 0 0
1619705540.824626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006f7000
success 0 0
1619705540.856626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x75091000
success 0 0
1619705540.918626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006d3000
success 0 0
1619705540.949626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x755e1000
success 0 0
1619705540.981626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006d4000
success 0 0
1619705540.981626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006dc000
success 0 0
1619705541.153626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04e80000
success 0 0
1619705541.153626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 49152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04e81000
success 0 0
1619705541.559626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006d7000
success 0 0
1619705542.246626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006d8000
success 0 0
1619705542.434626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04e8d000
success 0 0
1619705542.528626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006e6000
success 0 0
1619705542.793626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00901000
success 0 0
1619705542.996626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x74fb1000
success 0 0
1619705543.012626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006ea000
success 0 0
1619705543.012626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006e7000
success 0 0
1619705543.387626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02340000
success 0 0
1619705543.387626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02341000
success 0 0
1619705543.434626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02342000
success 0 0
1619705543.465626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04e8e000
success 0 0
1619705554.840626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02343000
success 0 0
1619705554.965626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x75291000
success 0 0
1619705556.012626
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x73ca1000
success 0 0
1619705556.324626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04e8f000
success 0 0
1619705556.340626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02344000
success 0 0
1619705556.840626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02345000
success 0 0
1619705556.965626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02346000
success 0 0
1619705556.965626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x006dd000
success 0 0
1619705556.965626
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04e60000
success 0 0
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 个事件)
Time & API Arguments Status Return Repeated
1619686134.920689
NtProtectVirtualMemory
process_identifier: 2852
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
process_handle: 0xffffffff
base_address: 0x003e0000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.875473929346085 section {'size_of_data': '0x00042000', 'virtual_address': '0x00001000', 'entropy': 7.875473929346085, 'name': '.text', 'virtual_size': '0x000411a4'} description A section with a high entropy has been found
entropy 0.7586206896551724 description Overall entropy of this PE file is high
Checks for the Locally Unique Identifier on the system for a suspicious privilege (1 个事件)
Time & API Arguments Status Return Repeated
1619705554.590626
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
网络通信
One or more of the buffers contains an embedded PE file (1 个事件)
buffer Buffer with sha1: c1ddfd594a23595493b972f5f1d9baf6b03c764b
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
A process attempted to delay the analysis task. (1 个事件)
description RegAsm.exe tried to sleep 2728182 seconds, actually delayed analysis time by 2728182 seconds
Used NtSetContextThread to modify a thread in a remote process indicative of process injection (2 个事件)
Process injection Process 2852 called NtSetContextThread to modify thread in remote process 2120
Time & API Arguments Status Return Repeated
1619686146.998689
NtSetContextThread
thread_handle: 0x00000150
registers.eip: 4505600
registers.esp: 1898988
registers.edi: 0
registers.eax: 4486254
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 2010382788
process_identifier: 2120
success 0 0
Resumed a suspended thread in a remote process potentially indicative of process injection (2 个事件)
Process injection Process 2852 resumed a thread in remote process 2120
Time & API Arguments Status Return Repeated
1619686147.326689
NtResumeThread
thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2120
success 0 0
Tries to unhook Windows functions monitored by Cuckoo (1 个事件)
Time & API Arguments Status Return Repeated
1619705568.949626
__anomaly__
subcategory: exception
tid: 1316
message: Encountered 65537 exceptions, quitting.
function_name:
success 0 0
Generates some ICMP traffic
Executed a process and injected code into it, probably while unpacking (12 个事件)
Time & API Arguments Status Return Repeated
1619686146.982689
CreateProcessInternalW
thread_identifier: 1404
thread_handle: 0x00000150
process_identifier: 2120
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000154
inherit_handles: 0
success 1 0
1619686146.982689
NtGetContextThread
thread_handle: 0x00000150
success 0 0
1619686146.982689
NtUnmapViewOfSection
process_identifier: 2120
region_size: 2004156416
process_handle: 0x00000154
base_address: 0x00400000
failed 3221225497 0
1619686146.982689
NtMapViewOfSection
section_handle: 0x000000e0
process_identifier: 2120
commit_size: 0
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000154
allocation_type: 0 ()
section_offset: 0
view_size: 323584
base_address: 0x00400000
success 0 0
1619686146.998689
NtSetContextThread
thread_handle: 0x00000150
registers.eip: 4505600
registers.esp: 1898988
registers.edi: 0
registers.eax: 4486254
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 2010382788
process_identifier: 2120
success 0 0
1619686147.326689
NtResumeThread
thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2120
success 0 0
1619705540.465626
NtResumeThread
thread_handle: 0x00000174
suspend_count: 1
process_identifier: 2120
success 0 0
1619705540.496626
NtResumeThread
thread_handle: 0x000001c0
suspend_count: 1
process_identifier: 2120
success 0 0
1619705540.512626
NtResumeThread
thread_handle: 0x000001fc
suspend_count: 1
process_identifier: 2120
success 0 0
1619705557.949626
NtResumeThread
thread_handle: 0x0000032c
suspend_count: 1
process_identifier: 2120
success 0 0
1619705558.168626
NtResumeThread
thread_handle: 0x0000035c
suspend_count: 1
process_identifier: 2120
success 0 0
1619705561.043626
NtResumeThread
thread_handle: 0x000003b0
suspend_count: 1
process_identifier: 2120
success 0 0
File has been identified by 52 AntiVirus engines on VirusTotal as malicious (50 out of 52 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Heur.Mint.SP.Azorult.1
ALYac Gen:Heur.Mint.SP.Azorult.1
Cylance Unsafe
K7AntiVirus Trojan ( 0056808e1 )
Alibaba TrojanPSW:Win32/Agensla.197303f5
K7GW Trojan ( 0056808e1 )
Arcabit Trojan.Mint.SP.Azorult.1
BitDefenderTheta Gen:NN.ZevbaF.34670.wm0@auqymrAi
Cyren W32/Trojan.DVRJ-7906
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:PWSX-gen [Trj]
ClamAV Win.Dropper.NetWire-8182308-0
Kaspersky Trojan-PSW.MSIL.Agensla.rvy
BitDefender Gen:Heur.Mint.SP.Azorult.1
NANO-Antivirus Trojan.Win32.GenKryptik.hlauat
Paloalto generic.ml
Rising Trojan.Injector!1.C6AF (CLASSIC)
Ad-Aware Gen:Heur.Mint.SP.Azorult.1
Emsisoft Gen:Heur.Mint.SP.Azorult.1 (B)
Comodo Malware@#2ebmwzoc42rfu
F-Secure Trojan.TR/AD.AgentTesla.qtdyq
DrWeb Trojan.DownLoader33.53544
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition BehavesLike.Win32.Fareit.fc
FireEye Generic.mg.8d62eb133e68427f
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
Avira TR/AD.AgentTesla.qtdyq
MAX malware (ai score=81)
Antiy-AVL Trojan[PSW]/MSIL.Agensla
Microsoft Trojan:Win32/Masslogger.VB!MTB
AegisLab Trojan.Multi.Generic.4!c
ZoneAlarm Trojan-PSW.MSIL.Agensla.rvy
GData Gen:Heur.Mint.SP.Azorult.1
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Kryptik.R340936
McAfee Artemis!8D62EB133E68
VBA32 TScope.Trojan.VB
Malwarebytes Spyware.MassLogger.Generic
ESET-NOD32 a variant of Win32/Injector.EMKM
Tencent Win32.Trojan.Inject.Auto
Yandex Trojan.Igent.bTTDoH.2
Ikarus Trojan.Win32.Krypt
Fortinet W32/GenKryptik.ELSW!tr
MaxSecure Trojan.Malware.108946231.susgen
AVG Win32:PWSX-gen [Trj]
Panda Trj/CI.A
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-06-11 06:39:19

Imports

Library MSVBVM60.DLL:
0x401000 __vbaVarSub
0x401004 _CIcos
0x401008 _adj_fptan
0x40100c __vbaVarMove
0x401010 __vbaVarVargNofree
0x401014 __vbaFreeVar
0x401018 __vbaAryMove
0x40101c __vbaStrVarMove
0x401020 __vbaLenBstr
0x401024 __vbaFreeVarList
0x401028 _adj_fdiv_m64
0x40102c
0x401030 _adj_fprem1
0x401034 __vbaStrCat
0x401038 __vbaVarCmpNe
0x40103c __vbaRecDestruct
0x401044 __vbaLenVar
0x401048 _adj_fdiv_m32
0x40104c __vbaAryDestruct
0x401050 __vbaExitProc
0x401054 __vbaVarForInit
0x401058 __vbaOnError
0x40105c
0x401060 __vbaObjSet
0x401064 _adj_fdiv_m16i
0x401068 __vbaObjSetAddref
0x40106c _adj_fdivr_m16i
0x401070 __vbaBoolVarNull
0x401074 _CIsin
0x401078 __vbaErase
0x40107c
0x401080 __vbaVarZero
0x401084 __vbaChkstk
0x401088
0x40108c EVENT_SINK_AddRef
0x401090
0x401094 __vbaAryConstruct2
0x401098 __vbaVarTstEq
0x40109c __vbaVarLikeVar
0x4010a0 __vbaVarOr
0x4010a4 __vbaRedimPreserve
0x4010a8 _adj_fpatan
0x4010ac __vbaRedim
0x4010b0 EVENT_SINK_Release
0x4010b4 _CIsqrt
0x4010bc __vbaExceptHandler
0x4010c0 _adj_fprem
0x4010c4 _adj_fdivr_m64
0x4010c8
0x4010cc __vbaFPException
0x4010d0 __vbaUbound
0x4010d4 __vbaStrVarVal
0x4010d8 __vbaVarCat
0x4010dc
0x4010e0 _CIlog
0x4010e4 _adj_fdiv_m32i
0x4010e8 _adj_fdivr_m32i
0x4010ec __vbaStrCopy
0x4010f0 __vbaFreeStrList
0x4010f4 _adj_fdivr_m32
0x4010f8 _adj_fdiv_r
0x4010fc
0x401100 __vbaVarTstNe
0x401104 __vbaI4Var
0x401108 __vbaAryLock
0x40110c __vbaVarDup
0x401110
0x401114 _CIatan
0x401118 __vbaCastObj
0x40111c __vbaStrMove
0x401120 _allmul
0x401124 __vbaLenVarB
0x401128 _CItan
0x40112c
0x401130
0x401134 __vbaAryUnlock
0x401138 __vbaVarForNext
0x40113c _CIexp
0x401140 __vbaI4ErrVar
0x401144 __vbaFreeObj
0x401148 __vbaFreeStr

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.